Analysis

  • max time kernel
    51s
  • max time network
    75s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24-05-2023 21:19

General

  • Target

    53b5a446e22fe904af6ce03fca8f2c16183325a9bab3578800cce8dd4c1c9cb2.exe

  • Size

    983KB

  • MD5

    28547c7f55ae431083e20ca1c4bd0c07

  • SHA1

    c8574a17b1180c6e5d6b7a0413cf15f5262104b8

  • SHA256

    53b5a446e22fe904af6ce03fca8f2c16183325a9bab3578800cce8dd4c1c9cb2

  • SHA512

    6389d54f612d47fe56a7bdcc50f42608fc7f59526307a3c7fe39ed2d446dbb805a782e8393ed47cf88cfa2069a39f5414e3e8688e6877e8be7fe4bac1b7fa25a

  • SSDEEP

    24576:6yJfg3c4bcYf4dFpPbUPldWPT8lhhfawuLAgPf1IKkYrx:Ba3rbjAFpPv8Xh4E0

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.122:19062

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Extracted

Family

redline

Botnet

ebal

C2

83.97.73.122:19062

Attributes
  • auth_value

    adedb0785152892650ba0123aadb727d

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\53b5a446e22fe904af6ce03fca8f2c16183325a9bab3578800cce8dd4c1c9cb2.exe
    "C:\Users\Admin\AppData\Local\Temp\53b5a446e22fe904af6ce03fca8f2c16183325a9bab3578800cce8dd4c1c9cb2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3944
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9158454.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9158454.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5048
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4430652.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4430652.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3560
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6791490.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6791490.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4556
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4748
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1539848.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1539848.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3096
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c4457409.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c4457409.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4348
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
          4⤵
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4972
          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
            5⤵
            • Executes dropped EXE
            PID:4280
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6226311.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6226311.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4420
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1740

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

    Filesize

    226B

    MD5

    957779c42144282d8cd83192b8fbc7cf

    SHA1

    de83d08d2cca06b9ff3d1ef239d6b60b705d25fe

    SHA256

    0d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51

    SHA512

    f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6226311.exe

    Filesize

    329KB

    MD5

    2ff62f35483c62f6235a8b56708b7422

    SHA1

    cc691b20fb56964e5d2ffaf9344ff7b00e0d3339

    SHA256

    45e8c1b99353d1b8fde5da2a1697dbc2a92fe18383092b84ca92690a8747d4c8

    SHA512

    db070349350c5aa4bc288087e582c4869495ac0cc9dae827659472f8436b97976b82966c443d4bbe9f8235229767166fe6d022a333466e51dcfdc94afe2ea525

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6226311.exe

    Filesize

    329KB

    MD5

    2ff62f35483c62f6235a8b56708b7422

    SHA1

    cc691b20fb56964e5d2ffaf9344ff7b00e0d3339

    SHA256

    45e8c1b99353d1b8fde5da2a1697dbc2a92fe18383092b84ca92690a8747d4c8

    SHA512

    db070349350c5aa4bc288087e582c4869495ac0cc9dae827659472f8436b97976b82966c443d4bbe9f8235229767166fe6d022a333466e51dcfdc94afe2ea525

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9158454.exe

    Filesize

    662KB

    MD5

    a3a017a7932d458a61ebccd136c6be79

    SHA1

    8b804863001a21aa0d46ee2c88b4265bd4f2d114

    SHA256

    075950d8388cd8067d9505918bb7e1450950cf0d102cc027c024783fd419672b

    SHA512

    19ec541da20f075ddd83654dae3d154ef3d84bb53ad7708478fa8e4f95a7684a22c9dd73d5c31f2bba4fb2a58b8fcf5ee645dbe87ae1825189e52177a11ce6b6

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9158454.exe

    Filesize

    662KB

    MD5

    a3a017a7932d458a61ebccd136c6be79

    SHA1

    8b804863001a21aa0d46ee2c88b4265bd4f2d114

    SHA256

    075950d8388cd8067d9505918bb7e1450950cf0d102cc027c024783fd419672b

    SHA512

    19ec541da20f075ddd83654dae3d154ef3d84bb53ad7708478fa8e4f95a7684a22c9dd73d5c31f2bba4fb2a58b8fcf5ee645dbe87ae1825189e52177a11ce6b6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c4457409.exe

    Filesize

    388KB

    MD5

    116289f13e8bccabaa20e0beef06ed5c

    SHA1

    b96e85739e827e57fe7975785e56f49c2229b2e6

    SHA256

    efaf8f82d795400aaffa6d0e8236d6b462c7d402ace0efaff78df221235ae4cf

    SHA512

    6965cb378eaf9a4a54e4563a3e9ec0417e46407422005f33a27c12a2013da0c97be849394af280e3ee69a5e740551efbb76b5ad3e735c24bab874d70989aa808

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c4457409.exe

    Filesize

    388KB

    MD5

    116289f13e8bccabaa20e0beef06ed5c

    SHA1

    b96e85739e827e57fe7975785e56f49c2229b2e6

    SHA256

    efaf8f82d795400aaffa6d0e8236d6b462c7d402ace0efaff78df221235ae4cf

    SHA512

    6965cb378eaf9a4a54e4563a3e9ec0417e46407422005f33a27c12a2013da0c97be849394af280e3ee69a5e740551efbb76b5ad3e735c24bab874d70989aa808

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4430652.exe

    Filesize

    280KB

    MD5

    52865e00b59ccc445a079177ac2c7b4d

    SHA1

    42c56f5614300bc44768f907d74feb9899fc668b

    SHA256

    96597037c44babe5194130078d12a29405c611ebf718e87da4c9651c516df749

    SHA512

    77c2a7db9ec61ef93b12d01177bc50938d19b57430c14d6df329e511348d7f16ae3a8f5a755151416c38bbd835e491774613728835d3f73714c541f1b9bfeca0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4430652.exe

    Filesize

    280KB

    MD5

    52865e00b59ccc445a079177ac2c7b4d

    SHA1

    42c56f5614300bc44768f907d74feb9899fc668b

    SHA256

    96597037c44babe5194130078d12a29405c611ebf718e87da4c9651c516df749

    SHA512

    77c2a7db9ec61ef93b12d01177bc50938d19b57430c14d6df329e511348d7f16ae3a8f5a755151416c38bbd835e491774613728835d3f73714c541f1b9bfeca0

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6791490.exe

    Filesize

    194KB

    MD5

    75dd452a5be2c240175a4f83c4398590

    SHA1

    4f8f3ed3653e30a6bb0008bc2033bcb4012748c1

    SHA256

    c53fd9418361cea462bc520264c4c262d96b6d6e0e28804c4fb28394c2a93294

    SHA512

    bfd63cc70e4aa4c96ef5be777d2a63f3e24a662f537f5226c0639903f22824060732f8b7449b89307f74644d75cae7430b58ec643e34cf6b95f1bd032bfdcb28

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6791490.exe

    Filesize

    194KB

    MD5

    75dd452a5be2c240175a4f83c4398590

    SHA1

    4f8f3ed3653e30a6bb0008bc2033bcb4012748c1

    SHA256

    c53fd9418361cea462bc520264c4c262d96b6d6e0e28804c4fb28394c2a93294

    SHA512

    bfd63cc70e4aa4c96ef5be777d2a63f3e24a662f537f5226c0639903f22824060732f8b7449b89307f74644d75cae7430b58ec643e34cf6b95f1bd032bfdcb28

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1539848.exe

    Filesize

    145KB

    MD5

    1f387e8748827ea60763bb505f33d7e6

    SHA1

    e97562396e544dd70bcd9d8574a600e75eb2f0bf

    SHA256

    80bc29027d5c9126c89b21fbbe6ee1e672dfb81f37b449fe5d96f80938027959

    SHA512

    69f57e9c836cb74f9442a27662bc233660fd3c0932b6c290f5606658bf4a8e3c94686877df31a1795c65799695d334f1861d65249548cfa9ed1566905bf193ed

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1539848.exe

    Filesize

    145KB

    MD5

    1f387e8748827ea60763bb505f33d7e6

    SHA1

    e97562396e544dd70bcd9d8574a600e75eb2f0bf

    SHA256

    80bc29027d5c9126c89b21fbbe6ee1e672dfb81f37b449fe5d96f80938027959

    SHA512

    69f57e9c836cb74f9442a27662bc233660fd3c0932b6c290f5606658bf4a8e3c94686877df31a1795c65799695d334f1861d65249548cfa9ed1566905bf193ed

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    96KB

    MD5

    7825cad99621dd288da81d8d8ae13cf5

    SHA1

    f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c

    SHA256

    529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5

    SHA512

    2e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    96KB

    MD5

    7825cad99621dd288da81d8d8ae13cf5

    SHA1

    f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c

    SHA256

    529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5

    SHA512

    2e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    96KB

    MD5

    7825cad99621dd288da81d8d8ae13cf5

    SHA1

    f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c

    SHA256

    529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5

    SHA512

    2e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4

  • memory/1740-208-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1740-224-0x0000000009130000-0x000000000917B000-memory.dmp

    Filesize

    300KB

  • memory/1740-225-0x0000000009000000-0x0000000009010000-memory.dmp

    Filesize

    64KB

  • memory/3096-153-0x00000000009D0000-0x00000000009FA000-memory.dmp

    Filesize

    168KB

  • memory/3096-158-0x00000000053E0000-0x000000000542B000-memory.dmp

    Filesize

    300KB

  • memory/3096-187-0x00000000069C0000-0x0000000006A36000-memory.dmp

    Filesize

    472KB

  • memory/3096-188-0x0000000006C50000-0x0000000006CA0000-memory.dmp

    Filesize

    320KB

  • memory/3096-189-0x0000000005370000-0x0000000005380000-memory.dmp

    Filesize

    64KB

  • memory/3096-171-0x0000000006A80000-0x0000000006C42000-memory.dmp

    Filesize

    1.8MB

  • memory/3096-170-0x00000000057C0000-0x0000000005826000-memory.dmp

    Filesize

    408KB

  • memory/3096-154-0x00000000058A0000-0x0000000005EA6000-memory.dmp

    Filesize

    6.0MB

  • memory/3096-169-0x0000000005720000-0x00000000057B2000-memory.dmp

    Filesize

    584KB

  • memory/3096-155-0x0000000005430000-0x000000000553A000-memory.dmp

    Filesize

    1.0MB

  • memory/3096-156-0x0000000005380000-0x0000000005392000-memory.dmp

    Filesize

    72KB

  • memory/3096-168-0x00000000063B0000-0x00000000068AE000-memory.dmp

    Filesize

    5.0MB

  • memory/3096-159-0x0000000005370000-0x0000000005380000-memory.dmp

    Filesize

    64KB

  • memory/3096-176-0x0000000007180000-0x00000000076AC000-memory.dmp

    Filesize

    5.2MB

  • memory/3096-157-0x00000000053A0000-0x00000000053DE000-memory.dmp

    Filesize

    248KB

  • memory/4748-142-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4972-205-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/4972-204-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/4972-195-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB