Analysis

  • max time kernel
    53s
  • max time network
    66s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24/05/2023, 20:40

General

  • Target

    8f9798e96fc468fb5b5b21a58ce3d46d49a716f5390b46ac37c5a32e31befcc8.exe

  • Size

    983KB

  • MD5

    ddbbdc58fe6c72266416fda891a4b3db

  • SHA1

    84f542daff89c1d3c73bd58aa4afc521e8442a48

  • SHA256

    8f9798e96fc468fb5b5b21a58ce3d46d49a716f5390b46ac37c5a32e31befcc8

  • SHA512

    373adbd2af4b2abf514a3505cfef7044990a0036b207cbc0ebd5ca26f61776d20f24597af2022c1bd9ce250ccaeb7932405dfb55f08dc9e9844d449e17be9cdc

  • SSDEEP

    24576:fy30B6dpVdgpiTXVshZvgGLAmPfPwDMC4d31R:qkBizgEXuhZvX/PC4dl

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.122:19062

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Extracted

Family

redline

Botnet

ebal

C2

83.97.73.122:19062

Attributes
  • auth_value

    adedb0785152892650ba0123aadb727d

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f9798e96fc468fb5b5b21a58ce3d46d49a716f5390b46ac37c5a32e31befcc8.exe
    "C:\Users\Admin\AppData\Local\Temp\8f9798e96fc468fb5b5b21a58ce3d46d49a716f5390b46ac37c5a32e31befcc8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2460
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0970371.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0970371.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2516
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4688217.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4688217.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2872
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7538723.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7538723.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4100
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4488
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5253179.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5253179.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4148
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5217362.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5217362.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4552
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:5068
          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
            5⤵
            • Executes dropped EXE
            PID:3344
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2936843.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2936843.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:5088
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4604

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

    Filesize

    226B

    MD5

    957779c42144282d8cd83192b8fbc7cf

    SHA1

    de83d08d2cca06b9ff3d1ef239d6b60b705d25fe

    SHA256

    0d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51

    SHA512

    f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2936843.exe

    Filesize

    329KB

    MD5

    01d8de68dc93b39db0543e2c04178b24

    SHA1

    83ca8e285c1a5d73f9deb4b993a20ece314906f4

    SHA256

    e406ec39d0a0ece2ba3645dde890b84e8a38d30b167388ef2a7d5e7eab5e7785

    SHA512

    103e15e6f1403495f44a02459942ed8f4227f92da29813882b42f0b524bdb2a62542ef2b5a88f071bbfb3da4986a95fb70e586955bd5021124faee0322f509a6

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2936843.exe

    Filesize

    329KB

    MD5

    01d8de68dc93b39db0543e2c04178b24

    SHA1

    83ca8e285c1a5d73f9deb4b993a20ece314906f4

    SHA256

    e406ec39d0a0ece2ba3645dde890b84e8a38d30b167388ef2a7d5e7eab5e7785

    SHA512

    103e15e6f1403495f44a02459942ed8f4227f92da29813882b42f0b524bdb2a62542ef2b5a88f071bbfb3da4986a95fb70e586955bd5021124faee0322f509a6

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0970371.exe

    Filesize

    662KB

    MD5

    41a205ccb00723ec150da515ac0a5636

    SHA1

    00bc529c3b6e88663d3761273ea31a688a0d31e7

    SHA256

    8bedaa830f1bb153d049c38d846a27f88d09e7f1aecabc0f6b82e42302037d19

    SHA512

    f146def057c3138d730070ec947705d9a81d39cbb1176100686d56f2ab83ca26e0642886954ed61e3dafe0c9db951e4e837bfd2d22605a10d5adedc28ae5a83b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0970371.exe

    Filesize

    662KB

    MD5

    41a205ccb00723ec150da515ac0a5636

    SHA1

    00bc529c3b6e88663d3761273ea31a688a0d31e7

    SHA256

    8bedaa830f1bb153d049c38d846a27f88d09e7f1aecabc0f6b82e42302037d19

    SHA512

    f146def057c3138d730070ec947705d9a81d39cbb1176100686d56f2ab83ca26e0642886954ed61e3dafe0c9db951e4e837bfd2d22605a10d5adedc28ae5a83b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5217362.exe

    Filesize

    388KB

    MD5

    60db716b1e412fd33ecb8c7d3c82c13d

    SHA1

    79834dc25e39442a6d2e5c4c11b755bae3c784ca

    SHA256

    1a3c897bc75535178e5b3a78b9384818493d5d2e681ffafd7ded5ab16fe5773f

    SHA512

    ff0c764ee93616e3907e54d913b834b0e7495ea5908fc7cb6c60a8d28414bb5cb6d828d486b02485819cc8d10dd1d0f29d3f2f90259921d1550bdaa562f388f8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5217362.exe

    Filesize

    388KB

    MD5

    60db716b1e412fd33ecb8c7d3c82c13d

    SHA1

    79834dc25e39442a6d2e5c4c11b755bae3c784ca

    SHA256

    1a3c897bc75535178e5b3a78b9384818493d5d2e681ffafd7ded5ab16fe5773f

    SHA512

    ff0c764ee93616e3907e54d913b834b0e7495ea5908fc7cb6c60a8d28414bb5cb6d828d486b02485819cc8d10dd1d0f29d3f2f90259921d1550bdaa562f388f8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4688217.exe

    Filesize

    280KB

    MD5

    ee722c1519c9d4765033111a12387e6c

    SHA1

    a87512bf8adf8627cb0e81d2cc7b2afbec65a564

    SHA256

    024cdc51b0de8e07fb4d54c790f51355257b7f6c341190f3eae51f0c8138968c

    SHA512

    4345922b311675ce3c1e8e086b343110d4b16a35b459b977a32aa3467833178ff666aadeb96cb453686bc6b87ce9f13c33e66cab01b63dbcc8c247f601b78e0f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4688217.exe

    Filesize

    280KB

    MD5

    ee722c1519c9d4765033111a12387e6c

    SHA1

    a87512bf8adf8627cb0e81d2cc7b2afbec65a564

    SHA256

    024cdc51b0de8e07fb4d54c790f51355257b7f6c341190f3eae51f0c8138968c

    SHA512

    4345922b311675ce3c1e8e086b343110d4b16a35b459b977a32aa3467833178ff666aadeb96cb453686bc6b87ce9f13c33e66cab01b63dbcc8c247f601b78e0f

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7538723.exe

    Filesize

    194KB

    MD5

    b9dafdb4bc1bbd422684c8a6c50624d0

    SHA1

    85b811fe1900a31ee95f5140ab673401e661ce0c

    SHA256

    65e367481112e6d76b2fd02cae8dca52fbba99d8debf021b6a3628496b0ab5fb

    SHA512

    97fa9478518cc86eadb8a4b0bb8772e3b90b4ba4f6e4e3195564f21a1ca4f638b6b7fa569454a59993c9cfe8fadee5b71763b4f73d1e7ddef4551093e7dab479

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7538723.exe

    Filesize

    194KB

    MD5

    b9dafdb4bc1bbd422684c8a6c50624d0

    SHA1

    85b811fe1900a31ee95f5140ab673401e661ce0c

    SHA256

    65e367481112e6d76b2fd02cae8dca52fbba99d8debf021b6a3628496b0ab5fb

    SHA512

    97fa9478518cc86eadb8a4b0bb8772e3b90b4ba4f6e4e3195564f21a1ca4f638b6b7fa569454a59993c9cfe8fadee5b71763b4f73d1e7ddef4551093e7dab479

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5253179.exe

    Filesize

    145KB

    MD5

    f11d820105c077f31fd4b9c8571b30bd

    SHA1

    73bf50338e1b9c13b8b4cf56db515287184cd0e2

    SHA256

    f0183ba98229196c8ca90df31792a99db5bcfce90b32dfe9a98b49cad7cd096e

    SHA512

    b04b89dd6581401283ae0498473228ebcad3f15e90581d3d2c9218857ede7347363bb1a00f27a805868f962c90f737bb87bd55873f3c7892c403c65766411d13

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5253179.exe

    Filesize

    145KB

    MD5

    f11d820105c077f31fd4b9c8571b30bd

    SHA1

    73bf50338e1b9c13b8b4cf56db515287184cd0e2

    SHA256

    f0183ba98229196c8ca90df31792a99db5bcfce90b32dfe9a98b49cad7cd096e

    SHA512

    b04b89dd6581401283ae0498473228ebcad3f15e90581d3d2c9218857ede7347363bb1a00f27a805868f962c90f737bb87bd55873f3c7892c403c65766411d13

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    96KB

    MD5

    7825cad99621dd288da81d8d8ae13cf5

    SHA1

    f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c

    SHA256

    529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5

    SHA512

    2e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    96KB

    MD5

    7825cad99621dd288da81d8d8ae13cf5

    SHA1

    f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c

    SHA256

    529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5

    SHA512

    2e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    96KB

    MD5

    7825cad99621dd288da81d8d8ae13cf5

    SHA1

    f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c

    SHA256

    529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5

    SHA512

    2e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4

  • memory/4148-154-0x0000000000030000-0x000000000005A000-memory.dmp

    Filesize

    168KB

  • memory/4148-159-0x00000000048E0000-0x000000000491E000-memory.dmp

    Filesize

    248KB

  • memory/4148-171-0x0000000004CE0000-0x0000000004D46000-memory.dmp

    Filesize

    408KB

  • memory/4148-186-0x00000000060A0000-0x0000000006262000-memory.dmp

    Filesize

    1.8MB

  • memory/4148-187-0x00000000067A0000-0x0000000006CCC000-memory.dmp

    Filesize

    5.2MB

  • memory/4148-188-0x0000000004B90000-0x0000000004BA0000-memory.dmp

    Filesize

    64KB

  • memory/4148-189-0x0000000006010000-0x0000000006086000-memory.dmp

    Filesize

    472KB

  • memory/4148-190-0x0000000006270000-0x00000000062C0000-memory.dmp

    Filesize

    320KB

  • memory/4148-169-0x00000000058D0000-0x0000000005DCE000-memory.dmp

    Filesize

    5.0MB

  • memory/4148-160-0x0000000004A60000-0x0000000004AAB000-memory.dmp

    Filesize

    300KB

  • memory/4148-155-0x0000000004DC0000-0x00000000053C6000-memory.dmp

    Filesize

    6.0MB

  • memory/4148-170-0x0000000004C40000-0x0000000004CD2000-memory.dmp

    Filesize

    584KB

  • memory/4148-156-0x0000000004950000-0x0000000004A5A000-memory.dmp

    Filesize

    1.0MB

  • memory/4148-157-0x0000000004880000-0x0000000004892000-memory.dmp

    Filesize

    72KB

  • memory/4148-158-0x0000000004B90000-0x0000000004BA0000-memory.dmp

    Filesize

    64KB

  • memory/4488-143-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4604-209-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4604-225-0x0000000009660000-0x00000000096AB000-memory.dmp

    Filesize

    300KB

  • memory/4604-226-0x0000000009770000-0x0000000009780000-memory.dmp

    Filesize

    64KB

  • memory/5068-206-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/5068-205-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/5068-196-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB