Analysis

  • max time kernel
    55s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2023 21:06

General

  • Target

    2f5079aa5054888becc752de4faeb986c783a9aa1a93b7052ecc543f0c9d3f3b.exe

  • Size

    984KB

  • MD5

    7a09013ce9da0eaa8d2ff695d5eb1712

  • SHA1

    4738060b2a93cc477778ce562ae405a337ba1f9f

  • SHA256

    2f5079aa5054888becc752de4faeb986c783a9aa1a93b7052ecc543f0c9d3f3b

  • SHA512

    9f54a8f2a19a21968d872a74e608101df931d79ad5345c3e3e33223242e38122db5f3d618cd1611d0cb6fe345a373d7147c7a62ce05546880ef687d6b7b17a8b

  • SSDEEP

    12288:wMrDy90N2CDxwU5++9aWBHa1lLUoZK/0TsAyRWgTqxvoh/ohD8mY9+s1VKfBAuPG:jye2KNUlLUp/R9TqGyh4cZAuPfqlehS

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.122:19062

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

redline

Botnet

ebal

C2

83.97.73.122:19062

Attributes
  • auth_value

    adedb0785152892650ba0123aadb727d

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f5079aa5054888becc752de4faeb986c783a9aa1a93b7052ecc543f0c9d3f3b.exe
    "C:\Users\Admin\AppData\Local\Temp\2f5079aa5054888becc752de4faeb986c783a9aa1a93b7052ecc543f0c9d3f3b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2804
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5902516.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5902516.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:724
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8025602.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8025602.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3340
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k5859601.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k5859601.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:236
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:5064
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l1881027.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l1881027.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2084
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m4095682.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m4095682.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1484
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
          4⤵
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:3712
          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
            5⤵
            • Executes dropped EXE
            PID:4768
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n7114440.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n7114440.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1680
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2336

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

    Filesize

    226B

    MD5

    916851e072fbabc4796d8916c5131092

    SHA1

    d48a602229a690c512d5fdaf4c8d77547a88e7a2

    SHA256

    7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

    SHA512

    07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n7114440.exe

    Filesize

    328KB

    MD5

    58700b5dcdd711d17322239daceba1b2

    SHA1

    62eb93d96bf3a2d40a63e834bea214969b17a81c

    SHA256

    ddd3e855f21e15c1fbf703518bd8c62c77c0e40a4d9edc937648d6c3c9496020

    SHA512

    3ffbda8dcb72506aa576d0c9df8c1146fff05e74d2092497ca1b40c018579463379d13e6ae8402ac849750b871eb66d302f026224ef0cac3fc853ea2918c6541

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n7114440.exe

    Filesize

    328KB

    MD5

    58700b5dcdd711d17322239daceba1b2

    SHA1

    62eb93d96bf3a2d40a63e834bea214969b17a81c

    SHA256

    ddd3e855f21e15c1fbf703518bd8c62c77c0e40a4d9edc937648d6c3c9496020

    SHA512

    3ffbda8dcb72506aa576d0c9df8c1146fff05e74d2092497ca1b40c018579463379d13e6ae8402ac849750b871eb66d302f026224ef0cac3fc853ea2918c6541

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5902516.exe

    Filesize

    663KB

    MD5

    5eda0b1429a2f1b3e34d53c6a8c5e5f2

    SHA1

    045eb78b274d7df6158269b53fbe6070bbd7618d

    SHA256

    f2642c8a3fc5c30f9fc5a37a347af3d516998048a469dc12c947de13e76c1879

    SHA512

    954add38ac2487c202f17733b1a458f84b877a9728d7c97bb7bcb7b40d3d90e010b9eaa6f33acd42c196f1e136055c1211e74ad9bb1685b397578737b301cffc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5902516.exe

    Filesize

    663KB

    MD5

    5eda0b1429a2f1b3e34d53c6a8c5e5f2

    SHA1

    045eb78b274d7df6158269b53fbe6070bbd7618d

    SHA256

    f2642c8a3fc5c30f9fc5a37a347af3d516998048a469dc12c947de13e76c1879

    SHA512

    954add38ac2487c202f17733b1a458f84b877a9728d7c97bb7bcb7b40d3d90e010b9eaa6f33acd42c196f1e136055c1211e74ad9bb1685b397578737b301cffc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m4095682.exe

    Filesize

    388KB

    MD5

    16bc1c9e5c0bce960908f6d044918a78

    SHA1

    abb499189787987353942bae090252023ea60089

    SHA256

    8efd01e58400dcf4c6797c61e9d59e644dbfbe9efe52cd3cc4a5af089335967f

    SHA512

    f0d32082f78c32aa65cf62547ca07cfde31b171ee217487e90b6baf93f259750a0166357e5ac36e0f7741bb036fc8a73cfe7a5ff865f9c8423f1ed51996b523f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m4095682.exe

    Filesize

    388KB

    MD5

    16bc1c9e5c0bce960908f6d044918a78

    SHA1

    abb499189787987353942bae090252023ea60089

    SHA256

    8efd01e58400dcf4c6797c61e9d59e644dbfbe9efe52cd3cc4a5af089335967f

    SHA512

    f0d32082f78c32aa65cf62547ca07cfde31b171ee217487e90b6baf93f259750a0166357e5ac36e0f7741bb036fc8a73cfe7a5ff865f9c8423f1ed51996b523f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8025602.exe

    Filesize

    280KB

    MD5

    ddaede5e34a393e4a106bcaff8b54836

    SHA1

    951e87248ca0e85727775f852cbb5b5b63b9d37b

    SHA256

    a18f40fe5d8b693445f91609a81372d162ca618a575ad255dc1b6fbd9571369d

    SHA512

    7a7fd36d759811fab8565ad8d2728d87cfead5f7446c01247a4e2642a81febfbfa66dd1d6ce13be37bb5b0eba85242ccb9792b3cc3d9b5fe182ccae8f2b41329

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8025602.exe

    Filesize

    280KB

    MD5

    ddaede5e34a393e4a106bcaff8b54836

    SHA1

    951e87248ca0e85727775f852cbb5b5b63b9d37b

    SHA256

    a18f40fe5d8b693445f91609a81372d162ca618a575ad255dc1b6fbd9571369d

    SHA512

    7a7fd36d759811fab8565ad8d2728d87cfead5f7446c01247a4e2642a81febfbfa66dd1d6ce13be37bb5b0eba85242ccb9792b3cc3d9b5fe182ccae8f2b41329

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k5859601.exe

    Filesize

    194KB

    MD5

    201fb27fbb399174e92f9aa2b61a1d5f

    SHA1

    2b750a545d6db17a4b5d786e4373c325d097090d

    SHA256

    39f779bbe0ddbb2bb7684630efa46575592e589a3d66ba4ca1de4bbe66bcee65

    SHA512

    5bfbe88ddb4859cc34b114fd06f980996f47b6048086078d323d8e3a6ab045edfb490d9cf9e8f75bda17bee9df9adae8f9c29fdac521166157cb7937f4eb3567

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k5859601.exe

    Filesize

    194KB

    MD5

    201fb27fbb399174e92f9aa2b61a1d5f

    SHA1

    2b750a545d6db17a4b5d786e4373c325d097090d

    SHA256

    39f779bbe0ddbb2bb7684630efa46575592e589a3d66ba4ca1de4bbe66bcee65

    SHA512

    5bfbe88ddb4859cc34b114fd06f980996f47b6048086078d323d8e3a6ab045edfb490d9cf9e8f75bda17bee9df9adae8f9c29fdac521166157cb7937f4eb3567

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l1881027.exe

    Filesize

    146KB

    MD5

    fabdf4d2e14d2eb0df5743a1d8aba7a9

    SHA1

    86ebbfb8770da9a599b75cdb3ab47767923a5eb7

    SHA256

    165adbd3a6210b58eabd70d8abbfa6f4b7e486e246cac7a13dc5d3f48e573d3e

    SHA512

    d882859ebf0dde39292c491a65820b5d837a51b165a418774a026619afa2521172a4443735cfeec7f8b4a1f76737c1f9dbec058178fb9e730df91dae9fc92a86

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l1881027.exe

    Filesize

    146KB

    MD5

    fabdf4d2e14d2eb0df5743a1d8aba7a9

    SHA1

    86ebbfb8770da9a599b75cdb3ab47767923a5eb7

    SHA256

    165adbd3a6210b58eabd70d8abbfa6f4b7e486e246cac7a13dc5d3f48e573d3e

    SHA512

    d882859ebf0dde39292c491a65820b5d837a51b165a418774a026619afa2521172a4443735cfeec7f8b4a1f76737c1f9dbec058178fb9e730df91dae9fc92a86

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    101KB

    MD5

    89d41e1cf478a3d3c2c701a27a5692b2

    SHA1

    691e20583ef80cb9a2fd3258560e7f02481d12fd

    SHA256

    dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac

    SHA512

    5c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    101KB

    MD5

    89d41e1cf478a3d3c2c701a27a5692b2

    SHA1

    691e20583ef80cb9a2fd3258560e7f02481d12fd

    SHA256

    dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac

    SHA512

    5c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    101KB

    MD5

    89d41e1cf478a3d3c2c701a27a5692b2

    SHA1

    691e20583ef80cb9a2fd3258560e7f02481d12fd

    SHA256

    dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac

    SHA512

    5c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc

  • memory/2084-173-0x0000000006240000-0x00000000062B6000-memory.dmp

    Filesize

    472KB

  • memory/2084-169-0x00000000055B0000-0x0000000005616000-memory.dmp

    Filesize

    408KB

  • memory/2084-170-0x0000000006020000-0x00000000060B2000-memory.dmp

    Filesize

    584KB

  • memory/2084-174-0x00000000062C0000-0x0000000006310000-memory.dmp

    Filesize

    320KB

  • memory/2084-175-0x0000000005430000-0x0000000005440000-memory.dmp

    Filesize

    64KB

  • memory/2084-176-0x0000000006C20000-0x0000000006DE2000-memory.dmp

    Filesize

    1.8MB

  • memory/2084-177-0x0000000007320000-0x000000000784C000-memory.dmp

    Filesize

    5.2MB

  • memory/2084-164-0x0000000005650000-0x0000000005C68000-memory.dmp

    Filesize

    6.1MB

  • memory/2084-168-0x0000000005430000-0x0000000005440000-memory.dmp

    Filesize

    64KB

  • memory/2084-171-0x0000000006670000-0x0000000006C14000-memory.dmp

    Filesize

    5.6MB

  • memory/2084-167-0x0000000005160000-0x000000000519C000-memory.dmp

    Filesize

    240KB

  • memory/2084-165-0x00000000051D0000-0x00000000052DA000-memory.dmp

    Filesize

    1.0MB

  • memory/2084-166-0x0000000005100000-0x0000000005112000-memory.dmp

    Filesize

    72KB

  • memory/2084-163-0x0000000000730000-0x000000000075A000-memory.dmp

    Filesize

    168KB

  • memory/2336-196-0x0000000000550000-0x000000000057A000-memory.dmp

    Filesize

    168KB

  • memory/2336-215-0x0000000004E00000-0x0000000004E10000-memory.dmp

    Filesize

    64KB

  • memory/3712-183-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/3712-193-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/3712-192-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/5064-155-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB