Analysis

  • max time kernel
    54s
  • max time network
    74s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25-05-2023 00:54

General

  • Target

    db85964a0c20651c3f6d3cee4f57b01bb7f4f9f7fafa977cc0d47627a74cf012.exe

  • Size

    981KB

  • MD5

    f0f40c086b48c00f3ddfbf01d28ff369

  • SHA1

    8df936485e546b509656c299a970fc58807ce5c4

  • SHA256

    db85964a0c20651c3f6d3cee4f57b01bb7f4f9f7fafa977cc0d47627a74cf012

  • SHA512

    7472fb1a07f4e2dbf48025074ce64ee9270f03acc6cc033c1266c7c51a0d4cb00aad866bb1a0cb556f949f98c602d01a72f55f39799479b9341b3c70aee64587

  • SSDEEP

    24576:cym/cShyrBi1xlDUAy9TGUMhfZaFx9FykftwL:Lk/OI/DUnGphf4xW

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.122:19062

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

redline

Botnet

haval

C2

83.97.73.122:19062

Attributes
  • auth_value

    d23dec6813deb04eb8abd82657a9b0af

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\db85964a0c20651c3f6d3cee4f57b01bb7f4f9f7fafa977cc0d47627a74cf012.exe
    "C:\Users\Admin\AppData\Local\Temp\db85964a0c20651c3f6d3cee4f57b01bb7f4f9f7fafa977cc0d47627a74cf012.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4640
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0009845.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0009845.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5064
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8932429.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8932429.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:968
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f5306557.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f5306557.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4060
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6796727.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6796727.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3552
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4812
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3463385.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3463385.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4864
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
          4⤵
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:1204
          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
            5⤵
            • Executes dropped EXE
            PID:3036
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4809762.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4809762.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4804
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4492

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

    Filesize

    226B

    MD5

    957779c42144282d8cd83192b8fbc7cf

    SHA1

    de83d08d2cca06b9ff3d1ef239d6b60b705d25fe

    SHA256

    0d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51

    SHA512

    f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4809762.exe

    Filesize

    328KB

    MD5

    5743c3f34dc0f2cd42ad94b1167584e8

    SHA1

    7adfa35c0685ec7b144a186667b5ec080b2b7b04

    SHA256

    ec52c1dc9767cbea2be759deb224f2602ebe1ec3a67e8a7d63d7af040062356b

    SHA512

    394dc160bf2724f1a622ef0b9a2e82e5dc3b0a7f1d73e5a666c7c0f7a22fb7c3f1c4ee0a4707a05130f01c892091ef9115d78318b7d0f35916dd074d9b89f95c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4809762.exe

    Filesize

    328KB

    MD5

    5743c3f34dc0f2cd42ad94b1167584e8

    SHA1

    7adfa35c0685ec7b144a186667b5ec080b2b7b04

    SHA256

    ec52c1dc9767cbea2be759deb224f2602ebe1ec3a67e8a7d63d7af040062356b

    SHA512

    394dc160bf2724f1a622ef0b9a2e82e5dc3b0a7f1d73e5a666c7c0f7a22fb7c3f1c4ee0a4707a05130f01c892091ef9115d78318b7d0f35916dd074d9b89f95c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0009845.exe

    Filesize

    661KB

    MD5

    24c33a8e07c770c29e2d42730476601e

    SHA1

    53a61b02599ccac5b4fd4b08d96f0921b134ce8d

    SHA256

    cf77228938bdc7c81453cc4f8d2681dbdd9698f59d4c9a0fb913e9a5745fce9c

    SHA512

    7434708dd05c84c01fd2e989989376152ed51f567a6fb745d64588cb4e461cb2312dc31727e6e8aac89d3029521b800a36d0890f257e3a8bc8ffff6e637d9604

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0009845.exe

    Filesize

    661KB

    MD5

    24c33a8e07c770c29e2d42730476601e

    SHA1

    53a61b02599ccac5b4fd4b08d96f0921b134ce8d

    SHA256

    cf77228938bdc7c81453cc4f8d2681dbdd9698f59d4c9a0fb913e9a5745fce9c

    SHA512

    7434708dd05c84c01fd2e989989376152ed51f567a6fb745d64588cb4e461cb2312dc31727e6e8aac89d3029521b800a36d0890f257e3a8bc8ffff6e637d9604

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3463385.exe

    Filesize

    387KB

    MD5

    78f1ef5eee69fa43e105cae3cdf96542

    SHA1

    600d3fe55aa0f279d0044f597fcdf79c26b9c26d

    SHA256

    a6ace47a07c170d01695ed5cf443737ef9091856bf82d5a44160efb7e5220174

    SHA512

    5c6d77b748acb09f3e5f58987fdfd9d58bab48d37e1bc2e056d4cfc3a30c09580397d7f3789dea1d6f294a46a3f826bd5158925b1e8a37d9855669df34723762

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3463385.exe

    Filesize

    387KB

    MD5

    78f1ef5eee69fa43e105cae3cdf96542

    SHA1

    600d3fe55aa0f279d0044f597fcdf79c26b9c26d

    SHA256

    a6ace47a07c170d01695ed5cf443737ef9091856bf82d5a44160efb7e5220174

    SHA512

    5c6d77b748acb09f3e5f58987fdfd9d58bab48d37e1bc2e056d4cfc3a30c09580397d7f3789dea1d6f294a46a3f826bd5158925b1e8a37d9855669df34723762

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8932429.exe

    Filesize

    280KB

    MD5

    8b2f9a7e766ed28d1a8854cc035773bf

    SHA1

    210970cb50bd02f2b63c9ea283b3e67c5fa72f93

    SHA256

    aa2c1004c5d9668fe9f9d16d04c1bf19c047f792032223a000d6c71e2f1b8872

    SHA512

    4fce2e212df590e3aa9d3a6fecf07d886c76c67371c57b084d5ddbb7ca561da26c19373061d524f698fd52992df05850fe1bc352db7cf36850f4e7764aecc8d5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8932429.exe

    Filesize

    280KB

    MD5

    8b2f9a7e766ed28d1a8854cc035773bf

    SHA1

    210970cb50bd02f2b63c9ea283b3e67c5fa72f93

    SHA256

    aa2c1004c5d9668fe9f9d16d04c1bf19c047f792032223a000d6c71e2f1b8872

    SHA512

    4fce2e212df590e3aa9d3a6fecf07d886c76c67371c57b084d5ddbb7ca561da26c19373061d524f698fd52992df05850fe1bc352db7cf36850f4e7764aecc8d5

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f5306557.exe

    Filesize

    146KB

    MD5

    4433090662a8f4575567db3837da12b0

    SHA1

    7144b4ead4a87b53b9126aab1d45b453b249c1cd

    SHA256

    2eb3fbb8c7b93661bcbecbba7524e3179a5c0218607fded6f5bea5aa2cbf8275

    SHA512

    3d4e41f679257caadad891fd8be10260e35b0e115af63accd83b65637f2bc3e756e6a0faa1c67b80e6b1c4dc7d165587d91b245eab14f425c5c39b069bbcc0b4

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f5306557.exe

    Filesize

    146KB

    MD5

    4433090662a8f4575567db3837da12b0

    SHA1

    7144b4ead4a87b53b9126aab1d45b453b249c1cd

    SHA256

    2eb3fbb8c7b93661bcbecbba7524e3179a5c0218607fded6f5bea5aa2cbf8275

    SHA512

    3d4e41f679257caadad891fd8be10260e35b0e115af63accd83b65637f2bc3e756e6a0faa1c67b80e6b1c4dc7d165587d91b245eab14f425c5c39b069bbcc0b4

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6796727.exe

    Filesize

    194KB

    MD5

    086deba0ff5ecacd20120f09163e999e

    SHA1

    74d9dc462d877b4bdc9d1a9511fb7c4f2a2361fb

    SHA256

    1909e26484c64714ff509082e33669ec2d610c73d7de3c80690f45e82d272e36

    SHA512

    5b01724764fbd73c0779fc1b741800875f0f0cade0d2b18839d70ad49e5cc841c0505988ddcbf32e0271c0a17daa33749300c62b76fc8116f419c6b13741a84d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6796727.exe

    Filesize

    194KB

    MD5

    086deba0ff5ecacd20120f09163e999e

    SHA1

    74d9dc462d877b4bdc9d1a9511fb7c4f2a2361fb

    SHA256

    1909e26484c64714ff509082e33669ec2d610c73d7de3c80690f45e82d272e36

    SHA512

    5b01724764fbd73c0779fc1b741800875f0f0cade0d2b18839d70ad49e5cc841c0505988ddcbf32e0271c0a17daa33749300c62b76fc8116f419c6b13741a84d

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    96KB

    MD5

    7825cad99621dd288da81d8d8ae13cf5

    SHA1

    f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c

    SHA256

    529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5

    SHA512

    2e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    96KB

    MD5

    7825cad99621dd288da81d8d8ae13cf5

    SHA1

    f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c

    SHA256

    529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5

    SHA512

    2e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    96KB

    MD5

    7825cad99621dd288da81d8d8ae13cf5

    SHA1

    f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c

    SHA256

    529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5

    SHA512

    2e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4

  • memory/1204-174-0x0000000000610000-0x0000000000648000-memory.dmp

    Filesize

    224KB

  • memory/1204-181-0x0000000000610000-0x0000000000648000-memory.dmp

    Filesize

    224KB

  • memory/1204-184-0x0000000000610000-0x0000000000648000-memory.dmp

    Filesize

    224KB

  • memory/4060-145-0x00000000048F0000-0x0000000004902000-memory.dmp

    Filesize

    72KB

  • memory/4060-149-0x0000000004CF0000-0x0000000004D82000-memory.dmp

    Filesize

    584KB

  • memory/4060-155-0x00000000061C0000-0x0000000006382000-memory.dmp

    Filesize

    1.8MB

  • memory/4060-154-0x0000000004C40000-0x0000000004C50000-memory.dmp

    Filesize

    64KB

  • memory/4060-142-0x00000000000A0000-0x00000000000CA000-memory.dmp

    Filesize

    168KB

  • memory/4060-153-0x0000000005970000-0x00000000059C0000-memory.dmp

    Filesize

    320KB

  • memory/4060-152-0x00000000058F0000-0x0000000005966000-memory.dmp

    Filesize

    472KB

  • memory/4060-151-0x0000000004D90000-0x0000000004DF6000-memory.dmp

    Filesize

    408KB

  • memory/4060-150-0x00000000059F0000-0x0000000005EEE000-memory.dmp

    Filesize

    5.0MB

  • memory/4060-156-0x00000000068C0000-0x0000000006DEC000-memory.dmp

    Filesize

    5.2MB

  • memory/4060-148-0x0000000004990000-0x00000000049DB000-memory.dmp

    Filesize

    300KB

  • memory/4060-147-0x0000000004950000-0x000000000498E000-memory.dmp

    Filesize

    248KB

  • memory/4060-143-0x0000000004EE0000-0x00000000054E6000-memory.dmp

    Filesize

    6.0MB

  • memory/4060-146-0x0000000004C40000-0x0000000004C50000-memory.dmp

    Filesize

    64KB

  • memory/4060-144-0x00000000049E0000-0x0000000004AEA000-memory.dmp

    Filesize

    1.0MB

  • memory/4492-187-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4492-202-0x00000000098C0000-0x000000000990B000-memory.dmp

    Filesize

    300KB

  • memory/4492-207-0x0000000009A30000-0x0000000009A40000-memory.dmp

    Filesize

    64KB

  • memory/4812-162-0x0000000000710000-0x000000000071A000-memory.dmp

    Filesize

    40KB