Analysis

  • max time kernel
    49s
  • max time network
    56s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25-05-2023 01:33

General

  • Target

    84c5862f16628c85a4618e5b8deea0f7dde70498589803e9bfaf9c35cd7c8d47.exe

  • Size

    982KB

  • MD5

    e0d1dce047e5d786a0c3b1792e0c132c

  • SHA1

    871efdab8717cb6ff59bdd82804731b96d113965

  • SHA256

    84c5862f16628c85a4618e5b8deea0f7dde70498589803e9bfaf9c35cd7c8d47

  • SHA512

    5a216282331f45e314ec3bc16152e8a78c3251428d47f406c28157af4f0c2bdd1385b63299b39950d9d59f40e592ec9045538a916d4930982e9a1796ed38c297

  • SSDEEP

    24576:ry9MbiznEd/93kFrDlxVbjTAkBhydMAtuLFDkfJ2/5:e9g0+/JkFrDHVrAahqdEt9

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.122:19062

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Extracted

Family

redline

Botnet

haval

C2

83.97.73.122:19062

Attributes
  • auth_value

    d23dec6813deb04eb8abd82657a9b0af

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\84c5862f16628c85a4618e5b8deea0f7dde70498589803e9bfaf9c35cd7c8d47.exe
    "C:\Users\Admin\AppData\Local\Temp\84c5862f16628c85a4618e5b8deea0f7dde70498589803e9bfaf9c35cd7c8d47.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3346391.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3346391.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2328
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3506623.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3506623.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2572
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4877897.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4877897.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2636
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4980
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7716794.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7716794.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1452
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3352793.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3352793.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1780
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
          4⤵
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:1296
          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
            5⤵
            • Executes dropped EXE
            PID:392
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5288523.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5288523.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4748
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4904

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

    Filesize

    226B

    MD5

    957779c42144282d8cd83192b8fbc7cf

    SHA1

    de83d08d2cca06b9ff3d1ef239d6b60b705d25fe

    SHA256

    0d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51

    SHA512

    f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5288523.exe

    Filesize

    328KB

    MD5

    8d1a701393c04ba5348bb0df46235e93

    SHA1

    829f408877feb6d7ce7d0e985e2cc25ec461cbe2

    SHA256

    218dab9be2b7a2127fc91f6a45651bb5fe394397654b112ddaeecae09a2505d7

    SHA512

    20b2f9fe6a331dcaef2944acb51da1545539edc2beeb59c2175d351fe987bfd2fb1b6b1189215d99de5b11ad270d3bb85cd595a20cfa4c679de517f851ce6287

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5288523.exe

    Filesize

    328KB

    MD5

    8d1a701393c04ba5348bb0df46235e93

    SHA1

    829f408877feb6d7ce7d0e985e2cc25ec461cbe2

    SHA256

    218dab9be2b7a2127fc91f6a45651bb5fe394397654b112ddaeecae09a2505d7

    SHA512

    20b2f9fe6a331dcaef2944acb51da1545539edc2beeb59c2175d351fe987bfd2fb1b6b1189215d99de5b11ad270d3bb85cd595a20cfa4c679de517f851ce6287

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3346391.exe

    Filesize

    661KB

    MD5

    863787165bac02e9209eb3dd2d407ba6

    SHA1

    439667ce1225f156e0e88054d4be7375019c3871

    SHA256

    e5d1158eaeb39eb8266672f089c93e8d461ae43d47c49cca61547857dc1bd08b

    SHA512

    393c823461d66c52ddd5395380532e694bd65e5185fa62e44342a8ee3777885639f4802da82c8861bdef4d528a0e23ac12fcc653665493d1dfcd61ee19b8ef0b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3346391.exe

    Filesize

    661KB

    MD5

    863787165bac02e9209eb3dd2d407ba6

    SHA1

    439667ce1225f156e0e88054d4be7375019c3871

    SHA256

    e5d1158eaeb39eb8266672f089c93e8d461ae43d47c49cca61547857dc1bd08b

    SHA512

    393c823461d66c52ddd5395380532e694bd65e5185fa62e44342a8ee3777885639f4802da82c8861bdef4d528a0e23ac12fcc653665493d1dfcd61ee19b8ef0b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3352793.exe

    Filesize

    388KB

    MD5

    9b689109f51fd2247b0e6971cf59505a

    SHA1

    e2afef32a404b7311349784f561047bd0bd6be7b

    SHA256

    cfa154865d2db3954e79b73b2bf599c38bb1a6e09c22b5d92d76c076a23e7afb

    SHA512

    73e9a0cc19250fd60556be809a2c662c30ab94d7ef4a950a3dd372f798c09c94ddb8d89511209ea4853dad6f7386728a667f890e3263ff6bd33075e12ae647f5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3352793.exe

    Filesize

    388KB

    MD5

    9b689109f51fd2247b0e6971cf59505a

    SHA1

    e2afef32a404b7311349784f561047bd0bd6be7b

    SHA256

    cfa154865d2db3954e79b73b2bf599c38bb1a6e09c22b5d92d76c076a23e7afb

    SHA512

    73e9a0cc19250fd60556be809a2c662c30ab94d7ef4a950a3dd372f798c09c94ddb8d89511209ea4853dad6f7386728a667f890e3263ff6bd33075e12ae647f5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3506623.exe

    Filesize

    280KB

    MD5

    684e88c4d04e9e23605ade095345fa7f

    SHA1

    67889c8c2bcb63d2013e3594f210b3978d6c6d7a

    SHA256

    21f1b4bbbb0ee56d52b34df37170765bd4330444825a56123e0d331ad058a80b

    SHA512

    de2832f4206410b15a601b54ba08ac5a84e84858b108dd650c6c352de6a2c2450892901c81af7f84a19624d9554f454ac80d01b362c0d124f83e4f2031437b93

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3506623.exe

    Filesize

    280KB

    MD5

    684e88c4d04e9e23605ade095345fa7f

    SHA1

    67889c8c2bcb63d2013e3594f210b3978d6c6d7a

    SHA256

    21f1b4bbbb0ee56d52b34df37170765bd4330444825a56123e0d331ad058a80b

    SHA512

    de2832f4206410b15a601b54ba08ac5a84e84858b108dd650c6c352de6a2c2450892901c81af7f84a19624d9554f454ac80d01b362c0d124f83e4f2031437b93

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4877897.exe

    Filesize

    194KB

    MD5

    8e6184575f76746c48f6abedd1a78afe

    SHA1

    c8d3821a0c3c168265c8b4bb7969067aaa5d72bb

    SHA256

    3302c1bd1ee250f70bbe9edfd0c326a8cf784d980c6d08d1c0aa6d6e0ef4c1ba

    SHA512

    be1f40f88d5d4a28b777f9a4cec6eb38a1b554e008842e68afeea7885971b623f4bd7c6655395f416085b69e301b7b616d216232d3a75b9001a23dcce3e4ca57

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4877897.exe

    Filesize

    194KB

    MD5

    8e6184575f76746c48f6abedd1a78afe

    SHA1

    c8d3821a0c3c168265c8b4bb7969067aaa5d72bb

    SHA256

    3302c1bd1ee250f70bbe9edfd0c326a8cf784d980c6d08d1c0aa6d6e0ef4c1ba

    SHA512

    be1f40f88d5d4a28b777f9a4cec6eb38a1b554e008842e68afeea7885971b623f4bd7c6655395f416085b69e301b7b616d216232d3a75b9001a23dcce3e4ca57

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7716794.exe

    Filesize

    145KB

    MD5

    f423687c66197379289f5f7707e804a4

    SHA1

    2cf8548aa44a15df892f37bd57b269dfe40b20aa

    SHA256

    5fe3eff7487d1432a24937b19c9e248506d116987638e137eda10efa6c9ec8d0

    SHA512

    04a62c3bd66862c8ff06b6490d8c7d71cc133d673bec67bcd57506250d6c67b80cb5d7648b5f3ddf28955fcdd6717641aaf17e8136d3ea838e25783dac15d8d9

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7716794.exe

    Filesize

    145KB

    MD5

    f423687c66197379289f5f7707e804a4

    SHA1

    2cf8548aa44a15df892f37bd57b269dfe40b20aa

    SHA256

    5fe3eff7487d1432a24937b19c9e248506d116987638e137eda10efa6c9ec8d0

    SHA512

    04a62c3bd66862c8ff06b6490d8c7d71cc133d673bec67bcd57506250d6c67b80cb5d7648b5f3ddf28955fcdd6717641aaf17e8136d3ea838e25783dac15d8d9

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    96KB

    MD5

    7825cad99621dd288da81d8d8ae13cf5

    SHA1

    f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c

    SHA256

    529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5

    SHA512

    2e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    96KB

    MD5

    7825cad99621dd288da81d8d8ae13cf5

    SHA1

    f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c

    SHA256

    529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5

    SHA512

    2e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    96KB

    MD5

    7825cad99621dd288da81d8d8ae13cf5

    SHA1

    f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c

    SHA256

    529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5

    SHA512

    2e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4

  • memory/1296-206-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/1296-205-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/1296-196-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/1452-154-0x0000000000030000-0x000000000005A000-memory.dmp

    Filesize

    168KB

  • memory/1452-160-0x0000000004BA0000-0x0000000004BEB000-memory.dmp

    Filesize

    300KB

  • memory/1452-188-0x0000000004D80000-0x0000000004D90000-memory.dmp

    Filesize

    64KB

  • memory/1452-189-0x0000000006380000-0x00000000063F6000-memory.dmp

    Filesize

    472KB

  • memory/1452-190-0x0000000006300000-0x0000000006350000-memory.dmp

    Filesize

    320KB

  • memory/1452-172-0x0000000006130000-0x00000000062F2000-memory.dmp

    Filesize

    1.8MB

  • memory/1452-171-0x0000000004E30000-0x0000000004E96000-memory.dmp

    Filesize

    408KB

  • memory/1452-170-0x0000000005A60000-0x0000000005F5E000-memory.dmp

    Filesize

    5.0MB

  • memory/1452-169-0x0000000004D90000-0x0000000004E22000-memory.dmp

    Filesize

    584KB

  • memory/1452-173-0x0000000006830000-0x0000000006D5C000-memory.dmp

    Filesize

    5.2MB

  • memory/1452-159-0x0000000004D80000-0x0000000004D90000-memory.dmp

    Filesize

    64KB

  • memory/1452-158-0x0000000004A20000-0x0000000004A5E000-memory.dmp

    Filesize

    248KB

  • memory/1452-155-0x0000000004F50000-0x0000000005556000-memory.dmp

    Filesize

    6.0MB

  • memory/1452-157-0x00000000049C0000-0x00000000049D2000-memory.dmp

    Filesize

    72KB

  • memory/1452-156-0x0000000004A90000-0x0000000004B9A000-memory.dmp

    Filesize

    1.0MB

  • memory/4904-209-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4904-226-0x0000000009830000-0x0000000009840000-memory.dmp

    Filesize

    64KB

  • memory/4904-225-0x00000000099F0000-0x0000000009A3B000-memory.dmp

    Filesize

    300KB

  • memory/4980-143-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB