Analysis

  • max time kernel
    78s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-05-2023 03:14

General

  • Target

    c089814163c686a278456c37d16edadce51b7cbeeb49486c1c0cf535fcb41ca2.exe

  • Size

    984KB

  • MD5

    d2f83a4fce7c10fab330c354901c81a5

  • SHA1

    18fb2fd192b97b3c4a2b8bab0b5f6d5690c5d28a

  • SHA256

    c089814163c686a278456c37d16edadce51b7cbeeb49486c1c0cf535fcb41ca2

  • SHA512

    ba578ace6ab7c06be5906f523d81b13afa35a3102b8c68902569bd4b14058534625ec0cdd600b8e39ef0264d725a3dd63c35f2477a94f99d44aae6007d2c0dcb

  • SSDEEP

    24576:xyaVNWGy2j1+zbcB3c8OQRzGxrG22hhVFFJkfP/S:kaVN6i18cB3c8OkAGnhTtY/

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.122:19062

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Extracted

Family

redline

Botnet

haval

C2

83.97.73.122:19062

Attributes
  • auth_value

    d23dec6813deb04eb8abd82657a9b0af

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c089814163c686a278456c37d16edadce51b7cbeeb49486c1c0cf535fcb41ca2.exe
    "C:\Users\Admin\AppData\Local\Temp\c089814163c686a278456c37d16edadce51b7cbeeb49486c1c0cf535fcb41ca2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6933558.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6933558.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4060
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4854124.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4854124.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3240
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0312348.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0312348.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3840
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4660
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8604282.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8604282.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4432
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0886780.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0886780.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4752
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3812
          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
            5⤵
            • Executes dropped EXE
            PID:2420
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3546965.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3546965.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3932
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4412

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

    Filesize

    226B

    MD5

    916851e072fbabc4796d8916c5131092

    SHA1

    d48a602229a690c512d5fdaf4c8d77547a88e7a2

    SHA256

    7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

    SHA512

    07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3546965.exe

    Filesize

    328KB

    MD5

    035e440a29b79be6fd945b1404ed1b3c

    SHA1

    c11c26c93a1f55b8548cae2a63f51a06fe725c28

    SHA256

    6d506fb5955828dd268eff31455314c4333a4fa8454d61284b17ae0981bce99c

    SHA512

    453e146e3f41bff4824da6acd2c47f5a82ec4873d4094fd73c36b4001ec9966ec535a0d45aa387167195c2f337d1bb0483850dd1089362bc49c9c96f6bf8ddf5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3546965.exe

    Filesize

    328KB

    MD5

    035e440a29b79be6fd945b1404ed1b3c

    SHA1

    c11c26c93a1f55b8548cae2a63f51a06fe725c28

    SHA256

    6d506fb5955828dd268eff31455314c4333a4fa8454d61284b17ae0981bce99c

    SHA512

    453e146e3f41bff4824da6acd2c47f5a82ec4873d4094fd73c36b4001ec9966ec535a0d45aa387167195c2f337d1bb0483850dd1089362bc49c9c96f6bf8ddf5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6933558.exe

    Filesize

    663KB

    MD5

    5a98087c1626d67e9dd5ae2cda21592b

    SHA1

    ef4d8a5f4940c982dfa6a83dc4d5708bea5f8c68

    SHA256

    09af64b986a081ab89e57cbdc5807c034cb15bb47134f100aa70efc85bcbfca8

    SHA512

    87615ef53fe3c7c849c7ad73e7618185a62eae210fc1b6871aee308b2806f2018a602c744383c0f009e43c4f5b347bbbe749a4f790f0faf907caf43b0ae9feb6

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6933558.exe

    Filesize

    663KB

    MD5

    5a98087c1626d67e9dd5ae2cda21592b

    SHA1

    ef4d8a5f4940c982dfa6a83dc4d5708bea5f8c68

    SHA256

    09af64b986a081ab89e57cbdc5807c034cb15bb47134f100aa70efc85bcbfca8

    SHA512

    87615ef53fe3c7c849c7ad73e7618185a62eae210fc1b6871aee308b2806f2018a602c744383c0f009e43c4f5b347bbbe749a4f790f0faf907caf43b0ae9feb6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0886780.exe

    Filesize

    388KB

    MD5

    4b9b9934de00f8095978a2411bb137e6

    SHA1

    4d2612ba6889105245acaa33140b32157bf69e0b

    SHA256

    7ab97c8c25d5841d4fbe79f6f3b40c6b558a0a51091e48915801cf4d729efd3b

    SHA512

    fba7701d2f5cec3fa6fa76071c719d1be5a6521aa838f53e4d898cd59951847ed9f898238164f90457976e85b6a5e033e8fbdda5c33419c5cb48a2d6935933f1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0886780.exe

    Filesize

    388KB

    MD5

    4b9b9934de00f8095978a2411bb137e6

    SHA1

    4d2612ba6889105245acaa33140b32157bf69e0b

    SHA256

    7ab97c8c25d5841d4fbe79f6f3b40c6b558a0a51091e48915801cf4d729efd3b

    SHA512

    fba7701d2f5cec3fa6fa76071c719d1be5a6521aa838f53e4d898cd59951847ed9f898238164f90457976e85b6a5e033e8fbdda5c33419c5cb48a2d6935933f1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4854124.exe

    Filesize

    280KB

    MD5

    da7f546fc217ebaf928233f573c4c2c7

    SHA1

    47a3281c825cecf4a06c0f7754d895beb33f4a08

    SHA256

    497371203178fe5250c7185b77564eca13d6037713988a457dc6f509f5a377d3

    SHA512

    d83f8dbf33514550b50a1eaf2c05daef12b07e23928605e794f4f1f6b3cd5af9a168e9d2b8c9651576dafb5440ae25771e9b4a0e541632f74a2b3cc727f3eddc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4854124.exe

    Filesize

    280KB

    MD5

    da7f546fc217ebaf928233f573c4c2c7

    SHA1

    47a3281c825cecf4a06c0f7754d895beb33f4a08

    SHA256

    497371203178fe5250c7185b77564eca13d6037713988a457dc6f509f5a377d3

    SHA512

    d83f8dbf33514550b50a1eaf2c05daef12b07e23928605e794f4f1f6b3cd5af9a168e9d2b8c9651576dafb5440ae25771e9b4a0e541632f74a2b3cc727f3eddc

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0312348.exe

    Filesize

    194KB

    MD5

    eacade78d4a87f0489216175124d1332

    SHA1

    574c136d469dcf021b28ce9afbd4b2dd832866fd

    SHA256

    d33d168db13d14241d41e5f3abecf22e0d0621af21ca2974382bc5b2262ad92a

    SHA512

    8b9456d5eacb72688d551a2a26d78967016f44de4195529fcbc2291575e118c8e6b1077838d7361843298b04b71ead3ac9a913a6851056bc507c5c1da275fce8

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0312348.exe

    Filesize

    194KB

    MD5

    eacade78d4a87f0489216175124d1332

    SHA1

    574c136d469dcf021b28ce9afbd4b2dd832866fd

    SHA256

    d33d168db13d14241d41e5f3abecf22e0d0621af21ca2974382bc5b2262ad92a

    SHA512

    8b9456d5eacb72688d551a2a26d78967016f44de4195529fcbc2291575e118c8e6b1077838d7361843298b04b71ead3ac9a913a6851056bc507c5c1da275fce8

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8604282.exe

    Filesize

    145KB

    MD5

    b326a3bd73925d2f0f31abfe4b2ead3e

    SHA1

    891f6a75dae7a2120cede073051bf91af993f504

    SHA256

    666229d4c87ae5ae2e0e40afb5c5d02b4e5968baeefa31fad9a7d75fad1eea1f

    SHA512

    611457829edb170dc09a650e9974240b4ee1356bbd9914965e6b9ec89a943653663e4031f3011f232a5b4e201d8ad747ed5410740e4d880f760ba5c2df93e38f

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8604282.exe

    Filesize

    145KB

    MD5

    b326a3bd73925d2f0f31abfe4b2ead3e

    SHA1

    891f6a75dae7a2120cede073051bf91af993f504

    SHA256

    666229d4c87ae5ae2e0e40afb5c5d02b4e5968baeefa31fad9a7d75fad1eea1f

    SHA512

    611457829edb170dc09a650e9974240b4ee1356bbd9914965e6b9ec89a943653663e4031f3011f232a5b4e201d8ad747ed5410740e4d880f760ba5c2df93e38f

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    101KB

    MD5

    89d41e1cf478a3d3c2c701a27a5692b2

    SHA1

    691e20583ef80cb9a2fd3258560e7f02481d12fd

    SHA256

    dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac

    SHA512

    5c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    101KB

    MD5

    89d41e1cf478a3d3c2c701a27a5692b2

    SHA1

    691e20583ef80cb9a2fd3258560e7f02481d12fd

    SHA256

    dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac

    SHA512

    5c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    101KB

    MD5

    89d41e1cf478a3d3c2c701a27a5692b2

    SHA1

    691e20583ef80cb9a2fd3258560e7f02481d12fd

    SHA256

    dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac

    SHA512

    5c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc

  • memory/3812-193-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/3812-192-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/3812-183-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/4412-196-0x0000000000340000-0x000000000036A000-memory.dmp

    Filesize

    168KB

  • memory/4412-215-0x0000000004B70000-0x0000000004B80000-memory.dmp

    Filesize

    64KB

  • memory/4432-163-0x00000000001A0000-0x00000000001CA000-memory.dmp

    Filesize

    168KB

  • memory/4432-177-0x0000000004D50000-0x0000000004D60000-memory.dmp

    Filesize

    64KB

  • memory/4432-176-0x0000000005CD0000-0x0000000005D20000-memory.dmp

    Filesize

    320KB

  • memory/4432-175-0x0000000005F10000-0x0000000005F86000-memory.dmp

    Filesize

    472KB

  • memory/4432-174-0x0000000006A80000-0x0000000006FAC000-memory.dmp

    Filesize

    5.2MB

  • memory/4432-173-0x0000000005D40000-0x0000000005F02000-memory.dmp

    Filesize

    1.8MB

  • memory/4432-171-0x0000000005FA0000-0x0000000006544000-memory.dmp

    Filesize

    5.6MB

  • memory/4432-170-0x0000000005950000-0x00000000059E2000-memory.dmp

    Filesize

    584KB

  • memory/4432-169-0x0000000004DD0000-0x0000000004E36000-memory.dmp

    Filesize

    408KB

  • memory/4432-168-0x0000000004D50000-0x0000000004D60000-memory.dmp

    Filesize

    64KB

  • memory/4432-167-0x0000000004A90000-0x0000000004ACC000-memory.dmp

    Filesize

    240KB

  • memory/4432-166-0x0000000004A30000-0x0000000004A42000-memory.dmp

    Filesize

    72KB

  • memory/4432-165-0x0000000004B00000-0x0000000004C0A000-memory.dmp

    Filesize

    1.0MB

  • memory/4432-164-0x0000000004F90000-0x00000000055A8000-memory.dmp

    Filesize

    6.1MB

  • memory/4660-155-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB