Analysis

  • max time kernel
    53s
  • max time network
    156s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25/05/2023, 04:51

General

  • Target

    e17f277f3bb90d7d1ce064377f2b8db2880468944d302b84de9251fa70e4d136.exe

  • Size

    982KB

  • MD5

    d718a52951f6a5aa750bbdd67e5a9d88

  • SHA1

    90aebfe65e2356a8f00a398259d12b47c2641a8c

  • SHA256

    e17f277f3bb90d7d1ce064377f2b8db2880468944d302b84de9251fa70e4d136

  • SHA512

    dcc52194360a9827d9fbbd44d2fd6f8281bbc10bbb554d2b1b3913082db3a1543d1d94fb1c71fe38d686cc7fb8cd0b5ac3f8bc07cbe9a07ec30aa15008e7ec4c

  • SSDEEP

    24576:py5ux9qlLWxxbkyLjFNWTG3qh1KQ3F5FpkfV9YVdpDT:c69GLhyLjyGah1x3FRaGn

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.122:19062

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

redline

Botnet

haval

C2

83.97.73.122:19062

Attributes
  • auth_value

    d23dec6813deb04eb8abd82657a9b0af

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e17f277f3bb90d7d1ce064377f2b8db2880468944d302b84de9251fa70e4d136.exe
    "C:\Users\Admin\AppData\Local\Temp\e17f277f3bb90d7d1ce064377f2b8db2880468944d302b84de9251fa70e4d136.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2544
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3331803.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3331803.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2884
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8277484.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8277484.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:5096
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2232946.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2232946.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4548
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6954746.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6954746.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1368
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3668
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9386696.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9386696.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3664
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
          4⤵
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4976
          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
            5⤵
            • Executes dropped EXE
            PID:4692
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2452113.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2452113.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:5000
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1340

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

    Filesize

    2KB

    MD5

    911ae024136ac24734b4fb1623f5721e

    SHA1

    377c2b092d4a67d86a1571681c52d40767b9d2c1

    SHA256

    3da9b5e0e2871bc6861e77cd11f485a104fd9fd354a2532309f7d85a8a240bbd

    SHA512

    47ada4c3177d65ef1f4e65751ebe91e2b77880b4b886942eb66d41bab7ddb1e1c7b6ab78837bbb7d7dd80638ace076a1c7407161e98b87ace657948ac84f13aa

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2452113.exe

    Filesize

    328KB

    MD5

    6a718a7b4ad2a40d1d8404d3d7a30df6

    SHA1

    005447e43a27bf59972743236c6555f17c576101

    SHA256

    7c460752b3942b61d83fd55ade7de1a71eed63185eda23d17a1f7d88c730691e

    SHA512

    17ef9854e60ba85fbcb4dff467798d2dd91c0e9be9f2cde38390886db24d74f01a051b2ee4cc8fa684b9352d9991c2f65e36904d87e5c96bb1f88dbb6fb00045

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2452113.exe

    Filesize

    328KB

    MD5

    6a718a7b4ad2a40d1d8404d3d7a30df6

    SHA1

    005447e43a27bf59972743236c6555f17c576101

    SHA256

    7c460752b3942b61d83fd55ade7de1a71eed63185eda23d17a1f7d88c730691e

    SHA512

    17ef9854e60ba85fbcb4dff467798d2dd91c0e9be9f2cde38390886db24d74f01a051b2ee4cc8fa684b9352d9991c2f65e36904d87e5c96bb1f88dbb6fb00045

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3331803.exe

    Filesize

    661KB

    MD5

    1a4125c192aac39bedd50053b9d7f74d

    SHA1

    a2a64813d1d7154c568ba3ea0d7819a144df3af9

    SHA256

    ea1ea0c3a41683c1f2f1347f70f5d58079980208a19a0036db1c5a9108f6c391

    SHA512

    6872331642a2bedcd964145cbdcf7508ac38c08c0af053923d7c4cd7a8df51200a8b1eaa5e4d846f5bf60af3539d92c2335c5fe4f38c38ad645346e78a6c6049

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3331803.exe

    Filesize

    661KB

    MD5

    1a4125c192aac39bedd50053b9d7f74d

    SHA1

    a2a64813d1d7154c568ba3ea0d7819a144df3af9

    SHA256

    ea1ea0c3a41683c1f2f1347f70f5d58079980208a19a0036db1c5a9108f6c391

    SHA512

    6872331642a2bedcd964145cbdcf7508ac38c08c0af053923d7c4cd7a8df51200a8b1eaa5e4d846f5bf60af3539d92c2335c5fe4f38c38ad645346e78a6c6049

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9386696.exe

    Filesize

    388KB

    MD5

    c7d8219e40b4eafdf6b88ba282bbe9e4

    SHA1

    9ca93217249500aef9c0f5bf467227913b6d2069

    SHA256

    9fd27c9929586e07d01b736c0dec8b3e3a13bd91621811d1f84c6e95994bcde0

    SHA512

    f96a2e3c4674c6930f9812b73b910e640a608be589398e494dd8d43462943bded3442650d2da7accb8c647838cf24d5213fc6ae855ccada1779df18c059b0d6f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9386696.exe

    Filesize

    388KB

    MD5

    c7d8219e40b4eafdf6b88ba282bbe9e4

    SHA1

    9ca93217249500aef9c0f5bf467227913b6d2069

    SHA256

    9fd27c9929586e07d01b736c0dec8b3e3a13bd91621811d1f84c6e95994bcde0

    SHA512

    f96a2e3c4674c6930f9812b73b910e640a608be589398e494dd8d43462943bded3442650d2da7accb8c647838cf24d5213fc6ae855ccada1779df18c059b0d6f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8277484.exe

    Filesize

    280KB

    MD5

    94801ac76070cc47fc21b37eebba1064

    SHA1

    26a83fb18c7c4892d991d71c74bf26c0e7a4b30f

    SHA256

    88efc56e5a61de77ed0f7c4f5c995ed8bbda73e79a4f6d72487b8fa2fd13c5ed

    SHA512

    91a4823f53e7ad0b9e5b9e55c376208e5a74e8386ce6ec3f1397d0ed8b8bdba43ac780ce009e81b21d89fa67204aaad7c62ee92520eaf372e24ba6b4ab7919c1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8277484.exe

    Filesize

    280KB

    MD5

    94801ac76070cc47fc21b37eebba1064

    SHA1

    26a83fb18c7c4892d991d71c74bf26c0e7a4b30f

    SHA256

    88efc56e5a61de77ed0f7c4f5c995ed8bbda73e79a4f6d72487b8fa2fd13c5ed

    SHA512

    91a4823f53e7ad0b9e5b9e55c376208e5a74e8386ce6ec3f1397d0ed8b8bdba43ac780ce009e81b21d89fa67204aaad7c62ee92520eaf372e24ba6b4ab7919c1

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2232946.exe

    Filesize

    146KB

    MD5

    32544c0b2de223b2b7a1ffbe3fc41627

    SHA1

    e0605090e5e112c6973a45b55cd7257f8526525a

    SHA256

    a6192f56dc5fabe1ccb8953c9f9d75f9164313377f4db5a91f836836fc8ece93

    SHA512

    0ba9a7433123ac07367f896cdec43b14ecd8517d5cde3f3eaff0f4dc399fa0b7844206efc5ca73ef66988744895b422aa7d2e309859de2d549940abea3531ca2

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2232946.exe

    Filesize

    146KB

    MD5

    32544c0b2de223b2b7a1ffbe3fc41627

    SHA1

    e0605090e5e112c6973a45b55cd7257f8526525a

    SHA256

    a6192f56dc5fabe1ccb8953c9f9d75f9164313377f4db5a91f836836fc8ece93

    SHA512

    0ba9a7433123ac07367f896cdec43b14ecd8517d5cde3f3eaff0f4dc399fa0b7844206efc5ca73ef66988744895b422aa7d2e309859de2d549940abea3531ca2

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6954746.exe

    Filesize

    194KB

    MD5

    b9be5eeaa5062ccd6a7085ae55968839

    SHA1

    3c861b5cbae123dc326b9853cc54ab35ce8e9279

    SHA256

    9eb0a001f377471718cee97e45a07604ffadd45e299bc6ccda9b5a163c6a3bbb

    SHA512

    96bde2f0c2f6353578162f30d119acb17562a880960d9ccf66232bde3c44630580fc46da274283dc4fbfc1d44527fed5e8199c0f16427daf4e555eb075a8fc3c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6954746.exe

    Filesize

    194KB

    MD5

    b9be5eeaa5062ccd6a7085ae55968839

    SHA1

    3c861b5cbae123dc326b9853cc54ab35ce8e9279

    SHA256

    9eb0a001f377471718cee97e45a07604ffadd45e299bc6ccda9b5a163c6a3bbb

    SHA512

    96bde2f0c2f6353578162f30d119acb17562a880960d9ccf66232bde3c44630580fc46da274283dc4fbfc1d44527fed5e8199c0f16427daf4e555eb075a8fc3c

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    96KB

    MD5

    7825cad99621dd288da81d8d8ae13cf5

    SHA1

    f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c

    SHA256

    529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5

    SHA512

    2e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    96KB

    MD5

    7825cad99621dd288da81d8d8ae13cf5

    SHA1

    f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c

    SHA256

    529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5

    SHA512

    2e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    96KB

    MD5

    7825cad99621dd288da81d8d8ae13cf5

    SHA1

    f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c

    SHA256

    529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5

    SHA512

    2e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4

  • memory/1340-190-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1340-202-0x0000000008EE0000-0x0000000008F2B000-memory.dmp

    Filesize

    300KB

  • memory/1340-208-0x0000000008F30000-0x0000000008F40000-memory.dmp

    Filesize

    64KB

  • memory/3668-162-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4548-145-0x0000000005000000-0x0000000005012000-memory.dmp

    Filesize

    72KB

  • memory/4548-147-0x00000000051E0000-0x000000000522B000-memory.dmp

    Filesize

    300KB

  • memory/4548-155-0x0000000006FA0000-0x00000000074CC000-memory.dmp

    Filesize

    5.2MB

  • memory/4548-154-0x00000000068A0000-0x0000000006A62000-memory.dmp

    Filesize

    1.8MB

  • memory/4548-153-0x0000000005FD0000-0x0000000006020000-memory.dmp

    Filesize

    320KB

  • memory/4548-152-0x0000000006550000-0x00000000065C6000-memory.dmp

    Filesize

    472KB

  • memory/4548-142-0x00000000007B0000-0x00000000007DA000-memory.dmp

    Filesize

    168KB

  • memory/4548-151-0x0000000005470000-0x00000000054D6000-memory.dmp

    Filesize

    408KB

  • memory/4548-143-0x0000000005540000-0x0000000005B46000-memory.dmp

    Filesize

    6.0MB

  • memory/4548-144-0x00000000050D0000-0x00000000051DA000-memory.dmp

    Filesize

    1.0MB

  • memory/4548-150-0x00000000053D0000-0x0000000005462000-memory.dmp

    Filesize

    584KB

  • memory/4548-149-0x0000000006050000-0x000000000654E000-memory.dmp

    Filesize

    5.0MB

  • memory/4548-148-0x0000000005320000-0x0000000005330000-memory.dmp

    Filesize

    64KB

  • memory/4548-156-0x0000000005320000-0x0000000005330000-memory.dmp

    Filesize

    64KB

  • memory/4548-146-0x0000000005060000-0x000000000509E000-memory.dmp

    Filesize

    248KB

  • memory/4976-183-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/4976-184-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/4976-174-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB