Analysis

  • max time kernel
    131s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-05-2023 14:08

General

  • Target

    5648bcabfd28b715db96eada43c91c8dd27d2f1dfbbf46301415566fc769169d.exe

  • Size

    1.0MB

  • MD5

    e8d03533b58fcad240a1ad1a72499485

  • SHA1

    b310643e29ab264bc8c93515369678106c7c1cc1

  • SHA256

    5648bcabfd28b715db96eada43c91c8dd27d2f1dfbbf46301415566fc769169d

  • SHA512

    6de7d3cdcb8ccc05e0534490fb0d144d6f25d7e7ecf449d19815b8de18b1a89446d85e89695096fda0ccaf9cb0d5f54e3ba6c121897c178915e3ef8e396c071d

  • SSDEEP

    24576:Hy2U8f3Bke0shMHg+QC4bkua5ic2aDb0geP8aGVKy0rfzRP:S2Us30so25byvYg9s

Malware Config

Extracted

Family

redline

Botnet

mina

C2

83.97.73.122:19062

Attributes
  • auth_value

    3d04bf4b8ba2a11c4dcf9df0e388fa05

Extracted

Family

redline

Botnet

fash

C2

83.97.73.122:19062

Attributes
  • auth_value

    dd7165bcd22b0ed3df426d944e12f136

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5648bcabfd28b715db96eada43c91c8dd27d2f1dfbbf46301415566fc769169d.exe
    "C:\Users\Admin\AppData\Local\Temp\5648bcabfd28b715db96eada43c91c8dd27d2f1dfbbf46301415566fc769169d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4316
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1621828.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1621828.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4904
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1092134.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1092134.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3980
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4822659.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4822659.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2676
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:488
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9301560.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9301560.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:864
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1092283.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1092283.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1960
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1092283.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1092283.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of UnmapMainImage
          PID:2632
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 12
            5⤵
            • Program crash
            PID:656
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6618312.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6618312.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3612
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2508
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2632 -ip 2632
    1⤵
      PID:264

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

      Filesize

      226B

      MD5

      916851e072fbabc4796d8916c5131092

      SHA1

      d48a602229a690c512d5fdaf4c8d77547a88e7a2

      SHA256

      7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

      SHA512

      07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6618312.exe

      Filesize

      328KB

      MD5

      9b2a7202b08bbc216e905680e3b74945

      SHA1

      76a91570b5d070889258ac927361028863b396b8

      SHA256

      a5caf504e49ca15bb0e584afd47eb1ae10a96c3e5cacf402eb02bc5b314b158f

      SHA512

      b2ea560940d9e2484a8090a5b07c3d532e893b031fef1c3c334328a652f9bc40094dd8ccf927238dce19a1433c434b5c3d60e837ff9c61768f76f6562068bec2

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6618312.exe

      Filesize

      328KB

      MD5

      9b2a7202b08bbc216e905680e3b74945

      SHA1

      76a91570b5d070889258ac927361028863b396b8

      SHA256

      a5caf504e49ca15bb0e584afd47eb1ae10a96c3e5cacf402eb02bc5b314b158f

      SHA512

      b2ea560940d9e2484a8090a5b07c3d532e893b031fef1c3c334328a652f9bc40094dd8ccf927238dce19a1433c434b5c3d60e837ff9c61768f76f6562068bec2

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1621828.exe

      Filesize

      724KB

      MD5

      dc738c18d8e5fe500e58e00a6ee07368

      SHA1

      39e05e5edbe883ffbec0f65d93c535dc65b909bf

      SHA256

      b8df6fb803e80dc4e911b9095f1e47b61119c2f2a18ea8c72fed83e150a0f9de

      SHA512

      1b373da2a2cb30c87a2d149de8954dfd41f05c3841897343cdac92c6b860dcfe7c8946d5d139bd686f09ff5ab17772866c94a6e50951700e75297e3517fb71a5

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1621828.exe

      Filesize

      724KB

      MD5

      dc738c18d8e5fe500e58e00a6ee07368

      SHA1

      39e05e5edbe883ffbec0f65d93c535dc65b909bf

      SHA256

      b8df6fb803e80dc4e911b9095f1e47b61119c2f2a18ea8c72fed83e150a0f9de

      SHA512

      1b373da2a2cb30c87a2d149de8954dfd41f05c3841897343cdac92c6b860dcfe7c8946d5d139bd686f09ff5ab17772866c94a6e50951700e75297e3517fb71a5

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1092283.exe

      Filesize

      963KB

      MD5

      2f972ab311939ac7c436d9f72b467900

      SHA1

      c66972e2ef04cf0c4d8ca395c96afc04b59474a8

      SHA256

      c16744f0a78821ba33133f788fa221f6930e0a6959da0d403ce2e04dfc25896a

      SHA512

      c8b0f8ec2b5968c5dd147b3492af75ef77158901d4f9b32d1e8c1534f2dae658b99d6bd0fdf6edc2ab7ee42770f36053d7748bd072727f0f5af57fe017c94179

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1092283.exe

      Filesize

      963KB

      MD5

      2f972ab311939ac7c436d9f72b467900

      SHA1

      c66972e2ef04cf0c4d8ca395c96afc04b59474a8

      SHA256

      c16744f0a78821ba33133f788fa221f6930e0a6959da0d403ce2e04dfc25896a

      SHA512

      c8b0f8ec2b5968c5dd147b3492af75ef77158901d4f9b32d1e8c1534f2dae658b99d6bd0fdf6edc2ab7ee42770f36053d7748bd072727f0f5af57fe017c94179

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1092283.exe

      Filesize

      963KB

      MD5

      2f972ab311939ac7c436d9f72b467900

      SHA1

      c66972e2ef04cf0c4d8ca395c96afc04b59474a8

      SHA256

      c16744f0a78821ba33133f788fa221f6930e0a6959da0d403ce2e04dfc25896a

      SHA512

      c8b0f8ec2b5968c5dd147b3492af75ef77158901d4f9b32d1e8c1534f2dae658b99d6bd0fdf6edc2ab7ee42770f36053d7748bd072727f0f5af57fe017c94179

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1092134.exe

      Filesize

      280KB

      MD5

      165c91d9dd33e599a553ec9f242cfab1

      SHA1

      dddc725b10ce43a822c2ba50add56e6a3443cc38

      SHA256

      d6d998085e21811ad2eb3fb730bed87f09fe3d0355db3f1ce2d14653494ee534

      SHA512

      f73ab2fa3150ea1014e036cef5797a862ac03996774d355188214ee80c9592839aae8d9c23d9a72f22884db024dd6d8dfd8d5c67b4858bd469c0f6912e131660

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1092134.exe

      Filesize

      280KB

      MD5

      165c91d9dd33e599a553ec9f242cfab1

      SHA1

      dddc725b10ce43a822c2ba50add56e6a3443cc38

      SHA256

      d6d998085e21811ad2eb3fb730bed87f09fe3d0355db3f1ce2d14653494ee534

      SHA512

      f73ab2fa3150ea1014e036cef5797a862ac03996774d355188214ee80c9592839aae8d9c23d9a72f22884db024dd6d8dfd8d5c67b4858bd469c0f6912e131660

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4822659.exe

      Filesize

      194KB

      MD5

      1fd0fd47b3c81d815fb2260b7d74eae3

      SHA1

      c275fcbb2f6365694914828cc5cc6fb6e44164dc

      SHA256

      aa83a6dd6aa58b3cd54e8e3aac29803a65e174479ee395dd49d97734e7198063

      SHA512

      173feab37a0503b060e6ad5bd14199d63494b046ea8927b26bbc6b2750502b99e1b0fc3f95c8f4306739015d217e1945be90f76490885f6c1b47a722785507d6

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4822659.exe

      Filesize

      194KB

      MD5

      1fd0fd47b3c81d815fb2260b7d74eae3

      SHA1

      c275fcbb2f6365694914828cc5cc6fb6e44164dc

      SHA256

      aa83a6dd6aa58b3cd54e8e3aac29803a65e174479ee395dd49d97734e7198063

      SHA512

      173feab37a0503b060e6ad5bd14199d63494b046ea8927b26bbc6b2750502b99e1b0fc3f95c8f4306739015d217e1945be90f76490885f6c1b47a722785507d6

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9301560.exe

      Filesize

      145KB

      MD5

      b9120fbd1c1e6ef0c6e1466a82b70bc2

      SHA1

      11f796590b7d23f466bd3bc2af6a6e334d6bc424

      SHA256

      16858fd07939320f7d18381911682e35d3963d0223f04ffc2f3c34a3087a3719

      SHA512

      c243212aef99a23c464e4f5210454871c27175a601b535c306ee1245fdd706326c3fa6f5e2f8bde6d8579ae1fbfc7e3b85bdf637e4fc6061430d602e43471846

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9301560.exe

      Filesize

      145KB

      MD5

      b9120fbd1c1e6ef0c6e1466a82b70bc2

      SHA1

      11f796590b7d23f466bd3bc2af6a6e334d6bc424

      SHA256

      16858fd07939320f7d18381911682e35d3963d0223f04ffc2f3c34a3087a3719

      SHA512

      c243212aef99a23c464e4f5210454871c27175a601b535c306ee1245fdd706326c3fa6f5e2f8bde6d8579ae1fbfc7e3b85bdf637e4fc6061430d602e43471846

    • memory/488-155-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/864-166-0x0000000005480000-0x0000000005492000-memory.dmp

      Filesize

      72KB

    • memory/864-169-0x0000000005860000-0x00000000058F2000-memory.dmp

      Filesize

      584KB

    • memory/864-171-0x0000000006020000-0x0000000006086000-memory.dmp

      Filesize

      408KB

    • memory/864-173-0x0000000006D50000-0x0000000006F12000-memory.dmp

      Filesize

      1.8MB

    • memory/864-174-0x0000000007450000-0x000000000797C000-memory.dmp

      Filesize

      5.2MB

    • memory/864-175-0x0000000006C00000-0x0000000006C76000-memory.dmp

      Filesize

      472KB

    • memory/864-176-0x0000000006C80000-0x0000000006CD0000-memory.dmp

      Filesize

      320KB

    • memory/864-167-0x00000000054E0000-0x000000000551C000-memory.dmp

      Filesize

      240KB

    • memory/864-168-0x0000000005850000-0x0000000005860000-memory.dmp

      Filesize

      64KB

    • memory/864-170-0x00000000065D0000-0x0000000006B74000-memory.dmp

      Filesize

      5.6MB

    • memory/864-177-0x0000000005850000-0x0000000005860000-memory.dmp

      Filesize

      64KB

    • memory/864-163-0x0000000000AB0000-0x0000000000ADA000-memory.dmp

      Filesize

      168KB

    • memory/864-164-0x0000000005A00000-0x0000000006018000-memory.dmp

      Filesize

      6.1MB

    • memory/864-165-0x0000000005550000-0x000000000565A000-memory.dmp

      Filesize

      1.0MB

    • memory/1960-183-0x0000000007A10000-0x0000000007A20000-memory.dmp

      Filesize

      64KB

    • memory/1960-182-0x0000000000C30000-0x0000000000D28000-memory.dmp

      Filesize

      992KB

    • memory/2508-191-0x0000000000750000-0x000000000077A000-memory.dmp

      Filesize

      168KB

    • memory/2508-197-0x0000000004F90000-0x0000000004FA0000-memory.dmp

      Filesize

      64KB

    • memory/2632-184-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/2632-198-0x00000000003C0000-0x00000000003C0000-memory.dmp