Analysis

  • max time kernel
    53s
  • max time network
    179s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    26/05/2023, 22:24

General

  • Target

    e5bd69203069e9408f0a6ed514b6bf16aa1ca7e3b8c7a4011be0796fc8df4960.exe

  • Size

    1.0MB

  • MD5

    66909771acd40df9c3d060705ac08dc9

  • SHA1

    a1d57c12b98f0d603a4dff134c8a4d56dbcb4ebf

  • SHA256

    e5bd69203069e9408f0a6ed514b6bf16aa1ca7e3b8c7a4011be0796fc8df4960

  • SHA512

    51bc6d0e3e43b329f09eb5ff407249797533401be1bb9a3da335ac204eeecfff09ea49d4faed6bb098cad68a8374943b2c82d2123c05e337e8cce5f1f919b047

  • SSDEEP

    24576:QygQ3JLRKhY/25zi/jjA+MZg2eNsT/QydW2:XgsJLRKy+5zifA+MG27T/Qy

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.122:19062

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e5bd69203069e9408f0a6ed514b6bf16aa1ca7e3b8c7a4011be0796fc8df4960.exe
    "C:\Users\Admin\AppData\Local\Temp\e5bd69203069e9408f0a6ed514b6bf16aa1ca7e3b8c7a4011be0796fc8df4960.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1852
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3125068.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3125068.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3911324.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3911324.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4264
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3305962.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3305962.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2080
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6441711.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6441711.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4764
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9857638.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9857638.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4536
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9857638.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9857638.exe
          4⤵
          • Executes dropped EXE
          PID:4728
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4728 -s 24
            5⤵
            • Program crash
            PID:3748
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9262129.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9262129.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3708

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9262129.exe

    Filesize

    284KB

    MD5

    401df59c8a476adfd2b77fba20476fae

    SHA1

    c00c650c69e72d2a15ade8c7facd586e4c5c32c1

    SHA256

    e0d6f670a944333e097dcdac121ce14dfc7ee4d00a0fc538a90478fb51a7ecc9

    SHA512

    29e61b4748097efb1419648c52917387e14c0794814bd8a1a0b571f82806a5410526a9f52eae82033abc3afeba3ac56d976a0bc9b0bfb40737341f14b7caea68

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9262129.exe

    Filesize

    284KB

    MD5

    401df59c8a476adfd2b77fba20476fae

    SHA1

    c00c650c69e72d2a15ade8c7facd586e4c5c32c1

    SHA256

    e0d6f670a944333e097dcdac121ce14dfc7ee4d00a0fc538a90478fb51a7ecc9

    SHA512

    29e61b4748097efb1419648c52917387e14c0794814bd8a1a0b571f82806a5410526a9f52eae82033abc3afeba3ac56d976a0bc9b0bfb40737341f14b7caea68

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3125068.exe

    Filesize

    750KB

    MD5

    bfa73c8bdb008d3a9fd5e36c818f6a68

    SHA1

    e097e30766e1f12e5375665761c304891699dbb3

    SHA256

    47cd9627dc6404bc9654e3d524b5672991d069f4f8bcc1620ed52b8b70f2322e

    SHA512

    5245d44cfe2d6f4811577984dd8ec202ba37fe7cef22bc936b7c1ab6f1ce1f69a38f38aba50a13ed322ebb63adae904dc5f7c42959ee330309238d460317661f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3125068.exe

    Filesize

    750KB

    MD5

    bfa73c8bdb008d3a9fd5e36c818f6a68

    SHA1

    e097e30766e1f12e5375665761c304891699dbb3

    SHA256

    47cd9627dc6404bc9654e3d524b5672991d069f4f8bcc1620ed52b8b70f2322e

    SHA512

    5245d44cfe2d6f4811577984dd8ec202ba37fe7cef22bc936b7c1ab6f1ce1f69a38f38aba50a13ed322ebb63adae904dc5f7c42959ee330309238d460317661f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9857638.exe

    Filesize

    967KB

    MD5

    c0574dede305bb404a9cce6569cd5312

    SHA1

    4173e2fb45a5034a2a601bea99d28819519b036d

    SHA256

    2ff31ed6f25a7b20808c53dae7851dee77cfb882dd34e7cc9f8f50d826b6b086

    SHA512

    37f938ecda7bb8ca6399c097d7c991eb177763ce4e7ce0e224a500b22a5a539cb25b17690267a8157e416cd0ce5b15ddcc82299c64fb3c3e6ac81346b4001b38

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9857638.exe

    Filesize

    967KB

    MD5

    c0574dede305bb404a9cce6569cd5312

    SHA1

    4173e2fb45a5034a2a601bea99d28819519b036d

    SHA256

    2ff31ed6f25a7b20808c53dae7851dee77cfb882dd34e7cc9f8f50d826b6b086

    SHA512

    37f938ecda7bb8ca6399c097d7c991eb177763ce4e7ce0e224a500b22a5a539cb25b17690267a8157e416cd0ce5b15ddcc82299c64fb3c3e6ac81346b4001b38

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9857638.exe

    Filesize

    967KB

    MD5

    c0574dede305bb404a9cce6569cd5312

    SHA1

    4173e2fb45a5034a2a601bea99d28819519b036d

    SHA256

    2ff31ed6f25a7b20808c53dae7851dee77cfb882dd34e7cc9f8f50d826b6b086

    SHA512

    37f938ecda7bb8ca6399c097d7c991eb177763ce4e7ce0e224a500b22a5a539cb25b17690267a8157e416cd0ce5b15ddcc82299c64fb3c3e6ac81346b4001b38

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3911324.exe

    Filesize

    306KB

    MD5

    8bc7df293cf581fa060ed5cf2d550ff9

    SHA1

    a72789a6f39b167942c0648b5487bcc16f576fb8

    SHA256

    52f1b7865ed0d401a599c215f021c3a9b30561d5f367a5915b6cabdcbc0008c7

    SHA512

    245671ea39a44f3612e25d9abdc6486d656d65ff90c670e8b4b0a0bce89d26649f73ddfd51491c580a8fc35e53cbd2cf2f96a674e0c85cd711f7e0d24ef0bb4c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3911324.exe

    Filesize

    306KB

    MD5

    8bc7df293cf581fa060ed5cf2d550ff9

    SHA1

    a72789a6f39b167942c0648b5487bcc16f576fb8

    SHA256

    52f1b7865ed0d401a599c215f021c3a9b30561d5f367a5915b6cabdcbc0008c7

    SHA512

    245671ea39a44f3612e25d9abdc6486d656d65ff90c670e8b4b0a0bce89d26649f73ddfd51491c580a8fc35e53cbd2cf2f96a674e0c85cd711f7e0d24ef0bb4c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3305962.exe

    Filesize

    145KB

    MD5

    16f6ba8ad11eccbafbaddfdbef475fcb

    SHA1

    5d9c55eefe279aac78ae729a05e42213567a0b0c

    SHA256

    0eb756453129e7aea9195b9a1171b38eec5f91a5b5c7f5b196311a7fedbe3055

    SHA512

    1511ce3812249e882d88977ca0b98c5d909fcbfba6ab8788233129ed0b8e25ee36be4e645a122abd9717a440d054a1a8564f9e1d216345476ac2cefa926a8049

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3305962.exe

    Filesize

    145KB

    MD5

    16f6ba8ad11eccbafbaddfdbef475fcb

    SHA1

    5d9c55eefe279aac78ae729a05e42213567a0b0c

    SHA256

    0eb756453129e7aea9195b9a1171b38eec5f91a5b5c7f5b196311a7fedbe3055

    SHA512

    1511ce3812249e882d88977ca0b98c5d909fcbfba6ab8788233129ed0b8e25ee36be4e645a122abd9717a440d054a1a8564f9e1d216345476ac2cefa926a8049

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6441711.exe

    Filesize

    186KB

    MD5

    440264dceda49c10fc65820595b73d74

    SHA1

    4281d625114f6968655adf33d14a9d86091570de

    SHA256

    0f05422d742cda51cb9f85c43184f917514391877dccf897bd967ae1729e0cd3

    SHA512

    b8b2e173e71b268724738f5b0b6400b8330f0f9082614892a903dd2f1fd3da1caf45593d3958825ded3d156c503e8e63fa5368988131d63e2d8aa4bde5615463

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6441711.exe

    Filesize

    186KB

    MD5

    440264dceda49c10fc65820595b73d74

    SHA1

    4281d625114f6968655adf33d14a9d86091570de

    SHA256

    0f05422d742cda51cb9f85c43184f917514391877dccf897bd967ae1729e0cd3

    SHA512

    b8b2e173e71b268724738f5b0b6400b8330f0f9082614892a903dd2f1fd3da1caf45593d3958825ded3d156c503e8e63fa5368988131d63e2d8aa4bde5615463

  • memory/2080-138-0x0000000005AF0000-0x00000000060F6000-memory.dmp

    Filesize

    6.0MB

  • memory/2080-151-0x00000000058B0000-0x00000000058C0000-memory.dmp

    Filesize

    64KB

  • memory/2080-146-0x0000000005A00000-0x0000000005A66000-memory.dmp

    Filesize

    408KB

  • memory/2080-147-0x0000000006CD0000-0x0000000006E92000-memory.dmp

    Filesize

    1.8MB

  • memory/2080-148-0x00000000073D0000-0x00000000078FC000-memory.dmp

    Filesize

    5.2MB

  • memory/2080-149-0x0000000006EA0000-0x0000000006F16000-memory.dmp

    Filesize

    472KB

  • memory/2080-150-0x0000000006F20000-0x0000000006F70000-memory.dmp

    Filesize

    320KB

  • memory/2080-145-0x0000000006600000-0x0000000006AFE000-memory.dmp

    Filesize

    5.0MB

  • memory/2080-144-0x0000000005960000-0x00000000059F2000-memory.dmp

    Filesize

    584KB

  • memory/2080-143-0x0000000005730000-0x000000000577B000-memory.dmp

    Filesize

    300KB

  • memory/2080-142-0x00000000058B0000-0x00000000058C0000-memory.dmp

    Filesize

    64KB

  • memory/2080-141-0x00000000055B0000-0x00000000055EE000-memory.dmp

    Filesize

    248KB

  • memory/2080-140-0x0000000005550000-0x0000000005562000-memory.dmp

    Filesize

    72KB

  • memory/2080-139-0x0000000005620000-0x000000000572A000-memory.dmp

    Filesize

    1.0MB

  • memory/2080-137-0x0000000000D00000-0x0000000000D2A000-memory.dmp

    Filesize

    168KB

  • memory/3708-210-0x0000000002560000-0x000000000259C000-memory.dmp

    Filesize

    240KB

  • memory/3708-223-0x0000000002560000-0x000000000259C000-memory.dmp

    Filesize

    240KB

  • memory/3708-1120-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

    Filesize

    64KB

  • memory/3708-1118-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

    Filesize

    64KB

  • memory/3708-1119-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

    Filesize

    64KB

  • memory/3708-1117-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

    Filesize

    64KB

  • memory/3708-1116-0x0000000005300000-0x000000000534B000-memory.dmp

    Filesize

    300KB

  • memory/3708-239-0x0000000002560000-0x000000000259C000-memory.dmp

    Filesize

    240KB

  • memory/3708-237-0x0000000002560000-0x000000000259C000-memory.dmp

    Filesize

    240KB

  • memory/3708-235-0x0000000002560000-0x000000000259C000-memory.dmp

    Filesize

    240KB

  • memory/3708-233-0x0000000002560000-0x000000000259C000-memory.dmp

    Filesize

    240KB

  • memory/3708-229-0x0000000002560000-0x000000000259C000-memory.dmp

    Filesize

    240KB

  • memory/3708-231-0x0000000002560000-0x000000000259C000-memory.dmp

    Filesize

    240KB

  • memory/3708-227-0x0000000002560000-0x000000000259C000-memory.dmp

    Filesize

    240KB

  • memory/3708-225-0x0000000002560000-0x000000000259C000-memory.dmp

    Filesize

    240KB

  • memory/3708-221-0x0000000002560000-0x000000000259C000-memory.dmp

    Filesize

    240KB

  • memory/3708-219-0x0000000002560000-0x000000000259C000-memory.dmp

    Filesize

    240KB

  • memory/3708-217-0x0000000002560000-0x000000000259C000-memory.dmp

    Filesize

    240KB

  • memory/3708-216-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

    Filesize

    64KB

  • memory/3708-214-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

    Filesize

    64KB

  • memory/3708-212-0x0000000002560000-0x000000000259C000-memory.dmp

    Filesize

    240KB

  • memory/3708-213-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

    Filesize

    64KB

  • memory/3708-208-0x0000000002560000-0x000000000259C000-memory.dmp

    Filesize

    240KB

  • memory/3708-201-0x00000000008B0000-0x00000000008F4000-memory.dmp

    Filesize

    272KB

  • memory/3708-202-0x0000000002560000-0x00000000025A0000-memory.dmp

    Filesize

    256KB

  • memory/3708-204-0x0000000002560000-0x000000000259C000-memory.dmp

    Filesize

    240KB

  • memory/3708-206-0x0000000002560000-0x000000000259C000-memory.dmp

    Filesize

    240KB

  • memory/4536-193-0x0000000000750000-0x0000000000848000-memory.dmp

    Filesize

    992KB

  • memory/4536-194-0x0000000007620000-0x0000000007630000-memory.dmp

    Filesize

    64KB

  • memory/4728-195-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/4764-187-0x0000000004B90000-0x0000000004BA0000-memory.dmp

    Filesize

    64KB

  • memory/4764-186-0x0000000004B90000-0x0000000004BA0000-memory.dmp

    Filesize

    64KB

  • memory/4764-158-0x00000000022C0000-0x00000000022D6000-memory.dmp

    Filesize

    88KB

  • memory/4764-156-0x0000000002110000-0x000000000212E000-memory.dmp

    Filesize

    120KB

  • memory/4764-161-0x00000000022C0000-0x00000000022D6000-memory.dmp

    Filesize

    88KB

  • memory/4764-163-0x00000000022C0000-0x00000000022D6000-memory.dmp

    Filesize

    88KB

  • memory/4764-165-0x00000000022C0000-0x00000000022D6000-memory.dmp

    Filesize

    88KB

  • memory/4764-188-0x0000000004B90000-0x0000000004BA0000-memory.dmp

    Filesize

    64KB

  • memory/4764-157-0x00000000022C0000-0x00000000022DC000-memory.dmp

    Filesize

    112KB

  • memory/4764-159-0x00000000022C0000-0x00000000022D6000-memory.dmp

    Filesize

    88KB

  • memory/4764-185-0x00000000022C0000-0x00000000022D6000-memory.dmp

    Filesize

    88KB

  • memory/4764-183-0x00000000022C0000-0x00000000022D6000-memory.dmp

    Filesize

    88KB

  • memory/4764-179-0x00000000022C0000-0x00000000022D6000-memory.dmp

    Filesize

    88KB

  • memory/4764-181-0x00000000022C0000-0x00000000022D6000-memory.dmp

    Filesize

    88KB

  • memory/4764-177-0x00000000022C0000-0x00000000022D6000-memory.dmp

    Filesize

    88KB

  • memory/4764-175-0x00000000022C0000-0x00000000022D6000-memory.dmp

    Filesize

    88KB

  • memory/4764-173-0x00000000022C0000-0x00000000022D6000-memory.dmp

    Filesize

    88KB

  • memory/4764-171-0x00000000022C0000-0x00000000022D6000-memory.dmp

    Filesize

    88KB

  • memory/4764-169-0x00000000022C0000-0x00000000022D6000-memory.dmp

    Filesize

    88KB

  • memory/4764-167-0x00000000022C0000-0x00000000022D6000-memory.dmp

    Filesize

    88KB