Analysis

  • max time kernel
    55s
  • max time network
    184s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    26/05/2023, 04:52

General

  • Target

    d8341e747ffc08a1ef94c26461fb47575d07187a2f7fd426eba59488c37fa939.exe

  • Size

    875KB

  • MD5

    c760283a1b7f56f26d601b79cec7ea63

  • SHA1

    cc346c05591a430e58237aaa4fa71a8b99d6a59a

  • SHA256

    d8341e747ffc08a1ef94c26461fb47575d07187a2f7fd426eba59488c37fa939

  • SHA512

    d33f92f26c2083852cb1cb48a4de13dd421f173941b4766ad2f0e7bd840248747cda3d8f7704c8ca505487c562dae6805a9a25ed26f2b2b21a5ec7722d890082

  • SSDEEP

    24576:gyqVzgetPURPLWVDs/SMs9wPFca+TgsVTLKbzBU0oDd:nqVzYPGDs/SMltcVgsVeBUT

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.122:19062

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

redline

Botnet

mesu

C2

83.97.73.122:19062

Attributes
  • auth_value

    8ede6a157d1d9509a21427d10e999ba2

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d8341e747ffc08a1ef94c26461fb47575d07187a2f7fd426eba59488c37fa939.exe
    "C:\Users\Admin\AppData\Local\Temp\d8341e747ffc08a1ef94c26461fb47575d07187a2f7fd426eba59488c37fa939.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1436
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5938098.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5938098.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1724
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1289985.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1289985.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1972
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f0147641.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f0147641.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4912
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6688128.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6688128.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4600
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3812
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h6205739.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h6205739.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1936
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
          4⤵
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4620
          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
            5⤵
            • Executes dropped EXE
            PID:1188
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i8534310.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i8534310.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1336
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4788

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

    Filesize

    226B

    MD5

    957779c42144282d8cd83192b8fbc7cf

    SHA1

    de83d08d2cca06b9ff3d1ef239d6b60b705d25fe

    SHA256

    0d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51

    SHA512

    f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i8534310.exe

    Filesize

    329KB

    MD5

    981219346db821c915a0d668a7c68b51

    SHA1

    db032cce4fd0c1cecb2fe98c11d43807c08d6850

    SHA256

    876d66e08f2a887513fe7bc8c00215e1a6784fc765c0c3bd44964f0c010af601

    SHA512

    c2015f3f46730da7ac7ad0cc61474dc6f3dc989ef19c92809650f324097d3a9ed388ae289404f1358801c4696b465d5f2b0e6eb6fd3e7d024327fe7e409d76a9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i8534310.exe

    Filesize

    329KB

    MD5

    981219346db821c915a0d668a7c68b51

    SHA1

    db032cce4fd0c1cecb2fe98c11d43807c08d6850

    SHA256

    876d66e08f2a887513fe7bc8c00215e1a6784fc765c0c3bd44964f0c010af601

    SHA512

    c2015f3f46730da7ac7ad0cc61474dc6f3dc989ef19c92809650f324097d3a9ed388ae289404f1358801c4696b465d5f2b0e6eb6fd3e7d024327fe7e409d76a9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5938098.exe

    Filesize

    603KB

    MD5

    da329bb4dae5f88907ae7cd33895faf6

    SHA1

    e830c1792075ba9a4dbffd5f2cd13fe8a6b7da0d

    SHA256

    76d297e8b41301d2f71399112adf97225f691f41fd830ef76d7ec2bb8e2125b4

    SHA512

    3a3fc5f5c7a9f4bab60abcfb7293013c0099e52c86d01f286e0eab5fc55e01c76a6e8a1e895fc3e3fc5aff0cffe91aa6160d2b476e908b46863278c29609411b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5938098.exe

    Filesize

    603KB

    MD5

    da329bb4dae5f88907ae7cd33895faf6

    SHA1

    e830c1792075ba9a4dbffd5f2cd13fe8a6b7da0d

    SHA256

    76d297e8b41301d2f71399112adf97225f691f41fd830ef76d7ec2bb8e2125b4

    SHA512

    3a3fc5f5c7a9f4bab60abcfb7293013c0099e52c86d01f286e0eab5fc55e01c76a6e8a1e895fc3e3fc5aff0cffe91aa6160d2b476e908b46863278c29609411b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h6205739.exe

    Filesize

    387KB

    MD5

    e4ae30b22d8a1dc71d155d32bf64e0bf

    SHA1

    5d552916f0f8e00772af975b33727ba4589e44d2

    SHA256

    88b9cc7efc7793500ad78aac39b6b5e39bc1a2859f77d11789e938cfd9e9fa55

    SHA512

    79bce5b7a8093149efc25e4f0d98b0d627c5056a2605fb50ef7a4bff565c4d5c53b0be4aeaa3ef9fb1098208c9bf242ade6f8f630434a3a72c68b104303bd9f9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h6205739.exe

    Filesize

    387KB

    MD5

    e4ae30b22d8a1dc71d155d32bf64e0bf

    SHA1

    5d552916f0f8e00772af975b33727ba4589e44d2

    SHA256

    88b9cc7efc7793500ad78aac39b6b5e39bc1a2859f77d11789e938cfd9e9fa55

    SHA512

    79bce5b7a8093149efc25e4f0d98b0d627c5056a2605fb50ef7a4bff565c4d5c53b0be4aeaa3ef9fb1098208c9bf242ade6f8f630434a3a72c68b104303bd9f9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1289985.exe

    Filesize

    277KB

    MD5

    95cbf5158ae62f7b6b0ffae6f9f5abc6

    SHA1

    23b0d70ba0c3daf3ca80e56c519640110c23005f

    SHA256

    609c30c818ef0adcb15770aa9a00283589c7c3b5a0f541b9dc7aace032c559d8

    SHA512

    a922ece0579107b86bf90f4125d5f59e7b3ac9abe65845457daefb9c34582df34002b1055903727fee58760d792b9c8c2cb2974540c4c1cb80fc33eddd8553ae

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1289985.exe

    Filesize

    277KB

    MD5

    95cbf5158ae62f7b6b0ffae6f9f5abc6

    SHA1

    23b0d70ba0c3daf3ca80e56c519640110c23005f

    SHA256

    609c30c818ef0adcb15770aa9a00283589c7c3b5a0f541b9dc7aace032c559d8

    SHA512

    a922ece0579107b86bf90f4125d5f59e7b3ac9abe65845457daefb9c34582df34002b1055903727fee58760d792b9c8c2cb2974540c4c1cb80fc33eddd8553ae

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f0147641.exe

    Filesize

    146KB

    MD5

    220aa09408bd5bd48e1c64f7456fe650

    SHA1

    97a9d6e037c298743d5d58916ee3013b17e71c57

    SHA256

    26470ad039c0add64756596e3c90320a634ace582250b26cdbd56da61d533f36

    SHA512

    8361d61c20ff1fe5d869a58b316b8f0dca98d07a89bef7140713a4c36af986bbe20d053c6b8cd31788435a2732d81bc8f2d23556363966c4d2d1838a2f94f643

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f0147641.exe

    Filesize

    146KB

    MD5

    220aa09408bd5bd48e1c64f7456fe650

    SHA1

    97a9d6e037c298743d5d58916ee3013b17e71c57

    SHA256

    26470ad039c0add64756596e3c90320a634ace582250b26cdbd56da61d533f36

    SHA512

    8361d61c20ff1fe5d869a58b316b8f0dca98d07a89bef7140713a4c36af986bbe20d053c6b8cd31788435a2732d81bc8f2d23556363966c4d2d1838a2f94f643

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6688128.exe

    Filesize

    194KB

    MD5

    e4224fc9e186f12072622af5c659e0e8

    SHA1

    b7c6a27b2e45dd773cb9d70456827479034fb231

    SHA256

    c48fd4ef9147b43d8189a707e9ff4a33bf1876169a04febe8d6d59bf806567ca

    SHA512

    067780aef1cc9c2c6d4c728b2765a622789a62bd46e133c0f59cc9f1639ddba6f78d9599dfb5243a61d006a71f54f9a643c0fd63dfae39909a3e53691056046d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6688128.exe

    Filesize

    194KB

    MD5

    e4224fc9e186f12072622af5c659e0e8

    SHA1

    b7c6a27b2e45dd773cb9d70456827479034fb231

    SHA256

    c48fd4ef9147b43d8189a707e9ff4a33bf1876169a04febe8d6d59bf806567ca

    SHA512

    067780aef1cc9c2c6d4c728b2765a622789a62bd46e133c0f59cc9f1639ddba6f78d9599dfb5243a61d006a71f54f9a643c0fd63dfae39909a3e53691056046d

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    96KB

    MD5

    7825cad99621dd288da81d8d8ae13cf5

    SHA1

    f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c

    SHA256

    529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5

    SHA512

    2e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    96KB

    MD5

    7825cad99621dd288da81d8d8ae13cf5

    SHA1

    f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c

    SHA256

    529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5

    SHA512

    2e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    96KB

    MD5

    7825cad99621dd288da81d8d8ae13cf5

    SHA1

    f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c

    SHA256

    529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5

    SHA512

    2e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4

  • memory/3812-162-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4620-183-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/4620-184-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/4620-174-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/4788-187-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4788-202-0x0000000008EC0000-0x0000000008F0B000-memory.dmp

    Filesize

    300KB

  • memory/4788-203-0x0000000008D10000-0x0000000008D20000-memory.dmp

    Filesize

    64KB

  • memory/4912-145-0x00000000050F0000-0x0000000005102000-memory.dmp

    Filesize

    72KB

  • memory/4912-156-0x00000000050C0000-0x00000000050D0000-memory.dmp

    Filesize

    64KB

  • memory/4912-155-0x00000000067F0000-0x0000000006840000-memory.dmp

    Filesize

    320KB

  • memory/4912-154-0x0000000006770000-0x00000000067E6000-memory.dmp

    Filesize

    472KB

  • memory/4912-153-0x0000000006F80000-0x00000000074AC000-memory.dmp

    Filesize

    5.2MB

  • memory/4912-152-0x0000000006880000-0x0000000006A42000-memory.dmp

    Filesize

    1.8MB

  • memory/4912-151-0x0000000005530000-0x0000000005596000-memory.dmp

    Filesize

    408KB

  • memory/4912-150-0x00000000061B0000-0x00000000066AE000-memory.dmp

    Filesize

    5.0MB

  • memory/4912-149-0x0000000005490000-0x0000000005522000-memory.dmp

    Filesize

    584KB

  • memory/4912-148-0x00000000052C0000-0x000000000530B000-memory.dmp

    Filesize

    300KB

  • memory/4912-147-0x00000000050C0000-0x00000000050D0000-memory.dmp

    Filesize

    64KB

  • memory/4912-146-0x0000000005150000-0x000000000518E000-memory.dmp

    Filesize

    248KB

  • memory/4912-144-0x00000000051B0000-0x00000000052BA000-memory.dmp

    Filesize

    1.0MB

  • memory/4912-143-0x00000000056A0000-0x0000000005CA6000-memory.dmp

    Filesize

    6.0MB

  • memory/4912-142-0x0000000000890000-0x00000000008BA000-memory.dmp

    Filesize

    168KB