Analysis

  • max time kernel
    135s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-05-2023 11:10

General

  • Target

    0f03545d91b8a2d8c4f914d025120d8a7df7e3487b82577f7d1503bafe2b1fe0.exe

  • Size

    1.0MB

  • MD5

    545aa43bc660a59f7382a54ebaaea413

  • SHA1

    7f5898c677c172e66389f865336d24ff5cf7b5b1

  • SHA256

    0f03545d91b8a2d8c4f914d025120d8a7df7e3487b82577f7d1503bafe2b1fe0

  • SHA512

    cd787e4779c8ad3eeda659ebe65b519bf72b8f46fd728222a363b9cc0ef6d61841d3e56e0584772d65c8dc294217358e398cf95e4b2a649e40ae24633b207e42

  • SSDEEP

    24576:RyIEEqKmmQsMW1dPjIcj3PMpSimdoLn+lhOMCw1i/QgomBPPUxy6:ElEvmfXW8cjMVmdoLn6Z1iGT

Malware Config

Extracted

Family

redline

Botnet

lisa

C2

83.97.73.122:19062

Attributes
  • auth_value

    c2dc311db9820012377b054447d37949

Extracted

Family

redline

Botnet

goga

C2

83.97.73.122:19062

Attributes
  • auth_value

    6d57dff6d3c42dddb8a76dc276b8467f

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f03545d91b8a2d8c4f914d025120d8a7df7e3487b82577f7d1503bafe2b1fe0.exe
    "C:\Users\Admin\AppData\Local\Temp\0f03545d91b8a2d8c4f914d025120d8a7df7e3487b82577f7d1503bafe2b1fe0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6497613.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6497613.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2636
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7945225.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7945225.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3088
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o5031053.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o5031053.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4216
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2908
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p2250271.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p2250271.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2028
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r0131278.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r0131278.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3708
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:32
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s7667880.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s7667880.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:208
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s7667880.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s7667880.exe
        3⤵
        • Executes dropped EXE
        PID:1308
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s7667880.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s7667880.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1960
        • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
          "C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2176
          • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of UnmapMainImage
            PID:3440
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3440 -s 12
              6⤵
              • Program crash
              PID:4724
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3440 -ip 3440
    1⤵
      PID:4128

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    2
    T1112

    Disabling Security Tools

    1
    T1089

    Credential Access

    Credentials in Files

    1
    T1081

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log
      Filesize

      226B

      MD5

      916851e072fbabc4796d8916c5131092

      SHA1

      d48a602229a690c512d5fdaf4c8d77547a88e7a2

      SHA256

      7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

      SHA512

      07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

    • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
      Filesize

      962KB

      MD5

      2d0021fa174de83979171a61af8a69b7

      SHA1

      72d3c45812d5f97826243005166531c048a7f75d

      SHA256

      88d3fec20f6ed37d0a23ddb777fc71cf1f51f9970b3104d261ba2804fbd65e2a

      SHA512

      3d2372c379f7ec10be3f30980b0ef96e45379391aa2e874f021ee747808ccbaea0d6b72ccb6917c26d1b0a0a819a9b8b11f3a303958d020ebee4cc227b62f485

    • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
      Filesize

      962KB

      MD5

      2d0021fa174de83979171a61af8a69b7

      SHA1

      72d3c45812d5f97826243005166531c048a7f75d

      SHA256

      88d3fec20f6ed37d0a23ddb777fc71cf1f51f9970b3104d261ba2804fbd65e2a

      SHA512

      3d2372c379f7ec10be3f30980b0ef96e45379391aa2e874f021ee747808ccbaea0d6b72ccb6917c26d1b0a0a819a9b8b11f3a303958d020ebee4cc227b62f485

    • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
      Filesize

      962KB

      MD5

      2d0021fa174de83979171a61af8a69b7

      SHA1

      72d3c45812d5f97826243005166531c048a7f75d

      SHA256

      88d3fec20f6ed37d0a23ddb777fc71cf1f51f9970b3104d261ba2804fbd65e2a

      SHA512

      3d2372c379f7ec10be3f30980b0ef96e45379391aa2e874f021ee747808ccbaea0d6b72ccb6917c26d1b0a0a819a9b8b11f3a303958d020ebee4cc227b62f485

    • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
      Filesize

      962KB

      MD5

      2d0021fa174de83979171a61af8a69b7

      SHA1

      72d3c45812d5f97826243005166531c048a7f75d

      SHA256

      88d3fec20f6ed37d0a23ddb777fc71cf1f51f9970b3104d261ba2804fbd65e2a

      SHA512

      3d2372c379f7ec10be3f30980b0ef96e45379391aa2e874f021ee747808ccbaea0d6b72ccb6917c26d1b0a0a819a9b8b11f3a303958d020ebee4cc227b62f485

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s7667880.exe
      Filesize

      962KB

      MD5

      2d0021fa174de83979171a61af8a69b7

      SHA1

      72d3c45812d5f97826243005166531c048a7f75d

      SHA256

      88d3fec20f6ed37d0a23ddb777fc71cf1f51f9970b3104d261ba2804fbd65e2a

      SHA512

      3d2372c379f7ec10be3f30980b0ef96e45379391aa2e874f021ee747808ccbaea0d6b72ccb6917c26d1b0a0a819a9b8b11f3a303958d020ebee4cc227b62f485

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s7667880.exe
      Filesize

      962KB

      MD5

      2d0021fa174de83979171a61af8a69b7

      SHA1

      72d3c45812d5f97826243005166531c048a7f75d

      SHA256

      88d3fec20f6ed37d0a23ddb777fc71cf1f51f9970b3104d261ba2804fbd65e2a

      SHA512

      3d2372c379f7ec10be3f30980b0ef96e45379391aa2e874f021ee747808ccbaea0d6b72ccb6917c26d1b0a0a819a9b8b11f3a303958d020ebee4cc227b62f485

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s7667880.exe
      Filesize

      962KB

      MD5

      2d0021fa174de83979171a61af8a69b7

      SHA1

      72d3c45812d5f97826243005166531c048a7f75d

      SHA256

      88d3fec20f6ed37d0a23ddb777fc71cf1f51f9970b3104d261ba2804fbd65e2a

      SHA512

      3d2372c379f7ec10be3f30980b0ef96e45379391aa2e874f021ee747808ccbaea0d6b72ccb6917c26d1b0a0a819a9b8b11f3a303958d020ebee4cc227b62f485

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s7667880.exe
      Filesize

      962KB

      MD5

      2d0021fa174de83979171a61af8a69b7

      SHA1

      72d3c45812d5f97826243005166531c048a7f75d

      SHA256

      88d3fec20f6ed37d0a23ddb777fc71cf1f51f9970b3104d261ba2804fbd65e2a

      SHA512

      3d2372c379f7ec10be3f30980b0ef96e45379391aa2e874f021ee747808ccbaea0d6b72ccb6917c26d1b0a0a819a9b8b11f3a303958d020ebee4cc227b62f485

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6497613.exe
      Filesize

      592KB

      MD5

      1d01ec3c40494c578360b6d791c3ed42

      SHA1

      4bcfa9aeafcdbd18b1e3b2a2da1ff2e86e894ad8

      SHA256

      8a4a39fe6947266c490f793ed77ec75820f1dd2065b43bc7e15e2aee0c3303cd

      SHA512

      d86e4569d6b2e87f866890cdd7626e05cee88e9d6d5f3c24511fb6a91ea79dc13276dba6e3b1061a1779a959c834d66460bfc00efa2aa35a354c5b5021a5dc55

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6497613.exe
      Filesize

      592KB

      MD5

      1d01ec3c40494c578360b6d791c3ed42

      SHA1

      4bcfa9aeafcdbd18b1e3b2a2da1ff2e86e894ad8

      SHA256

      8a4a39fe6947266c490f793ed77ec75820f1dd2065b43bc7e15e2aee0c3303cd

      SHA512

      d86e4569d6b2e87f866890cdd7626e05cee88e9d6d5f3c24511fb6a91ea79dc13276dba6e3b1061a1779a959c834d66460bfc00efa2aa35a354c5b5021a5dc55

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r0131278.exe
      Filesize

      316KB

      MD5

      5cae9b7a26b114f1c6f43cd6279d4a32

      SHA1

      f586401f5979e628953b97f8e748a5f990650741

      SHA256

      3906b724970afe507e545e3606b05941449c892415d557fdbcc182e2b153d1bc

      SHA512

      5aa6ad1fbb890790cae330d6a456917fda1cbf628e83e501319d201be2bbd9cb5f18be5445e2a9f67895f0af21332c83aaa0382cd266247f8d84c14e751c4291

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r0131278.exe
      Filesize

      316KB

      MD5

      5cae9b7a26b114f1c6f43cd6279d4a32

      SHA1

      f586401f5979e628953b97f8e748a5f990650741

      SHA256

      3906b724970afe507e545e3606b05941449c892415d557fdbcc182e2b153d1bc

      SHA512

      5aa6ad1fbb890790cae330d6a456917fda1cbf628e83e501319d201be2bbd9cb5f18be5445e2a9f67895f0af21332c83aaa0382cd266247f8d84c14e751c4291

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7945225.exe
      Filesize

      275KB

      MD5

      ab38932fac9efa5ce6de43af2d36b630

      SHA1

      08496c583cdc3df2ce0df3f3194718f90f19ad5f

      SHA256

      3e1e76ae3bab6c7ac22fed17a4635a0308a5e63fab1d77bcaba876805ea2ae36

      SHA512

      45859b18fa3e49fe19a0f83c5ce6bb32377a0728abb041fc655703fffab03e8a36cfb750850a1165399ddae959d001460dfed939533f9711e11b39f747215013

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7945225.exe
      Filesize

      275KB

      MD5

      ab38932fac9efa5ce6de43af2d36b630

      SHA1

      08496c583cdc3df2ce0df3f3194718f90f19ad5f

      SHA256

      3e1e76ae3bab6c7ac22fed17a4635a0308a5e63fab1d77bcaba876805ea2ae36

      SHA512

      45859b18fa3e49fe19a0f83c5ce6bb32377a0728abb041fc655703fffab03e8a36cfb750850a1165399ddae959d001460dfed939533f9711e11b39f747215013

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o5031053.exe
      Filesize

      182KB

      MD5

      d9adaa1be49c94aaaec1a57b42d961ee

      SHA1

      5bfe2a9238222b80f1c312b83650236369175924

      SHA256

      2df948bbe5b672e4cf2f531b2d3a562cd8686fd43d55ade38385df27f1015428

      SHA512

      85126a6c40dd52f053950d81cd980e2bb48ba8bee43e90b21db519d86395a233a512fc265597d369f9803cbaf4653b017336e17e7f248423927632e9249b8b47

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o5031053.exe
      Filesize

      182KB

      MD5

      d9adaa1be49c94aaaec1a57b42d961ee

      SHA1

      5bfe2a9238222b80f1c312b83650236369175924

      SHA256

      2df948bbe5b672e4cf2f531b2d3a562cd8686fd43d55ade38385df27f1015428

      SHA512

      85126a6c40dd52f053950d81cd980e2bb48ba8bee43e90b21db519d86395a233a512fc265597d369f9803cbaf4653b017336e17e7f248423927632e9249b8b47

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p2250271.exe
      Filesize

      145KB

      MD5

      e4e7db7dabca43288d8f4ce6182d9c6e

      SHA1

      6bb7379d24edbbe0579ea93ac7303331953d94d8

      SHA256

      cc241b14d4e4af10450936e7699d025d8faef27db5cba805798e073e6d56f936

      SHA512

      98a0dbebadb8c975f271a75461f42327886ccb18b42af39a1109ff31e5a5578154b16cf733f4d40b2824d25d843ef9beac680f3276785fa57e7d349a36a2905e

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p2250271.exe
      Filesize

      145KB

      MD5

      e4e7db7dabca43288d8f4ce6182d9c6e

      SHA1

      6bb7379d24edbbe0579ea93ac7303331953d94d8

      SHA256

      cc241b14d4e4af10450936e7699d025d8faef27db5cba805798e073e6d56f936

      SHA512

      98a0dbebadb8c975f271a75461f42327886ccb18b42af39a1109ff31e5a5578154b16cf733f4d40b2824d25d843ef9beac680f3276785fa57e7d349a36a2905e

    • memory/32-193-0x00000000058E0000-0x00000000058F0000-memory.dmp
      Filesize

      64KB

    • memory/32-183-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/208-194-0x0000000007900000-0x0000000007910000-memory.dmp
      Filesize

      64KB

    • memory/208-192-0x0000000000B20000-0x0000000000C18000-memory.dmp
      Filesize

      992KB

    • memory/1960-196-0x0000000000400000-0x0000000000438000-memory.dmp
      Filesize

      224KB

    • memory/1960-199-0x0000000000400000-0x0000000000438000-memory.dmp
      Filesize

      224KB

    • memory/1960-200-0x0000000000400000-0x0000000000438000-memory.dmp
      Filesize

      224KB

    • memory/1960-204-0x0000000000400000-0x0000000000438000-memory.dmp
      Filesize

      224KB

    • memory/1960-216-0x0000000000400000-0x0000000000438000-memory.dmp
      Filesize

      224KB

    • memory/2028-165-0x0000000004C20000-0x0000000004D2A000-memory.dmp
      Filesize

      1.0MB

    • memory/2028-177-0x0000000004B90000-0x0000000004BA0000-memory.dmp
      Filesize

      64KB

    • memory/2028-175-0x0000000005D70000-0x0000000005DC0000-memory.dmp
      Filesize

      320KB

    • memory/2028-174-0x0000000005CF0000-0x0000000005D66000-memory.dmp
      Filesize

      472KB

    • memory/2028-173-0x0000000006C20000-0x000000000714C000-memory.dmp
      Filesize

      5.2MB

    • memory/2028-172-0x0000000006520000-0x00000000066E2000-memory.dmp
      Filesize

      1.8MB

    • memory/2028-171-0x0000000005AA0000-0x0000000005B32000-memory.dmp
      Filesize

      584KB

    • memory/2028-170-0x0000000005F70000-0x0000000006514000-memory.dmp
      Filesize

      5.6MB

    • memory/2028-169-0x0000000004EB0000-0x0000000004F16000-memory.dmp
      Filesize

      408KB

    • memory/2028-168-0x0000000004B90000-0x0000000004BA0000-memory.dmp
      Filesize

      64KB

    • memory/2028-167-0x0000000004BE0000-0x0000000004C1C000-memory.dmp
      Filesize

      240KB

    • memory/2028-166-0x0000000004B40000-0x0000000004B52000-memory.dmp
      Filesize

      72KB

    • memory/2028-164-0x0000000005130000-0x0000000005748000-memory.dmp
      Filesize

      6.1MB

    • memory/2028-163-0x00000000002B0000-0x00000000002DA000-memory.dmp
      Filesize

      168KB

    • memory/2176-217-0x00000000075A0000-0x00000000075B0000-memory.dmp
      Filesize

      64KB

    • memory/2908-155-0x00000000003C0000-0x00000000003CA000-memory.dmp
      Filesize

      40KB

    • memory/3440-221-0x00000000003F0000-0x00000000003F0000-memory.dmp