Analysis

  • max time kernel
    53s
  • max time network
    66s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    29-05-2023 19:48

General

  • Target

    0f07d2670e82f839956921cf904d51a3c98dbbf2c49658ed58c3863f9e3d105c.exe

  • Size

    1.0MB

  • MD5

    1d8d742b93374e16cbed4c8c771852da

  • SHA1

    4207f27f8e96d5ca9fcd64a31593dfe7bf329f3b

  • SHA256

    0f07d2670e82f839956921cf904d51a3c98dbbf2c49658ed58c3863f9e3d105c

  • SHA512

    26805be67dc064186530dfc041700d68a0a5c001a04c41e09ec89a9995dd31cd4490d9acef17d150b2e71d42130d761117e11c8d7bd8995f7e28c60a991f2d5a

  • SSDEEP

    24576:TyoEx6qI4yj031G7VJJcFifCUA/qbJqRzRSQd0Ytdm7k8+OE:mzx5m44jJriqbgzR3Xv8Z

Malware Config

Extracted

Family

redline

Botnet

lizsa

C2

83.97.73.127:19045

Attributes
  • auth_value

    44b0b71b36e78465dbdebb4ecfb78b77

Extracted

Family

redline

Botnet

metro

C2

83.97.73.127:19045

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f07d2670e82f839956921cf904d51a3c98dbbf2c49658ed58c3863f9e3d105c.exe
    "C:\Users\Admin\AppData\Local\Temp\0f07d2670e82f839956921cf904d51a3c98dbbf2c49658ed58c3863f9e3d105c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6701710.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6701710.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2544
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5387932.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5387932.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2604
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o1547593.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o1547593.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4372
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4764
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p4225729.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p4225729.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4132
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r0874095.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r0874095.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:5056
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5096
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2102314.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2102314.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:748
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2102314.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2102314.exe
        3⤵
        • Executes dropped EXE
        PID:4708
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2102314.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2102314.exe
        3⤵
        • Executes dropped EXE
        PID:4856
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4856 -s 24
          4⤵
          • Program crash
          PID:4448

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Disabling Security Tools

1
T1089

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log
    Filesize

    226B

    MD5

    957779c42144282d8cd83192b8fbc7cf

    SHA1

    de83d08d2cca06b9ff3d1ef239d6b60b705d25fe

    SHA256

    0d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51

    SHA512

    f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2102314.exe
    Filesize

    964KB

    MD5

    9f1aca229894077d71b0328c62d1d4b9

    SHA1

    e4164b80949e20f2e838de1574fc86cb06e3b546

    SHA256

    96a468862820c7c9ddca61579ef0881c6b9c6e04114953c9d65ee928757d4154

    SHA512

    e46b49287660691dd66da71d0aa32e26e25b892825928a58ecfbdbc1ef30747f352856243f4b14bce99d4d7dd9d8a90b7d288ccc027350f8b239934cbb1b2468

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2102314.exe
    Filesize

    964KB

    MD5

    9f1aca229894077d71b0328c62d1d4b9

    SHA1

    e4164b80949e20f2e838de1574fc86cb06e3b546

    SHA256

    96a468862820c7c9ddca61579ef0881c6b9c6e04114953c9d65ee928757d4154

    SHA512

    e46b49287660691dd66da71d0aa32e26e25b892825928a58ecfbdbc1ef30747f352856243f4b14bce99d4d7dd9d8a90b7d288ccc027350f8b239934cbb1b2468

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2102314.exe
    Filesize

    964KB

    MD5

    9f1aca229894077d71b0328c62d1d4b9

    SHA1

    e4164b80949e20f2e838de1574fc86cb06e3b546

    SHA256

    96a468862820c7c9ddca61579ef0881c6b9c6e04114953c9d65ee928757d4154

    SHA512

    e46b49287660691dd66da71d0aa32e26e25b892825928a58ecfbdbc1ef30747f352856243f4b14bce99d4d7dd9d8a90b7d288ccc027350f8b239934cbb1b2468

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2102314.exe
    Filesize

    964KB

    MD5

    9f1aca229894077d71b0328c62d1d4b9

    SHA1

    e4164b80949e20f2e838de1574fc86cb06e3b546

    SHA256

    96a468862820c7c9ddca61579ef0881c6b9c6e04114953c9d65ee928757d4154

    SHA512

    e46b49287660691dd66da71d0aa32e26e25b892825928a58ecfbdbc1ef30747f352856243f4b14bce99d4d7dd9d8a90b7d288ccc027350f8b239934cbb1b2468

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6701710.exe
    Filesize

    617KB

    MD5

    6c2db9d00c8b374d4e498de5ed7db5a9

    SHA1

    e47378658b0018843bb037218fc3fb2c14d11547

    SHA256

    54ab029f921a3c3cb05514a8d84125e042d70690ab50cffbcc7b5f9e3ef8c0f0

    SHA512

    3d81f958f45f2774e1a926c1a2b2395c90aa4141d35b7517f7fb61218b693a2a46bbc58f548e138f79faa5a408e005eab7a62e464d4546e673d9a2f44c613f41

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6701710.exe
    Filesize

    617KB

    MD5

    6c2db9d00c8b374d4e498de5ed7db5a9

    SHA1

    e47378658b0018843bb037218fc3fb2c14d11547

    SHA256

    54ab029f921a3c3cb05514a8d84125e042d70690ab50cffbcc7b5f9e3ef8c0f0

    SHA512

    3d81f958f45f2774e1a926c1a2b2395c90aa4141d35b7517f7fb61218b693a2a46bbc58f548e138f79faa5a408e005eab7a62e464d4546e673d9a2f44c613f41

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r0874095.exe
    Filesize

    321KB

    MD5

    6eeb89d92dc64f3386540ecf964056dc

    SHA1

    2bc8c3e5f5dc402ab745efbf958218cb78055aa4

    SHA256

    28eb8aab79cdbce6472b08ebaeb817bd4e8b6ac61aa255c0d8aef7d5696103a0

    SHA512

    12134939e0329cbff809a30a4481b6b667c4d84033e8cda0e0878fc1917589bd653e472538a5d9829477e5892d7fbe4f71713d133be396515879c1abcb33e118

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r0874095.exe
    Filesize

    321KB

    MD5

    6eeb89d92dc64f3386540ecf964056dc

    SHA1

    2bc8c3e5f5dc402ab745efbf958218cb78055aa4

    SHA256

    28eb8aab79cdbce6472b08ebaeb817bd4e8b6ac61aa255c0d8aef7d5696103a0

    SHA512

    12134939e0329cbff809a30a4481b6b667c4d84033e8cda0e0878fc1917589bd653e472538a5d9829477e5892d7fbe4f71713d133be396515879c1abcb33e118

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5387932.exe
    Filesize

    282KB

    MD5

    e8fe72eb9ca628ab79d3d418309163f3

    SHA1

    b2fb3eaac5e1ecae0228d53811d1436e7a4018be

    SHA256

    09b4160d057b6616eae4697ef62ae1354b71625684569e3db3a338236ca6e4ad

    SHA512

    8d71b9ab0a424fe973379fee5a5656b576a0a11455ebb733e09b46dba94ce64fc7861864b5fc574c769b18af6f7cf8ba117e24695b974bcb8ce2a1b4d645c7bf

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5387932.exe
    Filesize

    282KB

    MD5

    e8fe72eb9ca628ab79d3d418309163f3

    SHA1

    b2fb3eaac5e1ecae0228d53811d1436e7a4018be

    SHA256

    09b4160d057b6616eae4697ef62ae1354b71625684569e3db3a338236ca6e4ad

    SHA512

    8d71b9ab0a424fe973379fee5a5656b576a0a11455ebb733e09b46dba94ce64fc7861864b5fc574c769b18af6f7cf8ba117e24695b974bcb8ce2a1b4d645c7bf

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o1547593.exe
    Filesize

    164KB

    MD5

    4c8edfcd02efc65314527bf30e6d0b32

    SHA1

    b5621c30c5cad0aa07aa08aee098a3cebc91bf16

    SHA256

    c104bde71a6e4703c8751c491468c47b1cb3c70576a97387840ced2c5de639ea

    SHA512

    a93941a53792bee7d00e88a7b7d543f8f18108c0a2cb3187f8ddbaf6dbd4c16bf32ec015a3d71ce208765c0cc28b29a2c8d7a268a5192892c2ed63011eec1edd

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o1547593.exe
    Filesize

    164KB

    MD5

    4c8edfcd02efc65314527bf30e6d0b32

    SHA1

    b5621c30c5cad0aa07aa08aee098a3cebc91bf16

    SHA256

    c104bde71a6e4703c8751c491468c47b1cb3c70576a97387840ced2c5de639ea

    SHA512

    a93941a53792bee7d00e88a7b7d543f8f18108c0a2cb3187f8ddbaf6dbd4c16bf32ec015a3d71ce208765c0cc28b29a2c8d7a268a5192892c2ed63011eec1edd

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p4225729.exe
    Filesize

    168KB

    MD5

    b34ca35d3be555bebcb5c9e3579f71ce

    SHA1

    b9128c715cd78608607347bf869418405846c6e3

    SHA256

    99f0f69d9e2e0e9b2a251d00b44f9a406640568a579449aae587fc23a1f2153a

    SHA512

    30f0cccf6478b1a873e1c60df7a96c8562085c04d7e6d02b893294f69bef8f193703caded91700f7d1f90dc8444c284bdc259125ec61344066586f26da3324fb

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p4225729.exe
    Filesize

    168KB

    MD5

    b34ca35d3be555bebcb5c9e3579f71ce

    SHA1

    b9128c715cd78608607347bf869418405846c6e3

    SHA256

    99f0f69d9e2e0e9b2a251d00b44f9a406640568a579449aae587fc23a1f2153a

    SHA512

    30f0cccf6478b1a873e1c60df7a96c8562085c04d7e6d02b893294f69bef8f193703caded91700f7d1f90dc8444c284bdc259125ec61344066586f26da3324fb

  • memory/748-211-0x0000000007970000-0x0000000007980000-memory.dmp
    Filesize

    64KB

  • memory/748-209-0x0000000000A80000-0x0000000000B78000-memory.dmp
    Filesize

    992KB

  • memory/4132-171-0x000000000A5A0000-0x000000000A632000-memory.dmp
    Filesize

    584KB

  • memory/4132-159-0x000000000A160000-0x000000000A19E000-memory.dmp
    Filesize

    248KB

  • memory/4132-172-0x000000000A500000-0x000000000A566000-memory.dmp
    Filesize

    408KB

  • memory/4132-173-0x000000000B5F0000-0x000000000BAEE000-memory.dmp
    Filesize

    5.0MB

  • memory/4132-174-0x000000000B290000-0x000000000B2E0000-memory.dmp
    Filesize

    320KB

  • memory/4132-189-0x000000000BAF0000-0x000000000BCB2000-memory.dmp
    Filesize

    1.8MB

  • memory/4132-190-0x000000000C1F0000-0x000000000C71C000-memory.dmp
    Filesize

    5.2MB

  • memory/4132-191-0x0000000004B40000-0x0000000004B50000-memory.dmp
    Filesize

    64KB

  • memory/4132-161-0x000000000A2F0000-0x000000000A33B000-memory.dmp
    Filesize

    300KB

  • memory/4132-160-0x0000000004B40000-0x0000000004B50000-memory.dmp
    Filesize

    64KB

  • memory/4132-154-0x0000000000290000-0x00000000002BE000-memory.dmp
    Filesize

    184KB

  • memory/4132-170-0x000000000A480000-0x000000000A4F6000-memory.dmp
    Filesize

    472KB

  • memory/4132-158-0x000000000A100000-0x000000000A112000-memory.dmp
    Filesize

    72KB

  • memory/4132-157-0x000000000A1E0000-0x000000000A2EA000-memory.dmp
    Filesize

    1.0MB

  • memory/4132-156-0x000000000A6E0000-0x000000000ACE6000-memory.dmp
    Filesize

    6.0MB

  • memory/4132-155-0x0000000002550000-0x0000000002556000-memory.dmp
    Filesize

    24KB

  • memory/4764-143-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/4856-218-0x0000000000400000-0x0000000000438000-memory.dmp
    Filesize

    224KB

  • memory/4856-221-0x00000000003E0000-0x00000000003E0000-memory.dmp
  • memory/5096-212-0x00000000097C0000-0x00000000097D0000-memory.dmp
    Filesize

    64KB

  • memory/5096-210-0x0000000005790000-0x0000000005796000-memory.dmp
    Filesize

    24KB

  • memory/5096-197-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB