Analysis

  • max time kernel
    53s
  • max time network
    65s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    30-05-2023 11:25

General

  • Target

    6111b9a6a3f1fb6bf6c76aa7eb64a8a2133b0a4cac1f35c62b4a667db4a5b72e.exe

  • Size

    1.0MB

  • MD5

    9ff1722f6b4e169a30a82d4500135204

  • SHA1

    1519bc565da9e59e8904eecb1ea8cd2ce4beec1a

  • SHA256

    6111b9a6a3f1fb6bf6c76aa7eb64a8a2133b0a4cac1f35c62b4a667db4a5b72e

  • SHA512

    3f6c9f93bed34779b1113df5f8e0c2ecfb9bb976fa751d154362f232b7b9b6f2f50bd395ce9c478c2d37327f143f8abc8cac49434176cacdc63ce8ba07a613b8

  • SSDEEP

    12288:5Mrby901+gBKg+AyyoR7VP9mNIKnkwENqq7/JYPOJseRkUTqb9ryD528Tm6mB/Hp:Kyjrg+q8MIKnEnBrRaWTmjkYqTaTVr

Malware Config

Extracted

Family

redline

Botnet

liza

C2

83.97.73.127:19045

Attributes
  • auth_value

    198e3e9b188d6cfab0a2b0fb100bb7c5

Extracted

Family

redline

Botnet

ronin

C2

83.97.73.127:19045

Attributes
  • auth_value

    4cce855f5ba9b9b6e5b1400f102745de

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6111b9a6a3f1fb6bf6c76aa7eb64a8a2133b0a4cac1f35c62b4a667db4a5b72e.exe
    "C:\Users\Admin\AppData\Local\Temp\6111b9a6a3f1fb6bf6c76aa7eb64a8a2133b0a4cac1f35c62b4a667db4a5b72e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2532
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2884016.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2884016.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3048
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2383905.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2383905.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:5072
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0822401.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0822401.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2056
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4224
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p5667858.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p5667858.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4792
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6257322.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6257322.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4988
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:780
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0731098.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0731098.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:488
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0731098.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0731098.exe
        3⤵
        • Executes dropped EXE
        PID:4884
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4884 -s 24
          4⤵
          • Program crash
          PID:4404

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

    Filesize

    226B

    MD5

    957779c42144282d8cd83192b8fbc7cf

    SHA1

    de83d08d2cca06b9ff3d1ef239d6b60b705d25fe

    SHA256

    0d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51

    SHA512

    f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0731098.exe

    Filesize

    964KB

    MD5

    824b86ae7273ed68070bb10f9ad7dbfa

    SHA1

    c34487fc268adefbdab3f88004aef64c1830d071

    SHA256

    a7266213ccbe0b780e13c67acf50903c8c7ed2269a685802f805fedbfcff280e

    SHA512

    146a6a39d44715bf1f844f072672195304ffd58c97213b68616fe753a0983474fb2f807bf85d15520a47f27b8e76823a0704f851470fc8fce22176790b1e4127

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0731098.exe

    Filesize

    964KB

    MD5

    824b86ae7273ed68070bb10f9ad7dbfa

    SHA1

    c34487fc268adefbdab3f88004aef64c1830d071

    SHA256

    a7266213ccbe0b780e13c67acf50903c8c7ed2269a685802f805fedbfcff280e

    SHA512

    146a6a39d44715bf1f844f072672195304ffd58c97213b68616fe753a0983474fb2f807bf85d15520a47f27b8e76823a0704f851470fc8fce22176790b1e4127

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0731098.exe

    Filesize

    964KB

    MD5

    824b86ae7273ed68070bb10f9ad7dbfa

    SHA1

    c34487fc268adefbdab3f88004aef64c1830d071

    SHA256

    a7266213ccbe0b780e13c67acf50903c8c7ed2269a685802f805fedbfcff280e

    SHA512

    146a6a39d44715bf1f844f072672195304ffd58c97213b68616fe753a0983474fb2f807bf85d15520a47f27b8e76823a0704f851470fc8fce22176790b1e4127

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2884016.exe

    Filesize

    580KB

    MD5

    7bc0628542b150aa26d4fe996d3f068b

    SHA1

    390014bf295a3fb51c021a082bbbfc06d8ef3456

    SHA256

    9c08e127f2b3cbee1deafd240d4a9117809c6613737c29a63758446a8bf757d3

    SHA512

    6270daa81bb89a46fdc8d1833354f7094b435169ce6419f91ca072b614fd469509d8b9c3e0ef89c138f3574e0a219c0cf21952cb8fb6b6d9ca72290e180bbcff

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2884016.exe

    Filesize

    580KB

    MD5

    7bc0628542b150aa26d4fe996d3f068b

    SHA1

    390014bf295a3fb51c021a082bbbfc06d8ef3456

    SHA256

    9c08e127f2b3cbee1deafd240d4a9117809c6613737c29a63758446a8bf757d3

    SHA512

    6270daa81bb89a46fdc8d1833354f7094b435169ce6419f91ca072b614fd469509d8b9c3e0ef89c138f3574e0a219c0cf21952cb8fb6b6d9ca72290e180bbcff

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6257322.exe

    Filesize

    327KB

    MD5

    67f7e1ada2460e46fee17ab75064cf0f

    SHA1

    643886aebafde0935a4b64011f01142b631f46ef

    SHA256

    e0c5b826f9a403ae6f6b6c73f0f25514d53540ff0bc337554f27b5eb29a51729

    SHA512

    e00e9d4cf443a1086e7943df993fd43520465d22b61f4ca372099ebacb2d93490520970daff763bdd2631093b572b4dfe8ce1cb28ee20c8bdaaad628b5e440fd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6257322.exe

    Filesize

    327KB

    MD5

    67f7e1ada2460e46fee17ab75064cf0f

    SHA1

    643886aebafde0935a4b64011f01142b631f46ef

    SHA256

    e0c5b826f9a403ae6f6b6c73f0f25514d53540ff0bc337554f27b5eb29a51729

    SHA512

    e00e9d4cf443a1086e7943df993fd43520465d22b61f4ca372099ebacb2d93490520970daff763bdd2631093b572b4dfe8ce1cb28ee20c8bdaaad628b5e440fd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2383905.exe

    Filesize

    281KB

    MD5

    3a0f6c868bb6eeca8f47ab064f0f03e8

    SHA1

    5e5d7917f6a241a0f22578169c6e0fee8d50e699

    SHA256

    06698e624ef2d9ad7d2033266550db50a8dcc7f647008848d7d99b5d71653e5c

    SHA512

    952a1f8b62f2ce5a092842a8bcd9b9e69c043fa76e3a91cc595cf72cd93fc14f462c27cff2eff8f85f9726209562c7486e6d1ae732bcc513f4c2e98da14ea993

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2383905.exe

    Filesize

    281KB

    MD5

    3a0f6c868bb6eeca8f47ab064f0f03e8

    SHA1

    5e5d7917f6a241a0f22578169c6e0fee8d50e699

    SHA256

    06698e624ef2d9ad7d2033266550db50a8dcc7f647008848d7d99b5d71653e5c

    SHA512

    952a1f8b62f2ce5a092842a8bcd9b9e69c043fa76e3a91cc595cf72cd93fc14f462c27cff2eff8f85f9726209562c7486e6d1ae732bcc513f4c2e98da14ea993

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0822401.exe

    Filesize

    170KB

    MD5

    b7dbfd41d8301bd1f3f4bfc180afb87c

    SHA1

    56a49d9d60fa9f58367122df032eb3db9b8bae37

    SHA256

    ce3ef8673e4bb3bc1950674372bbeece5b8e7893489f078ee2f187fcbc149c5d

    SHA512

    c9a62c5176d2d2ea4185c48b08ea807bfe17be0f095c2da774a79a4132943c70a6e31c1c345e25b4267487bf4d25dd693202dc7899684af3c62869f3865e369a

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0822401.exe

    Filesize

    170KB

    MD5

    b7dbfd41d8301bd1f3f4bfc180afb87c

    SHA1

    56a49d9d60fa9f58367122df032eb3db9b8bae37

    SHA256

    ce3ef8673e4bb3bc1950674372bbeece5b8e7893489f078ee2f187fcbc149c5d

    SHA512

    c9a62c5176d2d2ea4185c48b08ea807bfe17be0f095c2da774a79a4132943c70a6e31c1c345e25b4267487bf4d25dd693202dc7899684af3c62869f3865e369a

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p5667858.exe

    Filesize

    168KB

    MD5

    4ff533500739036406a0984173a4fd01

    SHA1

    44730ea21f0ca5df19fece305f45b124b2e97852

    SHA256

    89671d6f96a07c5cd6277e12145b4276695df4ddaaa58f9de8c8f6c23b358e49

    SHA512

    7e195496e7bae0e52f799a09f45427e9c92360c63732b12211193c88bb89c74f73a01e38415cccf373fc809c62a942dd754c923e4576f7e211e6004e3a6c302a

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p5667858.exe

    Filesize

    168KB

    MD5

    4ff533500739036406a0984173a4fd01

    SHA1

    44730ea21f0ca5df19fece305f45b124b2e97852

    SHA256

    89671d6f96a07c5cd6277e12145b4276695df4ddaaa58f9de8c8f6c23b358e49

    SHA512

    7e195496e7bae0e52f799a09f45427e9c92360c63732b12211193c88bb89c74f73a01e38415cccf373fc809c62a942dd754c923e4576f7e211e6004e3a6c302a

  • memory/488-211-0x0000000003190000-0x00000000031A0000-memory.dmp

    Filesize

    64KB

  • memory/488-209-0x0000000000E40000-0x0000000000F38000-memory.dmp

    Filesize

    992KB

  • memory/780-210-0x0000000004B40000-0x0000000004B46000-memory.dmp

    Filesize

    24KB

  • memory/780-216-0x0000000008CF0000-0x0000000008D00000-memory.dmp

    Filesize

    64KB

  • memory/780-197-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/4224-143-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4792-154-0x0000000000FA0000-0x0000000000FCE000-memory.dmp

    Filesize

    184KB

  • memory/4792-161-0x0000000005960000-0x0000000005970000-memory.dmp

    Filesize

    64KB

  • memory/4792-175-0x000000000CD10000-0x000000000D23C000-memory.dmp

    Filesize

    5.2MB

  • memory/4792-190-0x00000000059F0000-0x0000000005A40000-memory.dmp

    Filesize

    320KB

  • memory/4792-191-0x0000000005960000-0x0000000005970000-memory.dmp

    Filesize

    64KB

  • memory/4792-173-0x000000000C110000-0x000000000C60E000-memory.dmp

    Filesize

    5.0MB

  • memory/4792-172-0x000000000B030000-0x000000000B096000-memory.dmp

    Filesize

    408KB

  • memory/4792-171-0x000000000B0D0000-0x000000000B162000-memory.dmp

    Filesize

    584KB

  • memory/4792-170-0x000000000AFB0000-0x000000000B026000-memory.dmp

    Filesize

    472KB

  • memory/4792-174-0x000000000C610000-0x000000000C7D2000-memory.dmp

    Filesize

    1.8MB

  • memory/4792-160-0x000000000ACF0000-0x000000000AD3B000-memory.dmp

    Filesize

    300KB

  • memory/4792-159-0x00000000058D0000-0x000000000590E000-memory.dmp

    Filesize

    248KB

  • memory/4792-158-0x00000000058B0000-0x00000000058C2000-memory.dmp

    Filesize

    72KB

  • memory/4792-157-0x000000000AE00000-0x000000000AF0A000-memory.dmp

    Filesize

    1.0MB

  • memory/4792-156-0x000000000B300000-0x000000000B906000-memory.dmp

    Filesize

    6.0MB

  • memory/4792-155-0x0000000003250000-0x0000000003256000-memory.dmp

    Filesize

    24KB

  • memory/4884-217-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/4884-221-0x0000000000340000-0x0000000000340000-memory.dmp