Analysis

  • max time kernel
    53s
  • max time network
    66s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    04/06/2023, 09:53

General

  • Target

    447619bb127117be25eb2d36d2279ff97a45eadcc874868ee74813408e7da258.exe

  • Size

    1.0MB

  • MD5

    4da35d1cbd9fc920ac52bc149d7fac15

  • SHA1

    73220d4184a9c1e357c3cd251c5df08b23a3bca9

  • SHA256

    447619bb127117be25eb2d36d2279ff97a45eadcc874868ee74813408e7da258

  • SHA512

    9d16db8d64f65a3919dea4f8f654aac324f3f888af4d127f372bc7ac2982913ec504b2218f894d2560da43a4e260ab43af65da4cb279e03e4bc34cb19c70d614

  • SSDEEP

    24576:HyQuTkgU3jdwJeIr9wvqqq/GEfnw2lVAIHN+urI21oSTgNIA:SmPdwJeIr9wGeE0It++ASv

Malware Config

Extracted

Family

redline

Botnet

lusa

C2

83.97.73.126:19046

Attributes
  • auth_value

    c9df946711e01c378b42221de692acbd

Extracted

Family

redline

Botnet

brain

C2

83.97.73.126:19046

Attributes
  • auth_value

    5fb8269baadec0c49899b9a7a0c8851f

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\447619bb127117be25eb2d36d2279ff97a45eadcc874868ee74813408e7da258.exe
    "C:\Users\Admin\AppData\Local\Temp\447619bb127117be25eb2d36d2279ff97a45eadcc874868ee74813408e7da258.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6321342.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6321342.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2548
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1664016.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1664016.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2604
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o4952290.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o4952290.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4372
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4648
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3268555.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3268555.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2804
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7883095.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7883095.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:5056
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5084
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0780198.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0780198.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:700
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0780198.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0780198.exe
        3⤵
        • Executes dropped EXE
        PID:4604
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0780198.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0780198.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4840
        • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
          "C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4316
          • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            5⤵
            • Executes dropped EXE
            PID:3456
          • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            5⤵
            • Executes dropped EXE
            PID:516
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 516 -s 24
              6⤵
              • Program crash
              PID:4784

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

    Filesize

    226B

    MD5

    957779c42144282d8cd83192b8fbc7cf

    SHA1

    de83d08d2cca06b9ff3d1ef239d6b60b705d25fe

    SHA256

    0d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51

    SHA512

    f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd

  • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

    Filesize

    966KB

    MD5

    c1bc10b8e4a460892c724102e5281051

    SHA1

    9e356d0090ec1f2f13217a5d8445902edf663723

    SHA256

    ba9885ffb9d5d19770f6dd912548e53ecd61b9a06998c46ba8c39a9207c3cca5

    SHA512

    aece04ef7f00fe1ca8cf7c584d0423e3c0dd4e4e89334bdda76a1d26c9b1445560a310dfe976461a643582d27e08ed8911dd66491c32e28f568600667c6b5785

  • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

    Filesize

    966KB

    MD5

    c1bc10b8e4a460892c724102e5281051

    SHA1

    9e356d0090ec1f2f13217a5d8445902edf663723

    SHA256

    ba9885ffb9d5d19770f6dd912548e53ecd61b9a06998c46ba8c39a9207c3cca5

    SHA512

    aece04ef7f00fe1ca8cf7c584d0423e3c0dd4e4e89334bdda76a1d26c9b1445560a310dfe976461a643582d27e08ed8911dd66491c32e28f568600667c6b5785

  • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

    Filesize

    966KB

    MD5

    c1bc10b8e4a460892c724102e5281051

    SHA1

    9e356d0090ec1f2f13217a5d8445902edf663723

    SHA256

    ba9885ffb9d5d19770f6dd912548e53ecd61b9a06998c46ba8c39a9207c3cca5

    SHA512

    aece04ef7f00fe1ca8cf7c584d0423e3c0dd4e4e89334bdda76a1d26c9b1445560a310dfe976461a643582d27e08ed8911dd66491c32e28f568600667c6b5785

  • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

    Filesize

    966KB

    MD5

    c1bc10b8e4a460892c724102e5281051

    SHA1

    9e356d0090ec1f2f13217a5d8445902edf663723

    SHA256

    ba9885ffb9d5d19770f6dd912548e53ecd61b9a06998c46ba8c39a9207c3cca5

    SHA512

    aece04ef7f00fe1ca8cf7c584d0423e3c0dd4e4e89334bdda76a1d26c9b1445560a310dfe976461a643582d27e08ed8911dd66491c32e28f568600667c6b5785

  • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

    Filesize

    966KB

    MD5

    c1bc10b8e4a460892c724102e5281051

    SHA1

    9e356d0090ec1f2f13217a5d8445902edf663723

    SHA256

    ba9885ffb9d5d19770f6dd912548e53ecd61b9a06998c46ba8c39a9207c3cca5

    SHA512

    aece04ef7f00fe1ca8cf7c584d0423e3c0dd4e4e89334bdda76a1d26c9b1445560a310dfe976461a643582d27e08ed8911dd66491c32e28f568600667c6b5785

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0780198.exe

    Filesize

    966KB

    MD5

    c1bc10b8e4a460892c724102e5281051

    SHA1

    9e356d0090ec1f2f13217a5d8445902edf663723

    SHA256

    ba9885ffb9d5d19770f6dd912548e53ecd61b9a06998c46ba8c39a9207c3cca5

    SHA512

    aece04ef7f00fe1ca8cf7c584d0423e3c0dd4e4e89334bdda76a1d26c9b1445560a310dfe976461a643582d27e08ed8911dd66491c32e28f568600667c6b5785

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0780198.exe

    Filesize

    966KB

    MD5

    c1bc10b8e4a460892c724102e5281051

    SHA1

    9e356d0090ec1f2f13217a5d8445902edf663723

    SHA256

    ba9885ffb9d5d19770f6dd912548e53ecd61b9a06998c46ba8c39a9207c3cca5

    SHA512

    aece04ef7f00fe1ca8cf7c584d0423e3c0dd4e4e89334bdda76a1d26c9b1445560a310dfe976461a643582d27e08ed8911dd66491c32e28f568600667c6b5785

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0780198.exe

    Filesize

    966KB

    MD5

    c1bc10b8e4a460892c724102e5281051

    SHA1

    9e356d0090ec1f2f13217a5d8445902edf663723

    SHA256

    ba9885ffb9d5d19770f6dd912548e53ecd61b9a06998c46ba8c39a9207c3cca5

    SHA512

    aece04ef7f00fe1ca8cf7c584d0423e3c0dd4e4e89334bdda76a1d26c9b1445560a310dfe976461a643582d27e08ed8911dd66491c32e28f568600667c6b5785

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0780198.exe

    Filesize

    966KB

    MD5

    c1bc10b8e4a460892c724102e5281051

    SHA1

    9e356d0090ec1f2f13217a5d8445902edf663723

    SHA256

    ba9885ffb9d5d19770f6dd912548e53ecd61b9a06998c46ba8c39a9207c3cca5

    SHA512

    aece04ef7f00fe1ca8cf7c584d0423e3c0dd4e4e89334bdda76a1d26c9b1445560a310dfe976461a643582d27e08ed8911dd66491c32e28f568600667c6b5785

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6321342.exe

    Filesize

    605KB

    MD5

    05b23e88683b27de72ac82ffe41f3799

    SHA1

    7a04a5d2d0ee4876c170fd8261e6033a8fafe7cc

    SHA256

    4fb03d354c7e372054e6bac2295a82d1116d590f01eef39951d6dcc3323f3fba

    SHA512

    b4533cc54a85156708802e082f63592cbda24a2d5773e08fb0d7805ab69942ee854c71d8562debc4b43c11f809637df4b528a205932da911bdcb1e150400848e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6321342.exe

    Filesize

    605KB

    MD5

    05b23e88683b27de72ac82ffe41f3799

    SHA1

    7a04a5d2d0ee4876c170fd8261e6033a8fafe7cc

    SHA256

    4fb03d354c7e372054e6bac2295a82d1116d590f01eef39951d6dcc3323f3fba

    SHA512

    b4533cc54a85156708802e082f63592cbda24a2d5773e08fb0d7805ab69942ee854c71d8562debc4b43c11f809637df4b528a205932da911bdcb1e150400848e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7883095.exe

    Filesize

    304KB

    MD5

    4ce426b56999f73a1d7afa73aa5d5230

    SHA1

    0a6579e023207a9614837df15b681e74a43fd0a1

    SHA256

    ddd6f4c44d3e019f8506dfe7834650795daa6718612e50f1ee7a56b39f8fdf8f

    SHA512

    7860c478ca71b40fd747c6a454fbf50d41a1c5e4950ae718f57270bec813945ffd1354cc8c5e1a1c114ac7f416bd69f210d58550a73cc090ba89da523cb4fc90

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7883095.exe

    Filesize

    304KB

    MD5

    4ce426b56999f73a1d7afa73aa5d5230

    SHA1

    0a6579e023207a9614837df15b681e74a43fd0a1

    SHA256

    ddd6f4c44d3e019f8506dfe7834650795daa6718612e50f1ee7a56b39f8fdf8f

    SHA512

    7860c478ca71b40fd747c6a454fbf50d41a1c5e4950ae718f57270bec813945ffd1354cc8c5e1a1c114ac7f416bd69f210d58550a73cc090ba89da523cb4fc90

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1664016.exe

    Filesize

    276KB

    MD5

    04cc89ce597377f7d7fdd125fe17fd11

    SHA1

    6133e25f5bd1336db23a60592a7c373cf4992b32

    SHA256

    63efba6aea0bd1d2ed58903a4f0be333ed2c2c973e3dbfe9784fbb0b0597c089

    SHA512

    c73be6202fcad1ab1331abfd2f6d73f0bb72bb857b52ab69a15145b331872fa305357c7bcb2f510a55b4b064a072beb1dbb583137a157ef42e41abf2ec4e1b00

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1664016.exe

    Filesize

    276KB

    MD5

    04cc89ce597377f7d7fdd125fe17fd11

    SHA1

    6133e25f5bd1336db23a60592a7c373cf4992b32

    SHA256

    63efba6aea0bd1d2ed58903a4f0be333ed2c2c973e3dbfe9784fbb0b0597c089

    SHA512

    c73be6202fcad1ab1331abfd2f6d73f0bb72bb857b52ab69a15145b331872fa305357c7bcb2f510a55b4b064a072beb1dbb583137a157ef42e41abf2ec4e1b00

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o4952290.exe

    Filesize

    147KB

    MD5

    a9a30080871f6b7e344571d92f49445b

    SHA1

    baceee500f341ebd986c2600b0e301acf50736b1

    SHA256

    e34dc33831c0851ad8bcb4a9c1b358eac29cebed9d8112969b6ddb1628187250

    SHA512

    ad90df621feec8244838c6066092e173234425605daea17a510fa8a32899c49f3dc8386eae4e207ded65b886930931afe7b28923e56517b1af08d0f3c68cc7bf

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o4952290.exe

    Filesize

    147KB

    MD5

    a9a30080871f6b7e344571d92f49445b

    SHA1

    baceee500f341ebd986c2600b0e301acf50736b1

    SHA256

    e34dc33831c0851ad8bcb4a9c1b358eac29cebed9d8112969b6ddb1628187250

    SHA512

    ad90df621feec8244838c6066092e173234425605daea17a510fa8a32899c49f3dc8386eae4e207ded65b886930931afe7b28923e56517b1af08d0f3c68cc7bf

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3268555.exe

    Filesize

    168KB

    MD5

    d321c4665a194268b0d84996d0342ff5

    SHA1

    d7dd5337dc780e33ef5853c8fbd006ae7d5a5066

    SHA256

    b32d20764967080b3afffaf558daa418c2306b7b66ed18e5f4f4dc7b8e2c475b

    SHA512

    fc2ebaa3e98039090c78533400a5af80b10a0ba570f03e7d66218d89c4b2ed4f2d20a15980d7fd7d5b7a94f83ae455cdccbac40295ff8fc4606cc4b67ff5fb7a

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3268555.exe

    Filesize

    168KB

    MD5

    d321c4665a194268b0d84996d0342ff5

    SHA1

    d7dd5337dc780e33ef5853c8fbd006ae7d5a5066

    SHA256

    b32d20764967080b3afffaf558daa418c2306b7b66ed18e5f4f4dc7b8e2c475b

    SHA512

    fc2ebaa3e98039090c78533400a5af80b10a0ba570f03e7d66218d89c4b2ed4f2d20a15980d7fd7d5b7a94f83ae455cdccbac40295ff8fc4606cc4b67ff5fb7a

  • memory/700-209-0x0000000006F20000-0x0000000006F30000-memory.dmp

    Filesize

    64KB

  • memory/700-207-0x00000000000E0000-0x00000000001D8000-memory.dmp

    Filesize

    992KB

  • memory/2804-190-0x00000000060C0000-0x0000000006110000-memory.dmp

    Filesize

    320KB

  • memory/2804-153-0x00000000003A0000-0x00000000003CE000-memory.dmp

    Filesize

    184KB

  • memory/2804-188-0x0000000006830000-0x00000000069F2000-memory.dmp

    Filesize

    1.8MB

  • memory/2804-187-0x0000000005920000-0x0000000005986000-memory.dmp

    Filesize

    408KB

  • memory/2804-157-0x0000000004BA0000-0x0000000004BB2000-memory.dmp

    Filesize

    72KB

  • memory/2804-186-0x0000000006330000-0x000000000682E000-memory.dmp

    Filesize

    5.0MB

  • memory/2804-185-0x00000000059C0000-0x0000000005A52000-memory.dmp

    Filesize

    584KB

  • memory/2804-184-0x0000000005120000-0x0000000005196000-memory.dmp

    Filesize

    472KB

  • memory/2804-183-0x0000000004BF0000-0x0000000004C00000-memory.dmp

    Filesize

    64KB

  • memory/2804-156-0x0000000004E10000-0x0000000004F1A000-memory.dmp

    Filesize

    1.0MB

  • memory/2804-160-0x0000000004BF0000-0x0000000004C00000-memory.dmp

    Filesize

    64KB

  • memory/2804-154-0x0000000002520000-0x0000000002526000-memory.dmp

    Filesize

    24KB

  • memory/2804-159-0x0000000004D80000-0x0000000004DCB000-memory.dmp

    Filesize

    300KB

  • memory/2804-189-0x00000000085B0000-0x0000000008ADC000-memory.dmp

    Filesize

    5.2MB

  • memory/2804-158-0x0000000004D40000-0x0000000004D7E000-memory.dmp

    Filesize

    248KB

  • memory/2804-155-0x0000000005310000-0x0000000005916000-memory.dmp

    Filesize

    6.0MB

  • memory/4316-470-0x0000000006EE0000-0x0000000006EF0000-memory.dmp

    Filesize

    64KB

  • memory/4648-142-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4840-216-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/4840-327-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/4840-220-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/4840-219-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/5084-214-0x00000000099A0000-0x00000000099B0000-memory.dmp

    Filesize

    64KB

  • memory/5084-208-0x0000000005900000-0x0000000005906000-memory.dmp

    Filesize

    24KB

  • memory/5084-195-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB