Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    04-06-2023 17:45

General

  • Target

    tmp.exe

  • Size

    627KB

  • MD5

    d2def0084106d6e71ec3f01bf112d82e

  • SHA1

    2480ff75eb470c56db4762545b3d70a1a79696b3

  • SHA256

    ebebb7a0e4f0a8514b0b1e142d7e17fe0b6c336970066567601aa7ec17b4d13a

  • SHA512

    32c910ddd3a22fe236e0ec2df8ee0e70106063559064ead304770f6d066dcaa6464e812d9222c4f5bf1061a9a2e93ae9980ed7cb38486cccc9176494b14abb0c

  • SSDEEP

    12288:cMrMy90qYyW041SoNPrKVbFIWffdpo2nyKZxcLcgM/RFC/Z8auqD:Iy7odSoVrqd3fy9Lcg0RFCR8av

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19046

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1468
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5387363.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5387363.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1604
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6541230.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6541230.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:680
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7621364.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7621364.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1116
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1104
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3511224.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3511224.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1680

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Disabling Security Tools

1
T1089

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5387363.exe
    Filesize

    425KB

    MD5

    d67bbeee039b8d650bcd1065abc87961

    SHA1

    f9301c877e491f0750d38f66d2e7448f1b551743

    SHA256

    aab805e421a7eb381e46f363c5ee5dbfd997f847560c24e449a017c360645072

    SHA512

    44da3ec7e40bbc9e136f70841530bdd91f5dd1715cb8860bac65ea296608e339dae429fcec7a005908654f724c4dc9850da05ccc1e8f7e59373e8a0d78d37acc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5387363.exe
    Filesize

    425KB

    MD5

    d67bbeee039b8d650bcd1065abc87961

    SHA1

    f9301c877e491f0750d38f66d2e7448f1b551743

    SHA256

    aab805e421a7eb381e46f363c5ee5dbfd997f847560c24e449a017c360645072

    SHA512

    44da3ec7e40bbc9e136f70841530bdd91f5dd1715cb8860bac65ea296608e339dae429fcec7a005908654f724c4dc9850da05ccc1e8f7e59373e8a0d78d37acc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6541230.exe
    Filesize

    254KB

    MD5

    7f991f72157b903cac0c69532f65c422

    SHA1

    06209f2c7341ef82195e0c480753caed0dd4eed4

    SHA256

    ef4c5bf7b4cc7fb3fe1c6cbb4893f90807d9916b9630333cf623338071d7c1a6

    SHA512

    f2434e058d98a37bbb856bddc6a59ab7fe96b40e8325e9662fc2c92490a7cd27b3848251c1b60d958029e63e84cdb70f576352e818b73924db2cf68491a7d7de

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6541230.exe
    Filesize

    254KB

    MD5

    7f991f72157b903cac0c69532f65c422

    SHA1

    06209f2c7341ef82195e0c480753caed0dd4eed4

    SHA256

    ef4c5bf7b4cc7fb3fe1c6cbb4893f90807d9916b9630333cf623338071d7c1a6

    SHA512

    f2434e058d98a37bbb856bddc6a59ab7fe96b40e8325e9662fc2c92490a7cd27b3848251c1b60d958029e63e84cdb70f576352e818b73924db2cf68491a7d7de

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7621364.exe
    Filesize

    108KB

    MD5

    edd967e9176e91837da5d1ddcee897c0

    SHA1

    a68799909279d6b3040300701808b71c5e1995c4

    SHA256

    fe4842288e041020243b724386e9167707db41abf362a9f2aa784b5979c3f805

    SHA512

    56a5f6e5bbef59ac1e8cd05d7d0967c320d02d9e6480aac860503193e6efbaba549fa7e49f8a2d43ff6b42ea7092efe57e5fcd94a0be343c8c329a44e12a53f3

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7621364.exe
    Filesize

    108KB

    MD5

    edd967e9176e91837da5d1ddcee897c0

    SHA1

    a68799909279d6b3040300701808b71c5e1995c4

    SHA256

    fe4842288e041020243b724386e9167707db41abf362a9f2aa784b5979c3f805

    SHA512

    56a5f6e5bbef59ac1e8cd05d7d0967c320d02d9e6480aac860503193e6efbaba549fa7e49f8a2d43ff6b42ea7092efe57e5fcd94a0be343c8c329a44e12a53f3

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3511224.exe
    Filesize

    172KB

    MD5

    d1925563c6a3da713c97baead6741903

    SHA1

    d9f680d3e0af2ef7fdc5d6e490a65c10abe47840

    SHA256

    147591c3ea3dd79c626062a17dc718441cd98728a5adf7a82bf207a263e7355f

    SHA512

    26fa7b5cd63f7aa36f65eec66ddb5690e4d93cc45bc124bb04b4890297dfcdfee59bc3c42272da11b56ddff895193cbe9a8cbf95c2a75253e7c4b0b684cded60

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3511224.exe
    Filesize

    172KB

    MD5

    d1925563c6a3da713c97baead6741903

    SHA1

    d9f680d3e0af2ef7fdc5d6e490a65c10abe47840

    SHA256

    147591c3ea3dd79c626062a17dc718441cd98728a5adf7a82bf207a263e7355f

    SHA512

    26fa7b5cd63f7aa36f65eec66ddb5690e4d93cc45bc124bb04b4890297dfcdfee59bc3c42272da11b56ddff895193cbe9a8cbf95c2a75253e7c4b0b684cded60

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v5387363.exe
    Filesize

    425KB

    MD5

    d67bbeee039b8d650bcd1065abc87961

    SHA1

    f9301c877e491f0750d38f66d2e7448f1b551743

    SHA256

    aab805e421a7eb381e46f363c5ee5dbfd997f847560c24e449a017c360645072

    SHA512

    44da3ec7e40bbc9e136f70841530bdd91f5dd1715cb8860bac65ea296608e339dae429fcec7a005908654f724c4dc9850da05ccc1e8f7e59373e8a0d78d37acc

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v5387363.exe
    Filesize

    425KB

    MD5

    d67bbeee039b8d650bcd1065abc87961

    SHA1

    f9301c877e491f0750d38f66d2e7448f1b551743

    SHA256

    aab805e421a7eb381e46f363c5ee5dbfd997f847560c24e449a017c360645072

    SHA512

    44da3ec7e40bbc9e136f70841530bdd91f5dd1715cb8860bac65ea296608e339dae429fcec7a005908654f724c4dc9850da05ccc1e8f7e59373e8a0d78d37acc

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v6541230.exe
    Filesize

    254KB

    MD5

    7f991f72157b903cac0c69532f65c422

    SHA1

    06209f2c7341ef82195e0c480753caed0dd4eed4

    SHA256

    ef4c5bf7b4cc7fb3fe1c6cbb4893f90807d9916b9630333cf623338071d7c1a6

    SHA512

    f2434e058d98a37bbb856bddc6a59ab7fe96b40e8325e9662fc2c92490a7cd27b3848251c1b60d958029e63e84cdb70f576352e818b73924db2cf68491a7d7de

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v6541230.exe
    Filesize

    254KB

    MD5

    7f991f72157b903cac0c69532f65c422

    SHA1

    06209f2c7341ef82195e0c480753caed0dd4eed4

    SHA256

    ef4c5bf7b4cc7fb3fe1c6cbb4893f90807d9916b9630333cf623338071d7c1a6

    SHA512

    f2434e058d98a37bbb856bddc6a59ab7fe96b40e8325e9662fc2c92490a7cd27b3848251c1b60d958029e63e84cdb70f576352e818b73924db2cf68491a7d7de

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\a7621364.exe
    Filesize

    108KB

    MD5

    edd967e9176e91837da5d1ddcee897c0

    SHA1

    a68799909279d6b3040300701808b71c5e1995c4

    SHA256

    fe4842288e041020243b724386e9167707db41abf362a9f2aa784b5979c3f805

    SHA512

    56a5f6e5bbef59ac1e8cd05d7d0967c320d02d9e6480aac860503193e6efbaba549fa7e49f8a2d43ff6b42ea7092efe57e5fcd94a0be343c8c329a44e12a53f3

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\a7621364.exe
    Filesize

    108KB

    MD5

    edd967e9176e91837da5d1ddcee897c0

    SHA1

    a68799909279d6b3040300701808b71c5e1995c4

    SHA256

    fe4842288e041020243b724386e9167707db41abf362a9f2aa784b5979c3f805

    SHA512

    56a5f6e5bbef59ac1e8cd05d7d0967c320d02d9e6480aac860503193e6efbaba549fa7e49f8a2d43ff6b42ea7092efe57e5fcd94a0be343c8c329a44e12a53f3

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\b3511224.exe
    Filesize

    172KB

    MD5

    d1925563c6a3da713c97baead6741903

    SHA1

    d9f680d3e0af2ef7fdc5d6e490a65c10abe47840

    SHA256

    147591c3ea3dd79c626062a17dc718441cd98728a5adf7a82bf207a263e7355f

    SHA512

    26fa7b5cd63f7aa36f65eec66ddb5690e4d93cc45bc124bb04b4890297dfcdfee59bc3c42272da11b56ddff895193cbe9a8cbf95c2a75253e7c4b0b684cded60

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\b3511224.exe
    Filesize

    172KB

    MD5

    d1925563c6a3da713c97baead6741903

    SHA1

    d9f680d3e0af2ef7fdc5d6e490a65c10abe47840

    SHA256

    147591c3ea3dd79c626062a17dc718441cd98728a5adf7a82bf207a263e7355f

    SHA512

    26fa7b5cd63f7aa36f65eec66ddb5690e4d93cc45bc124bb04b4890297dfcdfee59bc3c42272da11b56ddff895193cbe9a8cbf95c2a75253e7c4b0b684cded60

  • memory/1104-91-0x0000000000090000-0x000000000009A000-memory.dmp
    Filesize

    40KB

  • memory/1104-92-0x0000000000090000-0x000000000009A000-memory.dmp
    Filesize

    40KB

  • memory/1104-84-0x0000000000090000-0x000000000009A000-memory.dmp
    Filesize

    40KB

  • memory/1104-89-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
    Filesize

    4KB

  • memory/1104-85-0x0000000000090000-0x000000000009A000-memory.dmp
    Filesize

    40KB

  • memory/1680-99-0x0000000000ED0000-0x0000000000F00000-memory.dmp
    Filesize

    192KB

  • memory/1680-100-0x0000000000360000-0x0000000000366000-memory.dmp
    Filesize

    24KB

  • memory/1680-101-0x0000000002430000-0x0000000002470000-memory.dmp
    Filesize

    256KB

  • memory/1680-102-0x0000000002430000-0x0000000002470000-memory.dmp
    Filesize

    256KB