Analysis

  • max time kernel
    140s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-06-2023 10:28

General

  • Target

    84d1157cde0f9b2f3dcaa221d327f34daedc3ebcd8742873f5425fbcd1029ea7.exe

  • Size

    728KB

  • MD5

    7641aed2c29277824a16490189990c5b

  • SHA1

    3377d67ceeab34e35f3a4229b157cbb8272f2617

  • SHA256

    84d1157cde0f9b2f3dcaa221d327f34daedc3ebcd8742873f5425fbcd1029ea7

  • SHA512

    b02e3c599321fbae0bd9027faa42a89c4051bf2cfa3ff43a8ef06a8a3b911f268396a97a6a314bb274175bd18a80ab8bb474c675e7dba36271b46c6a63627e5f

  • SSDEEP

    12288:xMr2y90sehCY1aUQPaqg4XTtefuJuhbidOD8y5XqAIgodi92BmC:Ty2hCYIyOXReGJuhbYfmodi92gC

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19046

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\84d1157cde0f9b2f3dcaa221d327f34daedc3ebcd8742873f5425fbcd1029ea7.exe
    "C:\Users\Admin\AppData\Local\Temp\84d1157cde0f9b2f3dcaa221d327f34daedc3ebcd8742873f5425fbcd1029ea7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4484
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4214059.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4214059.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:760
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0049222.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0049222.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2060
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2737935.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2737935.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1280
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a0768142.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a0768142.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1616
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b3100604.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b3100604.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2984
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4692
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2647014.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2647014.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4592

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4214059.exe
    Filesize

    526KB

    MD5

    195bff6f72ef91f9691a75fc9e157245

    SHA1

    90b35225dba7825cb016768a37b822bc519d1c86

    SHA256

    33fee740daa0bb2ac4c8be45cb282127a33cc9b2fb4ce542cca2d83a72fcf3c3

    SHA512

    9b744c24d0e0a351e85d504d5dcc299570f45ea3abd27f63ffba862dbfeaf4ea3f85c550353706f9dfc94d62c5cfdd8d977cd1d2b468e3bed98336ebb134551d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4214059.exe
    Filesize

    526KB

    MD5

    195bff6f72ef91f9691a75fc9e157245

    SHA1

    90b35225dba7825cb016768a37b822bc519d1c86

    SHA256

    33fee740daa0bb2ac4c8be45cb282127a33cc9b2fb4ce542cca2d83a72fcf3c3

    SHA512

    9b744c24d0e0a351e85d504d5dcc299570f45ea3abd27f63ffba862dbfeaf4ea3f85c550353706f9dfc94d62c5cfdd8d977cd1d2b468e3bed98336ebb134551d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0049222.exe
    Filesize

    354KB

    MD5

    308fb7e7be7e84a5360e3f0955473ebf

    SHA1

    5ae5b493a789bbb9b4c45c531d56fa370fdfade8

    SHA256

    f757743001d93d55a796aee39d1e57286aaf4318bc275b9d0dbc91b526eda832

    SHA512

    dae2e1616f6ad27c96d3cc9aa84707fa8c3e8c4e91a73b1f596d775ef9f4c299dd6c9f549002f4eb2f6a6622c37e8b2f7153285c08db8e1e38b174b4e0815ae7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0049222.exe
    Filesize

    354KB

    MD5

    308fb7e7be7e84a5360e3f0955473ebf

    SHA1

    5ae5b493a789bbb9b4c45c531d56fa370fdfade8

    SHA256

    f757743001d93d55a796aee39d1e57286aaf4318bc275b9d0dbc91b526eda832

    SHA512

    dae2e1616f6ad27c96d3cc9aa84707fa8c3e8c4e91a73b1f596d775ef9f4c299dd6c9f549002f4eb2f6a6622c37e8b2f7153285c08db8e1e38b174b4e0815ae7

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2647014.exe
    Filesize

    172KB

    MD5

    7572709f626def3adc927c49bcce058c

    SHA1

    0817aa0429bf309516c818448be0a51fe96626bf

    SHA256

    4d8a25e6d6965961c6a614eb6594690fa3ee865dadbc7d2ceafc22c5e95b6e16

    SHA512

    df520c77c45dc34352a3b0331554516635c8d6dbb58cf3e07395cdb48f722eba4f7dfea811e82fcdcb1e3ef3a3811b713558e950d0385e5161601fd85c14050b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2647014.exe
    Filesize

    172KB

    MD5

    7572709f626def3adc927c49bcce058c

    SHA1

    0817aa0429bf309516c818448be0a51fe96626bf

    SHA256

    4d8a25e6d6965961c6a614eb6594690fa3ee865dadbc7d2ceafc22c5e95b6e16

    SHA512

    df520c77c45dc34352a3b0331554516635c8d6dbb58cf3e07395cdb48f722eba4f7dfea811e82fcdcb1e3ef3a3811b713558e950d0385e5161601fd85c14050b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2737935.exe
    Filesize

    199KB

    MD5

    7ab1230adee852ce0bb1f73ae0f6ab20

    SHA1

    9e944afa68d3be99587d2fdc4d0143861e79c285

    SHA256

    3696db90350f6d98da5e7f992d80b876594f04dea608957df6abacbbd72a98f5

    SHA512

    ea8b8c0ba375cde4be3ec02ba02e1a4657581dc428d03d07f473205fbb5083807a640230e8a08b0518ac16957ca604cedf8cc538f6eed770439c649e41509b7d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2737935.exe
    Filesize

    199KB

    MD5

    7ab1230adee852ce0bb1f73ae0f6ab20

    SHA1

    9e944afa68d3be99587d2fdc4d0143861e79c285

    SHA256

    3696db90350f6d98da5e7f992d80b876594f04dea608957df6abacbbd72a98f5

    SHA512

    ea8b8c0ba375cde4be3ec02ba02e1a4657581dc428d03d07f473205fbb5083807a640230e8a08b0518ac16957ca604cedf8cc538f6eed770439c649e41509b7d

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a0768142.exe
    Filesize

    12KB

    MD5

    397dc98d345b87247d32fe469660617d

    SHA1

    9af8b91041a6f770aedf595cd8c2a7c6e0707816

    SHA256

    435585059224493ea5768ab88aae0f560d2ba17738bf2a54490379aadd33ba80

    SHA512

    be9b3001ed77e9dfa8b9e0b969f29be77ab1b9212e7c057fa9304d2cc331f2b6c6001c8872e8cea912957c774098028146c574dddabc37645d694561945db8d1

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a0768142.exe
    Filesize

    12KB

    MD5

    397dc98d345b87247d32fe469660617d

    SHA1

    9af8b91041a6f770aedf595cd8c2a7c6e0707816

    SHA256

    435585059224493ea5768ab88aae0f560d2ba17738bf2a54490379aadd33ba80

    SHA512

    be9b3001ed77e9dfa8b9e0b969f29be77ab1b9212e7c057fa9304d2cc331f2b6c6001c8872e8cea912957c774098028146c574dddabc37645d694561945db8d1

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b3100604.exe
    Filesize

    105KB

    MD5

    fb01bcf36c7ed1188ad7d8c3e7c87fa0

    SHA1

    f2a5c7a37e8f83be89e455877a7a3335ad6f2fad

    SHA256

    47a5bad19bcccc0f0f44d32d3f7a55105577b4a54b01a14ff869ca61070fea97

    SHA512

    6ab2d481f420857ba365031e442b70695387d211eca8ab216c0b67a37dcf0285ad1defc203be9f15faa9d59aec8e92c124ef4e2eb2f28d05bb4a13395c34bc0f

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b3100604.exe
    Filesize

    105KB

    MD5

    fb01bcf36c7ed1188ad7d8c3e7c87fa0

    SHA1

    f2a5c7a37e8f83be89e455877a7a3335ad6f2fad

    SHA256

    47a5bad19bcccc0f0f44d32d3f7a55105577b4a54b01a14ff869ca61070fea97

    SHA512

    6ab2d481f420857ba365031e442b70695387d211eca8ab216c0b67a37dcf0285ad1defc203be9f15faa9d59aec8e92c124ef4e2eb2f28d05bb4a13395c34bc0f

  • memory/1616-161-0x0000000000ED0000-0x0000000000EDA000-memory.dmp
    Filesize

    40KB

  • memory/4592-174-0x0000000000700000-0x0000000000730000-memory.dmp
    Filesize

    192KB

  • memory/4592-180-0x000000000A930000-0x000000000A9A6000-memory.dmp
    Filesize

    472KB

  • memory/4592-175-0x000000000AC20000-0x000000000B238000-memory.dmp
    Filesize

    6.1MB

  • memory/4592-176-0x000000000A710000-0x000000000A81A000-memory.dmp
    Filesize

    1.0MB

  • memory/4592-177-0x0000000005130000-0x0000000005142000-memory.dmp
    Filesize

    72KB

  • memory/4592-178-0x000000000A640000-0x000000000A67C000-memory.dmp
    Filesize

    240KB

  • memory/4592-179-0x0000000005170000-0x0000000005180000-memory.dmp
    Filesize

    64KB

  • memory/4592-188-0x000000000BDE0000-0x000000000BE30000-memory.dmp
    Filesize

    320KB

  • memory/4592-181-0x000000000AA50000-0x000000000AAE2000-memory.dmp
    Filesize

    584KB

  • memory/4592-182-0x000000000B7F0000-0x000000000BD94000-memory.dmp
    Filesize

    5.6MB

  • memory/4592-183-0x000000000B240000-0x000000000B2A6000-memory.dmp
    Filesize

    408KB

  • memory/4592-185-0x000000000BF70000-0x000000000C132000-memory.dmp
    Filesize

    1.8MB

  • memory/4592-186-0x000000000C670000-0x000000000CB9C000-memory.dmp
    Filesize

    5.2MB

  • memory/4592-187-0x0000000005170000-0x0000000005180000-memory.dmp
    Filesize

    64KB

  • memory/4692-166-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB