Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-06-2023 09:31

General

  • Target

    94de3b00e6c44e8d37188d026d4aedee52cbadf6351f38512854f93f6c1082f9.exe

  • Size

    738KB

  • MD5

    96b6e3751a8d8f27bb5670fa39895394

  • SHA1

    98a5095aa9ef74dcf8fb637e30d5d27e985c0823

  • SHA256

    94de3b00e6c44e8d37188d026d4aedee52cbadf6351f38512854f93f6c1082f9

  • SHA512

    2c51c0f6f80f4bffa9c075288d5c1d865403667a44f601314dd67e9925f1bac6361b1b3e7b395e70eff244ab2cb0f9a1852d9e87375ab3f9209716d709374c81

  • SSDEEP

    12288:tMrDy906QmkkT4Gym/VgcUW4cjAg/MSWM/gE0O80d1ie7TN0twUf+Iw5ZY7:SyvRkkdxpt4Zg/kM4Tu1iYhI/fYZY7

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19048

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\94de3b00e6c44e8d37188d026d4aedee52cbadf6351f38512854f93f6c1082f9.exe
    "C:\Users\Admin\AppData\Local\Temp\94de3b00e6c44e8d37188d026d4aedee52cbadf6351f38512854f93f6c1082f9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1520
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5593616.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5593616.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:536
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6095613.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6095613.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4632
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1667182.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1667182.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4056
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a3545027.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a3545027.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4324
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1818664.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1818664.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2064
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2072
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2064 -s 140
              6⤵
              • Program crash
              PID:232
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2541790.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2541790.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3948
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2064 -ip 2064
    1⤵
      PID:2552

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5593616.exe
      Filesize

      532KB

      MD5

      d8ea1543a8eaf2571bddc3b4b141015e

      SHA1

      80f5274b957767e81a3c421cead13ec42097f63e

      SHA256

      42f65e467e731c40561c9bbb4802aab94be14c6774a7315b82e4bde160dccb35

      SHA512

      27c7774ec541283345239da26ec6c3124b1c829b921ee5698824885cce4d6aad5b481465da7659bd56477310288672dbe602dddd48d56275e3a2ec6a6ee6682f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5593616.exe
      Filesize

      532KB

      MD5

      d8ea1543a8eaf2571bddc3b4b141015e

      SHA1

      80f5274b957767e81a3c421cead13ec42097f63e

      SHA256

      42f65e467e731c40561c9bbb4802aab94be14c6774a7315b82e4bde160dccb35

      SHA512

      27c7774ec541283345239da26ec6c3124b1c829b921ee5698824885cce4d6aad5b481465da7659bd56477310288672dbe602dddd48d56275e3a2ec6a6ee6682f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6095613.exe
      Filesize

      359KB

      MD5

      e0c756f720a7bf7134476d7e28a4568b

      SHA1

      ece0beab765a73e407f4560afee1b4e545bd4bab

      SHA256

      3d61e848e6c8e58fdcdcf7749348895b8c7b971627222915195f109ffb784656

      SHA512

      985d41ea7402a3b4750bd1533701f681e118b5625d707bb49f633617d909f96d6ab2bb32c60989504d1f551c6be17af5e1a17184ec1afdf4907329505c38551a

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6095613.exe
      Filesize

      359KB

      MD5

      e0c756f720a7bf7134476d7e28a4568b

      SHA1

      ece0beab765a73e407f4560afee1b4e545bd4bab

      SHA256

      3d61e848e6c8e58fdcdcf7749348895b8c7b971627222915195f109ffb784656

      SHA512

      985d41ea7402a3b4750bd1533701f681e118b5625d707bb49f633617d909f96d6ab2bb32c60989504d1f551c6be17af5e1a17184ec1afdf4907329505c38551a

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2541790.exe
      Filesize

      172KB

      MD5

      9abf170de76df76d4f2ef1cfb077c34d

      SHA1

      1a0f5575fede4cf2864c664a7a84b080a4137cca

      SHA256

      b986b2181c7a73d75dadebb359d915262f5451c078635da90cdb3f38a11ab5a0

      SHA512

      b4cca9c2a59fc60553e732ab397b46927021abfa0b59799280d55dd99f572e62ac6c6422871084a19dcf719c83b4502d17758dba8cbfab57d906c5c244699066

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2541790.exe
      Filesize

      172KB

      MD5

      9abf170de76df76d4f2ef1cfb077c34d

      SHA1

      1a0f5575fede4cf2864c664a7a84b080a4137cca

      SHA256

      b986b2181c7a73d75dadebb359d915262f5451c078635da90cdb3f38a11ab5a0

      SHA512

      b4cca9c2a59fc60553e732ab397b46927021abfa0b59799280d55dd99f572e62ac6c6422871084a19dcf719c83b4502d17758dba8cbfab57d906c5c244699066

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1667182.exe
      Filesize

      204KB

      MD5

      5f4d2ad888e36d2a4d288ae18be9b967

      SHA1

      62ccf81b1ab39bc13761db0da72fae7cd382ef7d

      SHA256

      64f2aa915b75dae565eddeeaf8f65b7390e8d8c619fc5c9d855ea4a342b6169f

      SHA512

      ed853563346bb9acf15efe79b4e4d4f7ff31deec6abd11099c796ea92629e0d4087da54c4c8313328f369716b42e6e0898a043db8fe87ec5985679a8f9027476

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1667182.exe
      Filesize

      204KB

      MD5

      5f4d2ad888e36d2a4d288ae18be9b967

      SHA1

      62ccf81b1ab39bc13761db0da72fae7cd382ef7d

      SHA256

      64f2aa915b75dae565eddeeaf8f65b7390e8d8c619fc5c9d855ea4a342b6169f

      SHA512

      ed853563346bb9acf15efe79b4e4d4f7ff31deec6abd11099c796ea92629e0d4087da54c4c8313328f369716b42e6e0898a043db8fe87ec5985679a8f9027476

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a3545027.exe
      Filesize

      13KB

      MD5

      6369e6b0bcf26650db4587e4533cccc4

      SHA1

      bb51c6b95d70545974ca9239fe5af4bec5be41d6

      SHA256

      b4dcd5af84c3360bc2a17803efa59707fae01faa09e575c9e1b169af99625786

      SHA512

      3fc8e50d0fdaed428b79d2af547a83339f423c9f6007a9bd88e8fff866d6fcb538dbd5c5bccf46455aefca4762322bd994daa176c673c90acefcc62a2879ddb1

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a3545027.exe
      Filesize

      13KB

      MD5

      6369e6b0bcf26650db4587e4533cccc4

      SHA1

      bb51c6b95d70545974ca9239fe5af4bec5be41d6

      SHA256

      b4dcd5af84c3360bc2a17803efa59707fae01faa09e575c9e1b169af99625786

      SHA512

      3fc8e50d0fdaed428b79d2af547a83339f423c9f6007a9bd88e8fff866d6fcb538dbd5c5bccf46455aefca4762322bd994daa176c673c90acefcc62a2879ddb1

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1818664.exe
      Filesize

      120KB

      MD5

      52aac5ebec31a31a7c02a863c7a2fa08

      SHA1

      83261bb9f27004c2988865cd78cdcae8ca2f20da

      SHA256

      d11b67ded928cb0c3d9f95a631959ae9bed89143267fc8b77abdfdad61440df5

      SHA512

      a292d3ad21ce41248237ad3160e4fac703ad3d5c3d71c6c3887719de0bc9a889bac463a917b151d9d3d02f236605aeb6a01635f6999f070ac827f893ba8b34a6

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1818664.exe
      Filesize

      120KB

      MD5

      52aac5ebec31a31a7c02a863c7a2fa08

      SHA1

      83261bb9f27004c2988865cd78cdcae8ca2f20da

      SHA256

      d11b67ded928cb0c3d9f95a631959ae9bed89143267fc8b77abdfdad61440df5

      SHA512

      a292d3ad21ce41248237ad3160e4fac703ad3d5c3d71c6c3887719de0bc9a889bac463a917b151d9d3d02f236605aeb6a01635f6999f070ac827f893ba8b34a6

    • memory/2072-167-0x0000000000400000-0x000000000040A000-memory.dmp
      Filesize

      40KB

    • memory/3948-175-0x00000000005B0000-0x00000000005E0000-memory.dmp
      Filesize

      192KB

    • memory/3948-181-0x00000000053C0000-0x0000000005436000-memory.dmp
      Filesize

      472KB

    • memory/3948-176-0x00000000056F0000-0x0000000005D08000-memory.dmp
      Filesize

      6.1MB

    • memory/3948-177-0x00000000051E0000-0x00000000052EA000-memory.dmp
      Filesize

      1.0MB

    • memory/3948-178-0x0000000004F40000-0x0000000004F52000-memory.dmp
      Filesize

      72KB

    • memory/3948-179-0x00000000050D0000-0x000000000510C000-memory.dmp
      Filesize

      240KB

    • memory/3948-180-0x0000000004FC0000-0x0000000004FD0000-memory.dmp
      Filesize

      64KB

    • memory/3948-189-0x00000000064B0000-0x0000000006500000-memory.dmp
      Filesize

      320KB

    • memory/3948-182-0x00000000055E0000-0x0000000005672000-memory.dmp
      Filesize

      584KB

    • memory/3948-183-0x0000000005540000-0x00000000055A6000-memory.dmp
      Filesize

      408KB

    • memory/3948-184-0x00000000067B0000-0x0000000006D54000-memory.dmp
      Filesize

      5.6MB

    • memory/3948-186-0x0000000006540000-0x0000000006702000-memory.dmp
      Filesize

      1.8MB

    • memory/3948-187-0x0000000008880000-0x0000000008DAC000-memory.dmp
      Filesize

      5.2MB

    • memory/3948-188-0x0000000004FC0000-0x0000000004FD0000-memory.dmp
      Filesize

      64KB

    • memory/4324-161-0x0000000000130000-0x000000000013A000-memory.dmp
      Filesize

      40KB