Analysis

  • max time kernel
    126s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06-06-2023 11:31

General

  • Target

    02133799.exe

  • Size

    738KB

  • MD5

    a842c3030b6492acf30649181f693ae9

  • SHA1

    21207d067d18b6b506095dd4c40e19877974fe92

  • SHA256

    139ca9693042d296a5fe37457aa0e8968113545705ea9d332b6b94abc8332fbd

  • SHA512

    2d5d9f77ad35d8311a51ae101cc93126c279c5c18d87bae98641446544843399cc7a262d65bd007f6fff253ded25ba8cd4d5f5b554049cc63b7180ff57f79a89

  • SSDEEP

    12288:0Mrly90/CoIST5ws7rZH26GaS4umKAng5Zod475flqrqv2pniQAOATlzr9TPdILq:pyuCoIEZ7SHuKKg5ZoudqrvtkrhPdUkp

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19048

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\02133799.exe
    "C:\Users\Admin\AppData\Local\Temp\02133799.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:912
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7832569.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7832569.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1764
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0189919.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0189919.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:992
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0295850.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0295850.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:320
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1858299.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1858299.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1700
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6175107.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6175107.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:340
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1628
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8442695.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8442695.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1892

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7832569.exe
    Filesize

    531KB

    MD5

    681c953b6697f7d0d12d8e9a9000dd75

    SHA1

    c6d4226ba2c7cf593784a1345ea4aca119111600

    SHA256

    4cac048a4135e96ee648771e062af6b914b5f10366c21b7b4060b2d639f52949

    SHA512

    b610886df0ec53f7c817dc7e277b072674ee274f52e14199ac296cb75f787224b1118e7184a335442006e7f0464152b1bcfe98190323aa2f05142357205f4c06

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7832569.exe
    Filesize

    531KB

    MD5

    681c953b6697f7d0d12d8e9a9000dd75

    SHA1

    c6d4226ba2c7cf593784a1345ea4aca119111600

    SHA256

    4cac048a4135e96ee648771e062af6b914b5f10366c21b7b4060b2d639f52949

    SHA512

    b610886df0ec53f7c817dc7e277b072674ee274f52e14199ac296cb75f787224b1118e7184a335442006e7f0464152b1bcfe98190323aa2f05142357205f4c06

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0189919.exe
    Filesize

    358KB

    MD5

    bfbf64de79ae372969f68a382459b71c

    SHA1

    59bb7df697aa7377e21f1182f929632935a91e13

    SHA256

    1b10574b60047b0ced3d5358445461a0fd4485e881cf9c36e55f368fad2b75f1

    SHA512

    2f24754d0a364020e4fecfb7ac7fc808c27f0382aa7d047769586d2033a81f52eefd23ce0092e3a7d04b4f9860dad13272a13b67119d662947b1f028eac8a07a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0189919.exe
    Filesize

    358KB

    MD5

    bfbf64de79ae372969f68a382459b71c

    SHA1

    59bb7df697aa7377e21f1182f929632935a91e13

    SHA256

    1b10574b60047b0ced3d5358445461a0fd4485e881cf9c36e55f368fad2b75f1

    SHA512

    2f24754d0a364020e4fecfb7ac7fc808c27f0382aa7d047769586d2033a81f52eefd23ce0092e3a7d04b4f9860dad13272a13b67119d662947b1f028eac8a07a

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8442695.exe
    Filesize

    172KB

    MD5

    fd8c055d23d598045b715fedcf1ad75b

    SHA1

    308253fd658c247cbed17822800e0e16b7be380b

    SHA256

    34cfc8b250e005cd66aaa94b61cd17843b5226372e59f11720995fafda76beca

    SHA512

    1bb2d601dfba09963de6119b75d8e8cd071a534d002884d0e9e5c6992cd814dc36ed97a3dc6f9ab91b3e44e9cd2c4414c12abfc554678c310c3df37a138210e1

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8442695.exe
    Filesize

    172KB

    MD5

    fd8c055d23d598045b715fedcf1ad75b

    SHA1

    308253fd658c247cbed17822800e0e16b7be380b

    SHA256

    34cfc8b250e005cd66aaa94b61cd17843b5226372e59f11720995fafda76beca

    SHA512

    1bb2d601dfba09963de6119b75d8e8cd071a534d002884d0e9e5c6992cd814dc36ed97a3dc6f9ab91b3e44e9cd2c4414c12abfc554678c310c3df37a138210e1

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0295850.exe
    Filesize

    203KB

    MD5

    317e6c303cee6e17b54001d6d9ac6b72

    SHA1

    04904de50c646dc1476dbb28869a8f56ff89b1df

    SHA256

    3e7c041b1b078d774ab9a4d47e09fd7ea058111e49d273daabe997758d78e32b

    SHA512

    36544a4333069b5dd3586c91898bd05852239ab8a9f14fb999918ff9046c947b88f2c738d46676f6732a5f292e91c14d37ce59baab5f9b502bb442d59c20ce2a

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0295850.exe
    Filesize

    203KB

    MD5

    317e6c303cee6e17b54001d6d9ac6b72

    SHA1

    04904de50c646dc1476dbb28869a8f56ff89b1df

    SHA256

    3e7c041b1b078d774ab9a4d47e09fd7ea058111e49d273daabe997758d78e32b

    SHA512

    36544a4333069b5dd3586c91898bd05852239ab8a9f14fb999918ff9046c947b88f2c738d46676f6732a5f292e91c14d37ce59baab5f9b502bb442d59c20ce2a

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1858299.exe
    Filesize

    13KB

    MD5

    b4d1df44bc2a04fcdc2071f6054c5b09

    SHA1

    4c07635f36ea55d7207f492c56af89db48742280

    SHA256

    6a479432c044dc6a35133655df9ae402ab0a282a80e96f44118e9979c418184b

    SHA512

    55710af73eaef6cd40b82d301f1b0e6b950ce79aa147eeaeaf95a4af2187641118a0d57a70912cbb5dbdb6aec9a8aa9e8345ffd13a0054dc1f9fcb27ebdde7a9

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1858299.exe
    Filesize

    13KB

    MD5

    b4d1df44bc2a04fcdc2071f6054c5b09

    SHA1

    4c07635f36ea55d7207f492c56af89db48742280

    SHA256

    6a479432c044dc6a35133655df9ae402ab0a282a80e96f44118e9979c418184b

    SHA512

    55710af73eaef6cd40b82d301f1b0e6b950ce79aa147eeaeaf95a4af2187641118a0d57a70912cbb5dbdb6aec9a8aa9e8345ffd13a0054dc1f9fcb27ebdde7a9

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6175107.exe
    Filesize

    120KB

    MD5

    a2d4bad81bc942e91663f23e4bfac242

    SHA1

    292c77a990956df6fcb6646255728bdf4078976b

    SHA256

    2d9606207c27c78a12ad768c69274f5c92bd899a552f488adf37294afb9065e5

    SHA512

    dae14995dec7b7df463d892e644f95b15935d2da0056b1d32d49051472e20d575ef2d4f1c43af4609b80cf37032308e0c819e824895e6151db1466079f9f4f53

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6175107.exe
    Filesize

    120KB

    MD5

    a2d4bad81bc942e91663f23e4bfac242

    SHA1

    292c77a990956df6fcb6646255728bdf4078976b

    SHA256

    2d9606207c27c78a12ad768c69274f5c92bd899a552f488adf37294afb9065e5

    SHA512

    dae14995dec7b7df463d892e644f95b15935d2da0056b1d32d49051472e20d575ef2d4f1c43af4609b80cf37032308e0c819e824895e6151db1466079f9f4f53

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v7832569.exe
    Filesize

    531KB

    MD5

    681c953b6697f7d0d12d8e9a9000dd75

    SHA1

    c6d4226ba2c7cf593784a1345ea4aca119111600

    SHA256

    4cac048a4135e96ee648771e062af6b914b5f10366c21b7b4060b2d639f52949

    SHA512

    b610886df0ec53f7c817dc7e277b072674ee274f52e14199ac296cb75f787224b1118e7184a335442006e7f0464152b1bcfe98190323aa2f05142357205f4c06

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v7832569.exe
    Filesize

    531KB

    MD5

    681c953b6697f7d0d12d8e9a9000dd75

    SHA1

    c6d4226ba2c7cf593784a1345ea4aca119111600

    SHA256

    4cac048a4135e96ee648771e062af6b914b5f10366c21b7b4060b2d639f52949

    SHA512

    b610886df0ec53f7c817dc7e277b072674ee274f52e14199ac296cb75f787224b1118e7184a335442006e7f0464152b1bcfe98190323aa2f05142357205f4c06

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v0189919.exe
    Filesize

    358KB

    MD5

    bfbf64de79ae372969f68a382459b71c

    SHA1

    59bb7df697aa7377e21f1182f929632935a91e13

    SHA256

    1b10574b60047b0ced3d5358445461a0fd4485e881cf9c36e55f368fad2b75f1

    SHA512

    2f24754d0a364020e4fecfb7ac7fc808c27f0382aa7d047769586d2033a81f52eefd23ce0092e3a7d04b4f9860dad13272a13b67119d662947b1f028eac8a07a

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v0189919.exe
    Filesize

    358KB

    MD5

    bfbf64de79ae372969f68a382459b71c

    SHA1

    59bb7df697aa7377e21f1182f929632935a91e13

    SHA256

    1b10574b60047b0ced3d5358445461a0fd4485e881cf9c36e55f368fad2b75f1

    SHA512

    2f24754d0a364020e4fecfb7ac7fc808c27f0382aa7d047769586d2033a81f52eefd23ce0092e3a7d04b4f9860dad13272a13b67119d662947b1f028eac8a07a

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c8442695.exe
    Filesize

    172KB

    MD5

    fd8c055d23d598045b715fedcf1ad75b

    SHA1

    308253fd658c247cbed17822800e0e16b7be380b

    SHA256

    34cfc8b250e005cd66aaa94b61cd17843b5226372e59f11720995fafda76beca

    SHA512

    1bb2d601dfba09963de6119b75d8e8cd071a534d002884d0e9e5c6992cd814dc36ed97a3dc6f9ab91b3e44e9cd2c4414c12abfc554678c310c3df37a138210e1

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c8442695.exe
    Filesize

    172KB

    MD5

    fd8c055d23d598045b715fedcf1ad75b

    SHA1

    308253fd658c247cbed17822800e0e16b7be380b

    SHA256

    34cfc8b250e005cd66aaa94b61cd17843b5226372e59f11720995fafda76beca

    SHA512

    1bb2d601dfba09963de6119b75d8e8cd071a534d002884d0e9e5c6992cd814dc36ed97a3dc6f9ab91b3e44e9cd2c4414c12abfc554678c310c3df37a138210e1

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v0295850.exe
    Filesize

    203KB

    MD5

    317e6c303cee6e17b54001d6d9ac6b72

    SHA1

    04904de50c646dc1476dbb28869a8f56ff89b1df

    SHA256

    3e7c041b1b078d774ab9a4d47e09fd7ea058111e49d273daabe997758d78e32b

    SHA512

    36544a4333069b5dd3586c91898bd05852239ab8a9f14fb999918ff9046c947b88f2c738d46676f6732a5f292e91c14d37ce59baab5f9b502bb442d59c20ce2a

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v0295850.exe
    Filesize

    203KB

    MD5

    317e6c303cee6e17b54001d6d9ac6b72

    SHA1

    04904de50c646dc1476dbb28869a8f56ff89b1df

    SHA256

    3e7c041b1b078d774ab9a4d47e09fd7ea058111e49d273daabe997758d78e32b

    SHA512

    36544a4333069b5dd3586c91898bd05852239ab8a9f14fb999918ff9046c947b88f2c738d46676f6732a5f292e91c14d37ce59baab5f9b502bb442d59c20ce2a

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a1858299.exe
    Filesize

    13KB

    MD5

    b4d1df44bc2a04fcdc2071f6054c5b09

    SHA1

    4c07635f36ea55d7207f492c56af89db48742280

    SHA256

    6a479432c044dc6a35133655df9ae402ab0a282a80e96f44118e9979c418184b

    SHA512

    55710af73eaef6cd40b82d301f1b0e6b950ce79aa147eeaeaf95a4af2187641118a0d57a70912cbb5dbdb6aec9a8aa9e8345ffd13a0054dc1f9fcb27ebdde7a9

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b6175107.exe
    Filesize

    120KB

    MD5

    a2d4bad81bc942e91663f23e4bfac242

    SHA1

    292c77a990956df6fcb6646255728bdf4078976b

    SHA256

    2d9606207c27c78a12ad768c69274f5c92bd899a552f488adf37294afb9065e5

    SHA512

    dae14995dec7b7df463d892e644f95b15935d2da0056b1d32d49051472e20d575ef2d4f1c43af4609b80cf37032308e0c819e824895e6151db1466079f9f4f53

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b6175107.exe
    Filesize

    120KB

    MD5

    a2d4bad81bc942e91663f23e4bfac242

    SHA1

    292c77a990956df6fcb6646255728bdf4078976b

    SHA256

    2d9606207c27c78a12ad768c69274f5c92bd899a552f488adf37294afb9065e5

    SHA512

    dae14995dec7b7df463d892e644f95b15935d2da0056b1d32d49051472e20d575ef2d4f1c43af4609b80cf37032308e0c819e824895e6151db1466079f9f4f53

  • memory/1628-105-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
    Filesize

    4KB

  • memory/1628-107-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/1628-108-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/1628-101-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/1628-100-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/1700-92-0x00000000010F0000-0x00000000010FA000-memory.dmp
    Filesize

    40KB

  • memory/1892-115-0x0000000000DA0000-0x0000000000DD0000-memory.dmp
    Filesize

    192KB

  • memory/1892-116-0x00000000004A0000-0x00000000004A6000-memory.dmp
    Filesize

    24KB

  • memory/1892-117-0x0000000004B90000-0x0000000004BD0000-memory.dmp
    Filesize

    256KB

  • memory/1892-118-0x0000000004B90000-0x0000000004BD0000-memory.dmp
    Filesize

    256KB