Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-06-2023 16:28

General

  • Target

    2c469c8b1906c5fb05de57710cc45bb1aa66dcf8218e78b0a99473150ea4a0b7.exe

  • Size

    738KB

  • MD5

    54b8ad12ef715f8c6e697f9c2dd39a11

  • SHA1

    2ab08de002532477bdc5ab009c23ca5a598774ed

  • SHA256

    2c469c8b1906c5fb05de57710cc45bb1aa66dcf8218e78b0a99473150ea4a0b7

  • SHA512

    0dcdf06202fc2ff783510f6e4e75c08992ad796ae142344a2b72cdf89e955ae9f038faa3e9ce6d05b2c40b341e7da1b178cd66148b4d64b87b92273d9b08c9eb

  • SSDEEP

    12288:KMrky90AVtWO6UXsta+FB8BTUOYcskjOwvOcvO/nC40HNOCq9AL+AU:iy/nGtPFOPYcROncvaV0HoCq2KAU

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19048

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c469c8b1906c5fb05de57710cc45bb1aa66dcf8218e78b0a99473150ea4a0b7.exe
    "C:\Users\Admin\AppData\Local\Temp\2c469c8b1906c5fb05de57710cc45bb1aa66dcf8218e78b0a99473150ea4a0b7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9164649.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9164649.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3356
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5749610.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5749610.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4544
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5558179.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5558179.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4128
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7191547.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7191547.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1476
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6139381.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6139381.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2144
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1952
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2144 -s 140
              6⤵
              • Program crash
              PID:2664
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c6980132.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c6980132.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1168
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2144 -ip 2144
    1⤵
      PID:4780

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Credential Access

    Credentials in Files

    1
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9164649.exe
      Filesize

      531KB

      MD5

      42e06644d7fab52f57a4d36381b33475

      SHA1

      580b65c56157263e335a1ac2a7edfcf82b01dbe9

      SHA256

      d83c6692b06414604ade4cd33698320ee0e3100a89c6abc7c7a4eadbd30c654f

      SHA512

      c730fdd090dbaee069a02da0ded001bf219080c2828ae7b8d193748c029f9703f2769f41fd5ba7e026b901b0b138b50389ef0f32ee471d63e64fb0933197df02

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9164649.exe
      Filesize

      531KB

      MD5

      42e06644d7fab52f57a4d36381b33475

      SHA1

      580b65c56157263e335a1ac2a7edfcf82b01dbe9

      SHA256

      d83c6692b06414604ade4cd33698320ee0e3100a89c6abc7c7a4eadbd30c654f

      SHA512

      c730fdd090dbaee069a02da0ded001bf219080c2828ae7b8d193748c029f9703f2769f41fd5ba7e026b901b0b138b50389ef0f32ee471d63e64fb0933197df02

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5749610.exe
      Filesize

      359KB

      MD5

      8f0c0ec4737319496370d0c96938f7ae

      SHA1

      5eaffe45a6682ad8a91944d57e839419cb6d494e

      SHA256

      371e13f9e39c201beb148697fe9d808541c968891acac3908648546afb6436cb

      SHA512

      f8a1d29f38678df2e38504964887622a262fdaf3b707a1f8ccbaa63ceb8a1832b4ffd45bbb7ecf03f946706f16ffdd3c6e76e81f58f9707ed1cf71d1eb01f765

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5749610.exe
      Filesize

      359KB

      MD5

      8f0c0ec4737319496370d0c96938f7ae

      SHA1

      5eaffe45a6682ad8a91944d57e839419cb6d494e

      SHA256

      371e13f9e39c201beb148697fe9d808541c968891acac3908648546afb6436cb

      SHA512

      f8a1d29f38678df2e38504964887622a262fdaf3b707a1f8ccbaa63ceb8a1832b4ffd45bbb7ecf03f946706f16ffdd3c6e76e81f58f9707ed1cf71d1eb01f765

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c6980132.exe
      Filesize

      172KB

      MD5

      17a40b681832cd713e0273fc335a6156

      SHA1

      a56fd4d3bc2ef405b9d3bf296cb9b90cd35663f2

      SHA256

      c83ae2ba6cdc67b8c6354cd2f3ba0dd520343d73cf46bfcc7738036cc10b255f

      SHA512

      9c28cd884f037da28425ce3b2a55e32092316825965257ede0888091aeb2575168e87aa7b26424147cd2cef988f2148924777dfdc90965d60d57dee1eabef6b7

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c6980132.exe
      Filesize

      172KB

      MD5

      17a40b681832cd713e0273fc335a6156

      SHA1

      a56fd4d3bc2ef405b9d3bf296cb9b90cd35663f2

      SHA256

      c83ae2ba6cdc67b8c6354cd2f3ba0dd520343d73cf46bfcc7738036cc10b255f

      SHA512

      9c28cd884f037da28425ce3b2a55e32092316825965257ede0888091aeb2575168e87aa7b26424147cd2cef988f2148924777dfdc90965d60d57dee1eabef6b7

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5558179.exe
      Filesize

      203KB

      MD5

      617e212abc9978b241c491a9462b770f

      SHA1

      450966f76766b6fe21b73028cf20c161eee474cd

      SHA256

      3866c894ee1dcfa9efb6bd062b3fc4335527a0b68236459f6de522b505f878f4

      SHA512

      8f26c0831d991e3276b7e9129996c92a03f9b89c341a40b79c43410ce2c618b39974cf27496179007c8f95bb690cdaf8fd3a273215c70211b45e8b2e423420d6

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5558179.exe
      Filesize

      203KB

      MD5

      617e212abc9978b241c491a9462b770f

      SHA1

      450966f76766b6fe21b73028cf20c161eee474cd

      SHA256

      3866c894ee1dcfa9efb6bd062b3fc4335527a0b68236459f6de522b505f878f4

      SHA512

      8f26c0831d991e3276b7e9129996c92a03f9b89c341a40b79c43410ce2c618b39974cf27496179007c8f95bb690cdaf8fd3a273215c70211b45e8b2e423420d6

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7191547.exe
      Filesize

      14KB

      MD5

      519ef5e3a9c6a91a03fbf56231b792d1

      SHA1

      8cb000e579ffcb387ef206b0cb879c83fe40c7f5

      SHA256

      8871c903077f65bfcf2451051162e06f1b304d7e5d6557470b4f11bb04e04588

      SHA512

      e414cb7232679f58f910df3b6038a7f9e2c4d61a8af4c41fcfef9928bdbbf921f5a438e7e09d60b48d9c6430c9ae68aa14e5b16e3ca4e8511183574bffeb849f

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7191547.exe
      Filesize

      14KB

      MD5

      519ef5e3a9c6a91a03fbf56231b792d1

      SHA1

      8cb000e579ffcb387ef206b0cb879c83fe40c7f5

      SHA256

      8871c903077f65bfcf2451051162e06f1b304d7e5d6557470b4f11bb04e04588

      SHA512

      e414cb7232679f58f910df3b6038a7f9e2c4d61a8af4c41fcfef9928bdbbf921f5a438e7e09d60b48d9c6430c9ae68aa14e5b16e3ca4e8511183574bffeb849f

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6139381.exe
      Filesize

      120KB

      MD5

      9a506b2fae6b4b26b09cb9592fdba575

      SHA1

      139ef3c0ead0e3c9e1205fb05d4abcb6bc8d27ba

      SHA256

      22aa6edf55ffa6632a3f066fe737ce2b6ce4603603815b73bfd126e6af306dfd

      SHA512

      884a2eae3011ab0e395d9a6db31a77f3366b7462dcb16b27eb685901a73260993c3ae390e40e8c06e80fc37b7b14a818086f47a18a487899e7e8de1f6e0b4c9f

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6139381.exe
      Filesize

      120KB

      MD5

      9a506b2fae6b4b26b09cb9592fdba575

      SHA1

      139ef3c0ead0e3c9e1205fb05d4abcb6bc8d27ba

      SHA256

      22aa6edf55ffa6632a3f066fe737ce2b6ce4603603815b73bfd126e6af306dfd

      SHA512

      884a2eae3011ab0e395d9a6db31a77f3366b7462dcb16b27eb685901a73260993c3ae390e40e8c06e80fc37b7b14a818086f47a18a487899e7e8de1f6e0b4c9f

    • memory/1168-175-0x00000000002A0000-0x00000000002D0000-memory.dmp
      Filesize

      192KB

    • memory/1168-180-0x0000000004B80000-0x0000000004B90000-memory.dmp
      Filesize

      64KB

    • memory/1168-189-0x000000000C220000-0x000000000C74C000-memory.dmp
      Filesize

      5.2MB

    • memory/1168-176-0x000000000A730000-0x000000000AD48000-memory.dmp
      Filesize

      6.1MB

    • memory/1168-177-0x000000000A220000-0x000000000A32A000-memory.dmp
      Filesize

      1.0MB

    • memory/1168-178-0x000000000A160000-0x000000000A172000-memory.dmp
      Filesize

      72KB

    • memory/1168-179-0x000000000A1C0000-0x000000000A1FC000-memory.dmp
      Filesize

      240KB

    • memory/1168-188-0x000000000BB20000-0x000000000BCE2000-memory.dmp
      Filesize

      1.8MB

    • memory/1168-181-0x000000000A5D0000-0x000000000A646000-memory.dmp
      Filesize

      472KB

    • memory/1168-182-0x000000000AD50000-0x000000000ADE2000-memory.dmp
      Filesize

      584KB

    • memory/1168-183-0x000000000B3A0000-0x000000000B944000-memory.dmp
      Filesize

      5.6MB

    • memory/1168-184-0x000000000A6C0000-0x000000000A726000-memory.dmp
      Filesize

      408KB

    • memory/1168-186-0x000000000B230000-0x000000000B280000-memory.dmp
      Filesize

      320KB

    • memory/1168-187-0x0000000004B80000-0x0000000004B90000-memory.dmp
      Filesize

      64KB

    • memory/1476-161-0x0000000000FD0000-0x0000000000FDA000-memory.dmp
      Filesize

      40KB

    • memory/1952-167-0x0000000000400000-0x000000000040A000-memory.dmp
      Filesize

      40KB