Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-06-2023 18:59

General

  • Target

    fba9a3c5c886564016febbc57daedd45ddf797ec774d82b75c79b77cf3691c41.exe

  • Size

    738KB

  • MD5

    0b4295c6a60852313ad38faad26bb12f

  • SHA1

    60ba6ce2208dcee0e4fd823048a8c26f4365ea6b

  • SHA256

    fba9a3c5c886564016febbc57daedd45ddf797ec774d82b75c79b77cf3691c41

  • SHA512

    19119563e006bd2042d5f4628a0ce17c432edb11460c7fe7ff84a32477617dc1eecf873c15266effedb6654311b983bf35f146c3ec5d341e5d4ad1900a775f88

  • SSDEEP

    12288:8Mray90zkNRjkE/nrWww7//3TMkXPfuC8Z9znUSrDJoI0nqVoAnp+N:myzrjkE/nre/jLngZl03nqVbngN

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19048

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fba9a3c5c886564016febbc57daedd45ddf797ec774d82b75c79b77cf3691c41.exe
    "C:\Users\Admin\AppData\Local\Temp\fba9a3c5c886564016febbc57daedd45ddf797ec774d82b75c79b77cf3691c41.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2992
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2489390.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2489390.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1280
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4090729.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4090729.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2340
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9001365.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9001365.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4272
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8696690.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8696690.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2632
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2879799.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2879799.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:4852
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2108
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4852 -s 140
              6⤵
              • Program crash
              PID:3576
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2095137.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2095137.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3940
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4852 -ip 4852
    1⤵
      PID:3396

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2489390.exe
      Filesize

      532KB

      MD5

      031bff5fe0057e206d27c24d9ecbc448

      SHA1

      4af47be4645b470b37b9f8466dccdfa034b9205a

      SHA256

      954674406e2747c3f3ce42cd834be88211327229bbbad84d8acfe8d511bac0e0

      SHA512

      835645266ec124fc47154e0eb0bdf45d314d2ba84ca8ff4ffd648b01f5dcb5b2ed1b868e9546994dd18e333aa05ba01e21f0392b2239f0067e46e9aca7bde628

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2489390.exe
      Filesize

      532KB

      MD5

      031bff5fe0057e206d27c24d9ecbc448

      SHA1

      4af47be4645b470b37b9f8466dccdfa034b9205a

      SHA256

      954674406e2747c3f3ce42cd834be88211327229bbbad84d8acfe8d511bac0e0

      SHA512

      835645266ec124fc47154e0eb0bdf45d314d2ba84ca8ff4ffd648b01f5dcb5b2ed1b868e9546994dd18e333aa05ba01e21f0392b2239f0067e46e9aca7bde628

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4090729.exe
      Filesize

      359KB

      MD5

      b78643ea6d8c30af502e6c82879ad48f

      SHA1

      f9d61ac2bf9276aabc8132f517fd5ee3d8c0e0df

      SHA256

      b410143c70c424eb3005face1ad76a40a7086fe07c4101a5fa9c58ddc4406648

      SHA512

      4ec98d819caf4023ab92bb531c090de04c41205efa17d7ff8563cb507edfc59129fa0e9706bc66a24ff0c54f1c81fca2ba26c2defe70ff2ab0337dae28db7e46

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4090729.exe
      Filesize

      359KB

      MD5

      b78643ea6d8c30af502e6c82879ad48f

      SHA1

      f9d61ac2bf9276aabc8132f517fd5ee3d8c0e0df

      SHA256

      b410143c70c424eb3005face1ad76a40a7086fe07c4101a5fa9c58ddc4406648

      SHA512

      4ec98d819caf4023ab92bb531c090de04c41205efa17d7ff8563cb507edfc59129fa0e9706bc66a24ff0c54f1c81fca2ba26c2defe70ff2ab0337dae28db7e46

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2095137.exe
      Filesize

      172KB

      MD5

      0b2922957b15529e24c091901245aac6

      SHA1

      34f3a91a9251f0cf409b8bcc57b61c87c38bd17a

      SHA256

      976331d4e331ec7cc4eb932409147330d92bdb1b48298ca6c28c957cd6843b99

      SHA512

      ce06ca5236ddc55bac4aa050bc897ab69dcd05507c7840267516a8f3763f9691578977652f765d1bb486dd613f809c8977194c5a7093edded1ccff5142c2fd32

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2095137.exe
      Filesize

      172KB

      MD5

      0b2922957b15529e24c091901245aac6

      SHA1

      34f3a91a9251f0cf409b8bcc57b61c87c38bd17a

      SHA256

      976331d4e331ec7cc4eb932409147330d92bdb1b48298ca6c28c957cd6843b99

      SHA512

      ce06ca5236ddc55bac4aa050bc897ab69dcd05507c7840267516a8f3763f9691578977652f765d1bb486dd613f809c8977194c5a7093edded1ccff5142c2fd32

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9001365.exe
      Filesize

      204KB

      MD5

      ddb261296b08b3797927463c770f6b8b

      SHA1

      ae0402450e3c32b6c33e9f049b07ef36c08ebce3

      SHA256

      0bbab5a3da86e2d28f2b02459134a12910b70090db49219da792ae47c3bf1259

      SHA512

      01b129ea9ec77993f0163b35ba2578a26329eb7210393295bc61f25848383bd49acbfabc11ac21706be0ab7ad0c45f7c18a08cd49129c614661e144b80b6b7f3

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9001365.exe
      Filesize

      204KB

      MD5

      ddb261296b08b3797927463c770f6b8b

      SHA1

      ae0402450e3c32b6c33e9f049b07ef36c08ebce3

      SHA256

      0bbab5a3da86e2d28f2b02459134a12910b70090db49219da792ae47c3bf1259

      SHA512

      01b129ea9ec77993f0163b35ba2578a26329eb7210393295bc61f25848383bd49acbfabc11ac21706be0ab7ad0c45f7c18a08cd49129c614661e144b80b6b7f3

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8696690.exe
      Filesize

      14KB

      MD5

      665b7d5fe556c70f89671cf10183cf81

      SHA1

      b7d5bed292a861af8f4ccf36d4f8f469262c94fd

      SHA256

      c02aad5d7b917eef310db5d8218e8f208a94183ab1af1064ecf826d7e1c5e597

      SHA512

      83b7de1e638badf120f442c57e118a1123b0d75ff3a1b23f1fd12e2694a0cffc74a3e36b22f1ee691bc7cfdab06bbe24e8f8e7a7832dc765af0b6a7a25ceae4d

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8696690.exe
      Filesize

      14KB

      MD5

      665b7d5fe556c70f89671cf10183cf81

      SHA1

      b7d5bed292a861af8f4ccf36d4f8f469262c94fd

      SHA256

      c02aad5d7b917eef310db5d8218e8f208a94183ab1af1064ecf826d7e1c5e597

      SHA512

      83b7de1e638badf120f442c57e118a1123b0d75ff3a1b23f1fd12e2694a0cffc74a3e36b22f1ee691bc7cfdab06bbe24e8f8e7a7832dc765af0b6a7a25ceae4d

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2879799.exe
      Filesize

      120KB

      MD5

      863d87f6410d24ad2e81717dcc32d818

      SHA1

      aaa73aa0293386b077f945971aa4f758101da0ad

      SHA256

      9bee28299287ff4e12f51ebaf88c0f00fc5c59e02628704c65b31a2e36479725

      SHA512

      f750513c18bee6c53a56119661df950108c6794afe4c23b36e240429f7d8cdc5e97f95de0e04fc5daa63ab81b02d3e8f50c5711d32d28f98e9c53e25c7be6acf

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2879799.exe
      Filesize

      120KB

      MD5

      863d87f6410d24ad2e81717dcc32d818

      SHA1

      aaa73aa0293386b077f945971aa4f758101da0ad

      SHA256

      9bee28299287ff4e12f51ebaf88c0f00fc5c59e02628704c65b31a2e36479725

      SHA512

      f750513c18bee6c53a56119661df950108c6794afe4c23b36e240429f7d8cdc5e97f95de0e04fc5daa63ab81b02d3e8f50c5711d32d28f98e9c53e25c7be6acf

    • memory/2108-167-0x0000000000400000-0x000000000040A000-memory.dmp
      Filesize

      40KB

    • memory/2632-161-0x00000000000A0000-0x00000000000AA000-memory.dmp
      Filesize

      40KB

    • memory/3940-175-0x0000000000040000-0x0000000000070000-memory.dmp
      Filesize

      192KB

    • memory/3940-176-0x000000000A320000-0x000000000A938000-memory.dmp
      Filesize

      6.1MB

    • memory/3940-177-0x0000000009E80000-0x0000000009F8A000-memory.dmp
      Filesize

      1.0MB

    • memory/3940-178-0x0000000009DC0000-0x0000000009DD2000-memory.dmp
      Filesize

      72KB

    • memory/3940-179-0x0000000009E20000-0x0000000009E5C000-memory.dmp
      Filesize

      240KB

    • memory/3940-180-0x0000000004970000-0x0000000004980000-memory.dmp
      Filesize

      64KB

    • memory/3940-181-0x000000000A130000-0x000000000A1A6000-memory.dmp
      Filesize

      472KB

    • memory/3940-182-0x000000000A9E0000-0x000000000AA72000-memory.dmp
      Filesize

      584KB

    • memory/3940-183-0x000000000B030000-0x000000000B5D4000-memory.dmp
      Filesize

      5.6MB

    • memory/3940-184-0x000000000A940000-0x000000000A9A6000-memory.dmp
      Filesize

      408KB

    • memory/3940-186-0x000000000B7B0000-0x000000000B972000-memory.dmp
      Filesize

      1.8MB

    • memory/3940-187-0x0000000004970000-0x0000000004980000-memory.dmp
      Filesize

      64KB

    • memory/3940-188-0x000000000BEB0000-0x000000000C3DC000-memory.dmp
      Filesize

      5.2MB

    • memory/3940-189-0x000000000B620000-0x000000000B670000-memory.dmp
      Filesize

      320KB