Analysis

  • max time kernel
    135s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-06-2023 22:01

General

  • Target

    79065f79febe72b265756fa51a0300d6fee0d92256d4d6e4d91fbe3df475d867.exe

  • Size

    592KB

  • MD5

    7e19bffa0c81a052de2ff798af5a2c8a

  • SHA1

    af85d118261a32b8a01d0a30d5bd81195c79a6ce

  • SHA256

    79065f79febe72b265756fa51a0300d6fee0d92256d4d6e4d91fbe3df475d867

  • SHA512

    b974cbec52a15e02fb49ad1a364a83b89994af0c5de0797a4439a60e9daa4c3340efe0cf5bf0ad8c2cb648b465f8aa3ba1be589c785b133c53b09b8a6b95a042

  • SSDEEP

    12288:5Mrry900o83lGlU+zUUczDUZuGw41R8OFIW0POdg5jKkx+fd:uyNo83AGDeuGw41RqhCkofd

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.129:19068

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\79065f79febe72b265756fa51a0300d6fee0d92256d4d6e4d91fbe3df475d867.exe
    "C:\Users\Admin\AppData\Local\Temp\79065f79febe72b265756fa51a0300d6fee0d92256d4d6e4d91fbe3df475d867.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4692
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2248424.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2248424.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4612
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8158929.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8158929.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3288
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f5630461.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f5630461.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5044
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g1161939.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g1161939.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5056
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h6976504.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h6976504.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1908
        • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
          "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4448
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN lamod.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:4276
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "lamod.exe" /P "Admin:N"&&CACLS "lamod.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2392
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "lamod.exe" /P "Admin:N"
              6⤵
                PID:4604
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                6⤵
                  PID:3420
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "lamod.exe" /P "Admin:R" /E
                  6⤵
                    PID:5100
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\a9e2a16078" /P "Admin:N"
                    6⤵
                      PID:4992
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      6⤵
                        PID:1860
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\a9e2a16078" /P "Admin:R" /E
                        6⤵
                          PID:4076
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:4832
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4398516.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4398516.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:492
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2168
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 492 -s 152
                    3⤵
                    • Program crash
                    PID:3292
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 492 -ip 492
                1⤵
                  PID:4944
                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  1⤵
                  • Executes dropped EXE
                  PID:4804

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4398516.exe

                  Filesize

                  282KB

                  MD5

                  6d9c9ee007a2850f2e1c8dbfe8315ed6

                  SHA1

                  4b2e3af2f6376e1848383ffb2034e701b171ebd5

                  SHA256

                  f23440d014b74168d09407cd397285cd6639bbd51c6f3db7affb2c6b9caa3e38

                  SHA512

                  0bc5c7cf8132ba691288d511a04318521e187ad5b2a48bc1f6190a5286b3f76f207ad3b6080659ecf2deb019e6498779b56ee189721ba10a256957c6db2a79c9

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4398516.exe

                  Filesize

                  282KB

                  MD5

                  6d9c9ee007a2850f2e1c8dbfe8315ed6

                  SHA1

                  4b2e3af2f6376e1848383ffb2034e701b171ebd5

                  SHA256

                  f23440d014b74168d09407cd397285cd6639bbd51c6f3db7affb2c6b9caa3e38

                  SHA512

                  0bc5c7cf8132ba691288d511a04318521e187ad5b2a48bc1f6190a5286b3f76f207ad3b6080659ecf2deb019e6498779b56ee189721ba10a256957c6db2a79c9

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2248424.exe

                  Filesize

                  378KB

                  MD5

                  4c2f80dce226854327e25f15af8306a8

                  SHA1

                  fe017871a327cf50b83a0f94a42d43cf4378d799

                  SHA256

                  d1f7d9aef14047b3d4b7e35e0f5a5a7ae0144a7f346dc26c59de5eec7ebc945a

                  SHA512

                  3578c874584a6aaba8b67556f74ab8b22a7e33df4bcce51311ad7b0c81cc33624650852de5177a142b20ab2dd5f61219dc79f3e32c49a103dadd1d1774cf37df

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2248424.exe

                  Filesize

                  378KB

                  MD5

                  4c2f80dce226854327e25f15af8306a8

                  SHA1

                  fe017871a327cf50b83a0f94a42d43cf4378d799

                  SHA256

                  d1f7d9aef14047b3d4b7e35e0f5a5a7ae0144a7f346dc26c59de5eec7ebc945a

                  SHA512

                  3578c874584a6aaba8b67556f74ab8b22a7e33df4bcce51311ad7b0c81cc33624650852de5177a142b20ab2dd5f61219dc79f3e32c49a103dadd1d1774cf37df

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h6976504.exe

                  Filesize

                  206KB

                  MD5

                  6abef37d4422783913462d9332c5cd8e

                  SHA1

                  eaa7c92370404d79e6b1579731c8e85aacf5b76f

                  SHA256

                  86ef7b07adc27a331ecad19f238bbcaf1ca6e106924eb175c495d9630117b227

                  SHA512

                  799d069617fea1e345f9bc0dbe408768d08cb85b54595e0fa8e85fad7493e7d83e47e9535f170dbcbeca7cf8cf35c0420ba0e9b2f45e992e9d80c2949959c46b

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h6976504.exe

                  Filesize

                  206KB

                  MD5

                  6abef37d4422783913462d9332c5cd8e

                  SHA1

                  eaa7c92370404d79e6b1579731c8e85aacf5b76f

                  SHA256

                  86ef7b07adc27a331ecad19f238bbcaf1ca6e106924eb175c495d9630117b227

                  SHA512

                  799d069617fea1e345f9bc0dbe408768d08cb85b54595e0fa8e85fad7493e7d83e47e9535f170dbcbeca7cf8cf35c0420ba0e9b2f45e992e9d80c2949959c46b

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8158929.exe

                  Filesize

                  206KB

                  MD5

                  cf4263062182f83e39bd347dcb8c7ba1

                  SHA1

                  7c2e85467959f111c6b1d9dfce0e12f6ed929aed

                  SHA256

                  593b68bdcca34e87e8a4af7eb59af5a221509bfee28cd2e90059d0b2ecdaa4cc

                  SHA512

                  d2f3622e762a93eb351d81d57a9fbcc4dab4b054c933c2b758a13b0a67d7c2097a72583de9a5ac788483eb063a8caf0edb5684cbed3fc74ff2a900bb99d60ae1

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8158929.exe

                  Filesize

                  206KB

                  MD5

                  cf4263062182f83e39bd347dcb8c7ba1

                  SHA1

                  7c2e85467959f111c6b1d9dfce0e12f6ed929aed

                  SHA256

                  593b68bdcca34e87e8a4af7eb59af5a221509bfee28cd2e90059d0b2ecdaa4cc

                  SHA512

                  d2f3622e762a93eb351d81d57a9fbcc4dab4b054c933c2b758a13b0a67d7c2097a72583de9a5ac788483eb063a8caf0edb5684cbed3fc74ff2a900bb99d60ae1

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f5630461.exe

                  Filesize

                  172KB

                  MD5

                  bbabfddcbccca80ac927a11320fc0ff8

                  SHA1

                  7d460973a28f74b72ee3b4a27cdeb3d860cf781b

                  SHA256

                  525e62fa29ba54e1de583b59cb759a97467710f6e9bf1885aeaaf7f49ed5d1cd

                  SHA512

                  f9eb1e73ac818ab5e0f3c5bc0cdea2ea463c49626e568463dbde1759cd23084bb281c86faa4acca39d62d8b105fda2df2881ba8992e344b33df5488fecae2724

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f5630461.exe

                  Filesize

                  172KB

                  MD5

                  bbabfddcbccca80ac927a11320fc0ff8

                  SHA1

                  7d460973a28f74b72ee3b4a27cdeb3d860cf781b

                  SHA256

                  525e62fa29ba54e1de583b59cb759a97467710f6e9bf1885aeaaf7f49ed5d1cd

                  SHA512

                  f9eb1e73ac818ab5e0f3c5bc0cdea2ea463c49626e568463dbde1759cd23084bb281c86faa4acca39d62d8b105fda2df2881ba8992e344b33df5488fecae2724

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g1161939.exe

                  Filesize

                  12KB

                  MD5

                  4471e84dfcf3b0b3b444bf9f65c97b2a

                  SHA1

                  ba6f31f739eb9da01cba143255fd6e5107c1033b

                  SHA256

                  357a46fd7884d7a0814374a8834e3046381939013e90caafe366071eecaaf81c

                  SHA512

                  3f09cad98dc9653b10612c1fffb283635df13270c59e02cb6e7a44000d53eb0d22d3a35a96bae584a5467b4837d5bc9831c330e306830d99e47e9866acb42701

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g1161939.exe

                  Filesize

                  12KB

                  MD5

                  4471e84dfcf3b0b3b444bf9f65c97b2a

                  SHA1

                  ba6f31f739eb9da01cba143255fd6e5107c1033b

                  SHA256

                  357a46fd7884d7a0814374a8834e3046381939013e90caafe366071eecaaf81c

                  SHA512

                  3f09cad98dc9653b10612c1fffb283635df13270c59e02cb6e7a44000d53eb0d22d3a35a96bae584a5467b4837d5bc9831c330e306830d99e47e9866acb42701

                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe

                  Filesize

                  206KB

                  MD5

                  6abef37d4422783913462d9332c5cd8e

                  SHA1

                  eaa7c92370404d79e6b1579731c8e85aacf5b76f

                  SHA256

                  86ef7b07adc27a331ecad19f238bbcaf1ca6e106924eb175c495d9630117b227

                  SHA512

                  799d069617fea1e345f9bc0dbe408768d08cb85b54595e0fa8e85fad7493e7d83e47e9535f170dbcbeca7cf8cf35c0420ba0e9b2f45e992e9d80c2949959c46b

                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe

                  Filesize

                  206KB

                  MD5

                  6abef37d4422783913462d9332c5cd8e

                  SHA1

                  eaa7c92370404d79e6b1579731c8e85aacf5b76f

                  SHA256

                  86ef7b07adc27a331ecad19f238bbcaf1ca6e106924eb175c495d9630117b227

                  SHA512

                  799d069617fea1e345f9bc0dbe408768d08cb85b54595e0fa8e85fad7493e7d83e47e9535f170dbcbeca7cf8cf35c0420ba0e9b2f45e992e9d80c2949959c46b

                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe

                  Filesize

                  206KB

                  MD5

                  6abef37d4422783913462d9332c5cd8e

                  SHA1

                  eaa7c92370404d79e6b1579731c8e85aacf5b76f

                  SHA256

                  86ef7b07adc27a331ecad19f238bbcaf1ca6e106924eb175c495d9630117b227

                  SHA512

                  799d069617fea1e345f9bc0dbe408768d08cb85b54595e0fa8e85fad7493e7d83e47e9535f170dbcbeca7cf8cf35c0420ba0e9b2f45e992e9d80c2949959c46b

                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe

                  Filesize

                  206KB

                  MD5

                  6abef37d4422783913462d9332c5cd8e

                  SHA1

                  eaa7c92370404d79e6b1579731c8e85aacf5b76f

                  SHA256

                  86ef7b07adc27a331ecad19f238bbcaf1ca6e106924eb175c495d9630117b227

                  SHA512

                  799d069617fea1e345f9bc0dbe408768d08cb85b54595e0fa8e85fad7493e7d83e47e9535f170dbcbeca7cf8cf35c0420ba0e9b2f45e992e9d80c2949959c46b

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                  Filesize

                  89KB

                  MD5

                  a5ed103ec4719a27ab3d3c01dac66f01

                  SHA1

                  c830d6980d7edea60568a518eccd36c0bc2a4924

                  SHA256

                  dbcdc009781edffc3c4e5234d3d23d26364d6bff47e2e384cffdef148d7b5b36

                  SHA512

                  b7fbe709a44f0e84a94c9e82f790d04e3d86b5409b5eb2d9f1d4d775b9669694c189042f04001acadb6da4c6284f4fbcbe39fd97427d41619191928510db9d80

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                  Filesize

                  89KB

                  MD5

                  a5ed103ec4719a27ab3d3c01dac66f01

                  SHA1

                  c830d6980d7edea60568a518eccd36c0bc2a4924

                  SHA256

                  dbcdc009781edffc3c4e5234d3d23d26364d6bff47e2e384cffdef148d7b5b36

                  SHA512

                  b7fbe709a44f0e84a94c9e82f790d04e3d86b5409b5eb2d9f1d4d775b9669694c189042f04001acadb6da4c6284f4fbcbe39fd97427d41619191928510db9d80

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                  Filesize

                  89KB

                  MD5

                  a5ed103ec4719a27ab3d3c01dac66f01

                  SHA1

                  c830d6980d7edea60568a518eccd36c0bc2a4924

                  SHA256

                  dbcdc009781edffc3c4e5234d3d23d26364d6bff47e2e384cffdef148d7b5b36

                  SHA512

                  b7fbe709a44f0e84a94c9e82f790d04e3d86b5409b5eb2d9f1d4d775b9669694c189042f04001acadb6da4c6284f4fbcbe39fd97427d41619191928510db9d80

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                  Filesize

                  162B

                  MD5

                  1b7c22a214949975556626d7217e9a39

                  SHA1

                  d01c97e2944166ed23e47e4a62ff471ab8fa031f

                  SHA256

                  340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                  SHA512

                  ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                • memory/2168-195-0x0000000004C00000-0x0000000004C10000-memory.dmp

                  Filesize

                  64KB

                • memory/2168-190-0x0000000000400000-0x0000000000430000-memory.dmp

                  Filesize

                  192KB

                • memory/5044-157-0x000000000A820000-0x000000000A832000-memory.dmp

                  Filesize

                  72KB

                • memory/5044-162-0x000000000B670000-0x000000000B702000-memory.dmp

                  Filesize

                  584KB

                • memory/5044-167-0x000000000B9B0000-0x000000000BA00000-memory.dmp

                  Filesize

                  320KB

                • memory/5044-166-0x000000000C7A0000-0x000000000CCCC000-memory.dmp

                  Filesize

                  5.2MB

                • memory/5044-165-0x000000000BA80000-0x000000000BC42000-memory.dmp

                  Filesize

                  1.8MB

                • memory/5044-164-0x000000000B710000-0x000000000B776000-memory.dmp

                  Filesize

                  408KB

                • memory/5044-163-0x000000000BCC0000-0x000000000C264000-memory.dmp

                  Filesize

                  5.6MB

                • memory/5044-154-0x0000000000960000-0x0000000000990000-memory.dmp

                  Filesize

                  192KB

                • memory/5044-161-0x000000000B450000-0x000000000B4C6000-memory.dmp

                  Filesize

                  472KB

                • memory/5044-160-0x00000000052B0000-0x00000000052C0000-memory.dmp

                  Filesize

                  64KB

                • memory/5044-159-0x00000000052B0000-0x00000000052C0000-memory.dmp

                  Filesize

                  64KB

                • memory/5044-158-0x000000000A880000-0x000000000A8BC000-memory.dmp

                  Filesize

                  240KB

                • memory/5044-156-0x000000000A8E0000-0x000000000A9EA000-memory.dmp

                  Filesize

                  1.0MB

                • memory/5044-155-0x000000000ADA0000-0x000000000B3B8000-memory.dmp

                  Filesize

                  6.1MB

                • memory/5056-172-0x0000000000D80000-0x0000000000D8A000-memory.dmp

                  Filesize

                  40KB