Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    07-06-2023 01:18

General

  • Target

    05ada3c7bb54efda0f84ce338d7558a6000e4bffc6e640d5ac2c25f6b1504976.exe

  • Size

    735KB

  • MD5

    1c9179fad34aa4dd246b5ebd3539b7b1

  • SHA1

    04d1a165e2e7dc2f1736223a9cfe1ad7aebacb6a

  • SHA256

    05ada3c7bb54efda0f84ce338d7558a6000e4bffc6e640d5ac2c25f6b1504976

  • SHA512

    ead9b21f1df264c0fff816a6e11eba1c747cf16bb7dcc65c766f203a848e31b7e882edfc36bee62f6e22eb0639470bed72022759012204c92fb5919251e60edd

  • SSDEEP

    12288:hMrqy90LcnW2YHevd7sSQ3lcPnQgP7ya7NkVBV20IxE:DyA2YHevd7sSI2f5Pua+I0qE

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19048

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05ada3c7bb54efda0f84ce338d7558a6000e4bffc6e640d5ac2c25f6b1504976.exe
    "C:\Users\Admin\AppData\Local\Temp\05ada3c7bb54efda0f84ce338d7558a6000e4bffc6e640d5ac2c25f6b1504976.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1324
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6096298.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6096298.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2032
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4781078.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4781078.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1580
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9099813.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9099813.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:472
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a2430684.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a2430684.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:716
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5412639.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5412639.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:360
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:908
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2518448.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2518448.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:884

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6096298.exe
    Filesize

    530KB

    MD5

    1f9604ac6e8813bd470effe801645717

    SHA1

    55a84f4f7ead50c7a504583f01e712d28a84b32b

    SHA256

    16ace01729c158d36ea8b868f609571007b6e9dc7a5e31c34fa80b8e7b345bb1

    SHA512

    965faad7a4dc7e1751422bb42d5e871f14cfa7aa6a0099c8a4b1ac0cf1bdbbdbb7d01f0bacf2935d486d90c2adbb949aea6a32a5a031bc2c51601f0bc5cdb5f5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6096298.exe
    Filesize

    530KB

    MD5

    1f9604ac6e8813bd470effe801645717

    SHA1

    55a84f4f7ead50c7a504583f01e712d28a84b32b

    SHA256

    16ace01729c158d36ea8b868f609571007b6e9dc7a5e31c34fa80b8e7b345bb1

    SHA512

    965faad7a4dc7e1751422bb42d5e871f14cfa7aa6a0099c8a4b1ac0cf1bdbbdbb7d01f0bacf2935d486d90c2adbb949aea6a32a5a031bc2c51601f0bc5cdb5f5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4781078.exe
    Filesize

    357KB

    MD5

    914b3e47a1473d8a5e27783fb574e3db

    SHA1

    670f60929526815b3abe90d07682f192b0baaef3

    SHA256

    23f10e283baad79fa53ecdceb74ddafb4e600969dc1f33fc1a72f6b42d77fe10

    SHA512

    a8446541303fa6da230c8ca29f3ed243eca491390ccbe46f0fada4a33301c2d804e54e3dd66c0d083e347663d5331f80801591ec3f3458984133abcc48ac6470

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4781078.exe
    Filesize

    357KB

    MD5

    914b3e47a1473d8a5e27783fb574e3db

    SHA1

    670f60929526815b3abe90d07682f192b0baaef3

    SHA256

    23f10e283baad79fa53ecdceb74ddafb4e600969dc1f33fc1a72f6b42d77fe10

    SHA512

    a8446541303fa6da230c8ca29f3ed243eca491390ccbe46f0fada4a33301c2d804e54e3dd66c0d083e347663d5331f80801591ec3f3458984133abcc48ac6470

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2518448.exe
    Filesize

    172KB

    MD5

    010f6fc9b85ff42f75b2726b5bb47925

    SHA1

    2e28aaa0cbf1b86741d02d85d52a22cf70a4f2e4

    SHA256

    d8c38dd478151b99a427744d8fe372c3dacaf5df03c844c3b9dee82d9e8b281e

    SHA512

    73e5c9f77961ec44b3c67ab6985a03eed483d9fb0282de9cb2c36a85f794d6697ef0fb64d29761c2b9105b111a156639bd3a8b24657f2617be1099e62e51ab5e

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2518448.exe
    Filesize

    172KB

    MD5

    010f6fc9b85ff42f75b2726b5bb47925

    SHA1

    2e28aaa0cbf1b86741d02d85d52a22cf70a4f2e4

    SHA256

    d8c38dd478151b99a427744d8fe372c3dacaf5df03c844c3b9dee82d9e8b281e

    SHA512

    73e5c9f77961ec44b3c67ab6985a03eed483d9fb0282de9cb2c36a85f794d6697ef0fb64d29761c2b9105b111a156639bd3a8b24657f2617be1099e62e51ab5e

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9099813.exe
    Filesize

    202KB

    MD5

    d621be7a110e1805793fec1c07238b85

    SHA1

    05dbec1f90e63c4a1f711ba68b88eb1267691c48

    SHA256

    7e7a9ece83453947781587f02dc2d90e09cddecfd9143f4cdb3c6153c948a418

    SHA512

    12e999afa1663b86923ec24fd00bb93cc2c8e10da689f24e6ae2398180fa4a35684997ffb9bb64bb8c42613fb06e88edbd5466bc32924ad0a2232aeb398f47fc

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9099813.exe
    Filesize

    202KB

    MD5

    d621be7a110e1805793fec1c07238b85

    SHA1

    05dbec1f90e63c4a1f711ba68b88eb1267691c48

    SHA256

    7e7a9ece83453947781587f02dc2d90e09cddecfd9143f4cdb3c6153c948a418

    SHA512

    12e999afa1663b86923ec24fd00bb93cc2c8e10da689f24e6ae2398180fa4a35684997ffb9bb64bb8c42613fb06e88edbd5466bc32924ad0a2232aeb398f47fc

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a2430684.exe
    Filesize

    12KB

    MD5

    93875b44398c62948decc62d45e84af9

    SHA1

    7b4fed98b263cfb1bc1722d182cdbb6a96454cfa

    SHA256

    ced5a32e8b3d74ba04fd0e6ba432f7057554efb5e97e1c589d81c8457125d5b0

    SHA512

    fcf1bce36b71715c47b82f9fbe401125eb57d0776578ccef96e1363191e48c0b5c87c6a51c1c1e34b9ca71a3fe92deae6e937e5acd6fa94d3c951da8e1d0d168

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a2430684.exe
    Filesize

    12KB

    MD5

    93875b44398c62948decc62d45e84af9

    SHA1

    7b4fed98b263cfb1bc1722d182cdbb6a96454cfa

    SHA256

    ced5a32e8b3d74ba04fd0e6ba432f7057554efb5e97e1c589d81c8457125d5b0

    SHA512

    fcf1bce36b71715c47b82f9fbe401125eb57d0776578ccef96e1363191e48c0b5c87c6a51c1c1e34b9ca71a3fe92deae6e937e5acd6fa94d3c951da8e1d0d168

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5412639.exe
    Filesize

    117KB

    MD5

    3da2da571a146859786e77b2ea37c7c3

    SHA1

    c9c82d175a24cdf30e34d6d85a929a37307a6726

    SHA256

    34772b490ac57a20b4b198ad442d6176cc044df3d72c297e22007bac2150c2e2

    SHA512

    40a7aee629c171c798a97e62d23370dabd52359ba4fb9b2ed45ed71f750e3168d37bb02695f2b1a1a3e36838bb68bccc19074f8d2b6c79bf0ffcf1332e47e97d

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5412639.exe
    Filesize

    117KB

    MD5

    3da2da571a146859786e77b2ea37c7c3

    SHA1

    c9c82d175a24cdf30e34d6d85a929a37307a6726

    SHA256

    34772b490ac57a20b4b198ad442d6176cc044df3d72c297e22007bac2150c2e2

    SHA512

    40a7aee629c171c798a97e62d23370dabd52359ba4fb9b2ed45ed71f750e3168d37bb02695f2b1a1a3e36838bb68bccc19074f8d2b6c79bf0ffcf1332e47e97d

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v6096298.exe
    Filesize

    530KB

    MD5

    1f9604ac6e8813bd470effe801645717

    SHA1

    55a84f4f7ead50c7a504583f01e712d28a84b32b

    SHA256

    16ace01729c158d36ea8b868f609571007b6e9dc7a5e31c34fa80b8e7b345bb1

    SHA512

    965faad7a4dc7e1751422bb42d5e871f14cfa7aa6a0099c8a4b1ac0cf1bdbbdbb7d01f0bacf2935d486d90c2adbb949aea6a32a5a031bc2c51601f0bc5cdb5f5

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v6096298.exe
    Filesize

    530KB

    MD5

    1f9604ac6e8813bd470effe801645717

    SHA1

    55a84f4f7ead50c7a504583f01e712d28a84b32b

    SHA256

    16ace01729c158d36ea8b868f609571007b6e9dc7a5e31c34fa80b8e7b345bb1

    SHA512

    965faad7a4dc7e1751422bb42d5e871f14cfa7aa6a0099c8a4b1ac0cf1bdbbdbb7d01f0bacf2935d486d90c2adbb949aea6a32a5a031bc2c51601f0bc5cdb5f5

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v4781078.exe
    Filesize

    357KB

    MD5

    914b3e47a1473d8a5e27783fb574e3db

    SHA1

    670f60929526815b3abe90d07682f192b0baaef3

    SHA256

    23f10e283baad79fa53ecdceb74ddafb4e600969dc1f33fc1a72f6b42d77fe10

    SHA512

    a8446541303fa6da230c8ca29f3ed243eca491390ccbe46f0fada4a33301c2d804e54e3dd66c0d083e347663d5331f80801591ec3f3458984133abcc48ac6470

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v4781078.exe
    Filesize

    357KB

    MD5

    914b3e47a1473d8a5e27783fb574e3db

    SHA1

    670f60929526815b3abe90d07682f192b0baaef3

    SHA256

    23f10e283baad79fa53ecdceb74ddafb4e600969dc1f33fc1a72f6b42d77fe10

    SHA512

    a8446541303fa6da230c8ca29f3ed243eca491390ccbe46f0fada4a33301c2d804e54e3dd66c0d083e347663d5331f80801591ec3f3458984133abcc48ac6470

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c2518448.exe
    Filesize

    172KB

    MD5

    010f6fc9b85ff42f75b2726b5bb47925

    SHA1

    2e28aaa0cbf1b86741d02d85d52a22cf70a4f2e4

    SHA256

    d8c38dd478151b99a427744d8fe372c3dacaf5df03c844c3b9dee82d9e8b281e

    SHA512

    73e5c9f77961ec44b3c67ab6985a03eed483d9fb0282de9cb2c36a85f794d6697ef0fb64d29761c2b9105b111a156639bd3a8b24657f2617be1099e62e51ab5e

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c2518448.exe
    Filesize

    172KB

    MD5

    010f6fc9b85ff42f75b2726b5bb47925

    SHA1

    2e28aaa0cbf1b86741d02d85d52a22cf70a4f2e4

    SHA256

    d8c38dd478151b99a427744d8fe372c3dacaf5df03c844c3b9dee82d9e8b281e

    SHA512

    73e5c9f77961ec44b3c67ab6985a03eed483d9fb0282de9cb2c36a85f794d6697ef0fb64d29761c2b9105b111a156639bd3a8b24657f2617be1099e62e51ab5e

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v9099813.exe
    Filesize

    202KB

    MD5

    d621be7a110e1805793fec1c07238b85

    SHA1

    05dbec1f90e63c4a1f711ba68b88eb1267691c48

    SHA256

    7e7a9ece83453947781587f02dc2d90e09cddecfd9143f4cdb3c6153c948a418

    SHA512

    12e999afa1663b86923ec24fd00bb93cc2c8e10da689f24e6ae2398180fa4a35684997ffb9bb64bb8c42613fb06e88edbd5466bc32924ad0a2232aeb398f47fc

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v9099813.exe
    Filesize

    202KB

    MD5

    d621be7a110e1805793fec1c07238b85

    SHA1

    05dbec1f90e63c4a1f711ba68b88eb1267691c48

    SHA256

    7e7a9ece83453947781587f02dc2d90e09cddecfd9143f4cdb3c6153c948a418

    SHA512

    12e999afa1663b86923ec24fd00bb93cc2c8e10da689f24e6ae2398180fa4a35684997ffb9bb64bb8c42613fb06e88edbd5466bc32924ad0a2232aeb398f47fc

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a2430684.exe
    Filesize

    12KB

    MD5

    93875b44398c62948decc62d45e84af9

    SHA1

    7b4fed98b263cfb1bc1722d182cdbb6a96454cfa

    SHA256

    ced5a32e8b3d74ba04fd0e6ba432f7057554efb5e97e1c589d81c8457125d5b0

    SHA512

    fcf1bce36b71715c47b82f9fbe401125eb57d0776578ccef96e1363191e48c0b5c87c6a51c1c1e34b9ca71a3fe92deae6e937e5acd6fa94d3c951da8e1d0d168

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b5412639.exe
    Filesize

    117KB

    MD5

    3da2da571a146859786e77b2ea37c7c3

    SHA1

    c9c82d175a24cdf30e34d6d85a929a37307a6726

    SHA256

    34772b490ac57a20b4b198ad442d6176cc044df3d72c297e22007bac2150c2e2

    SHA512

    40a7aee629c171c798a97e62d23370dabd52359ba4fb9b2ed45ed71f750e3168d37bb02695f2b1a1a3e36838bb68bccc19074f8d2b6c79bf0ffcf1332e47e97d

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b5412639.exe
    Filesize

    117KB

    MD5

    3da2da571a146859786e77b2ea37c7c3

    SHA1

    c9c82d175a24cdf30e34d6d85a929a37307a6726

    SHA256

    34772b490ac57a20b4b198ad442d6176cc044df3d72c297e22007bac2150c2e2

    SHA512

    40a7aee629c171c798a97e62d23370dabd52359ba4fb9b2ed45ed71f750e3168d37bb02695f2b1a1a3e36838bb68bccc19074f8d2b6c79bf0ffcf1332e47e97d

  • memory/716-92-0x0000000000B90000-0x0000000000B9A000-memory.dmp
    Filesize

    40KB

  • memory/884-115-0x0000000000980000-0x00000000009B0000-memory.dmp
    Filesize

    192KB

  • memory/884-116-0x00000000002D0000-0x00000000002D6000-memory.dmp
    Filesize

    24KB

  • memory/884-117-0x0000000002400000-0x0000000002440000-memory.dmp
    Filesize

    256KB

  • memory/884-118-0x0000000002400000-0x0000000002440000-memory.dmp
    Filesize

    256KB

  • memory/908-105-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
    Filesize

    4KB

  • memory/908-107-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/908-108-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/908-101-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/908-100-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB