Analysis

  • max time kernel
    135s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-06-2023 21:04

General

  • Target

    8f0bfd6c629cc99586aecebf9b699fb3491d90e182fa8c442d1b6cfcf63bfc19.exe

  • Size

    592KB

  • MD5

    b82c1789538f144c6278f170b41d8e10

  • SHA1

    397d1f25b75b8d9d87e3509f36600d607008b0e0

  • SHA256

    8f0bfd6c629cc99586aecebf9b699fb3491d90e182fa8c442d1b6cfcf63bfc19

  • SHA512

    53ad5ee2895d85b0352a88167f8f2681a7aaeb52770c638dac88d07a2ef7677d3b2323af634fa76b5a12fc40f512e9b168c4149b841b7d7471804fd2a98db6dd

  • SSDEEP

    12288:GMrzy90rrwodL5vTZuXuB+Xrz4wVXjdS67eYab8YE//y:9ygrwoJ5rZWuMFhMHAN/y

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.129:19068

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f0bfd6c629cc99586aecebf9b699fb3491d90e182fa8c442d1b6cfcf63bfc19.exe
    "C:\Users\Admin\AppData\Local\Temp\8f0bfd6c629cc99586aecebf9b699fb3491d90e182fa8c442d1b6cfcf63bfc19.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3388
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9723811.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9723811.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4028
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9243758.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9243758.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:876
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f5540682.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f5540682.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1436
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g1168197.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g1168197.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4212
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5080628.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5080628.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1256
        • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
          "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4492
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN lamod.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:460
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "lamod.exe" /P "Admin:N"&&CACLS "lamod.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2692
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:4884
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "lamod.exe" /P "Admin:N"
                6⤵
                  PID:4920
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "lamod.exe" /P "Admin:R" /E
                  6⤵
                    PID:760
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:3692
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\a9e2a16078" /P "Admin:N"
                      6⤵
                        PID:4776
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\a9e2a16078" /P "Admin:R" /E
                        6⤵
                          PID:3888
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:4872
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2243751.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2243751.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:4384
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4852
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 596
                    3⤵
                    • Program crash
                    PID:4768
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4384 -ip 4384
                1⤵
                  PID:3344
                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  1⤵
                  • Executes dropped EXE
                  PID:952
                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  1⤵
                  • Executes dropped EXE
                  PID:3460

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2243751.exe

                  Filesize

                  282KB

                  MD5

                  4dbe04ee3a9d195c49fad32c598c4f49

                  SHA1

                  e786a87a0c13dbfbc4ddb86d65e2229290e3d79a

                  SHA256

                  ed41cecf690746c882aa710888eb0e24c1bba9b7138e0a64bbb776d4b170b962

                  SHA512

                  78c7595cef99227b5ad01afeabc152d31bd5dc65e03945872c19ef3ab3967b9a6c98551649180d79a5da50ea98f0a9d63ff8ee89de705cb8171f816054f6eb33

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2243751.exe

                  Filesize

                  282KB

                  MD5

                  4dbe04ee3a9d195c49fad32c598c4f49

                  SHA1

                  e786a87a0c13dbfbc4ddb86d65e2229290e3d79a

                  SHA256

                  ed41cecf690746c882aa710888eb0e24c1bba9b7138e0a64bbb776d4b170b962

                  SHA512

                  78c7595cef99227b5ad01afeabc152d31bd5dc65e03945872c19ef3ab3967b9a6c98551649180d79a5da50ea98f0a9d63ff8ee89de705cb8171f816054f6eb33

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9723811.exe

                  Filesize

                  377KB

                  MD5

                  38889a1a10d4345f4b82fbc6c9413f58

                  SHA1

                  69796036c9012bda74badcf2aeafda1e196d3eb0

                  SHA256

                  65e518c42e82d735d4e48db34578e151aca57f553805723ca5db129bb542d2c8

                  SHA512

                  6129796a9000400889aaf33f65f2c7cb55224fa6508de90e1eb7f1b0152716b99adea821edb68c6918ece3ec6f6d47021f908b17a2266b39477dc64c39be8e75

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9723811.exe

                  Filesize

                  377KB

                  MD5

                  38889a1a10d4345f4b82fbc6c9413f58

                  SHA1

                  69796036c9012bda74badcf2aeafda1e196d3eb0

                  SHA256

                  65e518c42e82d735d4e48db34578e151aca57f553805723ca5db129bb542d2c8

                  SHA512

                  6129796a9000400889aaf33f65f2c7cb55224fa6508de90e1eb7f1b0152716b99adea821edb68c6918ece3ec6f6d47021f908b17a2266b39477dc64c39be8e75

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5080628.exe

                  Filesize

                  206KB

                  MD5

                  f18888a866ba03e43623d01f638b15e7

                  SHA1

                  a8af69d03f1a5680d04bbfd3300c880b71e6d31e

                  SHA256

                  5dde8c6a14c9addf5da4c4700e717c9bdf0fb2b5313c7660c43d803a88eb33ec

                  SHA512

                  df608296ab7f16d580495e6318f0b67f25d132ae4f982463c528e4302c133558bd7f87167f5cc750f9b8517cd8c076592bad5e2cabd7f10b52e63cf173af31f3

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5080628.exe

                  Filesize

                  206KB

                  MD5

                  f18888a866ba03e43623d01f638b15e7

                  SHA1

                  a8af69d03f1a5680d04bbfd3300c880b71e6d31e

                  SHA256

                  5dde8c6a14c9addf5da4c4700e717c9bdf0fb2b5313c7660c43d803a88eb33ec

                  SHA512

                  df608296ab7f16d580495e6318f0b67f25d132ae4f982463c528e4302c133558bd7f87167f5cc750f9b8517cd8c076592bad5e2cabd7f10b52e63cf173af31f3

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9243758.exe

                  Filesize

                  206KB

                  MD5

                  4459ae84e5fb57824af647a783a120e8

                  SHA1

                  a3f3493148fc6ce0cbcd70bd7ed47041f4f189f4

                  SHA256

                  a1906d91496d51d60879bde61bd1288ba7315697d8feab780296a42d14927630

                  SHA512

                  453df6a821e56022376620a5d2654262cfa050f57c86e934c37285da256170c59cc48f2484d5d71a527135078ee69dd0a075838bc810102ff5cb6feeea58e4b1

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9243758.exe

                  Filesize

                  206KB

                  MD5

                  4459ae84e5fb57824af647a783a120e8

                  SHA1

                  a3f3493148fc6ce0cbcd70bd7ed47041f4f189f4

                  SHA256

                  a1906d91496d51d60879bde61bd1288ba7315697d8feab780296a42d14927630

                  SHA512

                  453df6a821e56022376620a5d2654262cfa050f57c86e934c37285da256170c59cc48f2484d5d71a527135078ee69dd0a075838bc810102ff5cb6feeea58e4b1

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f5540682.exe

                  Filesize

                  172KB

                  MD5

                  688cce06e375dac1224f5562e37cf4d8

                  SHA1

                  0f11bd1cffee4fa222d2fe1c7e9e2b7a7162f32f

                  SHA256

                  cef45ec4a2870f8e74eb26c4f916aaaacdfb51b03e2f4231a082df4436d172fe

                  SHA512

                  5294f38f46bdf36757a69c57f4d8f4106eac1207dcb4d50b3b6cf941e64e384a624ccd5e518cbb3ad908eede6364879d377a2dfa643409aadb574f6915dc4732

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f5540682.exe

                  Filesize

                  172KB

                  MD5

                  688cce06e375dac1224f5562e37cf4d8

                  SHA1

                  0f11bd1cffee4fa222d2fe1c7e9e2b7a7162f32f

                  SHA256

                  cef45ec4a2870f8e74eb26c4f916aaaacdfb51b03e2f4231a082df4436d172fe

                  SHA512

                  5294f38f46bdf36757a69c57f4d8f4106eac1207dcb4d50b3b6cf941e64e384a624ccd5e518cbb3ad908eede6364879d377a2dfa643409aadb574f6915dc4732

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g1168197.exe

                  Filesize

                  12KB

                  MD5

                  3b1e808e1fffc7080300b70f6a533b10

                  SHA1

                  92a751551133ee641f67eefb9c2999026955fd07

                  SHA256

                  1c516f2f1356143d94e92500926afa66fa5700d80928716bd5abc2140f3abdae

                  SHA512

                  0a03cc1a50fc82b59294d6c0d7544816b449a0262af70bdfa06eabf12fec7b72bc809d8cf3fed8001a158fd13cb23282f7e9cca9e49ca4575d61101be5bf1957

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g1168197.exe

                  Filesize

                  12KB

                  MD5

                  3b1e808e1fffc7080300b70f6a533b10

                  SHA1

                  92a751551133ee641f67eefb9c2999026955fd07

                  SHA256

                  1c516f2f1356143d94e92500926afa66fa5700d80928716bd5abc2140f3abdae

                  SHA512

                  0a03cc1a50fc82b59294d6c0d7544816b449a0262af70bdfa06eabf12fec7b72bc809d8cf3fed8001a158fd13cb23282f7e9cca9e49ca4575d61101be5bf1957

                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe

                  Filesize

                  206KB

                  MD5

                  f18888a866ba03e43623d01f638b15e7

                  SHA1

                  a8af69d03f1a5680d04bbfd3300c880b71e6d31e

                  SHA256

                  5dde8c6a14c9addf5da4c4700e717c9bdf0fb2b5313c7660c43d803a88eb33ec

                  SHA512

                  df608296ab7f16d580495e6318f0b67f25d132ae4f982463c528e4302c133558bd7f87167f5cc750f9b8517cd8c076592bad5e2cabd7f10b52e63cf173af31f3

                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe

                  Filesize

                  206KB

                  MD5

                  f18888a866ba03e43623d01f638b15e7

                  SHA1

                  a8af69d03f1a5680d04bbfd3300c880b71e6d31e

                  SHA256

                  5dde8c6a14c9addf5da4c4700e717c9bdf0fb2b5313c7660c43d803a88eb33ec

                  SHA512

                  df608296ab7f16d580495e6318f0b67f25d132ae4f982463c528e4302c133558bd7f87167f5cc750f9b8517cd8c076592bad5e2cabd7f10b52e63cf173af31f3

                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe

                  Filesize

                  206KB

                  MD5

                  f18888a866ba03e43623d01f638b15e7

                  SHA1

                  a8af69d03f1a5680d04bbfd3300c880b71e6d31e

                  SHA256

                  5dde8c6a14c9addf5da4c4700e717c9bdf0fb2b5313c7660c43d803a88eb33ec

                  SHA512

                  df608296ab7f16d580495e6318f0b67f25d132ae4f982463c528e4302c133558bd7f87167f5cc750f9b8517cd8c076592bad5e2cabd7f10b52e63cf173af31f3

                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe

                  Filesize

                  206KB

                  MD5

                  f18888a866ba03e43623d01f638b15e7

                  SHA1

                  a8af69d03f1a5680d04bbfd3300c880b71e6d31e

                  SHA256

                  5dde8c6a14c9addf5da4c4700e717c9bdf0fb2b5313c7660c43d803a88eb33ec

                  SHA512

                  df608296ab7f16d580495e6318f0b67f25d132ae4f982463c528e4302c133558bd7f87167f5cc750f9b8517cd8c076592bad5e2cabd7f10b52e63cf173af31f3

                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe

                  Filesize

                  206KB

                  MD5

                  f18888a866ba03e43623d01f638b15e7

                  SHA1

                  a8af69d03f1a5680d04bbfd3300c880b71e6d31e

                  SHA256

                  5dde8c6a14c9addf5da4c4700e717c9bdf0fb2b5313c7660c43d803a88eb33ec

                  SHA512

                  df608296ab7f16d580495e6318f0b67f25d132ae4f982463c528e4302c133558bd7f87167f5cc750f9b8517cd8c076592bad5e2cabd7f10b52e63cf173af31f3

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                  Filesize

                  89KB

                  MD5

                  a5ed103ec4719a27ab3d3c01dac66f01

                  SHA1

                  c830d6980d7edea60568a518eccd36c0bc2a4924

                  SHA256

                  dbcdc009781edffc3c4e5234d3d23d26364d6bff47e2e384cffdef148d7b5b36

                  SHA512

                  b7fbe709a44f0e84a94c9e82f790d04e3d86b5409b5eb2d9f1d4d775b9669694c189042f04001acadb6da4c6284f4fbcbe39fd97427d41619191928510db9d80

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                  Filesize

                  89KB

                  MD5

                  a5ed103ec4719a27ab3d3c01dac66f01

                  SHA1

                  c830d6980d7edea60568a518eccd36c0bc2a4924

                  SHA256

                  dbcdc009781edffc3c4e5234d3d23d26364d6bff47e2e384cffdef148d7b5b36

                  SHA512

                  b7fbe709a44f0e84a94c9e82f790d04e3d86b5409b5eb2d9f1d4d775b9669694c189042f04001acadb6da4c6284f4fbcbe39fd97427d41619191928510db9d80

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                  Filesize

                  89KB

                  MD5

                  a5ed103ec4719a27ab3d3c01dac66f01

                  SHA1

                  c830d6980d7edea60568a518eccd36c0bc2a4924

                  SHA256

                  dbcdc009781edffc3c4e5234d3d23d26364d6bff47e2e384cffdef148d7b5b36

                  SHA512

                  b7fbe709a44f0e84a94c9e82f790d04e3d86b5409b5eb2d9f1d4d775b9669694c189042f04001acadb6da4c6284f4fbcbe39fd97427d41619191928510db9d80

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                  Filesize

                  162B

                  MD5

                  1b7c22a214949975556626d7217e9a39

                  SHA1

                  d01c97e2944166ed23e47e4a62ff471ab8fa031f

                  SHA256

                  340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                  SHA512

                  ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                • memory/1436-157-0x000000000A830000-0x000000000A842000-memory.dmp

                  Filesize

                  72KB

                • memory/1436-158-0x00000000053C0000-0x00000000053D0000-memory.dmp

                  Filesize

                  64KB

                • memory/1436-167-0x000000000C3D0000-0x000000000C420000-memory.dmp

                  Filesize

                  320KB

                • memory/1436-166-0x00000000053C0000-0x00000000053D0000-memory.dmp

                  Filesize

                  64KB

                • memory/1436-165-0x000000000C900000-0x000000000CE2C000-memory.dmp

                  Filesize

                  5.2MB

                • memory/1436-164-0x000000000C200000-0x000000000C3C2000-memory.dmp

                  Filesize

                  1.8MB

                • memory/1436-163-0x000000000B4D0000-0x000000000B536000-memory.dmp

                  Filesize

                  408KB

                • memory/1436-162-0x000000000BA80000-0x000000000C024000-memory.dmp

                  Filesize

                  5.6MB

                • memory/1436-161-0x000000000B430000-0x000000000B4C2000-memory.dmp

                  Filesize

                  584KB

                • memory/1436-154-0x0000000000AB0000-0x0000000000AE0000-memory.dmp

                  Filesize

                  192KB

                • memory/1436-155-0x000000000AD70000-0x000000000B388000-memory.dmp

                  Filesize

                  6.1MB

                • memory/1436-160-0x000000000ACA0000-0x000000000AD16000-memory.dmp

                  Filesize

                  472KB

                • memory/1436-159-0x000000000A890000-0x000000000A8CC000-memory.dmp

                  Filesize

                  240KB

                • memory/1436-156-0x000000000A8F0000-0x000000000A9FA000-memory.dmp

                  Filesize

                  1.0MB

                • memory/4212-172-0x00000000001A0000-0x00000000001AA000-memory.dmp

                  Filesize

                  40KB

                • memory/4852-195-0x0000000005000000-0x0000000005010000-memory.dmp

                  Filesize

                  64KB

                • memory/4852-190-0x0000000000400000-0x0000000000430000-memory.dmp

                  Filesize

                  192KB