Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/09/2023, 01:08

General

  • Target

    efbe6e47229a646410652946a5a792e8c3414bb244061a219aea650d068c7e1c.exe

  • Size

    956KB

  • MD5

    2a1ef00edfe378d2136ad96afa8a46ec

  • SHA1

    6224f1a957ced73577e73f76ae648280ef8f0ba2

  • SHA256

    efbe6e47229a646410652946a5a792e8c3414bb244061a219aea650d068c7e1c

  • SHA512

    8eda290935a6bb4e38219c10593db4512548f6a7654045c03bb5e743efac8aa665d8a48caa2490a9aabd6ee6619c39f951ab7f2d59e516b572b2a36c7b77a26c

  • SSDEEP

    24576:Ly16H9E4xqF5oAmNK4T02sBP/NpvucZb3Q9TN0U0D4uP:+18EvHoAerTVsBPlpWa3QUD

Malware Config

Extracted

Family

redline

Botnet

tuxiu

C2

77.91.124.82:19071

Attributes
  • auth_value

    29610cdad07e7187eec70685a04b89fe

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\efbe6e47229a646410652946a5a792e8c3414bb244061a219aea650d068c7e1c.exe
    "C:\Users\Admin\AppData\Local\Temp\efbe6e47229a646410652946a5a792e8c3414bb244061a219aea650d068c7e1c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1752
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6190423.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6190423.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4900
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8543495.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8543495.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3656
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7941102.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7941102.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1864
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7788597.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7788597.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:3540
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:796
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 796 -s 540
                  7⤵
                  • Program crash
                  PID:1940
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3540 -s 552
                6⤵
                • Program crash
                PID:4140
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8639604.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8639604.exe
              5⤵
              • Executes dropped EXE
              PID:4848
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3540 -ip 3540
      1⤵
        PID:556
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 796 -ip 796
        1⤵
          PID:3828

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6190423.exe

          Filesize

          854KB

          MD5

          1e3ad421833a4dc86652b692c3182f48

          SHA1

          b2d2f3f37c585b4ce806c1f6863e90d733e6a302

          SHA256

          f54f5008a7084449be7ba395fb6a9ea088f11e69df40accc7979b575f37ea82a

          SHA512

          0c8b919e10c6044e0fd5bc45d1023c1f822ac8de40d75044dd234b03034f480999976c865817586cc18e656f93acd28698f27ec12c080c8348ef54a269582c14

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6190423.exe

          Filesize

          854KB

          MD5

          1e3ad421833a4dc86652b692c3182f48

          SHA1

          b2d2f3f37c585b4ce806c1f6863e90d733e6a302

          SHA256

          f54f5008a7084449be7ba395fb6a9ea088f11e69df40accc7979b575f37ea82a

          SHA512

          0c8b919e10c6044e0fd5bc45d1023c1f822ac8de40d75044dd234b03034f480999976c865817586cc18e656f93acd28698f27ec12c080c8348ef54a269582c14

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8543495.exe

          Filesize

          589KB

          MD5

          eb2285e63b7e0846d35751cc69933500

          SHA1

          5c95cc8f90a7388125ea8c656f477c02e4480aad

          SHA256

          3482b16666c3155ea3d5e3d7b649915ad46ab6c19c47364a2a7538d1907511e1

          SHA512

          4ab1c9726164f1624c3e3d69556a88cf31adddc6991e2c696274703b2305b180234a66e5562df2aee13f458fb4f11c893f170ebf3e8ea0b11609a23e050dacd3

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8543495.exe

          Filesize

          589KB

          MD5

          eb2285e63b7e0846d35751cc69933500

          SHA1

          5c95cc8f90a7388125ea8c656f477c02e4480aad

          SHA256

          3482b16666c3155ea3d5e3d7b649915ad46ab6c19c47364a2a7538d1907511e1

          SHA512

          4ab1c9726164f1624c3e3d69556a88cf31adddc6991e2c696274703b2305b180234a66e5562df2aee13f458fb4f11c893f170ebf3e8ea0b11609a23e050dacd3

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7941102.exe

          Filesize

          403KB

          MD5

          fe51894671f3158b4b6ae2340019153d

          SHA1

          57fcd217863dff7d20476d16423cfa9e903c2d89

          SHA256

          a07eec9b6e6c62cc6114c74ef44e4ea825b0d673d52433f0348fffa8e5456754

          SHA512

          33714b1bafcdb173c69faeefeb3e328ca16477da96fdda4b0c3714b09fb8509bb07548c87418455c126651d8f64545b0f98d9ceff4d79e6cf5c069256182fd5e

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7941102.exe

          Filesize

          403KB

          MD5

          fe51894671f3158b4b6ae2340019153d

          SHA1

          57fcd217863dff7d20476d16423cfa9e903c2d89

          SHA256

          a07eec9b6e6c62cc6114c74ef44e4ea825b0d673d52433f0348fffa8e5456754

          SHA512

          33714b1bafcdb173c69faeefeb3e328ca16477da96fdda4b0c3714b09fb8509bb07548c87418455c126651d8f64545b0f98d9ceff4d79e6cf5c069256182fd5e

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7788597.exe

          Filesize

          378KB

          MD5

          e2610018194265cf1b14e537f0ff70d5

          SHA1

          a5b558d0e511c48ae968216d111fc74ba22b2b37

          SHA256

          94f32b6c819663247619ada1608db85219617a9c859a63356474198289ee2b6d

          SHA512

          dc9964a9cd729e8506698664a2260d39ce85463e1e57aca843c55ffd74b816e5e3605b77e32ff5a0e533adfe157323d4849f3eb7f825b65fda2b95e004725bd4

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7788597.exe

          Filesize

          378KB

          MD5

          e2610018194265cf1b14e537f0ff70d5

          SHA1

          a5b558d0e511c48ae968216d111fc74ba22b2b37

          SHA256

          94f32b6c819663247619ada1608db85219617a9c859a63356474198289ee2b6d

          SHA512

          dc9964a9cd729e8506698664a2260d39ce85463e1e57aca843c55ffd74b816e5e3605b77e32ff5a0e533adfe157323d4849f3eb7f825b65fda2b95e004725bd4

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8639604.exe

          Filesize

          174KB

          MD5

          69eed1a4cf1620166a630ca76e7aa413

          SHA1

          6ee4a651feba691c41607f81db58f4f11788dcf1

          SHA256

          a11dd4025a00dc2848ee683dae526a28fa08f3ec67b85cac47dab282da81b37d

          SHA512

          fc35d12625292373a73ae73d63ced14ce696afcfb9d865987ab6e97cbe6af4cd7e6fe28d7e16e1654f0e16ee3c71769b03ba4fb460e0d9e58d622b3a134b423e

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8639604.exe

          Filesize

          174KB

          MD5

          69eed1a4cf1620166a630ca76e7aa413

          SHA1

          6ee4a651feba691c41607f81db58f4f11788dcf1

          SHA256

          a11dd4025a00dc2848ee683dae526a28fa08f3ec67b85cac47dab282da81b37d

          SHA512

          fc35d12625292373a73ae73d63ced14ce696afcfb9d865987ab6e97cbe6af4cd7e6fe28d7e16e1654f0e16ee3c71769b03ba4fb460e0d9e58d622b3a134b423e

        • memory/796-29-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/796-30-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/796-32-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/796-28-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4848-39-0x000000000AA40000-0x000000000B058000-memory.dmp

          Filesize

          6.1MB

        • memory/4848-37-0x00000000743C0000-0x0000000074B70000-memory.dmp

          Filesize

          7.7MB

        • memory/4848-38-0x0000000005030000-0x0000000005036000-memory.dmp

          Filesize

          24KB

        • memory/4848-36-0x0000000000610000-0x0000000000640000-memory.dmp

          Filesize

          192KB

        • memory/4848-40-0x000000000A5C0000-0x000000000A6CA000-memory.dmp

          Filesize

          1.0MB

        • memory/4848-41-0x0000000005080000-0x0000000005090000-memory.dmp

          Filesize

          64KB

        • memory/4848-42-0x000000000A500000-0x000000000A512000-memory.dmp

          Filesize

          72KB

        • memory/4848-43-0x000000000A560000-0x000000000A59C000-memory.dmp

          Filesize

          240KB

        • memory/4848-44-0x000000000A6D0000-0x000000000A71C000-memory.dmp

          Filesize

          304KB

        • memory/4848-45-0x00000000743C0000-0x0000000074B70000-memory.dmp

          Filesize

          7.7MB

        • memory/4848-46-0x0000000005080000-0x0000000005090000-memory.dmp

          Filesize

          64KB