Analysis

  • max time kernel
    151s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/09/2023, 01:29

General

  • Target

    61eeef84d6840da73d35812ecfeab833182466d80518fcbc936bbc1613b05160.exe

  • Size

    928KB

  • MD5

    dd64ab94f8346177503476fbf3e12acf

  • SHA1

    5b761019e1b95298f399d7c79dca0046fc56045b

  • SHA256

    61eeef84d6840da73d35812ecfeab833182466d80518fcbc936bbc1613b05160

  • SHA512

    85905bcb4ff0ce78971b976b3077d087b0c36440a9cdcd778998948378ea92e8467a38e599580e148cf5b51cb67f3f0580885bf0539cc36bffb999fe24c28671

  • SSDEEP

    24576:kyuzfr8P5/P921qVqtkKCzsoKFggc/8c01mY/kQYk8Xbo:zuPo/PhwtkKhJe7nCmQRp4

Malware Config

Extracted

Family

redline

Botnet

tuxiu

C2

77.91.124.82:19071

Attributes
  • auth_value

    29610cdad07e7187eec70685a04b89fe

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\61eeef84d6840da73d35812ecfeab833182466d80518fcbc936bbc1613b05160.exe
    "C:\Users\Admin\AppData\Local\Temp\61eeef84d6840da73d35812ecfeab833182466d80518fcbc936bbc1613b05160.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6324592.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6324592.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1812
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2686995.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2686995.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3048
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9628487.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9628487.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4844
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8370361.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8370361.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:4980
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:1328
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                  PID:428
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 428 -s 540
                    7⤵
                    • Program crash
                    PID:4804
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4980 -s 196
                  6⤵
                  • Program crash
                  PID:3672
              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h5702073.exe
                C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h5702073.exe
                5⤵
                • Executes dropped EXE
                PID:3712
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4980 -ip 4980
        1⤵
          PID:5004
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 428 -ip 428
          1⤵
            PID:4224

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6324592.exe

            Filesize

            826KB

            MD5

            39d43b2d95e326bc08c342335fe69e2e

            SHA1

            3c3a375d791ae8d8fd17e4d367ca27ffef13b940

            SHA256

            8ef7876e12bc333751e50bf5dc7f29a73a376d2d962ba46f3278c0327bdbb25f

            SHA512

            b617bc5f10ad9518ccef64754374299e5e4187de3f87fcd9bcd25ca9431269a21bb057fed2815f761f33b134523e0ae14ceb170c47ee2b2068fafde333874582

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6324592.exe

            Filesize

            826KB

            MD5

            39d43b2d95e326bc08c342335fe69e2e

            SHA1

            3c3a375d791ae8d8fd17e4d367ca27ffef13b940

            SHA256

            8ef7876e12bc333751e50bf5dc7f29a73a376d2d962ba46f3278c0327bdbb25f

            SHA512

            b617bc5f10ad9518ccef64754374299e5e4187de3f87fcd9bcd25ca9431269a21bb057fed2815f761f33b134523e0ae14ceb170c47ee2b2068fafde333874582

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2686995.exe

            Filesize

            566KB

            MD5

            5baee5e2beaab466fb2381e60c40b615

            SHA1

            c9997665dceda7d5a600e50ecab7ee4a682d71bf

            SHA256

            979f2d783d795831bd48233857a297a9b0c7089a24f4d850dad0c14268d582bc

            SHA512

            157b192c1762a91819c31c6113f20b6b218283db7d4223e604249e5f5fb16020c97e184eb761dccc284c54b0217818bc84e01b17eb68473f4dc4fad1a67e30e3

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2686995.exe

            Filesize

            566KB

            MD5

            5baee5e2beaab466fb2381e60c40b615

            SHA1

            c9997665dceda7d5a600e50ecab7ee4a682d71bf

            SHA256

            979f2d783d795831bd48233857a297a9b0c7089a24f4d850dad0c14268d582bc

            SHA512

            157b192c1762a91819c31c6113f20b6b218283db7d4223e604249e5f5fb16020c97e184eb761dccc284c54b0217818bc84e01b17eb68473f4dc4fad1a67e30e3

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9628487.exe

            Filesize

            389KB

            MD5

            26157586361035fcb3b21ac8239fc644

            SHA1

            a7d09e3f98d9e63f4636616698f53d9b9e4ecf56

            SHA256

            b49daf13c9289712f57252ec7aa507c3a8b9970933126e345240319e19ac9252

            SHA512

            c6be9cef6f379d277fd1ea60d0d25c4bf810f24e6001dece436f312be5add45ccd87ec1b2b35f1e8fd8c1215033a57ee658e24f3415ed7b12467982b21f0de58

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9628487.exe

            Filesize

            389KB

            MD5

            26157586361035fcb3b21ac8239fc644

            SHA1

            a7d09e3f98d9e63f4636616698f53d9b9e4ecf56

            SHA256

            b49daf13c9289712f57252ec7aa507c3a8b9970933126e345240319e19ac9252

            SHA512

            c6be9cef6f379d277fd1ea60d0d25c4bf810f24e6001dece436f312be5add45ccd87ec1b2b35f1e8fd8c1215033a57ee658e24f3415ed7b12467982b21f0de58

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8370361.exe

            Filesize

            364KB

            MD5

            c3be2d1a63e8f8d0849b47a6cf2705e5

            SHA1

            5b9e6ec272612af2523fa98d45e4e792fffcadc8

            SHA256

            aeeb108d01335ecdbbbfe58b9b947c47ea7b09e03f1daca2fbc69a55aebe0d52

            SHA512

            e431a21edc075e4f7438dff7dec46c423c816f2886ae77258ae466d2af70ab3a8fa3ddb7c276200ab28ec4a11da94b512067bead2eccabd1bd883cc8bc5ba78b

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8370361.exe

            Filesize

            364KB

            MD5

            c3be2d1a63e8f8d0849b47a6cf2705e5

            SHA1

            5b9e6ec272612af2523fa98d45e4e792fffcadc8

            SHA256

            aeeb108d01335ecdbbbfe58b9b947c47ea7b09e03f1daca2fbc69a55aebe0d52

            SHA512

            e431a21edc075e4f7438dff7dec46c423c816f2886ae77258ae466d2af70ab3a8fa3ddb7c276200ab28ec4a11da94b512067bead2eccabd1bd883cc8bc5ba78b

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h5702073.exe

            Filesize

            174KB

            MD5

            26361d1adbe9b055dbb2883f7de2e464

            SHA1

            374ee9f27e476c0e0b6f29732ff7614b43cdc14b

            SHA256

            c4198263a1a08ee75855169aee802011164d1ff35702451892d432fe8488510e

            SHA512

            f971089ffe162b8ac8d1ad8fb51ad1e7b50477ebf28ae53e89743d190c47e143f85445ed662f6f6da5575aeb90a9718272876c7cff0109f191d6b9b758fa4410

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h5702073.exe

            Filesize

            174KB

            MD5

            26361d1adbe9b055dbb2883f7de2e464

            SHA1

            374ee9f27e476c0e0b6f29732ff7614b43cdc14b

            SHA256

            c4198263a1a08ee75855169aee802011164d1ff35702451892d432fe8488510e

            SHA512

            f971089ffe162b8ac8d1ad8fb51ad1e7b50477ebf28ae53e89743d190c47e143f85445ed662f6f6da5575aeb90a9718272876c7cff0109f191d6b9b758fa4410

          • memory/428-29-0x0000000000400000-0x000000000042C000-memory.dmp

            Filesize

            176KB

          • memory/428-30-0x0000000000400000-0x000000000042C000-memory.dmp

            Filesize

            176KB

          • memory/428-32-0x0000000000400000-0x000000000042C000-memory.dmp

            Filesize

            176KB

          • memory/428-28-0x0000000000400000-0x000000000042C000-memory.dmp

            Filesize

            176KB

          • memory/3712-39-0x000000000A6E0000-0x000000000ACF8000-memory.dmp

            Filesize

            6.1MB

          • memory/3712-37-0x0000000000260000-0x0000000000290000-memory.dmp

            Filesize

            192KB

          • memory/3712-38-0x0000000002550000-0x0000000002556000-memory.dmp

            Filesize

            24KB

          • memory/3712-36-0x00000000742A0000-0x0000000074A50000-memory.dmp

            Filesize

            7.7MB

          • memory/3712-40-0x000000000A210000-0x000000000A31A000-memory.dmp

            Filesize

            1.0MB

          • memory/3712-42-0x000000000A150000-0x000000000A162000-memory.dmp

            Filesize

            72KB

          • memory/3712-41-0x0000000004D30000-0x0000000004D40000-memory.dmp

            Filesize

            64KB

          • memory/3712-43-0x000000000A1B0000-0x000000000A1EC000-memory.dmp

            Filesize

            240KB

          • memory/3712-44-0x000000000A320000-0x000000000A36C000-memory.dmp

            Filesize

            304KB

          • memory/3712-45-0x00000000742A0000-0x0000000074A50000-memory.dmp

            Filesize

            7.7MB

          • memory/3712-46-0x0000000004D30000-0x0000000004D40000-memory.dmp

            Filesize

            64KB