Analysis

  • max time kernel
    152s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 22:32

General

  • Target

    4eb83e5f4039efe9296d95f59b3a2cd5678c22007cf270b8a65b6b58ac2e0e52.exe

  • Size

    956KB

  • MD5

    ad9a050a806ed357ebdaf7645f7d956a

  • SHA1

    60559c8131a5ab066d8681316c0eabd5c292a3d1

  • SHA256

    4eb83e5f4039efe9296d95f59b3a2cd5678c22007cf270b8a65b6b58ac2e0e52

  • SHA512

    a1e96a27e43da3ec87d660293b20cfffc428783c1435729b5c6e923c9ccd8e0af38431d8bcbba0cb2072bda18116caa9c3e406133552981a3a31cd3d11c46a50

  • SSDEEP

    24576:py7fbHnAbhSHhHJhlADjiaKvtcpu/3JDksmw6d/b1Jrf+yKo/hV:c/HAl8hJhlSjMj/XG/LtKo/h

Malware Config

Extracted

Family

redline

Botnet

tuxiu

C2

77.91.124.82:19071

Attributes
  • auth_value

    29610cdad07e7187eec70685a04b89fe

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4eb83e5f4039efe9296d95f59b3a2cd5678c22007cf270b8a65b6b58ac2e0e52.exe
    "C:\Users\Admin\AppData\Local\Temp\4eb83e5f4039efe9296d95f59b3a2cd5678c22007cf270b8a65b6b58ac2e0e52.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2272
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1326444.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1326444.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1032
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8711755.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8711755.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3028
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9264755.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9264755.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4968
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9078854.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9078854.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:5108
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:3548
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                  PID:1140
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 1140 -s 544
                    7⤵
                    • Program crash
                    PID:2940
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 5108 -s 588
                  6⤵
                  • Program crash
                  PID:3244
              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7328949.exe
                C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7328949.exe
                5⤵
                • Executes dropped EXE
                PID:3084
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5108 -ip 5108
        1⤵
          PID:3048
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1140 -ip 1140
          1⤵
            PID:4240

          Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1326444.exe

                  Filesize

                  854KB

                  MD5

                  f2eb343ba96f22fe55ecd8c14fc44878

                  SHA1

                  f44a1b41dfe9b3428e5bc55ae8e357715c0a5042

                  SHA256

                  7087b8192ef8cdca1415f47deb80073b824be58520f0dc3ce588c8c30c329434

                  SHA512

                  0aa4b496c3330b701dbbea65b5e198ba89190dbde56e7794115aee45218a589bb9f28e3a30fd17b37407ce0a46b1936f01cb7729ca00e955c2f8d58ff32c30a4

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1326444.exe

                  Filesize

                  854KB

                  MD5

                  f2eb343ba96f22fe55ecd8c14fc44878

                  SHA1

                  f44a1b41dfe9b3428e5bc55ae8e357715c0a5042

                  SHA256

                  7087b8192ef8cdca1415f47deb80073b824be58520f0dc3ce588c8c30c329434

                  SHA512

                  0aa4b496c3330b701dbbea65b5e198ba89190dbde56e7794115aee45218a589bb9f28e3a30fd17b37407ce0a46b1936f01cb7729ca00e955c2f8d58ff32c30a4

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8711755.exe

                  Filesize

                  580KB

                  MD5

                  e83b22f424f559a05cab5b2d3170e299

                  SHA1

                  587ed5dd45619ec512dfbf280d2d13b948a21572

                  SHA256

                  c68f03e0e7c3777f7053d3280718522112a03529b85656d8eca5d57530068884

                  SHA512

                  bebbd782b8f031501c51ea18cfb6fe0dcd53b7d8c454be9caf998ce5eb985af7bf98a0819054c6ca2bac00bd4b6773b91e9b00a264e2f23f50910f70e02f0c51

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8711755.exe

                  Filesize

                  580KB

                  MD5

                  e83b22f424f559a05cab5b2d3170e299

                  SHA1

                  587ed5dd45619ec512dfbf280d2d13b948a21572

                  SHA256

                  c68f03e0e7c3777f7053d3280718522112a03529b85656d8eca5d57530068884

                  SHA512

                  bebbd782b8f031501c51ea18cfb6fe0dcd53b7d8c454be9caf998ce5eb985af7bf98a0819054c6ca2bac00bd4b6773b91e9b00a264e2f23f50910f70e02f0c51

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9264755.exe

                  Filesize

                  403KB

                  MD5

                  1b579e825aa12552e8aff1b6bf79fa3c

                  SHA1

                  20486a475a53144a6113cb79ce925687168d1b86

                  SHA256

                  cf4d6904d8adf42d9104eb1ae55631c1dd2ae1ec5a7e18885ef189deebe5b800

                  SHA512

                  58695e64f1f9b1e9aa405c3b148033e182c1566cccfe22808ded3a8ad47dddec5ab3bb2513822cc0feafe9b1c4510b33a03d44db9ea81e888564119d65fc69ae

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9264755.exe

                  Filesize

                  403KB

                  MD5

                  1b579e825aa12552e8aff1b6bf79fa3c

                  SHA1

                  20486a475a53144a6113cb79ce925687168d1b86

                  SHA256

                  cf4d6904d8adf42d9104eb1ae55631c1dd2ae1ec5a7e18885ef189deebe5b800

                  SHA512

                  58695e64f1f9b1e9aa405c3b148033e182c1566cccfe22808ded3a8ad47dddec5ab3bb2513822cc0feafe9b1c4510b33a03d44db9ea81e888564119d65fc69ae

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9078854.exe

                  Filesize

                  396KB

                  MD5

                  31c50c2c10366e87cb1f23f6b4c706f5

                  SHA1

                  0f08dea0757afee0329e50cf073d68346d8ae83e

                  SHA256

                  04ae794435371a57fe2ed545c50093bf05058a0bb1bc7180bb8a3331f4f9ba83

                  SHA512

                  c19b02e5d01a48b66f366823985a66625ae004445f37609b785ad24766d68e0dd25987db1ed89974436e4e5c0a759c0df4b806b9355d399d58bb911789b4d4c3

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9078854.exe

                  Filesize

                  396KB

                  MD5

                  31c50c2c10366e87cb1f23f6b4c706f5

                  SHA1

                  0f08dea0757afee0329e50cf073d68346d8ae83e

                  SHA256

                  04ae794435371a57fe2ed545c50093bf05058a0bb1bc7180bb8a3331f4f9ba83

                  SHA512

                  c19b02e5d01a48b66f366823985a66625ae004445f37609b785ad24766d68e0dd25987db1ed89974436e4e5c0a759c0df4b806b9355d399d58bb911789b4d4c3

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7328949.exe

                  Filesize

                  175KB

                  MD5

                  c52a0727bd4885e5d0c70c428b54c32a

                  SHA1

                  f929e7cab23821e6502a274c431ca2d14eb95609

                  SHA256

                  b31fdfca080394a280df39fe025d53ad59309723072b6d1fc7e76fc7fb51a2a7

                  SHA512

                  1e023c39a94bdb402a5550f5340c97ab3b8c66fceb64438b8f5c250a01d617c43e9d2a5512d97d0e0e67bf5bbee2f76a45ff75847c451e459f4c0b50a335764a

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7328949.exe

                  Filesize

                  175KB

                  MD5

                  c52a0727bd4885e5d0c70c428b54c32a

                  SHA1

                  f929e7cab23821e6502a274c431ca2d14eb95609

                  SHA256

                  b31fdfca080394a280df39fe025d53ad59309723072b6d1fc7e76fc7fb51a2a7

                  SHA512

                  1e023c39a94bdb402a5550f5340c97ab3b8c66fceb64438b8f5c250a01d617c43e9d2a5512d97d0e0e67bf5bbee2f76a45ff75847c451e459f4c0b50a335764a

                • memory/1140-29-0x0000000000400000-0x000000000042C000-memory.dmp

                  Filesize

                  176KB

                • memory/1140-30-0x0000000000400000-0x000000000042C000-memory.dmp

                  Filesize

                  176KB

                • memory/1140-32-0x0000000000400000-0x000000000042C000-memory.dmp

                  Filesize

                  176KB

                • memory/1140-28-0x0000000000400000-0x000000000042C000-memory.dmp

                  Filesize

                  176KB

                • memory/3084-39-0x0000000005A90000-0x00000000060A8000-memory.dmp

                  Filesize

                  6.1MB

                • memory/3084-37-0x0000000073F20000-0x00000000746D0000-memory.dmp

                  Filesize

                  7.7MB

                • memory/3084-38-0x0000000002DE0000-0x0000000002DE6000-memory.dmp

                  Filesize

                  24KB

                • memory/3084-36-0x0000000000A60000-0x0000000000A90000-memory.dmp

                  Filesize

                  192KB

                • memory/3084-40-0x0000000005580000-0x000000000568A000-memory.dmp

                  Filesize

                  1.0MB

                • memory/3084-41-0x00000000052E0000-0x00000000052F2000-memory.dmp

                  Filesize

                  72KB

                • memory/3084-42-0x0000000005360000-0x0000000005370000-memory.dmp

                  Filesize

                  64KB

                • memory/3084-43-0x0000000005470000-0x00000000054AC000-memory.dmp

                  Filesize

                  240KB

                • memory/3084-44-0x00000000054B0000-0x00000000054FC000-memory.dmp

                  Filesize

                  304KB

                • memory/3084-45-0x0000000073F20000-0x00000000746D0000-memory.dmp

                  Filesize

                  7.7MB

                • memory/3084-46-0x0000000005360000-0x0000000005370000-memory.dmp

                  Filesize

                  64KB