Analysis

  • max time kernel
    147s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 22:48

General

  • Target

    43c2dc4d1595eae803346e406606bca2dac820fda89af1917d7762fb66cb2453.exe

  • Size

    956KB

  • MD5

    bc553eff5b4b8567f6691b3f345e890b

  • SHA1

    f3dfb7d6a0689549b9d924ec1972f79c49b9a96c

  • SHA256

    43c2dc4d1595eae803346e406606bca2dac820fda89af1917d7762fb66cb2453

  • SHA512

    99019020e34df2ee3b7fc32cdd4db53e8eda933d653d2a02933bb52bf1627a63be789abe914159331d41eb6e14b83286aac4ac9de2c1fddef1073cafc617186b

  • SSDEEP

    24576:KyolDkDv+9yI4KGT6QImxABsPh1xS0vWQwaOAIPfMS:RYkYyIFwR1TxBE

Malware Config

Extracted

Family

redline

Botnet

tuxiu

C2

77.91.124.82:19071

Attributes
  • auth_value

    29610cdad07e7187eec70685a04b89fe

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\43c2dc4d1595eae803346e406606bca2dac820fda89af1917d7762fb66cb2453.exe
    "C:\Users\Admin\AppData\Local\Temp\43c2dc4d1595eae803346e406606bca2dac820fda89af1917d7762fb66cb2453.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3640
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9643145.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9643145.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:404
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3806825.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3806825.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1776
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9683513.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9683513.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:5084
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3053198.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3053198.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:3644
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:4296
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4296 -s 540
                  7⤵
                  • Program crash
                  PID:1736
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 556
                6⤵
                • Program crash
                PID:852
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8820298.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8820298.exe
              5⤵
              • Executes dropped EXE
              PID:3932
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3644 -ip 3644
      1⤵
        PID:1952
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4296 -ip 4296
        1⤵
          PID:1716

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9643145.exe

          Filesize

          854KB

          MD5

          890333ca9002375508504fcb648ac858

          SHA1

          a38e843e37293f159e855b08a23efa19d3a80272

          SHA256

          0d4035174eac18016c596518166c080019dc4ca4d6431517d4eba610366630fa

          SHA512

          97965d7a1f455441b1c6334fff5bf42769bf0743e33020c6d1702b9887442f8f53f924543e7f727488b55cea70f09fd82e645040f8a9715111cf92da3d66016c

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9643145.exe

          Filesize

          854KB

          MD5

          890333ca9002375508504fcb648ac858

          SHA1

          a38e843e37293f159e855b08a23efa19d3a80272

          SHA256

          0d4035174eac18016c596518166c080019dc4ca4d6431517d4eba610366630fa

          SHA512

          97965d7a1f455441b1c6334fff5bf42769bf0743e33020c6d1702b9887442f8f53f924543e7f727488b55cea70f09fd82e645040f8a9715111cf92da3d66016c

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3806825.exe

          Filesize

          580KB

          MD5

          693c13b73b88d3a0b0700b46e9968354

          SHA1

          bee93506fd55ef121a60de7f54ea56b1564c70d0

          SHA256

          16a4f73018248b3856e5b57f6257b3c947c35f640b74841cd05c6e20638cf74c

          SHA512

          98b650f26aa0e5eb6a8d22e65a5d6a6d48202b72cb050f70d337f4e8ca9c131736bf936a5a257632bd3eee01c45b160c0f0a61aa6b98271d95e44257d0aba75d

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3806825.exe

          Filesize

          580KB

          MD5

          693c13b73b88d3a0b0700b46e9968354

          SHA1

          bee93506fd55ef121a60de7f54ea56b1564c70d0

          SHA256

          16a4f73018248b3856e5b57f6257b3c947c35f640b74841cd05c6e20638cf74c

          SHA512

          98b650f26aa0e5eb6a8d22e65a5d6a6d48202b72cb050f70d337f4e8ca9c131736bf936a5a257632bd3eee01c45b160c0f0a61aa6b98271d95e44257d0aba75d

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9683513.exe

          Filesize

          404KB

          MD5

          5fc9ce5165093ee758aab5555afd5ad0

          SHA1

          c4057c14f8ac5df3f4c6d3a1445bf641ba4dfed1

          SHA256

          57b841463b196aea4b9a71597786cd94847c0f6c945e404d418e5582c432316b

          SHA512

          900a9f64c2d30dd687ec680551e874dcc08127246ef72965a4599009e6c31e3134bb67e1ead669869d0f353d59c45acd6e48784432ab624783f371994fe9f733

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9683513.exe

          Filesize

          404KB

          MD5

          5fc9ce5165093ee758aab5555afd5ad0

          SHA1

          c4057c14f8ac5df3f4c6d3a1445bf641ba4dfed1

          SHA256

          57b841463b196aea4b9a71597786cd94847c0f6c945e404d418e5582c432316b

          SHA512

          900a9f64c2d30dd687ec680551e874dcc08127246ef72965a4599009e6c31e3134bb67e1ead669869d0f353d59c45acd6e48784432ab624783f371994fe9f733

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3053198.exe

          Filesize

          396KB

          MD5

          990f876fb678a1a40e7278c90be60411

          SHA1

          f193c3018da9e115ed2d122de9f7dd8f4d053437

          SHA256

          3da8b3174db326b473f2674d6e2776dbbc2b33d5ec003d152be9ae407f73738b

          SHA512

          ece7dcf156f1926d7fc64af33ea0fe70a99d9552165f6bf451622310b70a51b1022d58252dfec0aef4bd10062f895f21639c21bd5a33d1a2c9f709b9f0941084

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3053198.exe

          Filesize

          396KB

          MD5

          990f876fb678a1a40e7278c90be60411

          SHA1

          f193c3018da9e115ed2d122de9f7dd8f4d053437

          SHA256

          3da8b3174db326b473f2674d6e2776dbbc2b33d5ec003d152be9ae407f73738b

          SHA512

          ece7dcf156f1926d7fc64af33ea0fe70a99d9552165f6bf451622310b70a51b1022d58252dfec0aef4bd10062f895f21639c21bd5a33d1a2c9f709b9f0941084

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8820298.exe

          Filesize

          175KB

          MD5

          26214ea3d65522bbcfe9f4e660dd71b4

          SHA1

          c61d10e5011fbd52f10488c7fed1cdad4f8fc8bf

          SHA256

          f9c100765a20a02cdc05d6f5651279bd261d7156c55840f49cdc2daa577a7be0

          SHA512

          cf64daed825033f7fb145ef6452e217d8c7bb3c8a13b85173445e240608c5fe07fcac35a4ed6819158fbdde9633267bae59292b920a99645b52068ced55e7799

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8820298.exe

          Filesize

          175KB

          MD5

          26214ea3d65522bbcfe9f4e660dd71b4

          SHA1

          c61d10e5011fbd52f10488c7fed1cdad4f8fc8bf

          SHA256

          f9c100765a20a02cdc05d6f5651279bd261d7156c55840f49cdc2daa577a7be0

          SHA512

          cf64daed825033f7fb145ef6452e217d8c7bb3c8a13b85173445e240608c5fe07fcac35a4ed6819158fbdde9633267bae59292b920a99645b52068ced55e7799

        • memory/3932-39-0x0000000005EE0000-0x00000000064F8000-memory.dmp

          Filesize

          6.1MB

        • memory/3932-42-0x0000000005990000-0x00000000059A2000-memory.dmp

          Filesize

          72KB

        • memory/3932-46-0x00000000056B0000-0x00000000056C0000-memory.dmp

          Filesize

          64KB

        • memory/3932-45-0x00000000746A0000-0x0000000074E50000-memory.dmp

          Filesize

          7.7MB

        • memory/3932-36-0x0000000000EC0000-0x0000000000EF0000-memory.dmp

          Filesize

          192KB

        • memory/3932-37-0x00000000746A0000-0x0000000074E50000-memory.dmp

          Filesize

          7.7MB

        • memory/3932-44-0x0000000005B60000-0x0000000005BAC000-memory.dmp

          Filesize

          304KB

        • memory/3932-40-0x0000000005A50000-0x0000000005B5A000-memory.dmp

          Filesize

          1.0MB

        • memory/3932-38-0x0000000003170000-0x0000000003176000-memory.dmp

          Filesize

          24KB

        • memory/3932-41-0x00000000056B0000-0x00000000056C0000-memory.dmp

          Filesize

          64KB

        • memory/3932-43-0x00000000059F0000-0x0000000005A2C000-memory.dmp

          Filesize

          240KB

        • memory/4296-29-0x0000000000400000-0x000000000042C000-memory.dmp

          Filesize

          176KB

        • memory/4296-32-0x0000000000400000-0x000000000042C000-memory.dmp

          Filesize

          176KB

        • memory/4296-30-0x0000000000400000-0x000000000042C000-memory.dmp

          Filesize

          176KB

        • memory/4296-28-0x0000000000400000-0x000000000042C000-memory.dmp

          Filesize

          176KB