Analysis

  • max time kernel
    152s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 03:14

General

  • Target

    9543fe99870dd21ea09ad02decf0d7c578541aa63edfda834aed4099d7bd6043.exe

  • Size

    938KB

  • MD5

    9e63bbc5d0b9b7ea1a487f07d2ea8dce

  • SHA1

    97f2bb652c404705e3a3c3c5d1b670be294cf7f8

  • SHA256

    9543fe99870dd21ea09ad02decf0d7c578541aa63edfda834aed4099d7bd6043

  • SHA512

    7c720ffd65b2a6e98ca533b82669c7bf4f88ff07072f1cb1f5c87d88e7c18bcfa87f41154fc76e3f0f2cc3805fabec38c9305e0045f97e42da0ff097f2bc6d56

  • SSDEEP

    12288:dMryy90rRIlUwj8BECcV7/+IMvxWT/VnIZfRrgf+u655k8x4FVsyDMEsrJPBhdoE:vykyIaYIMvxWZnEef3Uke1ThuHuDT

Malware Config

Extracted

Family

redline

Botnet

tuxiu

C2

77.91.124.82:19071

Attributes
  • auth_value

    29610cdad07e7187eec70685a04b89fe

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 3 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9543fe99870dd21ea09ad02decf0d7c578541aa63edfda834aed4099d7bd6043.exe
    "C:\Users\Admin\AppData\Local\Temp\9543fe99870dd21ea09ad02decf0d7c578541aa63edfda834aed4099d7bd6043.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4960
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6586850.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6586850.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4984
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4875696.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4875696.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4608
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9648751.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9648751.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4464
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6858211.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6858211.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:4784
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:1884
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:1708
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 540
                  7⤵
                  • Program crash
                  PID:2400
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 540
                  7⤵
                  • Program crash
                  PID:3156
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4784 -s 552
                6⤵
                • Program crash
                PID:4804
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h4949529.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h4949529.exe
              5⤵
              • Executes dropped EXE
              PID:4188
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4784 -ip 4784
      1⤵
        PID:3708
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1708 -ip 1708
        1⤵
          PID:3020

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6586850.exe

                Filesize

                836KB

                MD5

                10e4445636953261dcd3916e404e9669

                SHA1

                f6fe621b3673053fdeddcee0cb41f956ddb264ba

                SHA256

                bc0ba9cf8ec1cae81691b0d273da0b37bdc82fa96836295e94c41c976545f738

                SHA512

                c9a3bb6b167b5fbcaa589239c0f3f1af1ffcb7c7997dfe99b3be2c506d37d2d441ffc555b6447e53bdc92fba5fa947593fba59016901c182eebd24c2aea19213

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6586850.exe

                Filesize

                836KB

                MD5

                10e4445636953261dcd3916e404e9669

                SHA1

                f6fe621b3673053fdeddcee0cb41f956ddb264ba

                SHA256

                bc0ba9cf8ec1cae81691b0d273da0b37bdc82fa96836295e94c41c976545f738

                SHA512

                c9a3bb6b167b5fbcaa589239c0f3f1af1ffcb7c7997dfe99b3be2c506d37d2d441ffc555b6447e53bdc92fba5fa947593fba59016901c182eebd24c2aea19213

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4875696.exe

                Filesize

                571KB

                MD5

                d921e103622fff240917a846905e0367

                SHA1

                6da8f192d7b68b2061d80c7d89af6bc54988265a

                SHA256

                2d9f282dfa4ec40d6cbad5a7acfd8c356a676b95b2e864f7915918c75ac4b10b

                SHA512

                f3735deb118098d4e1915cdce5cc09e9be9e70d22be81b41bb40f35a1d2cc0c3e433a56d995a5122af6ad5f3aaafda31224b58264faee39bd2566f9c7869c072

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4875696.exe

                Filesize

                571KB

                MD5

                d921e103622fff240917a846905e0367

                SHA1

                6da8f192d7b68b2061d80c7d89af6bc54988265a

                SHA256

                2d9f282dfa4ec40d6cbad5a7acfd8c356a676b95b2e864f7915918c75ac4b10b

                SHA512

                f3735deb118098d4e1915cdce5cc09e9be9e70d22be81b41bb40f35a1d2cc0c3e433a56d995a5122af6ad5f3aaafda31224b58264faee39bd2566f9c7869c072

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9648751.exe

                Filesize

                395KB

                MD5

                99fb9758ae7f6adb58e588b56b9b340f

                SHA1

                eb6202e28af4f30704c78052517f5bfe39786b69

                SHA256

                afdacf5c80fd032278555f1d553fdcdfcbd152e28901705c12cf545bbc2b604f

                SHA512

                37088cf8ceae08f0c439994d1bd04bc26370504ee313b320db1dfc035765aab331799ed73b1aafdc70a3c280d849a715aeafd1cfced9e783603bff9eff7d256c

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9648751.exe

                Filesize

                395KB

                MD5

                99fb9758ae7f6adb58e588b56b9b340f

                SHA1

                eb6202e28af4f30704c78052517f5bfe39786b69

                SHA256

                afdacf5c80fd032278555f1d553fdcdfcbd152e28901705c12cf545bbc2b604f

                SHA512

                37088cf8ceae08f0c439994d1bd04bc26370504ee313b320db1dfc035765aab331799ed73b1aafdc70a3c280d849a715aeafd1cfced9e783603bff9eff7d256c

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6858211.exe

                Filesize

                365KB

                MD5

                07759e4024c6bfc8bf4b745425aad345

                SHA1

                e5996d2841fab1e059383aa86ee6cd26b3e4813c

                SHA256

                a6bed99f313d230c432001be8dd5c9025d2977ec3a5777c1b08ccb6bf8705728

                SHA512

                9e38ccbaf46b8d348910f8cf779a71f78bf0d7512118f5fb0223142bcccf59a790b565977f3561754cf21524b09ee237c9966e09e1d0d2f3804901a299810e6f

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6858211.exe

                Filesize

                365KB

                MD5

                07759e4024c6bfc8bf4b745425aad345

                SHA1

                e5996d2841fab1e059383aa86ee6cd26b3e4813c

                SHA256

                a6bed99f313d230c432001be8dd5c9025d2977ec3a5777c1b08ccb6bf8705728

                SHA512

                9e38ccbaf46b8d348910f8cf779a71f78bf0d7512118f5fb0223142bcccf59a790b565977f3561754cf21524b09ee237c9966e09e1d0d2f3804901a299810e6f

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h4949529.exe

                Filesize

                174KB

                MD5

                4e6eb622c3522f583f253e7dce025ae6

                SHA1

                39084442a375d1f18787146a234e398a4c7e64e9

                SHA256

                57aa92e076d4bd6d64ba34e841eeab3be0e14a641684609428f304ebd4f2cb00

                SHA512

                e7172dd57c2c6beeba173d830163ec523ee0c6357b6bacf308f51c8ec4b0d8460e893b95b459a4daff8e50bfd7f32cd34864b64c6a100600124248b5e7368457

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h4949529.exe

                Filesize

                174KB

                MD5

                4e6eb622c3522f583f253e7dce025ae6

                SHA1

                39084442a375d1f18787146a234e398a4c7e64e9

                SHA256

                57aa92e076d4bd6d64ba34e841eeab3be0e14a641684609428f304ebd4f2cb00

                SHA512

                e7172dd57c2c6beeba173d830163ec523ee0c6357b6bacf308f51c8ec4b0d8460e893b95b459a4daff8e50bfd7f32cd34864b64c6a100600124248b5e7368457

              • memory/1708-30-0x0000000000400000-0x000000000042C000-memory.dmp

                Filesize

                176KB

              • memory/1708-32-0x0000000000400000-0x000000000042C000-memory.dmp

                Filesize

                176KB

              • memory/1708-29-0x0000000000400000-0x000000000042C000-memory.dmp

                Filesize

                176KB

              • memory/1708-28-0x0000000000400000-0x000000000042C000-memory.dmp

                Filesize

                176KB

              • memory/4188-39-0x000000000B220000-0x000000000B838000-memory.dmp

                Filesize

                6.1MB

              • memory/4188-37-0x0000000000F00000-0x0000000000F30000-memory.dmp

                Filesize

                192KB

              • memory/4188-38-0x00000000056E0000-0x00000000056E6000-memory.dmp

                Filesize

                24KB

              • memory/4188-36-0x0000000074540000-0x0000000074CF0000-memory.dmp

                Filesize

                7.7MB

              • memory/4188-40-0x000000000AD70000-0x000000000AE7A000-memory.dmp

                Filesize

                1.0MB

              • memory/4188-41-0x0000000005770000-0x0000000005780000-memory.dmp

                Filesize

                64KB

              • memory/4188-42-0x000000000ACB0000-0x000000000ACC2000-memory.dmp

                Filesize

                72KB

              • memory/4188-43-0x000000000AD10000-0x000000000AD4C000-memory.dmp

                Filesize

                240KB

              • memory/4188-44-0x000000000AE80000-0x000000000AECC000-memory.dmp

                Filesize

                304KB

              • memory/4188-45-0x0000000074540000-0x0000000074CF0000-memory.dmp

                Filesize

                7.7MB

              • memory/4188-46-0x0000000005770000-0x0000000005780000-memory.dmp

                Filesize

                64KB