Analysis

  • max time kernel
    137s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 04:54

General

  • Target

    486d802e6f6ffd2647f18868f7841ae7f1ff018adba25344a82a08acfbc7e0a8.exe

  • Size

    1.0MB

  • MD5

    4c77a170f32fd3bdbd05377a1e17bd82

  • SHA1

    36b4c1c8bd3014d92884e6f8e0c7de55cd63c5ec

  • SHA256

    486d802e6f6ffd2647f18868f7841ae7f1ff018adba25344a82a08acfbc7e0a8

  • SHA512

    5331f8c1c0c1161575f265444b5acb685af5d4d0af485eb059ae2d2426ebabbded68f40c7a1548116533754c4b5d77e991c849f02b87ada77a1d4a60001bb36a

  • SSDEEP

    24576:/yB+ePuQ/7S4Z17W5YtICxhXHaRuGaXQf:Kke9zC5iIMH+Eg

Malware Config

Extracted

Family

redline

Botnet

tuxiu

C2

77.91.124.82:19071

Attributes
  • auth_value

    29610cdad07e7187eec70685a04b89fe

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\486d802e6f6ffd2647f18868f7841ae7f1ff018adba25344a82a08acfbc7e0a8.exe
    "C:\Users\Admin\AppData\Local\Temp\486d802e6f6ffd2647f18868f7841ae7f1ff018adba25344a82a08acfbc7e0a8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:676
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4541201.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4541201.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1328
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6482044.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6482044.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4464
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7197008.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7197008.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2848
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2159128.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2159128.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:5056
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:1628
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 540
                  7⤵
                  • Program crash
                  PID:3252
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 136
                6⤵
                • Program crash
                PID:4884
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h6175226.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h6175226.exe
              5⤵
              • Executes dropped EXE
              PID:2392
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 5056 -ip 5056
      1⤵
        PID:2328
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1628 -ip 1628
        1⤵
          PID:4952

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4541201.exe

                Filesize

                932KB

                MD5

                1f8cb501734a3c4b435833bddd8c047a

                SHA1

                b36cfa6d3060d5f27e55c6a893841acc6c6ee0d1

                SHA256

                d403acfb9efa6f07e0de2b7141da3b7b0123bfff89bc9c9a3ad1c5dfa41e7031

                SHA512

                0ecaffbee321d132d04a5e0bd53c3f08244f513cc7c4629bf53b6f54054bb6548e42ddee943ff4b368951d6d83c9e1c953c9c4f434e560b4e6bb70e9fb0dba0f

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4541201.exe

                Filesize

                932KB

                MD5

                1f8cb501734a3c4b435833bddd8c047a

                SHA1

                b36cfa6d3060d5f27e55c6a893841acc6c6ee0d1

                SHA256

                d403acfb9efa6f07e0de2b7141da3b7b0123bfff89bc9c9a3ad1c5dfa41e7031

                SHA512

                0ecaffbee321d132d04a5e0bd53c3f08244f513cc7c4629bf53b6f54054bb6548e42ddee943ff4b368951d6d83c9e1c953c9c4f434e560b4e6bb70e9fb0dba0f

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6482044.exe

                Filesize

                628KB

                MD5

                5a52cd501bd5949ed07943e5bba9eacb

                SHA1

                872dd0e48ed629c25b7dfd7024e9947cb6618887

                SHA256

                408dc9c90ccd7f73b54240c85de2948c3b5684d4e594b49cbd5b87ccd303d36b

                SHA512

                19cc6680233cbca2184b5494a921b63c27d3600543286c73cee4d723d626f7a71a1a82fdcc727872b734b02016148904d8ae3daf32edad15ef63dba4d9fece14

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6482044.exe

                Filesize

                628KB

                MD5

                5a52cd501bd5949ed07943e5bba9eacb

                SHA1

                872dd0e48ed629c25b7dfd7024e9947cb6618887

                SHA256

                408dc9c90ccd7f73b54240c85de2948c3b5684d4e594b49cbd5b87ccd303d36b

                SHA512

                19cc6680233cbca2184b5494a921b63c27d3600543286c73cee4d723d626f7a71a1a82fdcc727872b734b02016148904d8ae3daf32edad15ef63dba4d9fece14

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7197008.exe

                Filesize

                443KB

                MD5

                033bf0754723e9bfcafede0fa2a6940c

                SHA1

                404488e3b9fd71036ee29d81d93d8f8ce4a6ca2a

                SHA256

                c27f7be4cadd24a35393a22f8d4f2640bbed6ce8130d792e183d0ad119b238d6

                SHA512

                811c3c8af438ab39410c83176715ba6fab756595675d89f4527e1e0e83c50e69fc674e6c072535e9045e5333b02f9d65ab5a5f6dc800ac6e8bdd074d7273b40a

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7197008.exe

                Filesize

                443KB

                MD5

                033bf0754723e9bfcafede0fa2a6940c

                SHA1

                404488e3b9fd71036ee29d81d93d8f8ce4a6ca2a

                SHA256

                c27f7be4cadd24a35393a22f8d4f2640bbed6ce8130d792e183d0ad119b238d6

                SHA512

                811c3c8af438ab39410c83176715ba6fab756595675d89f4527e1e0e83c50e69fc674e6c072535e9045e5333b02f9d65ab5a5f6dc800ac6e8bdd074d7273b40a

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2159128.exe

                Filesize

                700KB

                MD5

                c691e82760eac0752db2d5dbf44179c1

                SHA1

                8c404e7c09d23990c0982c43691e1b4af6531034

                SHA256

                adb8b86aee4a26be5c24703643a903da0b0a7215273f3cefc34a5191ab02b1ae

                SHA512

                d77230e701a1bc8fc9167b36b98011ff09384e66f79c270bb4255fa1a919eccf5ffd925dc65488ecb2d70cdc5460f1ca31ba5a8cf84ce0704228b76a550a85b5

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2159128.exe

                Filesize

                700KB

                MD5

                c691e82760eac0752db2d5dbf44179c1

                SHA1

                8c404e7c09d23990c0982c43691e1b4af6531034

                SHA256

                adb8b86aee4a26be5c24703643a903da0b0a7215273f3cefc34a5191ab02b1ae

                SHA512

                d77230e701a1bc8fc9167b36b98011ff09384e66f79c270bb4255fa1a919eccf5ffd925dc65488ecb2d70cdc5460f1ca31ba5a8cf84ce0704228b76a550a85b5

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h6175226.exe

                Filesize

                174KB

                MD5

                e8c7e2f06bf01cbffc4f902c8c38842b

                SHA1

                a3be335591da911731fbaf0b57207ebc5b46f5d4

                SHA256

                a010feff465fffb1824d2d4b18edbbabbc2b0718eb8d921c02e3b5fb2f02500c

                SHA512

                7b6794f6ee4fe4a73b235ef83f586769084d3e5d3c0ef117b810e48e9be02d28f7434e210265f3e1c34dbb75160584e3bf6a1f58e36e71b46dfa972c591ee109

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h6175226.exe

                Filesize

                174KB

                MD5

                e8c7e2f06bf01cbffc4f902c8c38842b

                SHA1

                a3be335591da911731fbaf0b57207ebc5b46f5d4

                SHA256

                a010feff465fffb1824d2d4b18edbbabbc2b0718eb8d921c02e3b5fb2f02500c

                SHA512

                7b6794f6ee4fe4a73b235ef83f586769084d3e5d3c0ef117b810e48e9be02d28f7434e210265f3e1c34dbb75160584e3bf6a1f58e36e71b46dfa972c591ee109

              • memory/1628-30-0x0000000000400000-0x000000000042F000-memory.dmp

                Filesize

                188KB

              • memory/1628-29-0x0000000000400000-0x000000000042F000-memory.dmp

                Filesize

                188KB

              • memory/1628-32-0x0000000000400000-0x000000000042F000-memory.dmp

                Filesize

                188KB

              • memory/1628-28-0x0000000000400000-0x000000000042F000-memory.dmp

                Filesize

                188KB

              • memory/2392-39-0x0000000074B00000-0x00000000752B0000-memory.dmp

                Filesize

                7.7MB

              • memory/2392-37-0x0000000000F00000-0x0000000000F30000-memory.dmp

                Filesize

                192KB

              • memory/2392-38-0x0000000003330000-0x0000000003336000-memory.dmp

                Filesize

                24KB

              • memory/2392-36-0x0000000074B00000-0x00000000752B0000-memory.dmp

                Filesize

                7.7MB

              • memory/2392-40-0x000000000B340000-0x000000000B958000-memory.dmp

                Filesize

                6.1MB

              • memory/2392-41-0x000000000AEB0000-0x000000000AFBA000-memory.dmp

                Filesize

                1.0MB

              • memory/2392-42-0x0000000005990000-0x00000000059A0000-memory.dmp

                Filesize

                64KB

              • memory/2392-43-0x000000000ADF0000-0x000000000AE02000-memory.dmp

                Filesize

                72KB

              • memory/2392-44-0x000000000AE50000-0x000000000AE8C000-memory.dmp

                Filesize

                240KB

              • memory/2392-45-0x000000000AFC0000-0x000000000B00C000-memory.dmp

                Filesize

                304KB

              • memory/2392-46-0x0000000005990000-0x00000000059A0000-memory.dmp

                Filesize

                64KB