Analysis

  • max time kernel
    141s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2023 04:56

General

  • Target

    a0f8e2b26c6c20bd278a67028fd951544c26fe408490a65de58b8e8212ee9a9a.exe

  • Size

    1.0MB

  • MD5

    e2afde3ecee647cf8f500c6fd14cab42

  • SHA1

    9419ba9d941cb8ea3bf0b408ed21532cdfd1ab9f

  • SHA256

    a0f8e2b26c6c20bd278a67028fd951544c26fe408490a65de58b8e8212ee9a9a

  • SHA512

    6df25575750b5863f6a09be57837ab57c569992ca0323d510bbaebfa71c3de4c88d9251303b2b305ce7906600af3bb290629fc25b493edbd13f9a21a88114c96

  • SSDEEP

    12288:iMrIy90xp6n3TkjztmSR5TsMNAt9kMUAKYi0DgNleWGXyJUvK++8G/72yRr8+6dQ:iynotT9LAXnDOeruoERLWWlchFij

Malware Config

Extracted

Family

redline

Botnet

tuxiu

C2

77.91.124.82:19071

Attributes
  • auth_value

    29610cdad07e7187eec70685a04b89fe

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a0f8e2b26c6c20bd278a67028fd951544c26fe408490a65de58b8e8212ee9a9a.exe
    "C:\Users\Admin\AppData\Local\Temp\a0f8e2b26c6c20bd278a67028fd951544c26fe408490a65de58b8e8212ee9a9a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8784802.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8784802.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:844
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3121515.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3121515.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4824
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6729903.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6729903.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4192
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2312590.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2312590.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1592
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:3956
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 3956 -s 540
                  7⤵
                  • Program crash
                  PID:2768
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1592 -s 140
                6⤵
                • Program crash
                PID:4776
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8523904.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8523904.exe
              5⤵
              • Executes dropped EXE
              PID:3244
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1592 -ip 1592
      1⤵
        PID:4876
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3956 -ip 3956
        1⤵
          PID:4872

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8784802.exe

          Filesize

          932KB

          MD5

          8a7bf02e52bb78fa018970ca9ee2d889

          SHA1

          d7862d22da8e5846cccb6f209f479ad74ab961a5

          SHA256

          fc0650fb5d628973dd7207078a6c55dae21064ae46ed76579e7e33509b3ffed7

          SHA512

          753716a7037e2196e9044f59cd56ba8adef48ac658a684cad6d4cbba3848119a9e193852a27f25e74e753d9883f84fedcdcf3ae60db2323a1b41b69d2292a240

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8784802.exe

          Filesize

          932KB

          MD5

          8a7bf02e52bb78fa018970ca9ee2d889

          SHA1

          d7862d22da8e5846cccb6f209f479ad74ab961a5

          SHA256

          fc0650fb5d628973dd7207078a6c55dae21064ae46ed76579e7e33509b3ffed7

          SHA512

          753716a7037e2196e9044f59cd56ba8adef48ac658a684cad6d4cbba3848119a9e193852a27f25e74e753d9883f84fedcdcf3ae60db2323a1b41b69d2292a240

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3121515.exe

          Filesize

          628KB

          MD5

          328781ba4183c1b2dea95a2c9f4e2fb2

          SHA1

          c3d303d136968060d39a716d7680cd7cf52cec46

          SHA256

          0ab5e2c09f256d9c9fe0e575c8fa8680992199e563915603c64952e144f6e846

          SHA512

          16e62b9108aa0bee0ee04b2243cdbbf7a9cbc4923d35a16a0dce1736aa29936e8fbaadeaa8f6e5644736b82cb0326a52f33a13a695f782677e17c76a62715c5e

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3121515.exe

          Filesize

          628KB

          MD5

          328781ba4183c1b2dea95a2c9f4e2fb2

          SHA1

          c3d303d136968060d39a716d7680cd7cf52cec46

          SHA256

          0ab5e2c09f256d9c9fe0e575c8fa8680992199e563915603c64952e144f6e846

          SHA512

          16e62b9108aa0bee0ee04b2243cdbbf7a9cbc4923d35a16a0dce1736aa29936e8fbaadeaa8f6e5644736b82cb0326a52f33a13a695f782677e17c76a62715c5e

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6729903.exe

          Filesize

          442KB

          MD5

          1e83b4c180806e89335f699a7341ebfd

          SHA1

          87b80267b793382f37a0b7185af881ccca4d57ab

          SHA256

          2b062cb912bb28cbabf06b705f270e98ce3cf0d66ad8886e5c06f10876079bff

          SHA512

          6114e97c9a6278998c19bac9243bbbfb256718810b49bdf648a61c9a861f0145068ab2695b12ee1f0081234798dc3e110742add665beab642920100188e60534

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6729903.exe

          Filesize

          442KB

          MD5

          1e83b4c180806e89335f699a7341ebfd

          SHA1

          87b80267b793382f37a0b7185af881ccca4d57ab

          SHA256

          2b062cb912bb28cbabf06b705f270e98ce3cf0d66ad8886e5c06f10876079bff

          SHA512

          6114e97c9a6278998c19bac9243bbbfb256718810b49bdf648a61c9a861f0145068ab2695b12ee1f0081234798dc3e110742add665beab642920100188e60534

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2312590.exe

          Filesize

          700KB

          MD5

          0ee045f663d07dca4edf5b360e8809c5

          SHA1

          0e5a7e9c4670d81334a16ef818fa6c2219873a24

          SHA256

          4bdf30014565dcdd65617da362ca46f371380b749083cd843ac85465aa22c221

          SHA512

          b98057f5a2310aa75d9f48d8e9c1da87fe3cbe4b055d30bccfce601ef0fb0776d99536c56f2c086eeb21816b979b91109e2429554449fe7c0b8f7eba6929bc83

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2312590.exe

          Filesize

          700KB

          MD5

          0ee045f663d07dca4edf5b360e8809c5

          SHA1

          0e5a7e9c4670d81334a16ef818fa6c2219873a24

          SHA256

          4bdf30014565dcdd65617da362ca46f371380b749083cd843ac85465aa22c221

          SHA512

          b98057f5a2310aa75d9f48d8e9c1da87fe3cbe4b055d30bccfce601ef0fb0776d99536c56f2c086eeb21816b979b91109e2429554449fe7c0b8f7eba6929bc83

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8523904.exe

          Filesize

          174KB

          MD5

          d1dd45032d3c87eaee199d76ca2a7530

          SHA1

          e2e0b47a4efb66c0ce92b579598ed1dbcd5277f2

          SHA256

          1f3b74e6fb8faf0dc9003e66bdec35620483261e08544713dac8e3f10b682e54

          SHA512

          e0d7bce976f92ff51afd91fdd12baa3730b864e321b5ae4037e454d86afbc352ab5a8a7ef08c1cd959d8fbf7d5a988d9865fdf8edd6841d5e5ae8a799aefd623

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8523904.exe

          Filesize

          174KB

          MD5

          d1dd45032d3c87eaee199d76ca2a7530

          SHA1

          e2e0b47a4efb66c0ce92b579598ed1dbcd5277f2

          SHA256

          1f3b74e6fb8faf0dc9003e66bdec35620483261e08544713dac8e3f10b682e54

          SHA512

          e0d7bce976f92ff51afd91fdd12baa3730b864e321b5ae4037e454d86afbc352ab5a8a7ef08c1cd959d8fbf7d5a988d9865fdf8edd6841d5e5ae8a799aefd623

        • memory/3244-39-0x0000000005750000-0x0000000005D68000-memory.dmp

          Filesize

          6.1MB

        • memory/3244-40-0x0000000005240000-0x000000000534A000-memory.dmp

          Filesize

          1.0MB

        • memory/3244-46-0x0000000005120000-0x0000000005130000-memory.dmp

          Filesize

          64KB

        • memory/3244-45-0x0000000074190000-0x0000000074940000-memory.dmp

          Filesize

          7.7MB

        • memory/3244-36-0x00000000007C0000-0x00000000007F0000-memory.dmp

          Filesize

          192KB

        • memory/3244-37-0x0000000074190000-0x0000000074940000-memory.dmp

          Filesize

          7.7MB

        • memory/3244-44-0x00000000051F0000-0x000000000523C000-memory.dmp

          Filesize

          304KB

        • memory/3244-43-0x00000000051B0000-0x00000000051EC000-memory.dmp

          Filesize

          240KB

        • memory/3244-38-0x0000000001070000-0x0000000001076000-memory.dmp

          Filesize

          24KB

        • memory/3244-42-0x0000000005120000-0x0000000005130000-memory.dmp

          Filesize

          64KB

        • memory/3244-41-0x0000000005150000-0x0000000005162000-memory.dmp

          Filesize

          72KB

        • memory/3956-29-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/3956-32-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/3956-30-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/3956-28-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB