Analysis

  • max time kernel
    146s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 05:01

General

  • Target

    cbd401468253a8b9e9f335b9f23c251c05c3a47eaa229a157559a16d33d2e93a.exe

  • Size

    1.0MB

  • MD5

    5bea432079dad8cfe031acf040e7a995

  • SHA1

    179c49408b68c57b7f8b3e394aedb25238ab1533

  • SHA256

    cbd401468253a8b9e9f335b9f23c251c05c3a47eaa229a157559a16d33d2e93a

  • SHA512

    bcd8cccc91a517b8647625f95a50576864cac30d91f9d359422ec800aad833ec242d419c6827ccc17a9d26b85a0bd2db9b8eab17a5b00520a4a65f564be0a71a

  • SSDEEP

    24576:HyuSR54Fwj6xtr6vqpVHvno2rtMRb/bj5H/TtzrY8:Sus5Ewj6xwvUVHvyBZ/Tt3Y

Malware Config

Extracted

Family

redline

Botnet

tuxiu

C2

77.91.124.82:19071

Attributes
  • auth_value

    29610cdad07e7187eec70685a04b89fe

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cbd401468253a8b9e9f335b9f23c251c05c3a47eaa229a157559a16d33d2e93a.exe
    "C:\Users\Admin\AppData\Local\Temp\cbd401468253a8b9e9f335b9f23c251c05c3a47eaa229a157559a16d33d2e93a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4328
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7232108.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7232108.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5064
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6112915.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6112915.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3400
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6846176.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6846176.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2916
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8921218.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8921218.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:4668
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:2000
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 540
                  7⤵
                  • Program crash
                  PID:3388
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4668 -s 580
                6⤵
                • Program crash
                PID:2768
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h6842287.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h6842287.exe
              5⤵
              • Executes dropped EXE
              PID:632
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4668 -ip 4668
      1⤵
        PID:848
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2000 -ip 2000
        1⤵
          PID:3736

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7232108.exe

          Filesize

          933KB

          MD5

          47daf0f76da62686a01ad5d45937f50b

          SHA1

          c532c56eba3cd18e7f9c2d06467033873c3772d1

          SHA256

          b4e71cc5c18f9df4e158da19c7ec8fd131988399586adb5b1a26a0aca0a21c36

          SHA512

          bf931134e6db3bd30793bcba92d01c3e8c16eb22bba1b842951847bcb35c706d15218e3835761d6242d20619c6c484dddc6d78526b9fa77c414869c19b2317bd

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7232108.exe

          Filesize

          933KB

          MD5

          47daf0f76da62686a01ad5d45937f50b

          SHA1

          c532c56eba3cd18e7f9c2d06467033873c3772d1

          SHA256

          b4e71cc5c18f9df4e158da19c7ec8fd131988399586adb5b1a26a0aca0a21c36

          SHA512

          bf931134e6db3bd30793bcba92d01c3e8c16eb22bba1b842951847bcb35c706d15218e3835761d6242d20619c6c484dddc6d78526b9fa77c414869c19b2317bd

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6112915.exe

          Filesize

          629KB

          MD5

          06f7b87e2a344b07ea8ba74425f4f077

          SHA1

          1746cc165cdfe6a1f5b364c2d7ed5ff5f245b3ff

          SHA256

          5b09f5971e7a59b64d398c770cea5983faef8120107f2c13d966056435d939ea

          SHA512

          84cc2dd5df2b5b16ca6174904dd8c07ee1cd63fb37a618dd36f2f90a1173eed397d5e4fed9ffae19550b756e82d1c4f4f3e589892f11e9f406f36ee920fcf13a

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6112915.exe

          Filesize

          629KB

          MD5

          06f7b87e2a344b07ea8ba74425f4f077

          SHA1

          1746cc165cdfe6a1f5b364c2d7ed5ff5f245b3ff

          SHA256

          5b09f5971e7a59b64d398c770cea5983faef8120107f2c13d966056435d939ea

          SHA512

          84cc2dd5df2b5b16ca6174904dd8c07ee1cd63fb37a618dd36f2f90a1173eed397d5e4fed9ffae19550b756e82d1c4f4f3e589892f11e9f406f36ee920fcf13a

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6846176.exe

          Filesize

          443KB

          MD5

          76349ec5228153f1a64bf179aed3872b

          SHA1

          eb1a97515e102a431b3f7c788bead674585c8d06

          SHA256

          e2b126c330ecebad60abc81aa12ec4f3522b4f857a086cc7bc228fcd66503d5c

          SHA512

          88f151a3390eed509efede84e86a4684baa1a3ef21537596a985bc4e1fa7eedf09e13679284606a6dd7d4a50029f0ef6ec7a5a7fb117d5bc3d8fe86f66ca7056

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6846176.exe

          Filesize

          443KB

          MD5

          76349ec5228153f1a64bf179aed3872b

          SHA1

          eb1a97515e102a431b3f7c788bead674585c8d06

          SHA256

          e2b126c330ecebad60abc81aa12ec4f3522b4f857a086cc7bc228fcd66503d5c

          SHA512

          88f151a3390eed509efede84e86a4684baa1a3ef21537596a985bc4e1fa7eedf09e13679284606a6dd7d4a50029f0ef6ec7a5a7fb117d5bc3d8fe86f66ca7056

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8921218.exe

          Filesize

          700KB

          MD5

          ad11342d70792eab10dbb7d14afefb95

          SHA1

          958f5cfae062a5015307d100b7c0fab8c88f89ac

          SHA256

          c38b8655ddbfeb902939f58d5e79114f7e5091d56227373c55f0fc2ba438cfda

          SHA512

          bdd27c4630a10d4f8eba1f1856fb90bfdc0c1d2dae3060fb3419e7e4e0d3553e17679382c2b50518e4b481ab9e3b50cfa84cdbe139f82c8a220881fce75bdf25

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8921218.exe

          Filesize

          700KB

          MD5

          ad11342d70792eab10dbb7d14afefb95

          SHA1

          958f5cfae062a5015307d100b7c0fab8c88f89ac

          SHA256

          c38b8655ddbfeb902939f58d5e79114f7e5091d56227373c55f0fc2ba438cfda

          SHA512

          bdd27c4630a10d4f8eba1f1856fb90bfdc0c1d2dae3060fb3419e7e4e0d3553e17679382c2b50518e4b481ab9e3b50cfa84cdbe139f82c8a220881fce75bdf25

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h6842287.exe

          Filesize

          174KB

          MD5

          3e9139392697dcae26c7f98ecace0547

          SHA1

          42e1a28bc44064f270df6f8bbe8ce936355545b3

          SHA256

          dc5d0eb022d56d0fe9eea5b3e5b4fcff7d49295ec67df93aef4f2a767c81bebd

          SHA512

          076e6b16809b3ffaeaee1022e937f248db8f9dda792c0963ab334bc70c29556e4e666d3cac8e32ebbd448092e398336a0c4212d0fd0f5935de0214d65e162748

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h6842287.exe

          Filesize

          174KB

          MD5

          3e9139392697dcae26c7f98ecace0547

          SHA1

          42e1a28bc44064f270df6f8bbe8ce936355545b3

          SHA256

          dc5d0eb022d56d0fe9eea5b3e5b4fcff7d49295ec67df93aef4f2a767c81bebd

          SHA512

          076e6b16809b3ffaeaee1022e937f248db8f9dda792c0963ab334bc70c29556e4e666d3cac8e32ebbd448092e398336a0c4212d0fd0f5935de0214d65e162748

        • memory/632-39-0x00000000052D0000-0x00000000058E8000-memory.dmp

          Filesize

          6.1MB

        • memory/632-41-0x0000000004CD0000-0x0000000004CE2000-memory.dmp

          Filesize

          72KB

        • memory/632-46-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

          Filesize

          64KB

        • memory/632-45-0x0000000073C50000-0x0000000074400000-memory.dmp

          Filesize

          7.7MB

        • memory/632-36-0x0000000000200000-0x0000000000230000-memory.dmp

          Filesize

          192KB

        • memory/632-37-0x0000000073C50000-0x0000000074400000-memory.dmp

          Filesize

          7.7MB

        • memory/632-44-0x0000000004D70000-0x0000000004DBC000-memory.dmp

          Filesize

          304KB

        • memory/632-40-0x0000000004DC0000-0x0000000004ECA000-memory.dmp

          Filesize

          1.0MB

        • memory/632-38-0x0000000004B20000-0x0000000004B26000-memory.dmp

          Filesize

          24KB

        • memory/632-42-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

          Filesize

          64KB

        • memory/632-43-0x0000000004D30000-0x0000000004D6C000-memory.dmp

          Filesize

          240KB

        • memory/2000-29-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2000-32-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2000-30-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2000-28-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB