Analysis

  • max time kernel
    138s
  • max time network
    148s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250207-en
  • resource tags

    arch:x64arch:x86image:win11-20250207-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    08-02-2025 16:02

General

  • Target

    update.exe

  • Size

    1.4MB

  • MD5

    b5b47184175f3b329e06238e6f55f7bf

  • SHA1

    20516898407496ef5b6079c0ca60b620da946526

  • SHA256

    c6d4a545c17d3c8e6d2fa0b9ef4d915ff7d025a5d4cdf5fa9000de4c2a5725f6

  • SHA512

    d31b6406ce05761027c02f1b8cd1b78e449aff797560ed68c68a9ac2945ce6f700baa4ed659e10cfe5c0bdada5aab838eba77e2411277fea7653f283a59df6e8

  • SSDEEP

    24576:3xJWx7zJo9IanLupW1nmUxOAD7RsiHNRj7BYPkHNB4U:hEx73HSnpoi7zNp9YPnU

Malware Config

Extracted

Family

redline

Botnet

usa_installs

C2

87.120.113.144:57725

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Drops startup file 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3200
      • C:\Users\Admin\AppData\Local\Temp\update.exe
        "C:\Users\Admin\AppData\Local\Temp\update.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Drops startup file
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:800
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:5948
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations --always-read-main-dll --field-trial-handle=3840,i,16294233882891958660,8619871275160685719,262144 --variations-seed-version --mojo-platform-channel-handle=3844 /prefetch:14
      1⤵
        PID:4776
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NDVBQkQyREMtOUIxRi00NkU3LTkyQ0ItOTE3MjgyMTk3QUM3fSIgdXNlcmlkPSJ7QTlGRjcwM0YtMDM5Ri00MEY2LUE1QzItMzc0NTVBRjE3NTIxfSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7NDcwMTJBRkItRkI3Mi00QjI5LTgxREItRkI4MkUzQTNGMDI0fSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4yMjAwMC40OTMiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7RSt4YkF6Nlk2c1UxMjg5YlM2cWw0VlJMYmtqZkJVR1RNSnNqckhyNDRpST0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7OEE2OUQzNDUtRDU2NC00NjNjLUFGRjEtQTY5RDlFNTMwRjk2fSIgdmVyc2lvbj0iMTIzLjAuNjMxMi4xMjMiIG5leHR2ZXJzaW9uPSIiIGxhbmc9ImVuIiBicmFuZD0iR0dMUyIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjAiIGluc3RhbGxkYXRldGltZT0iMTczODk1NTAyNyIgb29iZV9pbnN0YWxsX3RpbWU9IjEzMzgzNDI3NjIxMTgwMDAwMCI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjIxNzk4NjIiIHN5c3RlbV91cHRpbWVfdGlja3M9IjUxNzUyODQxMzEiLz48L2FwcD48L3JlcXVlc3Q-
        1⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        PID:1956
      • C:\Windows\SysWOW64\wermgr.exe
        "C:\Windows\system32\wermgr.exe" "-outproc" "0" "1004" "1260" "1168" "1272" "0" "0" "0" "0" "0" "0" "0" "0"
        1⤵
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Enumerates system info in registry
        PID:2344
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NDVBQkQyREMtOUIxRi00NkU3LTkyQ0ItOTE3MjgyMTk3QUM3fSIgdXNlcmlkPSJ7QTlGRjcwM0YtMDM5Ri00MEY2LUE1QzItMzc0NTVBRjE3NTIxfSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9InsyNUI5OTIwOS03RDNDLTQwRUUtODAyQy1ERkZBMEJCMEJBOEF9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iMiIgcGh5c21lbW9yeT0iNCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjIyMDAwLjQ5MyIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiIGlzX2luX2xvY2tkb3duX21vZGU9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSImcXVvdDtWUFFvUDFGK2ZxMTV3UnpoMWtQTDRQTXBXaDhPUk1CNWl6dnJPQy9jaGpRPSZxdW90OyIvPjxhcHAgYXBwaWQ9Ins1NkVCMThGOC1CMDA4LTRDQkQtQjZEMi04Qzk3RkU3RTkwNjJ9IiB2ZXJzaW9uPSIxMzIuMC4yOTU3LjE0MCIgbmV4dHZlcnNpb249IiIgbGFuZz0iIiBicmFuZD0iSU5CWCIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjAiIGluc3RhbGxkYXRldGltZT0iMTczODk1NDU0OSI-PGV2ZW50IGV2ZW50dHlwZT0iMzIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjQiIHN5c3RlbV91cHRpbWVfdGlja3M9IjUxODI5NDA1MzIiLz48L2FwcD48L3JlcXVlc3Q-
        1⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        PID:4148
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NDVBQkQyREMtOUIxRi00NkU3LTkyQ0ItOTE3MjgyMTk3QUM3fSIgdXNlcmlkPSJ7QTlGRjcwM0YtMDM5Ri00MEY2LUE1QzItMzc0NTVBRjE3NTIxfSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9IntERUVEOUQxMS00RDExLTRBRDYtQjUxQy03QjM3NDhDOERBQTJ9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iMiIgcGh5c21lbW9yeT0iNCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjIyMDAwLjQ5MyIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiIGlzX2luX2xvY2tkb3duX21vZGU9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSImcXVvdDtWUFFvUDFGK2ZxMTV3UnpoMWtQTDRQTXBXaDhPUk1CNWl6dnJPQy9jaGpRPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGM0M0RkUwMC1FRkQ1LTQwM0ItOTU2OS0zOThBMjBGMUJBNEF9IiB2ZXJzaW9uPSIxLjMuMTk1LjQzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSIiIGJyYW5kPSJJTkJYIiBjbGllbnQ9IiIgaW5zdGFsbGFnZT0iMCIgY29ob3J0PSJycmZAMC40OCI-PHVwZGF0ZWNoZWNrLz48cGluZyByPSIxIiByZD0iNjYxMiIgcGluZ19mcmVzaG5lc3M9IntENTQ1NTQwOC0yQTMxLTQ4NjgtODE1My0zQjRDRDBDMzcxMDZ9Ii8-PC9hcHA-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-PHBpbmcgcj0iMSIgcmQ9IjY2MTIiIHBpbmdfZnJlc2huZXNzPSJ7NDYxMTFDMUMtMDc4Mi00NkI2LUJEQkItQkU2OUVCRTk0MjI4fSIvPjwvYXBwPjwvcmVxdWVzdD4
        1⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        PID:2796
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=5204,i,16294233882891958660,8619871275160685719,262144 --variations-seed-version --mojo-platform-channel-handle=5308 /prefetch:14
        1⤵
          PID:5944
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations --always-read-main-dll --field-trial-handle=2288,i,16294233882891958660,8619871275160685719,262144 --variations-seed-version --mojo-platform-channel-handle=4148 /prefetch:14
          1⤵
            PID:2796

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.log

            Filesize

            380KB

            MD5

            7c1a62306dad810a5c30fe29d0661762

            SHA1

            15e9f4897e9b0c808f459a04ebf559999879a145

            SHA256

            8415a056cd5a62ee9a90ebd9712ef48d6f6fe7b6b53b6e08593232c2723f8ec3

            SHA512

            8d7dbe0d76dfbc06f7e5adb310cb04f2af8d15562f044a6519bf424740e0a16e3f84707bccccf51b2aa0922a2b45adb9fb1bc3b2dec994500a1d2dbdd697d54d

          • C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.log

            Filesize

            406KB

            MD5

            8ffd250c62ada240e8658a3a73733241

            SHA1

            45f78e705b5d3aef9ebc0157f53e12def5af2c7f

            SHA256

            8f83d85010d5fd8fdd36e495cd21c54288efc64602bed88acd8902c6d7150091

            SHA512

            eaa2cd5f920bcbbc21c0559938e13757116d81a85b54e72cfd04859c8229d5315f8fb72399075f20e60c9be3469e82a106f55e60de0b4256a22dc0d01299de08

          • memory/800-0-0x000000007364E000-0x000000007364F000-memory.dmp

            Filesize

            4KB

          • memory/800-1-0x0000000000390000-0x00000000004FA000-memory.dmp

            Filesize

            1.4MB

          • memory/800-2-0x0000000004E10000-0x0000000004F16000-memory.dmp

            Filesize

            1.0MB

          • memory/800-14-0x0000000004E10000-0x0000000004F11000-memory.dmp

            Filesize

            1.0MB

          • memory/800-18-0x0000000004E10000-0x0000000004F11000-memory.dmp

            Filesize

            1.0MB

          • memory/800-59-0x0000000004E10000-0x0000000004F11000-memory.dmp

            Filesize

            1.0MB

          • memory/800-62-0x0000000004E10000-0x0000000004F11000-memory.dmp

            Filesize

            1.0MB

          • memory/800-56-0x0000000004E10000-0x0000000004F11000-memory.dmp

            Filesize

            1.0MB

          • memory/800-54-0x0000000004E10000-0x0000000004F11000-memory.dmp

            Filesize

            1.0MB

          • memory/800-52-0x0000000004E10000-0x0000000004F11000-memory.dmp

            Filesize

            1.0MB

          • memory/800-48-0x0000000004E10000-0x0000000004F11000-memory.dmp

            Filesize

            1.0MB

          • memory/800-44-0x0000000004E10000-0x0000000004F11000-memory.dmp

            Filesize

            1.0MB

          • memory/800-42-0x0000000004E10000-0x0000000004F11000-memory.dmp

            Filesize

            1.0MB

          • memory/800-66-0x0000000004E10000-0x0000000004F11000-memory.dmp

            Filesize

            1.0MB

          • memory/800-64-0x0000000004E10000-0x0000000004F11000-memory.dmp

            Filesize

            1.0MB

          • memory/800-40-0x0000000004E10000-0x0000000004F11000-memory.dmp

            Filesize

            1.0MB

          • memory/800-38-0x0000000004E10000-0x0000000004F11000-memory.dmp

            Filesize

            1.0MB

          • memory/800-34-0x0000000004E10000-0x0000000004F11000-memory.dmp

            Filesize

            1.0MB

          • memory/800-32-0x0000000004E10000-0x0000000004F11000-memory.dmp

            Filesize

            1.0MB

          • memory/800-30-0x0000000004E10000-0x0000000004F11000-memory.dmp

            Filesize

            1.0MB

          • memory/800-28-0x0000000004E10000-0x0000000004F11000-memory.dmp

            Filesize

            1.0MB

          • memory/800-26-0x0000000004E10000-0x0000000004F11000-memory.dmp

            Filesize

            1.0MB

          • memory/800-24-0x0000000004E10000-0x0000000004F11000-memory.dmp

            Filesize

            1.0MB

          • memory/800-60-0x0000000004E10000-0x0000000004F11000-memory.dmp

            Filesize

            1.0MB

          • memory/800-50-0x0000000004E10000-0x0000000004F11000-memory.dmp

            Filesize

            1.0MB

          • memory/800-46-0x0000000004E10000-0x0000000004F11000-memory.dmp

            Filesize

            1.0MB

          • memory/800-36-0x0000000004E10000-0x0000000004F11000-memory.dmp

            Filesize

            1.0MB

          • memory/800-22-0x0000000004E10000-0x0000000004F11000-memory.dmp

            Filesize

            1.0MB

          • memory/800-20-0x0000000004E10000-0x0000000004F11000-memory.dmp

            Filesize

            1.0MB

          • memory/800-16-0x0000000004E10000-0x0000000004F11000-memory.dmp

            Filesize

            1.0MB

          • memory/800-8-0x0000000004E10000-0x0000000004F11000-memory.dmp

            Filesize

            1.0MB

          • memory/800-6-0x0000000004E10000-0x0000000004F11000-memory.dmp

            Filesize

            1.0MB

          • memory/800-3-0x0000000004E10000-0x0000000004F11000-memory.dmp

            Filesize

            1.0MB

          • memory/800-12-0x0000000004E10000-0x0000000004F11000-memory.dmp

            Filesize

            1.0MB

          • memory/800-10-0x0000000004E10000-0x0000000004F11000-memory.dmp

            Filesize

            1.0MB

          • memory/800-4-0x0000000004E10000-0x0000000004F11000-memory.dmp

            Filesize

            1.0MB

          • memory/800-1325-0x0000000073640000-0x0000000073DF1000-memory.dmp

            Filesize

            7.7MB

          • memory/800-1326-0x0000000073640000-0x0000000073DF1000-memory.dmp

            Filesize

            7.7MB

          • memory/800-1327-0x0000000004FC0000-0x0000000005022000-memory.dmp

            Filesize

            392KB

          • memory/800-1328-0x0000000005180000-0x00000000051DE000-memory.dmp

            Filesize

            376KB

          • memory/800-1329-0x0000000005260000-0x00000000052AC000-memory.dmp

            Filesize

            304KB

          • memory/800-1330-0x0000000005350000-0x00000000053E2000-memory.dmp

            Filesize

            584KB

          • memory/800-1331-0x0000000005440000-0x00000000054A6000-memory.dmp

            Filesize

            408KB

          • memory/800-1332-0x0000000005FA0000-0x0000000006546000-memory.dmp

            Filesize

            5.6MB

          • memory/800-1333-0x0000000005A70000-0x0000000005AC4000-memory.dmp

            Filesize

            336KB

          • memory/800-1338-0x0000000073640000-0x0000000073DF1000-memory.dmp

            Filesize

            7.7MB

          • memory/800-1341-0x0000000073640000-0x0000000073DF1000-memory.dmp

            Filesize

            7.7MB

          • memory/800-1343-0x0000000073640000-0x0000000073DF1000-memory.dmp

            Filesize

            7.7MB

          • memory/800-1344-0x0000000073640000-0x0000000073DF1000-memory.dmp

            Filesize

            7.7MB

          • memory/5948-1345-0x0000000000400000-0x000000000041E000-memory.dmp

            Filesize

            120KB

          • memory/5948-1346-0x0000000073640000-0x0000000073DF1000-memory.dmp

            Filesize

            7.7MB

          • memory/5948-1347-0x00000000055C0000-0x0000000005BD8000-memory.dmp

            Filesize

            6.1MB

          • memory/5948-1348-0x0000000004F00000-0x0000000004F12000-memory.dmp

            Filesize

            72KB

          • memory/5948-1349-0x0000000004FA0000-0x0000000004FDC000-memory.dmp

            Filesize

            240KB

          • memory/5948-1350-0x0000000004F20000-0x0000000004F6C000-memory.dmp

            Filesize

            304KB

          • memory/5948-1351-0x0000000073640000-0x0000000073DF1000-memory.dmp

            Filesize

            7.7MB

          • memory/5948-1352-0x0000000005210000-0x000000000531A000-memory.dmp

            Filesize

            1.0MB

          • memory/5948-1364-0x0000000073640000-0x0000000073DF1000-memory.dmp

            Filesize

            7.7MB