Analysis

  • max time kernel
    156s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/03/2023, 23:09

General

  • Target

    015b69caeababf3442ee7faba18e5d7c7cb71cefa04eb9920fac690abcbc9862.exe

  • Size

    1.1MB

  • MD5

    9a5e0aa2e8e0ec4f393a866298d3f9fd

  • SHA1

    77f78fae174855eb5026ccc2fc0198d81fb769ec

  • SHA256

    015b69caeababf3442ee7faba18e5d7c7cb71cefa04eb9920fac690abcbc9862

  • SHA512

    aed5b154d610c8fbb352017e40b820d5767a988b2befafed87f0ee1dd597183cae3b7298a97fcea2e179f1013943bc1ab9828286942835ea1ed48110520e1032

  • SSDEEP

    24576:4yQi4UJAedLFS6BbC9l4cUqaMw87nU/XfL1CFOW/To0WsodnDiDkuGiy96BOq:/QBOSO+9O47nWho/To5nDimpw

Malware Config

Extracted

Family

redline

Botnet

rouch

C2

193.56.146.11:4162

Attributes
  • auth_value

    1b1735bcfc122c708eae27ca352568de

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\015b69caeababf3442ee7faba18e5d7c7cb71cefa04eb9920fac690abcbc9862.exe
    "C:\Users\Admin\AppData\Local\Temp\015b69caeababf3442ee7faba18e5d7c7cb71cefa04eb9920fac690abcbc9862.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1868
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plDP91BH70.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plDP91BH70.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2496
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plIp15Te47.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plIp15Te47.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4940
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pldY28Zr13.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pldY28Zr13.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:224
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plgF86mr58.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plgF86mr58.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:4244
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buxF63PS07.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buxF63PS07.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1492
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caEr93yE47.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caEr93yE47.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:1840

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plDP91BH70.exe

    Filesize

    996KB

    MD5

    8ec63652f1dbf8c0f4a1b23a0af11321

    SHA1

    98cd91de3e0875f62723a75a8ba4832fdad3f0eb

    SHA256

    6252ac83df204176c45ba10586da19e7172fa35128a4eea1a547da2ec9adcd30

    SHA512

    b0c8a451946fa0c21c9fb80a7b498c8e0108f917bb981296ec0a892e62075831ecd88cc8538f28e67b4a35fbca3b208efea5e4472897295f840db1ff0e76cff5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plDP91BH70.exe

    Filesize

    996KB

    MD5

    8ec63652f1dbf8c0f4a1b23a0af11321

    SHA1

    98cd91de3e0875f62723a75a8ba4832fdad3f0eb

    SHA256

    6252ac83df204176c45ba10586da19e7172fa35128a4eea1a547da2ec9adcd30

    SHA512

    b0c8a451946fa0c21c9fb80a7b498c8e0108f917bb981296ec0a892e62075831ecd88cc8538f28e67b4a35fbca3b208efea5e4472897295f840db1ff0e76cff5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plIp15Te47.exe

    Filesize

    892KB

    MD5

    a037a3cfc4d4268852f1d5cdd24e4e8d

    SHA1

    3817ddbd19a699e3fba4b592b5da7bf9b95680c4

    SHA256

    6b9e8c6f657be030df6cbe622fbaae21c97433c66a31b2eb7bf6bbc89d90eb92

    SHA512

    cb38d7f4532db5a1a7b3856b09f37e6f1511ebe54669126779d7eade72c50e5995eaf1538cfc42d211cd21e152654c8330c3a198c01e8b9a20f9b3d9dfc0e2cb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plIp15Te47.exe

    Filesize

    892KB

    MD5

    a037a3cfc4d4268852f1d5cdd24e4e8d

    SHA1

    3817ddbd19a699e3fba4b592b5da7bf9b95680c4

    SHA256

    6b9e8c6f657be030df6cbe622fbaae21c97433c66a31b2eb7bf6bbc89d90eb92

    SHA512

    cb38d7f4532db5a1a7b3856b09f37e6f1511ebe54669126779d7eade72c50e5995eaf1538cfc42d211cd21e152654c8330c3a198c01e8b9a20f9b3d9dfc0e2cb

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pldY28Zr13.exe

    Filesize

    666KB

    MD5

    20dc8fcad8bc3931466829ac3562f31f

    SHA1

    3b1fec0e6f95b489d5d7f0cc48ef769289928caa

    SHA256

    59d9e7e91a7719ac6009332cce33a15a9967d2330f5be0e06817c063f357ce47

    SHA512

    cc5489f2751206b93416ef59aba52ed60edbce117290f964d55629395802c37dfb2395428c24ec4cff30f1243fe97c0dee7a20b61d5906c4d199ade44bbd2076

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pldY28Zr13.exe

    Filesize

    666KB

    MD5

    20dc8fcad8bc3931466829ac3562f31f

    SHA1

    3b1fec0e6f95b489d5d7f0cc48ef769289928caa

    SHA256

    59d9e7e91a7719ac6009332cce33a15a9967d2330f5be0e06817c063f357ce47

    SHA512

    cc5489f2751206b93416ef59aba52ed60edbce117290f964d55629395802c37dfb2395428c24ec4cff30f1243fe97c0dee7a20b61d5906c4d199ade44bbd2076

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plgF86mr58.exe

    Filesize

    391KB

    MD5

    22cb0c5de08e41b10ecefafd8259f732

    SHA1

    bedd961c4f777ea7666e85551adace58f898fbe9

    SHA256

    60732770dc7149d1a21c0105c3c945a81a76b72b4949934d553f238e4d9dde6e

    SHA512

    07f12e16833db21b1c269e69c1ddaafa0f66834b91666d7e026065143dde521abe07f8dd3090e28f1e64f621128ac78b8e5b435185445aa3a2a725a542321685

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plgF86mr58.exe

    Filesize

    391KB

    MD5

    22cb0c5de08e41b10ecefafd8259f732

    SHA1

    bedd961c4f777ea7666e85551adace58f898fbe9

    SHA256

    60732770dc7149d1a21c0105c3c945a81a76b72b4949934d553f238e4d9dde6e

    SHA512

    07f12e16833db21b1c269e69c1ddaafa0f66834b91666d7e026065143dde521abe07f8dd3090e28f1e64f621128ac78b8e5b435185445aa3a2a725a542321685

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buxF63PS07.exe

    Filesize

    11KB

    MD5

    da24b2706a7e8dd8ffbacde3b39d72f9

    SHA1

    1476442694f0798b17310bad3bff3416ae133436

    SHA256

    887265dbcad5bcf84e4a8558ea5fe34ddffa581fd6a6e55544785aa1df22698a

    SHA512

    5c7d1071b4a9666350b8cefc8edde1e819a8b1fc98bc059eb940070f89eedb648aee7db12b2ad9213485880dcd74dadadabd25a05f9c6a61f05aba0c1ab0a3f2

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buxF63PS07.exe

    Filesize

    11KB

    MD5

    da24b2706a7e8dd8ffbacde3b39d72f9

    SHA1

    1476442694f0798b17310bad3bff3416ae133436

    SHA256

    887265dbcad5bcf84e4a8558ea5fe34ddffa581fd6a6e55544785aa1df22698a

    SHA512

    5c7d1071b4a9666350b8cefc8edde1e819a8b1fc98bc059eb940070f89eedb648aee7db12b2ad9213485880dcd74dadadabd25a05f9c6a61f05aba0c1ab0a3f2

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buxF63PS07.exe

    Filesize

    11KB

    MD5

    da24b2706a7e8dd8ffbacde3b39d72f9

    SHA1

    1476442694f0798b17310bad3bff3416ae133436

    SHA256

    887265dbcad5bcf84e4a8558ea5fe34ddffa581fd6a6e55544785aa1df22698a

    SHA512

    5c7d1071b4a9666350b8cefc8edde1e819a8b1fc98bc059eb940070f89eedb648aee7db12b2ad9213485880dcd74dadadabd25a05f9c6a61f05aba0c1ab0a3f2

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caEr93yE47.exe

    Filesize

    304KB

    MD5

    a562213cf445eaaf665759f35b4e91c2

    SHA1

    c37cb42d6b01cb56f0528499c8cb2d801176bf45

    SHA256

    457e081eb0be34e398946eda58be940aef13cd4390cb727cc848846833d307c3

    SHA512

    6944f4c08e8617f4ff143a96aeb4b4dc8c31562db7f6747bed36abb4116b540c181a5c42384505f1d059c3e3bbdf4f4ca3f74d0480b0e20efa28e1505f3b4fbd

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caEr93yE47.exe

    Filesize

    304KB

    MD5

    a562213cf445eaaf665759f35b4e91c2

    SHA1

    c37cb42d6b01cb56f0528499c8cb2d801176bf45

    SHA256

    457e081eb0be34e398946eda58be940aef13cd4390cb727cc848846833d307c3

    SHA512

    6944f4c08e8617f4ff143a96aeb4b4dc8c31562db7f6747bed36abb4116b540c181a5c42384505f1d059c3e3bbdf4f4ca3f74d0480b0e20efa28e1505f3b4fbd

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caEr93yE47.exe

    Filesize

    304KB

    MD5

    a562213cf445eaaf665759f35b4e91c2

    SHA1

    c37cb42d6b01cb56f0528499c8cb2d801176bf45

    SHA256

    457e081eb0be34e398946eda58be940aef13cd4390cb727cc848846833d307c3

    SHA512

    6944f4c08e8617f4ff143a96aeb4b4dc8c31562db7f6747bed36abb4116b540c181a5c42384505f1d059c3e3bbdf4f4ca3f74d0480b0e20efa28e1505f3b4fbd

  • memory/1492-168-0x0000000000170000-0x000000000017A000-memory.dmp

    Filesize

    40KB

  • memory/1840-174-0x0000000002200000-0x000000000224B000-memory.dmp

    Filesize

    300KB

  • memory/1840-175-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/1840-176-0x0000000004E60000-0x0000000005404000-memory.dmp

    Filesize

    5.6MB

  • memory/1840-177-0x0000000002820000-0x000000000285E000-memory.dmp

    Filesize

    248KB

  • memory/1840-178-0x0000000002820000-0x000000000285E000-memory.dmp

    Filesize

    248KB

  • memory/1840-180-0x0000000002820000-0x000000000285E000-memory.dmp

    Filesize

    248KB

  • memory/1840-182-0x0000000002820000-0x000000000285E000-memory.dmp

    Filesize

    248KB

  • memory/1840-184-0x0000000002820000-0x000000000285E000-memory.dmp

    Filesize

    248KB

  • memory/1840-186-0x0000000002820000-0x000000000285E000-memory.dmp

    Filesize

    248KB

  • memory/1840-188-0x0000000002820000-0x000000000285E000-memory.dmp

    Filesize

    248KB

  • memory/1840-190-0x0000000002820000-0x000000000285E000-memory.dmp

    Filesize

    248KB

  • memory/1840-192-0x0000000002820000-0x000000000285E000-memory.dmp

    Filesize

    248KB

  • memory/1840-194-0x0000000002820000-0x000000000285E000-memory.dmp

    Filesize

    248KB

  • memory/1840-196-0x0000000002820000-0x000000000285E000-memory.dmp

    Filesize

    248KB

  • memory/1840-198-0x0000000002820000-0x000000000285E000-memory.dmp

    Filesize

    248KB

  • memory/1840-200-0x0000000002820000-0x000000000285E000-memory.dmp

    Filesize

    248KB

  • memory/1840-202-0x0000000002820000-0x000000000285E000-memory.dmp

    Filesize

    248KB

  • memory/1840-204-0x0000000002820000-0x000000000285E000-memory.dmp

    Filesize

    248KB

  • memory/1840-206-0x0000000002820000-0x000000000285E000-memory.dmp

    Filesize

    248KB

  • memory/1840-208-0x0000000002820000-0x000000000285E000-memory.dmp

    Filesize

    248KB

  • memory/1840-210-0x0000000002820000-0x000000000285E000-memory.dmp

    Filesize

    248KB

  • memory/1840-212-0x0000000002820000-0x000000000285E000-memory.dmp

    Filesize

    248KB

  • memory/1840-214-0x0000000002820000-0x000000000285E000-memory.dmp

    Filesize

    248KB

  • memory/1840-216-0x0000000002820000-0x000000000285E000-memory.dmp

    Filesize

    248KB

  • memory/1840-218-0x0000000002820000-0x000000000285E000-memory.dmp

    Filesize

    248KB

  • memory/1840-220-0x0000000002820000-0x000000000285E000-memory.dmp

    Filesize

    248KB

  • memory/1840-222-0x0000000002820000-0x000000000285E000-memory.dmp

    Filesize

    248KB

  • memory/1840-224-0x0000000002820000-0x000000000285E000-memory.dmp

    Filesize

    248KB

  • memory/1840-226-0x0000000002820000-0x000000000285E000-memory.dmp

    Filesize

    248KB

  • memory/1840-228-0x0000000002820000-0x000000000285E000-memory.dmp

    Filesize

    248KB

  • memory/1840-230-0x0000000002820000-0x000000000285E000-memory.dmp

    Filesize

    248KB

  • memory/1840-232-0x0000000002820000-0x000000000285E000-memory.dmp

    Filesize

    248KB

  • memory/1840-234-0x0000000002820000-0x000000000285E000-memory.dmp

    Filesize

    248KB

  • memory/1840-236-0x0000000002820000-0x000000000285E000-memory.dmp

    Filesize

    248KB

  • memory/1840-238-0x0000000002820000-0x000000000285E000-memory.dmp

    Filesize

    248KB

  • memory/1840-240-0x0000000002820000-0x000000000285E000-memory.dmp

    Filesize

    248KB

  • memory/1840-1083-0x0000000005410000-0x0000000005A28000-memory.dmp

    Filesize

    6.1MB

  • memory/1840-1084-0x0000000005A30000-0x0000000005B3A000-memory.dmp

    Filesize

    1.0MB

  • memory/1840-1085-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

    Filesize

    72KB

  • memory/1840-1086-0x0000000004DE0000-0x0000000004E1C000-memory.dmp

    Filesize

    240KB

  • memory/1840-1087-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/1840-1089-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB