Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-03-2023 16:42

General

  • Target

    0007472c64432eded91d353ac7cfc215964619308acdb6644092b127a29fe26f.exe

  • Size

    526KB

  • MD5

    83dd5cb850e58979d119368cf8631d28

  • SHA1

    1b6ed0f1e80d53fbab66c4fc344f46b0ff49dab2

  • SHA256

    0007472c64432eded91d353ac7cfc215964619308acdb6644092b127a29fe26f

  • SHA512

    2cde12c2870d05c47b5bbf4a699822f6bd081fc2a7837b5dee7eef3f401c676653acd3cc1f721d8f856ff825d418776c03ed3dfc98bad656c00432b920c78a54

  • SSDEEP

    12288:iMrhy90hHHKhd3XL4azRjRuhO16yPYFvfH4Rl:Tymo7zxRhVEnHyl

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0007472c64432eded91d353ac7cfc215964619308acdb6644092b127a29fe26f.exe
    "C:\Users\Admin\AppData\Local\Temp\0007472c64432eded91d353ac7cfc215964619308acdb6644092b127a29fe26f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:448
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhix8855bo.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhix8855bo.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5096
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf18xQ12jA67.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf18xQ12jA67.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1776
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf81rA92iO15.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf81rA92iO15.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4612

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhix8855bo.exe

    Filesize

    381KB

    MD5

    dcf2d89ee39bdd29d076b683ceb8ce63

    SHA1

    0e4abe67ac8a8384218bc5bafa06b17e961c4f66

    SHA256

    f9766f529cb7dc68acf71ce2678229c01372d3b8456a2bbad30e50761dad958f

    SHA512

    b7b79fcd74dee7d12ec7001f333ea29b6a7d774c15723877625a9fc26e381b6dc247b188580b7e152ac7cb87035e321ce26dd8f92197aff1bf7debfcaf379c9a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhix8855bo.exe

    Filesize

    381KB

    MD5

    dcf2d89ee39bdd29d076b683ceb8ce63

    SHA1

    0e4abe67ac8a8384218bc5bafa06b17e961c4f66

    SHA256

    f9766f529cb7dc68acf71ce2678229c01372d3b8456a2bbad30e50761dad958f

    SHA512

    b7b79fcd74dee7d12ec7001f333ea29b6a7d774c15723877625a9fc26e381b6dc247b188580b7e152ac7cb87035e321ce26dd8f92197aff1bf7debfcaf379c9a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf18xQ12jA67.exe

    Filesize

    11KB

    MD5

    6ba3fe925b93be5858cbb7d010a7aa49

    SHA1

    dac6a8b93dd8a51725bfbd463d7448005a671a3e

    SHA256

    9b35c066b4fbb34794dfec3561196e9ac4fe056cc45753f8bda84b989568abc6

    SHA512

    79d24fc293cdcd5d7b8b58d483de763298060ef822a4e883b9606beb42e068d24710115ddf829804f8320edc87c964bdc097718102fb53b708cb94d0cad2c5ae

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf18xQ12jA67.exe

    Filesize

    11KB

    MD5

    6ba3fe925b93be5858cbb7d010a7aa49

    SHA1

    dac6a8b93dd8a51725bfbd463d7448005a671a3e

    SHA256

    9b35c066b4fbb34794dfec3561196e9ac4fe056cc45753f8bda84b989568abc6

    SHA512

    79d24fc293cdcd5d7b8b58d483de763298060ef822a4e883b9606beb42e068d24710115ddf829804f8320edc87c964bdc097718102fb53b708cb94d0cad2c5ae

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf81rA92iO15.exe

    Filesize

    292KB

    MD5

    bd407beaed8912f6f9f5b269e5a85686

    SHA1

    f9d8fc6c0a1ca9a1e0af1ca278f629994df04b1b

    SHA256

    3fb5f126878146985387aac28dc8b1c17d8ee6ae3630a0c754c135138180d367

    SHA512

    79eca3bfa76f241986888271cbcf4858a6eb2c729b1dbebcf000ae13b9fb1e981360c930e40c39437c027794ecce33d9302e6db93d65208ad6bb458aa1b2ff72

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf81rA92iO15.exe

    Filesize

    292KB

    MD5

    bd407beaed8912f6f9f5b269e5a85686

    SHA1

    f9d8fc6c0a1ca9a1e0af1ca278f629994df04b1b

    SHA256

    3fb5f126878146985387aac28dc8b1c17d8ee6ae3630a0c754c135138180d367

    SHA512

    79eca3bfa76f241986888271cbcf4858a6eb2c729b1dbebcf000ae13b9fb1e981360c930e40c39437c027794ecce33d9302e6db93d65208ad6bb458aa1b2ff72

  • memory/1776-147-0x00000000002B0000-0x00000000002BA000-memory.dmp

    Filesize

    40KB

  • memory/4612-153-0x0000000004D30000-0x00000000052D4000-memory.dmp

    Filesize

    5.6MB

  • memory/4612-154-0x0000000004C80000-0x0000000004CBE000-memory.dmp

    Filesize

    248KB

  • memory/4612-156-0x0000000004C80000-0x0000000004CBE000-memory.dmp

    Filesize

    248KB

  • memory/4612-157-0x0000000004D20000-0x0000000004D30000-memory.dmp

    Filesize

    64KB

  • memory/4612-159-0x0000000004D20000-0x0000000004D30000-memory.dmp

    Filesize

    64KB

  • memory/4612-160-0x0000000004C80000-0x0000000004CBE000-memory.dmp

    Filesize

    248KB

  • memory/4612-155-0x0000000000700000-0x000000000074B000-memory.dmp

    Filesize

    300KB

  • memory/4612-162-0x0000000004C80000-0x0000000004CBE000-memory.dmp

    Filesize

    248KB

  • memory/4612-164-0x0000000004C80000-0x0000000004CBE000-memory.dmp

    Filesize

    248KB

  • memory/4612-166-0x0000000004C80000-0x0000000004CBE000-memory.dmp

    Filesize

    248KB

  • memory/4612-168-0x0000000004C80000-0x0000000004CBE000-memory.dmp

    Filesize

    248KB

  • memory/4612-170-0x0000000004C80000-0x0000000004CBE000-memory.dmp

    Filesize

    248KB

  • memory/4612-172-0x0000000004C80000-0x0000000004CBE000-memory.dmp

    Filesize

    248KB

  • memory/4612-174-0x0000000004C80000-0x0000000004CBE000-memory.dmp

    Filesize

    248KB

  • memory/4612-176-0x0000000004C80000-0x0000000004CBE000-memory.dmp

    Filesize

    248KB

  • memory/4612-178-0x0000000004C80000-0x0000000004CBE000-memory.dmp

    Filesize

    248KB

  • memory/4612-180-0x0000000004C80000-0x0000000004CBE000-memory.dmp

    Filesize

    248KB

  • memory/4612-182-0x0000000004C80000-0x0000000004CBE000-memory.dmp

    Filesize

    248KB

  • memory/4612-184-0x0000000004C80000-0x0000000004CBE000-memory.dmp

    Filesize

    248KB

  • memory/4612-186-0x0000000004C80000-0x0000000004CBE000-memory.dmp

    Filesize

    248KB

  • memory/4612-188-0x0000000004C80000-0x0000000004CBE000-memory.dmp

    Filesize

    248KB

  • memory/4612-190-0x0000000004C80000-0x0000000004CBE000-memory.dmp

    Filesize

    248KB

  • memory/4612-192-0x0000000004C80000-0x0000000004CBE000-memory.dmp

    Filesize

    248KB

  • memory/4612-194-0x0000000004C80000-0x0000000004CBE000-memory.dmp

    Filesize

    248KB

  • memory/4612-196-0x0000000004C80000-0x0000000004CBE000-memory.dmp

    Filesize

    248KB

  • memory/4612-198-0x0000000004C80000-0x0000000004CBE000-memory.dmp

    Filesize

    248KB

  • memory/4612-200-0x0000000004C80000-0x0000000004CBE000-memory.dmp

    Filesize

    248KB

  • memory/4612-202-0x0000000004C80000-0x0000000004CBE000-memory.dmp

    Filesize

    248KB

  • memory/4612-204-0x0000000004C80000-0x0000000004CBE000-memory.dmp

    Filesize

    248KB

  • memory/4612-206-0x0000000004C80000-0x0000000004CBE000-memory.dmp

    Filesize

    248KB

  • memory/4612-208-0x0000000004C80000-0x0000000004CBE000-memory.dmp

    Filesize

    248KB

  • memory/4612-210-0x0000000004C80000-0x0000000004CBE000-memory.dmp

    Filesize

    248KB

  • memory/4612-212-0x0000000004C80000-0x0000000004CBE000-memory.dmp

    Filesize

    248KB

  • memory/4612-214-0x0000000004C80000-0x0000000004CBE000-memory.dmp

    Filesize

    248KB

  • memory/4612-216-0x0000000004C80000-0x0000000004CBE000-memory.dmp

    Filesize

    248KB

  • memory/4612-218-0x0000000004C80000-0x0000000004CBE000-memory.dmp

    Filesize

    248KB

  • memory/4612-220-0x0000000004C80000-0x0000000004CBE000-memory.dmp

    Filesize

    248KB

  • memory/4612-1063-0x00000000052E0000-0x00000000058F8000-memory.dmp

    Filesize

    6.1MB

  • memory/4612-1064-0x0000000005970000-0x0000000005A7A000-memory.dmp

    Filesize

    1.0MB

  • memory/4612-1065-0x0000000005AB0000-0x0000000005AC2000-memory.dmp

    Filesize

    72KB

  • memory/4612-1066-0x0000000005AD0000-0x0000000005B0C000-memory.dmp

    Filesize

    240KB

  • memory/4612-1067-0x0000000004D20000-0x0000000004D30000-memory.dmp

    Filesize

    64KB

  • memory/4612-1069-0x0000000004D20000-0x0000000004D30000-memory.dmp

    Filesize

    64KB

  • memory/4612-1070-0x0000000004D20000-0x0000000004D30000-memory.dmp

    Filesize

    64KB

  • memory/4612-1071-0x0000000004D20000-0x0000000004D30000-memory.dmp

    Filesize

    64KB