Analysis

  • max time kernel
    26s
  • max time network
    75s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/03/2023, 07:47

General

  • Target

    850d9a9623f93e6db33732876f508db0.exe

  • Size

    1.2MB

  • MD5

    850d9a9623f93e6db33732876f508db0

  • SHA1

    d0d4fd16eff876549309c6eb13123688b80cda9a

  • SHA256

    5b1b3e04d5d4ff6a9b11311b94416c19f46c8fbb2c38302bee2ad09277c14437

  • SHA512

    ddd357942a64df74f7aec0a47c06510b0eb95220543cbf7b6edfec4b75c08e43479dcc214852ebbacca2d5ac95d0a9a58132a43869362f88aa19b5e2d30c5f84

  • SSDEEP

    24576:qhVKo7S6ImQruXrQQMxCzSB9h7qIAtzq6orHFkhWW5lNNR:qHb7OubGlh7y8rl4pl

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 17 IoCs
  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\850d9a9623f93e6db33732876f508db0.exe
    "C:\Users\Admin\AppData\Local\Temp\850d9a9623f93e6db33732876f508db0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3464
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino1226.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino1226.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:220
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino8147.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino8147.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1896
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino1962.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino1962.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3696
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus7720.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus7720.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2064
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\con6645.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\con6645.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3356
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dER55s09.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dER55s09.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:3916
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 1836
            5⤵
            • Program crash
            PID:436
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3916 -ip 3916
    1⤵
      PID:1420

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino1226.exe

            Filesize

            850KB

            MD5

            828e84e760ad554a1c6a7cd5a34b6ac5

            SHA1

            a514fdd329fde0ebd2add6fb684cde7568ec1120

            SHA256

            09c44e0297fae477dfed2bff64a6b77c91f2fc4679342c6145badb5a72b971ee

            SHA512

            4df57365031711d68116c6e62d00ac8ae58ae510301b4a40e7f81efb989e3b716017aeea23a83e99a3b93b6615d203eb09b04409fbdeb3865b5181b133f276cb

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino1226.exe

            Filesize

            850KB

            MD5

            828e84e760ad554a1c6a7cd5a34b6ac5

            SHA1

            a514fdd329fde0ebd2add6fb684cde7568ec1120

            SHA256

            09c44e0297fae477dfed2bff64a6b77c91f2fc4679342c6145badb5a72b971ee

            SHA512

            4df57365031711d68116c6e62d00ac8ae58ae510301b4a40e7f81efb989e3b716017aeea23a83e99a3b93b6615d203eb09b04409fbdeb3865b5181b133f276cb

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino8147.exe

            Filesize

            708KB

            MD5

            b258a8ffb1c5ea24db1c3b91538856fb

            SHA1

            62ab42c883042bf4174b75edb9a0968bfc1a80e8

            SHA256

            f8dc96eb924d46c9c0132173cefbb58ec0880186ceb015380649ae190de28b3b

            SHA512

            9fbabd5a12958989c5051fca4bca09569d3c5ab1e7bbe0d8496daa7c3fbdcac11dff485d71a0def53b7419ca9ca9fb577d8cfe06d784d6fec6b2c7654808b85c

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino8147.exe

            Filesize

            708KB

            MD5

            b258a8ffb1c5ea24db1c3b91538856fb

            SHA1

            62ab42c883042bf4174b75edb9a0968bfc1a80e8

            SHA256

            f8dc96eb924d46c9c0132173cefbb58ec0880186ceb015380649ae190de28b3b

            SHA512

            9fbabd5a12958989c5051fca4bca09569d3c5ab1e7bbe0d8496daa7c3fbdcac11dff485d71a0def53b7419ca9ca9fb577d8cfe06d784d6fec6b2c7654808b85c

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dER55s09.exe

            Filesize

            391KB

            MD5

            ee7287803f4633fba25833bf931fc2a1

            SHA1

            aaf2cdffad0f7a29b87744cb8ee190c17fa8b98d

            SHA256

            5c8822b8cffc386acfac4374968745111e9a84ae1e3fc600ca7ebf5c11f86302

            SHA512

            f2057d6553930a4571f606d06aece748a1303453a24627e2c6f182a6188dee42580363808de525c3c2eb7fd001e343e420043b1debc010a767e8d831414d2c0f

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dER55s09.exe

            Filesize

            391KB

            MD5

            ee7287803f4633fba25833bf931fc2a1

            SHA1

            aaf2cdffad0f7a29b87744cb8ee190c17fa8b98d

            SHA256

            5c8822b8cffc386acfac4374968745111e9a84ae1e3fc600ca7ebf5c11f86302

            SHA512

            f2057d6553930a4571f606d06aece748a1303453a24627e2c6f182a6188dee42580363808de525c3c2eb7fd001e343e420043b1debc010a767e8d831414d2c0f

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino1962.exe

            Filesize

            358KB

            MD5

            2ad15592315a6f5cb4b386fa9e5df66c

            SHA1

            a083e7c21ef79294520cce2af43f9f96bfd640b5

            SHA256

            11ad001fa19b11e23174b09c01a1663ae469e5c8f011c28c40c8541ac3b29b70

            SHA512

            f7f4ad0cc09149bf9c1addbe46397261e1be99f8c050f9f7834498802c51fc05b08ebff0d339ccfe17b0850bf1facb287969de6c6c433f1a5e758fee5fc59db6

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino1962.exe

            Filesize

            358KB

            MD5

            2ad15592315a6f5cb4b386fa9e5df66c

            SHA1

            a083e7c21ef79294520cce2af43f9f96bfd640b5

            SHA256

            11ad001fa19b11e23174b09c01a1663ae469e5c8f011c28c40c8541ac3b29b70

            SHA512

            f7f4ad0cc09149bf9c1addbe46397261e1be99f8c050f9f7834498802c51fc05b08ebff0d339ccfe17b0850bf1facb287969de6c6c433f1a5e758fee5fc59db6

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus7720.exe

            Filesize

            11KB

            MD5

            7e93bacbbc33e6652e147e7fe07572a0

            SHA1

            421a7167da01c8da4dc4d5234ca3dd84e319e762

            SHA256

            850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

            SHA512

            250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus7720.exe

            Filesize

            11KB

            MD5

            7e93bacbbc33e6652e147e7fe07572a0

            SHA1

            421a7167da01c8da4dc4d5234ca3dd84e319e762

            SHA256

            850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

            SHA512

            250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\con6645.exe

            Filesize

            371KB

            MD5

            bd32410d61ce3e607de87fc97a1bd6a0

            SHA1

            745fb0d80feb24cbe22a7dc65279fb17ef3440ab

            SHA256

            61f96b6feb00bd777d277061b0f081dc5eff6c8face65f85502c5c36915d2b29

            SHA512

            583396d15d5ef769992ab6a0eb0a949e90db429b08d0e39c42674c543fd82fcf37d0a169c5ad426204772307242b11fed99133e3069428dba7fe670ce01529d6

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\con6645.exe

            Filesize

            371KB

            MD5

            bd32410d61ce3e607de87fc97a1bd6a0

            SHA1

            745fb0d80feb24cbe22a7dc65279fb17ef3440ab

            SHA256

            61f96b6feb00bd777d277061b0f081dc5eff6c8face65f85502c5c36915d2b29

            SHA512

            583396d15d5ef769992ab6a0eb0a949e90db429b08d0e39c42674c543fd82fcf37d0a169c5ad426204772307242b11fed99133e3069428dba7fe670ce01529d6

          • memory/2064-162-0x0000000000F60000-0x0000000000F6A000-memory.dmp

            Filesize

            40KB

          • memory/3356-177-0x0000000007070000-0x0000000007082000-memory.dmp

            Filesize

            72KB

          • memory/3356-171-0x0000000007220000-0x00000000077C4000-memory.dmp

            Filesize

            5.6MB

          • memory/3356-173-0x0000000007070000-0x0000000007082000-memory.dmp

            Filesize

            72KB

          • memory/3356-172-0x0000000007070000-0x0000000007082000-memory.dmp

            Filesize

            72KB

          • memory/3356-175-0x0000000007070000-0x0000000007082000-memory.dmp

            Filesize

            72KB

          • memory/3356-170-0x0000000002C80000-0x0000000002CAD000-memory.dmp

            Filesize

            180KB

          • memory/3356-179-0x0000000007070000-0x0000000007082000-memory.dmp

            Filesize

            72KB

          • memory/3356-181-0x0000000007070000-0x0000000007082000-memory.dmp

            Filesize

            72KB

          • memory/3356-183-0x0000000007070000-0x0000000007082000-memory.dmp

            Filesize

            72KB

          • memory/3356-185-0x0000000007070000-0x0000000007082000-memory.dmp

            Filesize

            72KB

          • memory/3356-193-0x0000000007070000-0x0000000007082000-memory.dmp

            Filesize

            72KB

          • memory/3356-195-0x0000000007070000-0x0000000007082000-memory.dmp

            Filesize

            72KB

          • memory/3356-199-0x0000000007070000-0x0000000007082000-memory.dmp

            Filesize

            72KB

          • memory/3356-197-0x0000000007070000-0x0000000007082000-memory.dmp

            Filesize

            72KB

          • memory/3356-191-0x0000000007070000-0x0000000007082000-memory.dmp

            Filesize

            72KB

          • memory/3356-189-0x0000000007070000-0x0000000007082000-memory.dmp

            Filesize

            72KB

          • memory/3356-187-0x0000000007070000-0x0000000007082000-memory.dmp

            Filesize

            72KB

          • memory/3356-201-0x0000000007210000-0x0000000007220000-memory.dmp

            Filesize

            64KB

          • memory/3356-200-0x0000000007210000-0x0000000007220000-memory.dmp

            Filesize

            64KB

          • memory/3356-202-0x0000000007210000-0x0000000007220000-memory.dmp

            Filesize

            64KB

          • memory/3356-204-0x0000000000400000-0x0000000002B0C000-memory.dmp

            Filesize

            39.0MB

          • memory/3356-206-0x0000000000400000-0x0000000002B0C000-memory.dmp

            Filesize

            39.0MB

          • memory/3464-164-0x0000000000400000-0x0000000002BE8000-memory.dmp

            Filesize

            39.9MB

          • memory/3464-163-0x0000000004940000-0x0000000004A44000-memory.dmp

            Filesize

            1.0MB

          • memory/3916-239-0x0000000004740000-0x000000000478B000-memory.dmp

            Filesize

            300KB

          • memory/3916-220-0x0000000004D70000-0x0000000004DAE000-memory.dmp

            Filesize

            248KB

          • memory/3916-224-0x0000000004D70000-0x0000000004DAE000-memory.dmp

            Filesize

            248KB

          • memory/3916-226-0x0000000004D70000-0x0000000004DAE000-memory.dmp

            Filesize

            248KB

          • memory/3916-238-0x0000000004D70000-0x0000000004DAE000-memory.dmp

            Filesize

            248KB

          • memory/3916-212-0x0000000004D70000-0x0000000004DAE000-memory.dmp

            Filesize

            248KB

          • memory/3916-243-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

            Filesize

            64KB

          • memory/3916-246-0x0000000004D70000-0x0000000004DAE000-memory.dmp

            Filesize

            248KB

          • memory/3916-244-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

            Filesize

            64KB

          • memory/3916-242-0x0000000004D70000-0x0000000004DAE000-memory.dmp

            Filesize

            248KB

          • memory/3916-240-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

            Filesize

            64KB

          • memory/3916-236-0x0000000004D70000-0x0000000004DAE000-memory.dmp

            Filesize

            248KB

          • memory/3916-234-0x0000000004D70000-0x0000000004DAE000-memory.dmp

            Filesize

            248KB

          • memory/3916-232-0x0000000004D70000-0x0000000004DAE000-memory.dmp

            Filesize

            248KB

          • memory/3916-230-0x0000000004D70000-0x0000000004DAE000-memory.dmp

            Filesize

            248KB

          • memory/3916-228-0x0000000004D70000-0x0000000004DAE000-memory.dmp

            Filesize

            248KB

          • memory/3916-222-0x0000000004D70000-0x0000000004DAE000-memory.dmp

            Filesize

            248KB

          • memory/3916-211-0x0000000004D70000-0x0000000004DAE000-memory.dmp

            Filesize

            248KB

          • memory/3916-218-0x0000000004D70000-0x0000000004DAE000-memory.dmp

            Filesize

            248KB

          • memory/3916-216-0x0000000004D70000-0x0000000004DAE000-memory.dmp

            Filesize

            248KB

          • memory/3916-214-0x0000000004D70000-0x0000000004DAE000-memory.dmp

            Filesize

            248KB

          • memory/3916-1121-0x0000000007890000-0x0000000007EA8000-memory.dmp

            Filesize

            6.1MB

          • memory/3916-1123-0x0000000008040000-0x0000000008052000-memory.dmp

            Filesize

            72KB

          • memory/3916-1122-0x0000000007F00000-0x000000000800A000-memory.dmp

            Filesize

            1.0MB

          • memory/3916-1124-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

            Filesize

            64KB

          • memory/3916-1125-0x0000000008060000-0x000000000809C000-memory.dmp

            Filesize

            240KB

          • memory/3916-1127-0x0000000008350000-0x00000000083E2000-memory.dmp

            Filesize

            584KB

          • memory/3916-1128-0x00000000083F0000-0x0000000008456000-memory.dmp

            Filesize

            408KB

          • memory/3916-1131-0x0000000008DC0000-0x0000000008E10000-memory.dmp

            Filesize

            320KB

          • memory/3916-1130-0x0000000008D30000-0x0000000008DA6000-memory.dmp

            Filesize

            472KB

          • memory/3916-1132-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

            Filesize

            64KB

          • memory/3916-1133-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

            Filesize

            64KB

          • memory/3916-1134-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

            Filesize

            64KB

          • memory/3916-1135-0x0000000008F90000-0x0000000009152000-memory.dmp

            Filesize

            1.8MB

          • memory/3916-1136-0x0000000009160000-0x000000000968C000-memory.dmp

            Filesize

            5.2MB

          • memory/3916-1138-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

            Filesize

            64KB