Analysis

  • max time kernel
    28s
  • max time network
    76s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-03-2023 09:57

General

  • Target

    38c5e656c5e252e8dafbeab880aceeab88a49b6ca884d4487c4fe3a0d08e894e.exe

  • Size

    1010KB

  • MD5

    f6d172b63e56b73278f4dabd8216eac9

  • SHA1

    54e1fba0b6337a89bc6d1ac9e86d18a07b900057

  • SHA256

    38c5e656c5e252e8dafbeab880aceeab88a49b6ca884d4487c4fe3a0d08e894e

  • SHA512

    9fe7659930466e404f1d113a29b1bd17b6c580d3a082d9cbf977d219b3e165ca6df5e7d688df052af32cb95a01cf20b75f41d0893486144e99cd4498791eede0

  • SSDEEP

    24576:PyUEjIKvb4B4zwX+bKmY8T6nOSMthTYWb3jh0pPDb7iK:avjDvbK4zUzmY8TpTYizh2PD

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 12 IoCs
  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\38c5e656c5e252e8dafbeab880aceeab88a49b6ca884d4487c4fe3a0d08e894e.exe
    "C:\Users\Admin\AppData\Local\Temp\38c5e656c5e252e8dafbeab880aceeab88a49b6ca884d4487c4fe3a0d08e894e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1604
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino0548.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino0548.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:644
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino4220.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino4220.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2260
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino6729.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino6729.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2972
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus1322.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus1322.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:208
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor4881.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor4881.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1856
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1856 -s 1080
              6⤵
              • Program crash
              PID:4752
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dzN67s84.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dzN67s84.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:2588
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1856 -ip 1856
    1⤵
      PID:4884

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino0548.exe
      Filesize

      829KB

      MD5

      2f0d5123f3170a367cb8104331b38cb2

      SHA1

      1d5e8eed792bd55970a30e7b29c4feae31977471

      SHA256

      cfac8172e40a9dc272ac9defa682d2d8dc2489c97c1d81e36f37c9370291cd89

      SHA512

      e0623d75604355b8c0d33e4629e87cd2b666f428fd63cab0a999f93a5b039412601523d47058539b414cef581d24e575d72762e13cb1d419648be1cb079e54ec

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino0548.exe
      Filesize

      829KB

      MD5

      2f0d5123f3170a367cb8104331b38cb2

      SHA1

      1d5e8eed792bd55970a30e7b29c4feae31977471

      SHA256

      cfac8172e40a9dc272ac9defa682d2d8dc2489c97c1d81e36f37c9370291cd89

      SHA512

      e0623d75604355b8c0d33e4629e87cd2b666f428fd63cab0a999f93a5b039412601523d47058539b414cef581d24e575d72762e13cb1d419648be1cb079e54ec

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino4220.exe
      Filesize

      686KB

      MD5

      1b5ad72163de00fda0f6aa99cd1e929f

      SHA1

      d9d137bac60ab543a22f5b5687d19d2e676484ba

      SHA256

      275e800fbef9826f122e2e0f9f77789048a849d03e97a8e4a365de38b7066eea

      SHA512

      ca9ff4a64028d4437309795f27f1b5e9379cbbee5a7378c6049f1bfabd85395a70c2a0e75d35ec3cd0fab0a65f81a8626de77469f1c5170a768ee12d17fa4e8c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino4220.exe
      Filesize

      686KB

      MD5

      1b5ad72163de00fda0f6aa99cd1e929f

      SHA1

      d9d137bac60ab543a22f5b5687d19d2e676484ba

      SHA256

      275e800fbef9826f122e2e0f9f77789048a849d03e97a8e4a365de38b7066eea

      SHA512

      ca9ff4a64028d4437309795f27f1b5e9379cbbee5a7378c6049f1bfabd85395a70c2a0e75d35ec3cd0fab0a65f81a8626de77469f1c5170a768ee12d17fa4e8c

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dzN67s84.exe
      Filesize

      355KB

      MD5

      a8693a1a68034fb9abbc3c3193e21287

      SHA1

      316c8ccaed9f0f464bb8b9a81106d722ea1f56c1

      SHA256

      5a697362500a8fc5189cee93ad36a85af2af52b0a1467b4787fea1c4411dcd23

      SHA512

      7cf221b15a552abcf7cc49dda56d0a93ec02f4789b3291f33d81b45144318b3007b08e49e43f794e2ee75c3d7b40b2f4635c95a328b60a2ea3f617c66dfb8bcf

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dzN67s84.exe
      Filesize

      355KB

      MD5

      a8693a1a68034fb9abbc3c3193e21287

      SHA1

      316c8ccaed9f0f464bb8b9a81106d722ea1f56c1

      SHA256

      5a697362500a8fc5189cee93ad36a85af2af52b0a1467b4787fea1c4411dcd23

      SHA512

      7cf221b15a552abcf7cc49dda56d0a93ec02f4789b3291f33d81b45144318b3007b08e49e43f794e2ee75c3d7b40b2f4635c95a328b60a2ea3f617c66dfb8bcf

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino6729.exe
      Filesize

      340KB

      MD5

      e3d9cd1777b3e96307a99bcff89cd4bd

      SHA1

      8abe3c0b131e0e95217ffe43bbc8af4077c88211

      SHA256

      a60909337cb85c1c0dbace0783d53bdd5c6c82efb483e5ac952f0853a7bf18b7

      SHA512

      9584afc088efcba22bd2caf5420542e71443afb50c05df29d237e0c0cb926e759df8d05ac6443f3c667d1ed081a82c0e151f22b6699bef2313e29085cce7a79b

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino6729.exe
      Filesize

      340KB

      MD5

      e3d9cd1777b3e96307a99bcff89cd4bd

      SHA1

      8abe3c0b131e0e95217ffe43bbc8af4077c88211

      SHA256

      a60909337cb85c1c0dbace0783d53bdd5c6c82efb483e5ac952f0853a7bf18b7

      SHA512

      9584afc088efcba22bd2caf5420542e71443afb50c05df29d237e0c0cb926e759df8d05ac6443f3c667d1ed081a82c0e151f22b6699bef2313e29085cce7a79b

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus1322.exe
      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus1322.exe
      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor4881.exe
      Filesize

      298KB

      MD5

      e603cf8ff0a24cf50c273f69c1deaba3

      SHA1

      431747960d69f1c0043ec7187768d8f1b9ec387f

      SHA256

      f3af592a596ee5d0f58f431087b56506faca77952974d6707dddf15d13ec38ae

      SHA512

      ab6d5a4fab515211aaf9adfc11462633475ac8959f5d7757ae8aa47e1f7a2efd0c2c6f918d7de7d1ee9f71345b18817bcf9439972e65bc0341ff74bda8c23fbb

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor4881.exe
      Filesize

      298KB

      MD5

      e603cf8ff0a24cf50c273f69c1deaba3

      SHA1

      431747960d69f1c0043ec7187768d8f1b9ec387f

      SHA256

      f3af592a596ee5d0f58f431087b56506faca77952974d6707dddf15d13ec38ae

      SHA512

      ab6d5a4fab515211aaf9adfc11462633475ac8959f5d7757ae8aa47e1f7a2efd0c2c6f918d7de7d1ee9f71345b18817bcf9439972e65bc0341ff74bda8c23fbb

    • memory/208-161-0x0000000000420000-0x000000000042A000-memory.dmp
      Filesize

      40KB

    • memory/1856-167-0x0000000007090000-0x0000000007634000-memory.dmp
      Filesize

      5.6MB

    • memory/1856-168-0x00000000076A0000-0x00000000076B2000-memory.dmp
      Filesize

      72KB

    • memory/1856-169-0x00000000076A0000-0x00000000076B2000-memory.dmp
      Filesize

      72KB

    • memory/1856-171-0x00000000076A0000-0x00000000076B2000-memory.dmp
      Filesize

      72KB

    • memory/1856-173-0x00000000076A0000-0x00000000076B2000-memory.dmp
      Filesize

      72KB

    • memory/1856-177-0x0000000004AD0000-0x0000000004AE0000-memory.dmp
      Filesize

      64KB

    • memory/1856-180-0x00000000076A0000-0x00000000076B2000-memory.dmp
      Filesize

      72KB

    • memory/1856-179-0x0000000004AD0000-0x0000000004AE0000-memory.dmp
      Filesize

      64KB

    • memory/1856-175-0x0000000002C90000-0x0000000002CBD000-memory.dmp
      Filesize

      180KB

    • memory/1856-182-0x00000000076A0000-0x00000000076B2000-memory.dmp
      Filesize

      72KB

    • memory/1856-176-0x00000000076A0000-0x00000000076B2000-memory.dmp
      Filesize

      72KB

    • memory/1856-184-0x00000000076A0000-0x00000000076B2000-memory.dmp
      Filesize

      72KB

    • memory/1856-186-0x00000000076A0000-0x00000000076B2000-memory.dmp
      Filesize

      72KB

    • memory/1856-188-0x00000000076A0000-0x00000000076B2000-memory.dmp
      Filesize

      72KB

    • memory/1856-190-0x00000000076A0000-0x00000000076B2000-memory.dmp
      Filesize

      72KB

    • memory/1856-194-0x00000000076A0000-0x00000000076B2000-memory.dmp
      Filesize

      72KB

    • memory/1856-192-0x00000000076A0000-0x00000000076B2000-memory.dmp
      Filesize

      72KB

    • memory/1856-196-0x00000000076A0000-0x00000000076B2000-memory.dmp
      Filesize

      72KB

    • memory/1856-198-0x00000000076A0000-0x00000000076B2000-memory.dmp
      Filesize

      72KB

    • memory/1856-199-0x0000000000400000-0x0000000002B79000-memory.dmp
      Filesize

      39.5MB

    • memory/1856-201-0x0000000004AD0000-0x0000000004AE0000-memory.dmp
      Filesize

      64KB

    • memory/1856-202-0x0000000004AD0000-0x0000000004AE0000-memory.dmp
      Filesize

      64KB

    • memory/1856-203-0x0000000004AD0000-0x0000000004AE0000-memory.dmp
      Filesize

      64KB

    • memory/1856-204-0x0000000000400000-0x0000000002B79000-memory.dmp
      Filesize

      39.5MB

    • memory/2588-209-0x0000000004520000-0x000000000456B000-memory.dmp
      Filesize

      300KB

    • memory/2588-210-0x0000000004BF0000-0x0000000004C00000-memory.dmp
      Filesize

      64KB

    • memory/2588-212-0x0000000004BF0000-0x0000000004C00000-memory.dmp
      Filesize

      64KB

    • memory/2588-211-0x0000000004BF0000-0x0000000004C00000-memory.dmp
      Filesize

      64KB

    • memory/2588-213-0x00000000077A0000-0x00000000077DE000-memory.dmp
      Filesize

      248KB

    • memory/2588-214-0x00000000077A0000-0x00000000077DE000-memory.dmp
      Filesize

      248KB

    • memory/2588-216-0x00000000077A0000-0x00000000077DE000-memory.dmp
      Filesize

      248KB

    • memory/2588-218-0x00000000077A0000-0x00000000077DE000-memory.dmp
      Filesize

      248KB

    • memory/2588-220-0x00000000077A0000-0x00000000077DE000-memory.dmp
      Filesize

      248KB

    • memory/2588-222-0x00000000077A0000-0x00000000077DE000-memory.dmp
      Filesize

      248KB

    • memory/2588-224-0x00000000077A0000-0x00000000077DE000-memory.dmp
      Filesize

      248KB

    • memory/2588-226-0x00000000077A0000-0x00000000077DE000-memory.dmp
      Filesize

      248KB

    • memory/2588-228-0x00000000077A0000-0x00000000077DE000-memory.dmp
      Filesize

      248KB

    • memory/2588-230-0x00000000077A0000-0x00000000077DE000-memory.dmp
      Filesize

      248KB

    • memory/2588-232-0x00000000077A0000-0x00000000077DE000-memory.dmp
      Filesize

      248KB

    • memory/2588-234-0x00000000077A0000-0x00000000077DE000-memory.dmp
      Filesize

      248KB