Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-03-2023 11:35

General

  • Target

    d9bcc89f497c06ca7468192139807f3f7b7d6087c5ca9e2d18208ca7f8d7a50f.exe

  • Size

    539KB

  • MD5

    5f3d320e976257a2c1cf50681e580d1d

  • SHA1

    f9ef47fc73909076353e4e403789918135ee0474

  • SHA256

    d9bcc89f497c06ca7468192139807f3f7b7d6087c5ca9e2d18208ca7f8d7a50f

  • SHA512

    e788a5e9ce071ebac35f177eaf952716a536bd891454fe90ce94a2e15f926d8e5e258fd36ec89fb44eb39881c93cdd8ba4a339d3b2e4a1025972f88288572640

  • SSDEEP

    12288:6Mrsy90GonhnMIhBncRMWyWls9UJEQCtdO+HNyQWYgb:6y7ShMIHcmbW5EFdRtyD

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 32 IoCs
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9bcc89f497c06ca7468192139807f3f7b7d6087c5ca9e2d18208ca7f8d7a50f.exe
    "C:\Users\Admin\AppData\Local\Temp\d9bcc89f497c06ca7468192139807f3f7b7d6087c5ca9e2d18208ca7f8d7a50f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3176
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio8467.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio8467.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4352
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7000.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7000.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4204
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9986.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9986.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4404

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio8467.exe

    Filesize

    397KB

    MD5

    21431ac71520c4dacb84f55fde008bad

    SHA1

    b246f79ecb45ab81c6e1fd51baab2c4328e6124c

    SHA256

    8d68a1d0ed079778199dd68643fd2cd3d4619b49c566bebe011e03413b1fbe3b

    SHA512

    29c0a9cfd7a2d6d0603b942afdfcc5a3b1641fbfe8e2a438cc2d1a9b4f92d4ac6a4f92f61629f57d20ad380395e674a93fd6983396504a58ef258d62862ca4a7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio8467.exe

    Filesize

    397KB

    MD5

    21431ac71520c4dacb84f55fde008bad

    SHA1

    b246f79ecb45ab81c6e1fd51baab2c4328e6124c

    SHA256

    8d68a1d0ed079778199dd68643fd2cd3d4619b49c566bebe011e03413b1fbe3b

    SHA512

    29c0a9cfd7a2d6d0603b942afdfcc5a3b1641fbfe8e2a438cc2d1a9b4f92d4ac6a4f92f61629f57d20ad380395e674a93fd6983396504a58ef258d62862ca4a7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7000.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7000.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9986.exe

    Filesize

    356KB

    MD5

    4bc1e3b2edb800a9be04f166022f72d0

    SHA1

    849748d3883315db2f07be4abd9d9a84d1132349

    SHA256

    066535e83ff34d01a48ae46e9e40f883b5d881225e429226518201f874182291

    SHA512

    e3cc63ba88d3aed6e4d1f98c2dd852d988188fc4decfe9bbaffe5edf5bde3a4b55703a377939db5caabeca0944c78bec3ac51f989601e0a5ea70ff783e3647a7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9986.exe

    Filesize

    356KB

    MD5

    4bc1e3b2edb800a9be04f166022f72d0

    SHA1

    849748d3883315db2f07be4abd9d9a84d1132349

    SHA256

    066535e83ff34d01a48ae46e9e40f883b5d881225e429226518201f874182291

    SHA512

    e3cc63ba88d3aed6e4d1f98c2dd852d988188fc4decfe9bbaffe5edf5bde3a4b55703a377939db5caabeca0944c78bec3ac51f989601e0a5ea70ff783e3647a7

  • memory/4204-147-0x0000000000350000-0x000000000035A000-memory.dmp

    Filesize

    40KB

  • memory/4204-148-0x000000001AEE0000-0x000000001B02E000-memory.dmp

    Filesize

    1.3MB

  • memory/4204-150-0x000000001AEE0000-0x000000001B02E000-memory.dmp

    Filesize

    1.3MB

  • memory/4404-155-0x00000000072F0000-0x0000000007894000-memory.dmp

    Filesize

    5.6MB

  • memory/4404-156-0x0000000002B90000-0x0000000002BDB000-memory.dmp

    Filesize

    300KB

  • memory/4404-157-0x00000000072E0000-0x00000000072F0000-memory.dmp

    Filesize

    64KB

  • memory/4404-158-0x00000000072E0000-0x00000000072F0000-memory.dmp

    Filesize

    64KB

  • memory/4404-159-0x00000000072E0000-0x00000000072F0000-memory.dmp

    Filesize

    64KB

  • memory/4404-160-0x0000000007160000-0x000000000719E000-memory.dmp

    Filesize

    248KB

  • memory/4404-163-0x0000000007160000-0x000000000719E000-memory.dmp

    Filesize

    248KB

  • memory/4404-161-0x0000000007160000-0x000000000719E000-memory.dmp

    Filesize

    248KB

  • memory/4404-165-0x0000000007160000-0x000000000719E000-memory.dmp

    Filesize

    248KB

  • memory/4404-167-0x0000000007160000-0x000000000719E000-memory.dmp

    Filesize

    248KB

  • memory/4404-169-0x0000000007160000-0x000000000719E000-memory.dmp

    Filesize

    248KB

  • memory/4404-171-0x0000000007160000-0x000000000719E000-memory.dmp

    Filesize

    248KB

  • memory/4404-173-0x0000000007160000-0x000000000719E000-memory.dmp

    Filesize

    248KB

  • memory/4404-175-0x0000000007160000-0x000000000719E000-memory.dmp

    Filesize

    248KB

  • memory/4404-177-0x0000000007160000-0x000000000719E000-memory.dmp

    Filesize

    248KB

  • memory/4404-179-0x0000000007160000-0x000000000719E000-memory.dmp

    Filesize

    248KB

  • memory/4404-181-0x0000000007160000-0x000000000719E000-memory.dmp

    Filesize

    248KB

  • memory/4404-183-0x0000000007160000-0x000000000719E000-memory.dmp

    Filesize

    248KB

  • memory/4404-185-0x0000000007160000-0x000000000719E000-memory.dmp

    Filesize

    248KB

  • memory/4404-187-0x0000000007160000-0x000000000719E000-memory.dmp

    Filesize

    248KB

  • memory/4404-189-0x0000000007160000-0x000000000719E000-memory.dmp

    Filesize

    248KB

  • memory/4404-191-0x0000000007160000-0x000000000719E000-memory.dmp

    Filesize

    248KB

  • memory/4404-193-0x0000000007160000-0x000000000719E000-memory.dmp

    Filesize

    248KB

  • memory/4404-195-0x0000000007160000-0x000000000719E000-memory.dmp

    Filesize

    248KB

  • memory/4404-197-0x0000000007160000-0x000000000719E000-memory.dmp

    Filesize

    248KB

  • memory/4404-199-0x0000000007160000-0x000000000719E000-memory.dmp

    Filesize

    248KB

  • memory/4404-201-0x0000000007160000-0x000000000719E000-memory.dmp

    Filesize

    248KB

  • memory/4404-203-0x0000000007160000-0x000000000719E000-memory.dmp

    Filesize

    248KB

  • memory/4404-205-0x0000000007160000-0x000000000719E000-memory.dmp

    Filesize

    248KB

  • memory/4404-207-0x0000000007160000-0x000000000719E000-memory.dmp

    Filesize

    248KB

  • memory/4404-209-0x0000000007160000-0x000000000719E000-memory.dmp

    Filesize

    248KB

  • memory/4404-211-0x0000000007160000-0x000000000719E000-memory.dmp

    Filesize

    248KB

  • memory/4404-213-0x0000000007160000-0x000000000719E000-memory.dmp

    Filesize

    248KB

  • memory/4404-215-0x0000000007160000-0x000000000719E000-memory.dmp

    Filesize

    248KB

  • memory/4404-217-0x0000000007160000-0x000000000719E000-memory.dmp

    Filesize

    248KB

  • memory/4404-219-0x0000000007160000-0x000000000719E000-memory.dmp

    Filesize

    248KB

  • memory/4404-221-0x0000000007160000-0x000000000719E000-memory.dmp

    Filesize

    248KB

  • memory/4404-1066-0x00000000079A0000-0x0000000007FB8000-memory.dmp

    Filesize

    6.1MB

  • memory/4404-1067-0x0000000007FC0000-0x00000000080CA000-memory.dmp

    Filesize

    1.0MB

  • memory/4404-1068-0x00000000072C0000-0x00000000072D2000-memory.dmp

    Filesize

    72KB

  • memory/4404-1069-0x00000000080D0000-0x000000000810C000-memory.dmp

    Filesize

    240KB

  • memory/4404-1070-0x00000000072E0000-0x00000000072F0000-memory.dmp

    Filesize

    64KB

  • memory/4404-1072-0x00000000072E0000-0x00000000072F0000-memory.dmp

    Filesize

    64KB

  • memory/4404-1073-0x00000000072E0000-0x00000000072F0000-memory.dmp

    Filesize

    64KB

  • memory/4404-1074-0x00000000072E0000-0x00000000072F0000-memory.dmp

    Filesize

    64KB

  • memory/4404-1075-0x00000000072E0000-0x00000000072F0000-memory.dmp

    Filesize

    64KB