Analysis

  • max time kernel
    145s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24-03-2023 11:39

General

  • Target

    999b21745d5da6d1d953d9b20464126a23d3078d6e741e975443cf8b7c13c496.exe

  • Size

    1010KB

  • MD5

    d414622702e50b8996985ef28b13305e

  • SHA1

    c6b1a10f4e098ba508cdcd60a8b68b494562f21b

  • SHA256

    999b21745d5da6d1d953d9b20464126a23d3078d6e741e975443cf8b7c13c496

  • SHA512

    a9ebd5605933a24c45d3f6f675c4c21f1de1a002def4cd77c536de51ad5ec9d2915385c4a86d0094761403560faa0104e72968a52b8099decb46ffb31c71ee75

  • SSDEEP

    24576:cyjtFGrlhj2t659LEBEkdBHk3ditaj/tb:Lid2t6bwE0BE3Ytaj/t

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\999b21745d5da6d1d953d9b20464126a23d3078d6e741e975443cf8b7c13c496.exe
    "C:\Users\Admin\AppData\Local\Temp\999b21745d5da6d1d953d9b20464126a23d3078d6e741e975443cf8b7c13c496.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4124
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino6648.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino6648.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3924
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino8950.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino8950.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4960
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino3472.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino3472.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1928
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus3716.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus3716.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2444
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor0560.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor0560.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4208
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dSU87s37.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dSU87s37.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:4848

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino6648.exe
    Filesize

    828KB

    MD5

    3baf451165359d588345d593ebe03891

    SHA1

    230856eba7ffc78b4ee68ab0763ca6c930d19c82

    SHA256

    aa76d48f1cba6e43f2157f2f95ab2df5bd63a98ce9268f7ac943e544a7091ef2

    SHA512

    533332146aa4b21f4ce98c6c8006e60f258c72cd267093198e6e876cfb72fd267efb46dbba0a859eca478fe8e8ecd0688cb9a667b7b62d4b925dcee696526d73

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino6648.exe
    Filesize

    828KB

    MD5

    3baf451165359d588345d593ebe03891

    SHA1

    230856eba7ffc78b4ee68ab0763ca6c930d19c82

    SHA256

    aa76d48f1cba6e43f2157f2f95ab2df5bd63a98ce9268f7ac943e544a7091ef2

    SHA512

    533332146aa4b21f4ce98c6c8006e60f258c72cd267093198e6e876cfb72fd267efb46dbba0a859eca478fe8e8ecd0688cb9a667b7b62d4b925dcee696526d73

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino8950.exe
    Filesize

    686KB

    MD5

    4d55cc0cffa580255a7080bc55e19653

    SHA1

    db2d4bfe29a90e5a61e6847021e42db9f60834fd

    SHA256

    e30e3ad6355e21a06c7e455dbeffaf3b6ebeddcef35215504ed30d3492963525

    SHA512

    12c1795691d780e094c2a55d76b02ac76c660666a7c82c75ac2894811e55eb8dbe483c1919a307ea63e50b754b8719c9b7379f1045788c98a789507cf7b62a5c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino8950.exe
    Filesize

    686KB

    MD5

    4d55cc0cffa580255a7080bc55e19653

    SHA1

    db2d4bfe29a90e5a61e6847021e42db9f60834fd

    SHA256

    e30e3ad6355e21a06c7e455dbeffaf3b6ebeddcef35215504ed30d3492963525

    SHA512

    12c1795691d780e094c2a55d76b02ac76c660666a7c82c75ac2894811e55eb8dbe483c1919a307ea63e50b754b8719c9b7379f1045788c98a789507cf7b62a5c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dSU87s37.exe
    Filesize

    356KB

    MD5

    31d02ffd5768442938e2296fb7c0b2bc

    SHA1

    d9e081aa7c896abf07375a70eb926e1b3b29b86f

    SHA256

    1c16beffaf75fedb3d28cbade025ca5e567ebbeffe061e7c9182bc604fa4a617

    SHA512

    517663a83fa35588daf985628043c34e1ef6d59b86514355561fea4841fb98f31775dd8f07fe28e6673a5bb350b2bbf1ab5b3d3f7cde9b3a10c140d1a8584adf

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dSU87s37.exe
    Filesize

    356KB

    MD5

    31d02ffd5768442938e2296fb7c0b2bc

    SHA1

    d9e081aa7c896abf07375a70eb926e1b3b29b86f

    SHA256

    1c16beffaf75fedb3d28cbade025ca5e567ebbeffe061e7c9182bc604fa4a617

    SHA512

    517663a83fa35588daf985628043c34e1ef6d59b86514355561fea4841fb98f31775dd8f07fe28e6673a5bb350b2bbf1ab5b3d3f7cde9b3a10c140d1a8584adf

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino3472.exe
    Filesize

    340KB

    MD5

    79d1d864c665d3f9bb87500894227029

    SHA1

    dbac7352db047d0eee2f2250e6da18943ffc55ce

    SHA256

    60d17556a715a9525b03b33fae1c711a0938658a62916ea0018c94ed53c7b108

    SHA512

    6ab2b7bebed89b4e5b14640c55b86893e4fa5f43d9c765707fd42996fa755a5513ab36ad0c0b5cee8dc9c5b32f8e1cbd9a91c45c2483dd45aeb2a4fe87ff441e

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino3472.exe
    Filesize

    340KB

    MD5

    79d1d864c665d3f9bb87500894227029

    SHA1

    dbac7352db047d0eee2f2250e6da18943ffc55ce

    SHA256

    60d17556a715a9525b03b33fae1c711a0938658a62916ea0018c94ed53c7b108

    SHA512

    6ab2b7bebed89b4e5b14640c55b86893e4fa5f43d9c765707fd42996fa755a5513ab36ad0c0b5cee8dc9c5b32f8e1cbd9a91c45c2483dd45aeb2a4fe87ff441e

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus3716.exe
    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus3716.exe
    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor0560.exe
    Filesize

    298KB

    MD5

    2b8ed73f7d452a256fff3dd94c6dda11

    SHA1

    503167de836993343e146983529f162db041050f

    SHA256

    849e538d7824053c539b0227936166f2f01a05b6905cd24ab5e7f5d1719cbfbe

    SHA512

    47784e5d2a5f8ed6b902c74d7c4d02617a3ebcb7a21f415eaac60b8b1bdff623082431310270f46e61e4754de60ab6cf86d0fc53a253b02d1232f54b9e095693

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor0560.exe
    Filesize

    298KB

    MD5

    2b8ed73f7d452a256fff3dd94c6dda11

    SHA1

    503167de836993343e146983529f162db041050f

    SHA256

    849e538d7824053c539b0227936166f2f01a05b6905cd24ab5e7f5d1719cbfbe

    SHA512

    47784e5d2a5f8ed6b902c74d7c4d02617a3ebcb7a21f415eaac60b8b1bdff623082431310270f46e61e4754de60ab6cf86d0fc53a253b02d1232f54b9e095693

  • memory/2444-144-0x0000000000780000-0x000000000078A000-memory.dmp
    Filesize

    40KB

  • memory/4208-150-0x0000000002E40000-0x0000000002E5A000-memory.dmp
    Filesize

    104KB

  • memory/4208-151-0x0000000007360000-0x000000000785E000-memory.dmp
    Filesize

    5.0MB

  • memory/4208-152-0x00000000001D0000-0x00000000001FD000-memory.dmp
    Filesize

    180KB

  • memory/4208-153-0x0000000007350000-0x0000000007360000-memory.dmp
    Filesize

    64KB

  • memory/4208-155-0x0000000004900000-0x0000000004918000-memory.dmp
    Filesize

    96KB

  • memory/4208-156-0x0000000007350000-0x0000000007360000-memory.dmp
    Filesize

    64KB

  • memory/4208-154-0x0000000007350000-0x0000000007360000-memory.dmp
    Filesize

    64KB

  • memory/4208-157-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/4208-158-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/4208-160-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/4208-162-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/4208-164-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/4208-166-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/4208-168-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/4208-170-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/4208-172-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/4208-174-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/4208-176-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/4208-178-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/4208-180-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/4208-182-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/4208-184-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/4208-185-0x0000000000400000-0x0000000002B79000-memory.dmp
    Filesize

    39.5MB

  • memory/4208-186-0x0000000007350000-0x0000000007360000-memory.dmp
    Filesize

    64KB

  • memory/4208-187-0x0000000007350000-0x0000000007360000-memory.dmp
    Filesize

    64KB

  • memory/4208-188-0x0000000007350000-0x0000000007360000-memory.dmp
    Filesize

    64KB

  • memory/4208-190-0x0000000000400000-0x0000000002B79000-memory.dmp
    Filesize

    39.5MB

  • memory/4848-195-0x00000000048C0000-0x0000000004906000-memory.dmp
    Filesize

    280KB

  • memory/4848-196-0x0000000004BB0000-0x0000000004BF4000-memory.dmp
    Filesize

    272KB

  • memory/4848-197-0x0000000004BB0000-0x0000000004BEE000-memory.dmp
    Filesize

    248KB

  • memory/4848-198-0x0000000004BB0000-0x0000000004BEE000-memory.dmp
    Filesize

    248KB

  • memory/4848-200-0x0000000004BB0000-0x0000000004BEE000-memory.dmp
    Filesize

    248KB

  • memory/4848-202-0x0000000004BB0000-0x0000000004BEE000-memory.dmp
    Filesize

    248KB

  • memory/4848-204-0x0000000004BB0000-0x0000000004BEE000-memory.dmp
    Filesize

    248KB

  • memory/4848-206-0x0000000002C90000-0x0000000002CDB000-memory.dmp
    Filesize

    300KB

  • memory/4848-207-0x0000000004BB0000-0x0000000004BEE000-memory.dmp
    Filesize

    248KB

  • memory/4848-208-0x00000000072E0000-0x00000000072F0000-memory.dmp
    Filesize

    64KB

  • memory/4848-210-0x00000000072E0000-0x00000000072F0000-memory.dmp
    Filesize

    64KB

  • memory/4848-212-0x00000000072E0000-0x00000000072F0000-memory.dmp
    Filesize

    64KB

  • memory/4848-211-0x0000000004BB0000-0x0000000004BEE000-memory.dmp
    Filesize

    248KB

  • memory/4848-214-0x0000000004BB0000-0x0000000004BEE000-memory.dmp
    Filesize

    248KB

  • memory/4848-216-0x0000000004BB0000-0x0000000004BEE000-memory.dmp
    Filesize

    248KB

  • memory/4848-218-0x0000000004BB0000-0x0000000004BEE000-memory.dmp
    Filesize

    248KB

  • memory/4848-220-0x0000000004BB0000-0x0000000004BEE000-memory.dmp
    Filesize

    248KB

  • memory/4848-222-0x0000000004BB0000-0x0000000004BEE000-memory.dmp
    Filesize

    248KB

  • memory/4848-224-0x0000000004BB0000-0x0000000004BEE000-memory.dmp
    Filesize

    248KB

  • memory/4848-226-0x0000000004BB0000-0x0000000004BEE000-memory.dmp
    Filesize

    248KB

  • memory/4848-228-0x0000000004BB0000-0x0000000004BEE000-memory.dmp
    Filesize

    248KB

  • memory/4848-230-0x0000000004BB0000-0x0000000004BEE000-memory.dmp
    Filesize

    248KB

  • memory/4848-232-0x0000000004BB0000-0x0000000004BEE000-memory.dmp
    Filesize

    248KB

  • memory/4848-234-0x0000000004BB0000-0x0000000004BEE000-memory.dmp
    Filesize

    248KB

  • memory/4848-1107-0x00000000077F0000-0x0000000007DF6000-memory.dmp
    Filesize

    6.0MB

  • memory/4848-1108-0x0000000007E00000-0x0000000007F0A000-memory.dmp
    Filesize

    1.0MB

  • memory/4848-1109-0x0000000007240000-0x0000000007252000-memory.dmp
    Filesize

    72KB

  • memory/4848-1110-0x0000000007260000-0x000000000729E000-memory.dmp
    Filesize

    248KB

  • memory/4848-1111-0x0000000008010000-0x000000000805B000-memory.dmp
    Filesize

    300KB

  • memory/4848-1112-0x00000000072E0000-0x00000000072F0000-memory.dmp
    Filesize

    64KB

  • memory/4848-1114-0x00000000072E0000-0x00000000072F0000-memory.dmp
    Filesize

    64KB

  • memory/4848-1115-0x00000000072E0000-0x00000000072F0000-memory.dmp
    Filesize

    64KB

  • memory/4848-1116-0x00000000072E0000-0x00000000072F0000-memory.dmp
    Filesize

    64KB

  • memory/4848-1117-0x00000000072E0000-0x00000000072F0000-memory.dmp
    Filesize

    64KB