Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-03-2023 11:40

General

  • Target

    4bcc7fbfd0c76ac955452334538d09fe4f64b3d19369991c5e1eef209619c99a.exe

  • Size

    1011KB

  • MD5

    94cc7ca058f0b33c9496a6de7650beda

  • SHA1

    23bcc7fa3bf698edf5e26f41a8f22646039eb1a9

  • SHA256

    4bcc7fbfd0c76ac955452334538d09fe4f64b3d19369991c5e1eef209619c99a

  • SHA512

    17cebbc051705eb6f1b1a90ca8a9bf7ccbd8c6ce9d8b4e62cd961c6ef8c0b1b237a5896e2bcba1c8926df2f1265bc3864a90e1f8162330126bbb46c2a7668279

  • SSDEEP

    24576:JyVIW200fzL3eE5SVKpKtHe7C8NsNs14kLdeaXd+yuxWIkXp7L:88LoVuKACGsNs1VLkat+yWWd

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4bcc7fbfd0c76ac955452334538d09fe4f64b3d19369991c5e1eef209619c99a.exe
    "C:\Users\Admin\AppData\Local\Temp\4bcc7fbfd0c76ac955452334538d09fe4f64b3d19369991c5e1eef209619c99a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1336
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino9865.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino9865.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1508
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino2302.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino2302.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4408
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino7318.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino7318.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1084
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus1817.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus1817.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1296
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor7480.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor7480.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:608
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 608 -s 1084
              6⤵
              • Program crash
              PID:5008
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dAG50s96.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dAG50s96.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1960
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 608 -ip 608
    1⤵
      PID:1916

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino9865.exe
      Filesize

      828KB

      MD5

      9a7d65d95e5bb2cec6e0b5e44578950b

      SHA1

      0baae8820388a07fd09d953ba93848422a39c0b7

      SHA256

      621b72834c87acc196876065e6565b594ac5a4cbe9f010758153bcc87a2b1feb

      SHA512

      6b22eef7b22654b1ca1cd32149f25db332b4dcc9742f3833fe1a4e28b715b9e46fe2ba652b70a1eacccca78bc2e9f58d468af0d390b9001286969fa6ebc5ee3a

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino9865.exe
      Filesize

      828KB

      MD5

      9a7d65d95e5bb2cec6e0b5e44578950b

      SHA1

      0baae8820388a07fd09d953ba93848422a39c0b7

      SHA256

      621b72834c87acc196876065e6565b594ac5a4cbe9f010758153bcc87a2b1feb

      SHA512

      6b22eef7b22654b1ca1cd32149f25db332b4dcc9742f3833fe1a4e28b715b9e46fe2ba652b70a1eacccca78bc2e9f58d468af0d390b9001286969fa6ebc5ee3a

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino2302.exe
      Filesize

      686KB

      MD5

      76bb21b7e16a95ab9e940a1aa9cd6f1d

      SHA1

      0ffe8dee23d344213838e780600538f9ab7736bf

      SHA256

      872b371d582e298ff81a60a362447a7c30794cc707bcb843470f55f858fba5e0

      SHA512

      97d5e45f6bec101e2b79efb142853f33487ee6cd113a8a4b8a6f7c7639e77dd5ce18218573870d39db8bfe1d4e820cda5fe416f61be5a4833246dff64ba7c4d5

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino2302.exe
      Filesize

      686KB

      MD5

      76bb21b7e16a95ab9e940a1aa9cd6f1d

      SHA1

      0ffe8dee23d344213838e780600538f9ab7736bf

      SHA256

      872b371d582e298ff81a60a362447a7c30794cc707bcb843470f55f858fba5e0

      SHA512

      97d5e45f6bec101e2b79efb142853f33487ee6cd113a8a4b8a6f7c7639e77dd5ce18218573870d39db8bfe1d4e820cda5fe416f61be5a4833246dff64ba7c4d5

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dAG50s96.exe
      Filesize

      356KB

      MD5

      f5381cacb0d920df32a8dc3e081b770a

      SHA1

      a8cc722dbda7c4b776452f7dfba070034ef4ef71

      SHA256

      341dc6646c22502c5e8e1505cb8857848914c1368a5c8826ab0349eff732ad30

      SHA512

      b53c581e5126559b61db8f1e0401f62d5e4101fb1962e238b449866d6184a9e7fde86a1a4462eb4f66c44babc086a6070f0047111b70760f785c68f7bfa9b59a

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dAG50s96.exe
      Filesize

      356KB

      MD5

      f5381cacb0d920df32a8dc3e081b770a

      SHA1

      a8cc722dbda7c4b776452f7dfba070034ef4ef71

      SHA256

      341dc6646c22502c5e8e1505cb8857848914c1368a5c8826ab0349eff732ad30

      SHA512

      b53c581e5126559b61db8f1e0401f62d5e4101fb1962e238b449866d6184a9e7fde86a1a4462eb4f66c44babc086a6070f0047111b70760f785c68f7bfa9b59a

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino7318.exe
      Filesize

      340KB

      MD5

      e1a13c901e59807a5fb3eea1e45ad325

      SHA1

      31f4edde97303c5a1375a0ced02e74902dc92ddf

      SHA256

      e10390bae166284a69189533b35e7bd53f97546b1d74a4243850d7c68677bdd4

      SHA512

      d4859e698c1062f653b543d4c60f0f5d81866c6313b70b79563beadb75a9e6709d3d9f874abe16872963c62a4acbfb1e6290251b0f8007929ebf59052df8172f

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino7318.exe
      Filesize

      340KB

      MD5

      e1a13c901e59807a5fb3eea1e45ad325

      SHA1

      31f4edde97303c5a1375a0ced02e74902dc92ddf

      SHA256

      e10390bae166284a69189533b35e7bd53f97546b1d74a4243850d7c68677bdd4

      SHA512

      d4859e698c1062f653b543d4c60f0f5d81866c6313b70b79563beadb75a9e6709d3d9f874abe16872963c62a4acbfb1e6290251b0f8007929ebf59052df8172f

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus1817.exe
      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus1817.exe
      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor7480.exe
      Filesize

      298KB

      MD5

      efbdbc88da968cf4a0237ab84bf5c792

      SHA1

      e03c772e2100056b64b5e22751cc4dfd8f3c638e

      SHA256

      3ab0235da27297677aaaf5b21b3e75016b8ca586ddb2add4fc2e7206232a7a8f

      SHA512

      6e255232587f29e8980676bd93a722bfa3eefc9ada5c23708d712962d84ac12d8c4e34144b641980f3ed1ba963b66cc28e00f9c12709c94c866b7300ba4e1fee

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor7480.exe
      Filesize

      298KB

      MD5

      efbdbc88da968cf4a0237ab84bf5c792

      SHA1

      e03c772e2100056b64b5e22751cc4dfd8f3c638e

      SHA256

      3ab0235da27297677aaaf5b21b3e75016b8ca586ddb2add4fc2e7206232a7a8f

      SHA512

      6e255232587f29e8980676bd93a722bfa3eefc9ada5c23708d712962d84ac12d8c4e34144b641980f3ed1ba963b66cc28e00f9c12709c94c866b7300ba4e1fee

    • memory/608-167-0x00000000073B0000-0x0000000007954000-memory.dmp
      Filesize

      5.6MB

    • memory/608-168-0x0000000002D70000-0x0000000002D9D000-memory.dmp
      Filesize

      180KB

    • memory/608-170-0x0000000004DD0000-0x0000000004DE2000-memory.dmp
      Filesize

      72KB

    • memory/608-172-0x0000000004DD0000-0x0000000004DE2000-memory.dmp
      Filesize

      72KB

    • memory/608-169-0x00000000073A0000-0x00000000073B0000-memory.dmp
      Filesize

      64KB

    • memory/608-171-0x00000000073A0000-0x00000000073B0000-memory.dmp
      Filesize

      64KB

    • memory/608-175-0x0000000004DD0000-0x0000000004DE2000-memory.dmp
      Filesize

      72KB

    • memory/608-174-0x00000000073A0000-0x00000000073B0000-memory.dmp
      Filesize

      64KB

    • memory/608-177-0x0000000004DD0000-0x0000000004DE2000-memory.dmp
      Filesize

      72KB

    • memory/608-179-0x0000000004DD0000-0x0000000004DE2000-memory.dmp
      Filesize

      72KB

    • memory/608-181-0x0000000004DD0000-0x0000000004DE2000-memory.dmp
      Filesize

      72KB

    • memory/608-183-0x0000000004DD0000-0x0000000004DE2000-memory.dmp
      Filesize

      72KB

    • memory/608-185-0x0000000004DD0000-0x0000000004DE2000-memory.dmp
      Filesize

      72KB

    • memory/608-187-0x0000000004DD0000-0x0000000004DE2000-memory.dmp
      Filesize

      72KB

    • memory/608-189-0x0000000004DD0000-0x0000000004DE2000-memory.dmp
      Filesize

      72KB

    • memory/608-191-0x0000000004DD0000-0x0000000004DE2000-memory.dmp
      Filesize

      72KB

    • memory/608-193-0x0000000004DD0000-0x0000000004DE2000-memory.dmp
      Filesize

      72KB

    • memory/608-195-0x0000000004DD0000-0x0000000004DE2000-memory.dmp
      Filesize

      72KB

    • memory/608-197-0x0000000004DD0000-0x0000000004DE2000-memory.dmp
      Filesize

      72KB

    • memory/608-199-0x0000000004DD0000-0x0000000004DE2000-memory.dmp
      Filesize

      72KB

    • memory/608-200-0x0000000000400000-0x0000000002B79000-memory.dmp
      Filesize

      39.5MB

    • memory/608-201-0x00000000073A0000-0x00000000073B0000-memory.dmp
      Filesize

      64KB

    • memory/608-203-0x0000000000400000-0x0000000002B79000-memory.dmp
      Filesize

      39.5MB

    • memory/1296-161-0x00000000003F0000-0x00000000003FA000-memory.dmp
      Filesize

      40KB

    • memory/1960-208-0x0000000002C60000-0x0000000002CAB000-memory.dmp
      Filesize

      300KB

    • memory/1960-209-0x0000000004950000-0x0000000004960000-memory.dmp
      Filesize

      64KB

    • memory/1960-210-0x0000000004950000-0x0000000004960000-memory.dmp
      Filesize

      64KB

    • memory/1960-212-0x0000000004D40000-0x0000000004D7E000-memory.dmp
      Filesize

      248KB

    • memory/1960-211-0x0000000004D40000-0x0000000004D7E000-memory.dmp
      Filesize

      248KB

    • memory/1960-214-0x0000000004D40000-0x0000000004D7E000-memory.dmp
      Filesize

      248KB

    • memory/1960-216-0x0000000004D40000-0x0000000004D7E000-memory.dmp
      Filesize

      248KB

    • memory/1960-218-0x0000000004D40000-0x0000000004D7E000-memory.dmp
      Filesize

      248KB

    • memory/1960-220-0x0000000004D40000-0x0000000004D7E000-memory.dmp
      Filesize

      248KB

    • memory/1960-222-0x0000000004D40000-0x0000000004D7E000-memory.dmp
      Filesize

      248KB

    • memory/1960-224-0x0000000004D40000-0x0000000004D7E000-memory.dmp
      Filesize

      248KB

    • memory/1960-226-0x0000000004D40000-0x0000000004D7E000-memory.dmp
      Filesize

      248KB

    • memory/1960-228-0x0000000004D40000-0x0000000004D7E000-memory.dmp
      Filesize

      248KB

    • memory/1960-230-0x0000000004D40000-0x0000000004D7E000-memory.dmp
      Filesize

      248KB

    • memory/1960-232-0x0000000004D40000-0x0000000004D7E000-memory.dmp
      Filesize

      248KB

    • memory/1960-234-0x0000000004D40000-0x0000000004D7E000-memory.dmp
      Filesize

      248KB

    • memory/1960-236-0x0000000004D40000-0x0000000004D7E000-memory.dmp
      Filesize

      248KB

    • memory/1960-238-0x0000000004D40000-0x0000000004D7E000-memory.dmp
      Filesize

      248KB

    • memory/1960-240-0x0000000004D40000-0x0000000004D7E000-memory.dmp
      Filesize

      248KB

    • memory/1960-242-0x0000000004D40000-0x0000000004D7E000-memory.dmp
      Filesize

      248KB

    • memory/1960-244-0x0000000004D40000-0x0000000004D7E000-memory.dmp
      Filesize

      248KB

    • memory/1960-261-0x0000000004950000-0x0000000004960000-memory.dmp
      Filesize

      64KB

    • memory/1960-1118-0x00000000078B0000-0x0000000007EC8000-memory.dmp
      Filesize

      6.1MB

    • memory/1960-1119-0x0000000007ED0000-0x0000000007FDA000-memory.dmp
      Filesize

      1.0MB

    • memory/1960-1120-0x0000000004F40000-0x0000000004F52000-memory.dmp
      Filesize

      72KB

    • memory/1960-1121-0x0000000004F60000-0x0000000004F9C000-memory.dmp
      Filesize

      240KB

    • memory/1960-1122-0x0000000004950000-0x0000000004960000-memory.dmp
      Filesize

      64KB

    • memory/1960-1124-0x0000000004950000-0x0000000004960000-memory.dmp
      Filesize

      64KB

    • memory/1960-1125-0x0000000004950000-0x0000000004960000-memory.dmp
      Filesize

      64KB

    • memory/1960-1126-0x0000000004950000-0x0000000004960000-memory.dmp
      Filesize

      64KB