Analysis

  • max time kernel
    16s
  • max time network
    67s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 23:46

General

  • Target

    6c698d54f0b40b3a4c50f6c44b6ea3d0a03b2812b186970998daa9d407dc1c2a.exe

  • Size

    699KB

  • MD5

    ce663ef1c86e6834115127889800eeb4

  • SHA1

    c32a3b182cd487ced7736708136f924b12dbadfa

  • SHA256

    6c698d54f0b40b3a4c50f6c44b6ea3d0a03b2812b186970998daa9d407dc1c2a

  • SHA512

    8a80fb741dbf46ea32c6e80ad6603051b875159d6366b75cdb2669ce6440aa2b18e3ee5f2d436a72240abf548cc869fc70d718f91a7a68ed13696b4a93e3df78

  • SSDEEP

    12288:oMr8y90AogMQxvwDV9D5gcAQVcPpqNBqufTQ6xs4VFywPMiW:kydFME4DcQVcPpqqE7vp6

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c698d54f0b40b3a4c50f6c44b6ea3d0a03b2812b186970998daa9d407dc1c2a.exe
    "C:\Users\Admin\AppData\Local\Temp\6c698d54f0b40b3a4c50f6c44b6ea3d0a03b2812b186970998daa9d407dc1c2a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4184
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un963741.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un963741.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1364
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9607.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9607.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4060
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4060 -s 1084
          4⤵
          • Program crash
          PID:5036
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4358.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4358.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4544
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4060 -ip 4060
    1⤵
      PID:1128

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un963741.exe

      Filesize

      558KB

      MD5

      c1a9edeb234e60e82956a5c9cedd128b

      SHA1

      c947ea6c2f3d8668eda4eb89b262c7be624d765d

      SHA256

      12e1c63007b220bcde434e9bc70b7e7fefc852a545a56e1089cac4b3a784ec40

      SHA512

      ea0f8919ba9e5fd789837c1fecdc9f02e98a1a78bca77fa04b14b02a02b7d0afaa5aa947ccdb296a8addfafba96df7b715e02fdbff9bb8833b5546a93d8c85d4

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un963741.exe

      Filesize

      558KB

      MD5

      c1a9edeb234e60e82956a5c9cedd128b

      SHA1

      c947ea6c2f3d8668eda4eb89b262c7be624d765d

      SHA256

      12e1c63007b220bcde434e9bc70b7e7fefc852a545a56e1089cac4b3a784ec40

      SHA512

      ea0f8919ba9e5fd789837c1fecdc9f02e98a1a78bca77fa04b14b02a02b7d0afaa5aa947ccdb296a8addfafba96df7b715e02fdbff9bb8833b5546a93d8c85d4

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9607.exe

      Filesize

      307KB

      MD5

      fc2230c97cb7d7698d30305f16e1bd6e

      SHA1

      bd25ba513540dd871ff3b38546ef3d1587fd1721

      SHA256

      5097a9d09bfd28a70849cfb7e479121c1f285b22fbacb0fd6b2d7c0abd3529dd

      SHA512

      d92eabf232c7b14e258e559305632cdde601be7e0710ca42ab0e485e1d2b27c25d6448c7b99f109b2a452edcf9dcd0b64a77fcf0e3331c6ee371b31e7b580cbd

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9607.exe

      Filesize

      307KB

      MD5

      fc2230c97cb7d7698d30305f16e1bd6e

      SHA1

      bd25ba513540dd871ff3b38546ef3d1587fd1721

      SHA256

      5097a9d09bfd28a70849cfb7e479121c1f285b22fbacb0fd6b2d7c0abd3529dd

      SHA512

      d92eabf232c7b14e258e559305632cdde601be7e0710ca42ab0e485e1d2b27c25d6448c7b99f109b2a452edcf9dcd0b64a77fcf0e3331c6ee371b31e7b580cbd

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4358.exe

      Filesize

      365KB

      MD5

      b996b1a321593eec9eb2d6f8c43b70b2

      SHA1

      53bf8d77565f2714253d91d07c9a452a5c8b6465

      SHA256

      93db462dbcd11e091f137f80c1facd4819f69a478eb4f7d0294299e4cb552e91

      SHA512

      257f06dd82857577187c4541c1a89c06ef8641687331eb46e297625e29751a2b23256862839a0c2396b5001a82a58ed27a736706e771b6775b5e3a47b2a61f76

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4358.exe

      Filesize

      365KB

      MD5

      b996b1a321593eec9eb2d6f8c43b70b2

      SHA1

      53bf8d77565f2714253d91d07c9a452a5c8b6465

      SHA256

      93db462dbcd11e091f137f80c1facd4819f69a478eb4f7d0294299e4cb552e91

      SHA512

      257f06dd82857577187c4541c1a89c06ef8641687331eb46e297625e29751a2b23256862839a0c2396b5001a82a58ed27a736706e771b6775b5e3a47b2a61f76

    • memory/4060-170-0x0000000004C70000-0x0000000004C82000-memory.dmp

      Filesize

      72KB

    • memory/4060-176-0x0000000004C70000-0x0000000004C82000-memory.dmp

      Filesize

      72KB

    • memory/4060-152-0x0000000004C90000-0x0000000004CA0000-memory.dmp

      Filesize

      64KB

    • memory/4060-153-0x0000000004C70000-0x0000000004C82000-memory.dmp

      Filesize

      72KB

    • memory/4060-154-0x0000000004C70000-0x0000000004C82000-memory.dmp

      Filesize

      72KB

    • memory/4060-156-0x0000000004C70000-0x0000000004C82000-memory.dmp

      Filesize

      72KB

    • memory/4060-158-0x0000000004C70000-0x0000000004C82000-memory.dmp

      Filesize

      72KB

    • memory/4060-160-0x0000000004C70000-0x0000000004C82000-memory.dmp

      Filesize

      72KB

    • memory/4060-162-0x0000000004C70000-0x0000000004C82000-memory.dmp

      Filesize

      72KB

    • memory/4060-164-0x0000000004C70000-0x0000000004C82000-memory.dmp

      Filesize

      72KB

    • memory/4060-166-0x0000000004C70000-0x0000000004C82000-memory.dmp

      Filesize

      72KB

    • memory/4060-168-0x0000000004C70000-0x0000000004C82000-memory.dmp

      Filesize

      72KB

    • memory/4060-149-0x0000000000710000-0x000000000073D000-memory.dmp

      Filesize

      180KB

    • memory/4060-172-0x0000000004C70000-0x0000000004C82000-memory.dmp

      Filesize

      72KB

    • memory/4060-174-0x0000000004C70000-0x0000000004C82000-memory.dmp

      Filesize

      72KB

    • memory/4060-151-0x0000000004C90000-0x0000000004CA0000-memory.dmp

      Filesize

      64KB

    • memory/4060-178-0x0000000004C70000-0x0000000004C82000-memory.dmp

      Filesize

      72KB

    • memory/4060-180-0x0000000004C70000-0x0000000004C82000-memory.dmp

      Filesize

      72KB

    • memory/4060-181-0x0000000000400000-0x000000000070F000-memory.dmp

      Filesize

      3.1MB

    • memory/4060-182-0x0000000004C90000-0x0000000004CA0000-memory.dmp

      Filesize

      64KB

    • memory/4060-183-0x0000000004C90000-0x0000000004CA0000-memory.dmp

      Filesize

      64KB

    • memory/4060-185-0x0000000000400000-0x000000000070F000-memory.dmp

      Filesize

      3.1MB

    • memory/4060-150-0x0000000004C90000-0x0000000004CA0000-memory.dmp

      Filesize

      64KB

    • memory/4060-148-0x0000000004CA0000-0x0000000005244000-memory.dmp

      Filesize

      5.6MB

    • memory/4544-190-0x0000000000720000-0x000000000076B000-memory.dmp

      Filesize

      300KB

    • memory/4544-191-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

      Filesize

      64KB

    • memory/4544-192-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

      Filesize

      64KB

    • memory/4544-193-0x00000000052A0000-0x00000000052DF000-memory.dmp

      Filesize

      252KB

    • memory/4544-194-0x00000000052A0000-0x00000000052DF000-memory.dmp

      Filesize

      252KB

    • memory/4544-196-0x00000000052A0000-0x00000000052DF000-memory.dmp

      Filesize

      252KB

    • memory/4544-198-0x00000000052A0000-0x00000000052DF000-memory.dmp

      Filesize

      252KB

    • memory/4544-200-0x00000000052A0000-0x00000000052DF000-memory.dmp

      Filesize

      252KB