Analysis

  • max time kernel
    144s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 16:17

General

  • Target

    45b26e56b5da762c4ccdf36524d93f02d07b95192439a739e5e21509eede124f.exe

  • Size

    1.0MB

  • MD5

    4542adfd01621aa38c28e1ade5524fd3

  • SHA1

    5ace280e419588fd94c66a7a1e8967379f14a576

  • SHA256

    45b26e56b5da762c4ccdf36524d93f02d07b95192439a739e5e21509eede124f

  • SHA512

    981820ab772137ef3347626ade6c03ca349d0ee6573452ded0dc9f3897c950c6c7db122463b51b452c75e48be525662d4bbb4ca6e48971bb68a2c5d5dc510eae

  • SSDEEP

    24576:aybX82FLEKvKY1e2i8vIuyd1k2CzlR/7Za1Pg:hz8mLEmKY1e2iGIFd1k2CpR/7Z

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\45b26e56b5da762c4ccdf36524d93f02d07b95192439a739e5e21509eede124f.exe
    "C:\Users\Admin\AppData\Local\Temp\45b26e56b5da762c4ccdf36524d93f02d07b95192439a739e5e21509eede124f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4024
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7859.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7859.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3488
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina5675.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina5675.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2692
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina1989.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina1989.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3976
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu838939.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu838939.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3948
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor3213.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor3213.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1524
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dBq89s76.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dBq89s76.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:3944

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7859.exe

    Filesize

    858KB

    MD5

    ea70129b59a67140b7e4264e123fe7bb

    SHA1

    82f81c97545c93e9bbebd107fda771e734a3875f

    SHA256

    8c1108997068379bb28c3987a1ddc1998615a87479e4f67a9160b2c7861a6dc9

    SHA512

    b1fbfcf378aac37f12aa94e68ab1382628e7ac6dc6c35fc86b7811509d8ec02c48e2ef745e1eeef8af35a6e5233c6c5eedce21eac5f04edcde272df257d98b90

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7859.exe

    Filesize

    858KB

    MD5

    ea70129b59a67140b7e4264e123fe7bb

    SHA1

    82f81c97545c93e9bbebd107fda771e734a3875f

    SHA256

    8c1108997068379bb28c3987a1ddc1998615a87479e4f67a9160b2c7861a6dc9

    SHA512

    b1fbfcf378aac37f12aa94e68ab1382628e7ac6dc6c35fc86b7811509d8ec02c48e2ef745e1eeef8af35a6e5233c6c5eedce21eac5f04edcde272df257d98b90

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina5675.exe

    Filesize

    716KB

    MD5

    199bfc695069c3accb55abdd91e16e98

    SHA1

    1574811806fe6d1965585779c8a776de5eb9c9a8

    SHA256

    cb652c72d2479997b152208138fd6c1aae4a52fc4d5b0668fb4aed42fccfbe2e

    SHA512

    5151bbe2a176bf788ffff42cef73d1b60bb30c2d4fa03886bebe5c53932c791a20b66fcce1e40ebc5ea27d2694baded6048602ce51aac6c6ec71c95567082f5a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina5675.exe

    Filesize

    716KB

    MD5

    199bfc695069c3accb55abdd91e16e98

    SHA1

    1574811806fe6d1965585779c8a776de5eb9c9a8

    SHA256

    cb652c72d2479997b152208138fd6c1aae4a52fc4d5b0668fb4aed42fccfbe2e

    SHA512

    5151bbe2a176bf788ffff42cef73d1b60bb30c2d4fa03886bebe5c53932c791a20b66fcce1e40ebc5ea27d2694baded6048602ce51aac6c6ec71c95567082f5a

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dBq89s76.exe

    Filesize

    366KB

    MD5

    0e0b08561479b151b229b351548d94fd

    SHA1

    ae8acb5119fa234446dd99905e0eac5cb72ef736

    SHA256

    4a357d821ae7fdd58792a38b411e6411096fec3c795126c9990a5c9d00192cff

    SHA512

    fdccf84365c22cc3b030bb388fffe6a9a7731d3fa6a3205fbd02307389ceeeaaf173a4f782676f6e5f58556936bcf1485b386239c98c286059005bec5916f7b0

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dBq89s76.exe

    Filesize

    366KB

    MD5

    0e0b08561479b151b229b351548d94fd

    SHA1

    ae8acb5119fa234446dd99905e0eac5cb72ef736

    SHA256

    4a357d821ae7fdd58792a38b411e6411096fec3c795126c9990a5c9d00192cff

    SHA512

    fdccf84365c22cc3b030bb388fffe6a9a7731d3fa6a3205fbd02307389ceeeaaf173a4f782676f6e5f58556936bcf1485b386239c98c286059005bec5916f7b0

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina1989.exe

    Filesize

    354KB

    MD5

    50a848b5d40937879503f9c257d0822f

    SHA1

    3595f8eb14bc2027ec5efd580cb4c9cdad5c2e9d

    SHA256

    edce565de43b1481c1158ad1fc3c1d9c91ac588e1c57189012ad6b4420ec32a1

    SHA512

    1241998a34c8f29e253d7e0d5aaa2c7d889600877b4027064cca77b598f587ad248056bfb89216fc8ccc2ac03dfb4a54b6a873e735c4c2906d46384fca66bc13

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina1989.exe

    Filesize

    354KB

    MD5

    50a848b5d40937879503f9c257d0822f

    SHA1

    3595f8eb14bc2027ec5efd580cb4c9cdad5c2e9d

    SHA256

    edce565de43b1481c1158ad1fc3c1d9c91ac588e1c57189012ad6b4420ec32a1

    SHA512

    1241998a34c8f29e253d7e0d5aaa2c7d889600877b4027064cca77b598f587ad248056bfb89216fc8ccc2ac03dfb4a54b6a873e735c4c2906d46384fca66bc13

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu838939.exe

    Filesize

    12KB

    MD5

    f3b5c4aaad175eb3bc23b85b834d45d6

    SHA1

    37d8863dcaa3e6b5cb318fa913579fa1fffc50bf

    SHA256

    89085a9fec220f01f3f5343abab709833737c99158abb6d33061c22bb55063d4

    SHA512

    4dbda3d782ff1ca3c57fb348e09502c948f5a07e27f535ad2ed7e1636cefbc8d56e862b1530f1ef4eaaa2a6770d054e1a7c8934498c940a8d0d32b2dbf3f382f

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu838939.exe

    Filesize

    12KB

    MD5

    f3b5c4aaad175eb3bc23b85b834d45d6

    SHA1

    37d8863dcaa3e6b5cb318fa913579fa1fffc50bf

    SHA256

    89085a9fec220f01f3f5343abab709833737c99158abb6d33061c22bb55063d4

    SHA512

    4dbda3d782ff1ca3c57fb348e09502c948f5a07e27f535ad2ed7e1636cefbc8d56e862b1530f1ef4eaaa2a6770d054e1a7c8934498c940a8d0d32b2dbf3f382f

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor3213.exe

    Filesize

    308KB

    MD5

    b7a92c448e9644115b5a6f073ff3f1dd

    SHA1

    3400a5bcc55e0436ee9169df5df0c07730db0534

    SHA256

    c83bf4b3ae28bd96d9a00a20600cdbcf3489afd59826088e1a02466faa1861a3

    SHA512

    0d723ee034ebaf88acad7e9e76f2cead61a8c7dfb5d1ab7812c8119f00c46617d89712e40f8a5e414cf3af2b29668f01a4c09422d80a45e9384d92ece88e0649

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor3213.exe

    Filesize

    308KB

    MD5

    b7a92c448e9644115b5a6f073ff3f1dd

    SHA1

    3400a5bcc55e0436ee9169df5df0c07730db0534

    SHA256

    c83bf4b3ae28bd96d9a00a20600cdbcf3489afd59826088e1a02466faa1861a3

    SHA512

    0d723ee034ebaf88acad7e9e76f2cead61a8c7dfb5d1ab7812c8119f00c46617d89712e40f8a5e414cf3af2b29668f01a4c09422d80a45e9384d92ece88e0649

  • memory/1524-194-0x0000000004D30000-0x0000000004D40000-memory.dmp

    Filesize

    64KB

  • memory/1524-157-0x0000000004C30000-0x0000000004C48000-memory.dmp

    Filesize

    96KB

  • memory/1524-158-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/1524-159-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/1524-161-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/1524-165-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/1524-163-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/1524-168-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/1524-167-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/1524-170-0x0000000004D30000-0x0000000004D40000-memory.dmp

    Filesize

    64KB

  • memory/1524-171-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/1524-174-0x0000000004D30000-0x0000000004D40000-memory.dmp

    Filesize

    64KB

  • memory/1524-175-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/1524-177-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/1524-179-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/1524-172-0x0000000004D30000-0x0000000004D40000-memory.dmp

    Filesize

    64KB

  • memory/1524-183-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/1524-181-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/1524-185-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/1524-187-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/1524-189-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/1524-190-0x0000000000400000-0x0000000000710000-memory.dmp

    Filesize

    3.1MB

  • memory/1524-192-0x0000000004D30000-0x0000000004D40000-memory.dmp

    Filesize

    64KB

  • memory/1524-156-0x0000000004D40000-0x000000000523E000-memory.dmp

    Filesize

    5.0MB

  • memory/1524-193-0x0000000000400000-0x0000000000710000-memory.dmp

    Filesize

    3.1MB

  • memory/1524-155-0x00000000025A0000-0x00000000025BA000-memory.dmp

    Filesize

    104KB

  • memory/3944-204-0x0000000002740000-0x000000000277E000-memory.dmp

    Filesize

    248KB

  • memory/3944-228-0x0000000002740000-0x000000000277E000-memory.dmp

    Filesize

    248KB

  • memory/3944-200-0x0000000002740000-0x0000000002784000-memory.dmp

    Filesize

    272KB

  • memory/3944-201-0x0000000002740000-0x000000000277E000-memory.dmp

    Filesize

    248KB

  • memory/3944-202-0x0000000002740000-0x000000000277E000-memory.dmp

    Filesize

    248KB

  • memory/3944-1121-0x0000000002730000-0x0000000002740000-memory.dmp

    Filesize

    64KB

  • memory/3944-206-0x0000000002740000-0x000000000277E000-memory.dmp

    Filesize

    248KB

  • memory/3944-208-0x0000000002740000-0x000000000277E000-memory.dmp

    Filesize

    248KB

  • memory/3944-210-0x0000000002740000-0x000000000277E000-memory.dmp

    Filesize

    248KB

  • memory/3944-212-0x0000000002740000-0x000000000277E000-memory.dmp

    Filesize

    248KB

  • memory/3944-214-0x0000000002740000-0x000000000277E000-memory.dmp

    Filesize

    248KB

  • memory/3944-216-0x0000000002740000-0x000000000277E000-memory.dmp

    Filesize

    248KB

  • memory/3944-218-0x0000000002740000-0x000000000277E000-memory.dmp

    Filesize

    248KB

  • memory/3944-220-0x0000000002740000-0x000000000277E000-memory.dmp

    Filesize

    248KB

  • memory/3944-222-0x0000000002740000-0x000000000277E000-memory.dmp

    Filesize

    248KB

  • memory/3944-224-0x0000000002740000-0x000000000277E000-memory.dmp

    Filesize

    248KB

  • memory/3944-226-0x0000000002740000-0x000000000277E000-memory.dmp

    Filesize

    248KB

  • memory/3944-199-0x0000000002380000-0x00000000023C6000-memory.dmp

    Filesize

    280KB

  • memory/3944-230-0x0000000002740000-0x000000000277E000-memory.dmp

    Filesize

    248KB

  • memory/3944-232-0x0000000002740000-0x000000000277E000-memory.dmp

    Filesize

    248KB

  • memory/3944-234-0x0000000002740000-0x000000000277E000-memory.dmp

    Filesize

    248KB

  • memory/3944-236-0x00000000007F0000-0x000000000083B000-memory.dmp

    Filesize

    300KB

  • memory/3944-240-0x0000000002730000-0x0000000002740000-memory.dmp

    Filesize

    64KB

  • memory/3944-241-0x0000000002730000-0x0000000002740000-memory.dmp

    Filesize

    64KB

  • memory/3944-238-0x0000000002730000-0x0000000002740000-memory.dmp

    Filesize

    64KB

  • memory/3944-1111-0x0000000005840000-0x0000000005E46000-memory.dmp

    Filesize

    6.0MB

  • memory/3944-1112-0x00000000052B0000-0x00000000053BA000-memory.dmp

    Filesize

    1.0MB

  • memory/3944-1113-0x00000000053F0000-0x0000000005402000-memory.dmp

    Filesize

    72KB

  • memory/3944-1114-0x0000000005410000-0x000000000544E000-memory.dmp

    Filesize

    248KB

  • memory/3944-1115-0x0000000002730000-0x0000000002740000-memory.dmp

    Filesize

    64KB

  • memory/3944-1116-0x0000000005560000-0x00000000055AB000-memory.dmp

    Filesize

    300KB

  • memory/3944-1118-0x0000000002730000-0x0000000002740000-memory.dmp

    Filesize

    64KB

  • memory/3944-1119-0x0000000002730000-0x0000000002740000-memory.dmp

    Filesize

    64KB

  • memory/3944-1120-0x0000000002730000-0x0000000002740000-memory.dmp

    Filesize

    64KB

  • memory/3948-149-0x0000000000A90000-0x0000000000A9A000-memory.dmp

    Filesize

    40KB