Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 16:25

General

  • Target

    58c8dd496d5908760c60af99aa20eaa43caee876561ef799cea440dbd720d2fa.exe

  • Size

    700KB

  • MD5

    b4a936a1e098a33fbcc89886d422a61d

  • SHA1

    4eded5403ab3964d47557df4523a44dd88687099

  • SHA256

    58c8dd496d5908760c60af99aa20eaa43caee876561ef799cea440dbd720d2fa

  • SHA512

    a00a940311b092f92874e73378229657b14260782eaa8d357090bd6c34ff7cfb7a3eba17e0df1c26fc954bd71a8b1bcb3c29e8ce4eb215cb3427d46d723cd09a

  • SSDEEP

    12288:AMrly90PhMhDMkaBta7uO2j9I6EJrwOZ2OjqulaRumDWBRvIYbgf4XJjr5:1yvMkQouOoKwOZ2OjqoaPDWPbgf4XJj1

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\58c8dd496d5908760c60af99aa20eaa43caee876561ef799cea440dbd720d2fa.exe
    "C:\Users\Admin\AppData\Local\Temp\58c8dd496d5908760c60af99aa20eaa43caee876561ef799cea440dbd720d2fa.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un842605.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un842605.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1984
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3141.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3141.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4284
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6338.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6338.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1348

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un842605.exe

    Filesize

    558KB

    MD5

    5cf898d327739536380f9ea8da171ada

    SHA1

    8375f5f349f4cd50bf506b29342cc946b7a717bc

    SHA256

    0ffe264240faa3de22c2ba38e93851ccbaeeb936e432f1fcc2c59ee3d2a63692

    SHA512

    44937208ab625fa0e0f3b3e26e3d1343c81990d3ec9dba76ba62b7111672dbb46ee71565cb3254820d02d7ee9bf4e36515c9239b3354a2f72d59f8e26d04ba11

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un842605.exe

    Filesize

    558KB

    MD5

    5cf898d327739536380f9ea8da171ada

    SHA1

    8375f5f349f4cd50bf506b29342cc946b7a717bc

    SHA256

    0ffe264240faa3de22c2ba38e93851ccbaeeb936e432f1fcc2c59ee3d2a63692

    SHA512

    44937208ab625fa0e0f3b3e26e3d1343c81990d3ec9dba76ba62b7111672dbb46ee71565cb3254820d02d7ee9bf4e36515c9239b3354a2f72d59f8e26d04ba11

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3141.exe

    Filesize

    308KB

    MD5

    67074d829eb479bdfaa041d4f4d837c8

    SHA1

    07701b3a6b29520349bdbf3a7029ccbefcd86fdf

    SHA256

    b8d435844479c7c04ee5151a2854212e09f3c32a04c4c7fd77d9d4caea545264

    SHA512

    4ed6d8519d57af23e3bcbcb89940f9029d564128e8696ac691b0fdb6f19753f9cf1bc0abc7bf3266cd131e0d9c00b84922f26dd0dcc78acd8a2fa53918a6022d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3141.exe

    Filesize

    308KB

    MD5

    67074d829eb479bdfaa041d4f4d837c8

    SHA1

    07701b3a6b29520349bdbf3a7029ccbefcd86fdf

    SHA256

    b8d435844479c7c04ee5151a2854212e09f3c32a04c4c7fd77d9d4caea545264

    SHA512

    4ed6d8519d57af23e3bcbcb89940f9029d564128e8696ac691b0fdb6f19753f9cf1bc0abc7bf3266cd131e0d9c00b84922f26dd0dcc78acd8a2fa53918a6022d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6338.exe

    Filesize

    366KB

    MD5

    479e875050cab2e1aa1904cdbce7ea57

    SHA1

    0f5bb567896c63db7e74559e913abad4a43f5dcb

    SHA256

    fb7be0d50fa6b9b4736da5954d9cbd29292ba756022364fe004d8b6b6424fe2d

    SHA512

    a1388d14698eac10ec5b5ad5b0f06fed00afb3dd2ce8efc294e4444c6c0536c5db3278cf63bcc311eb23a834cd23b6bbaadd7a0125e605a7966ca76824eda947

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6338.exe

    Filesize

    366KB

    MD5

    479e875050cab2e1aa1904cdbce7ea57

    SHA1

    0f5bb567896c63db7e74559e913abad4a43f5dcb

    SHA256

    fb7be0d50fa6b9b4736da5954d9cbd29292ba756022364fe004d8b6b6424fe2d

    SHA512

    a1388d14698eac10ec5b5ad5b0f06fed00afb3dd2ce8efc294e4444c6c0536c5db3278cf63bcc311eb23a834cd23b6bbaadd7a0125e605a7966ca76824eda947

  • memory/1348-207-0x00000000009C0000-0x00000000009D0000-memory.dmp

    Filesize

    64KB

  • memory/1348-211-0x0000000005200000-0x000000000523E000-memory.dmp

    Filesize

    248KB

  • memory/1348-1103-0x00000000009C0000-0x00000000009D0000-memory.dmp

    Filesize

    64KB

  • memory/1348-1102-0x00000000009C0000-0x00000000009D0000-memory.dmp

    Filesize

    64KB

  • memory/1348-186-0x0000000005200000-0x000000000523E000-memory.dmp

    Filesize

    248KB

  • memory/1348-1100-0x00000000009C0000-0x00000000009D0000-memory.dmp

    Filesize

    64KB

  • memory/1348-1098-0x0000000005B70000-0x0000000005BBB000-memory.dmp

    Filesize

    300KB

  • memory/1348-184-0x0000000005200000-0x000000000523E000-memory.dmp

    Filesize

    248KB

  • memory/1348-1097-0x0000000005A20000-0x0000000005A5E000-memory.dmp

    Filesize

    248KB

  • memory/1348-1096-0x00000000009C0000-0x00000000009D0000-memory.dmp

    Filesize

    64KB

  • memory/1348-1095-0x0000000005A00000-0x0000000005A12000-memory.dmp

    Filesize

    72KB

  • memory/1348-1094-0x00000000058C0000-0x00000000059CA000-memory.dmp

    Filesize

    1.0MB

  • memory/1348-1093-0x0000000005240000-0x0000000005846000-memory.dmp

    Filesize

    6.0MB

  • memory/1348-220-0x0000000005200000-0x000000000523E000-memory.dmp

    Filesize

    248KB

  • memory/1348-218-0x0000000005200000-0x000000000523E000-memory.dmp

    Filesize

    248KB

  • memory/1348-216-0x0000000005200000-0x000000000523E000-memory.dmp

    Filesize

    248KB

  • memory/1348-214-0x0000000005200000-0x000000000523E000-memory.dmp

    Filesize

    248KB

  • memory/1348-212-0x00000000009C0000-0x00000000009D0000-memory.dmp

    Filesize

    64KB

  • memory/1348-210-0x00000000009C0000-0x00000000009D0000-memory.dmp

    Filesize

    64KB

  • memory/1348-208-0x0000000005200000-0x000000000523E000-memory.dmp

    Filesize

    248KB

  • memory/1348-205-0x00000000007F0000-0x000000000083B000-memory.dmp

    Filesize

    300KB

  • memory/1348-204-0x0000000005200000-0x000000000523E000-memory.dmp

    Filesize

    248KB

  • memory/1348-202-0x0000000005200000-0x000000000523E000-memory.dmp

    Filesize

    248KB

  • memory/1348-200-0x0000000005200000-0x000000000523E000-memory.dmp

    Filesize

    248KB

  • memory/1348-198-0x0000000005200000-0x000000000523E000-memory.dmp

    Filesize

    248KB

  • memory/1348-196-0x0000000005200000-0x000000000523E000-memory.dmp

    Filesize

    248KB

  • memory/1348-194-0x0000000005200000-0x000000000523E000-memory.dmp

    Filesize

    248KB

  • memory/1348-181-0x0000000002700000-0x0000000002746000-memory.dmp

    Filesize

    280KB

  • memory/1348-182-0x0000000005200000-0x0000000005244000-memory.dmp

    Filesize

    272KB

  • memory/1348-183-0x0000000005200000-0x000000000523E000-memory.dmp

    Filesize

    248KB

  • memory/1348-188-0x0000000005200000-0x000000000523E000-memory.dmp

    Filesize

    248KB

  • memory/1348-1101-0x00000000009C0000-0x00000000009D0000-memory.dmp

    Filesize

    64KB

  • memory/1348-192-0x0000000005200000-0x000000000523E000-memory.dmp

    Filesize

    248KB

  • memory/1348-190-0x0000000005200000-0x000000000523E000-memory.dmp

    Filesize

    248KB

  • memory/4284-142-0x00000000027B0000-0x00000000027C0000-memory.dmp

    Filesize

    64KB

  • memory/4284-166-0x00000000026B0000-0x00000000026C2000-memory.dmp

    Filesize

    72KB

  • memory/4284-146-0x00000000026B0000-0x00000000026C2000-memory.dmp

    Filesize

    72KB

  • memory/4284-176-0x0000000000400000-0x0000000000710000-memory.dmp

    Filesize

    3.1MB

  • memory/4284-175-0x00000000027B0000-0x00000000027C0000-memory.dmp

    Filesize

    64KB

  • memory/4284-173-0x00000000027B0000-0x00000000027C0000-memory.dmp

    Filesize

    64KB

  • memory/4284-172-0x00000000027B0000-0x00000000027C0000-memory.dmp

    Filesize

    64KB

  • memory/4284-171-0x0000000000400000-0x0000000000710000-memory.dmp

    Filesize

    3.1MB

  • memory/4284-136-0x0000000002520000-0x000000000253A000-memory.dmp

    Filesize

    104KB

  • memory/4284-170-0x00000000026B0000-0x00000000026C2000-memory.dmp

    Filesize

    72KB

  • memory/4284-168-0x00000000026B0000-0x00000000026C2000-memory.dmp

    Filesize

    72KB

  • memory/4284-140-0x00000000027B0000-0x00000000027C0000-memory.dmp

    Filesize

    64KB

  • memory/4284-138-0x00000000026B0000-0x00000000026C8000-memory.dmp

    Filesize

    96KB

  • memory/4284-137-0x0000000004F00000-0x00000000053FE000-memory.dmp

    Filesize

    5.0MB

  • memory/4284-148-0x00000000026B0000-0x00000000026C2000-memory.dmp

    Filesize

    72KB

  • memory/4284-160-0x00000000026B0000-0x00000000026C2000-memory.dmp

    Filesize

    72KB

  • memory/4284-158-0x00000000026B0000-0x00000000026C2000-memory.dmp

    Filesize

    72KB

  • memory/4284-164-0x00000000026B0000-0x00000000026C2000-memory.dmp

    Filesize

    72KB

  • memory/4284-154-0x00000000026B0000-0x00000000026C2000-memory.dmp

    Filesize

    72KB

  • memory/4284-152-0x00000000026B0000-0x00000000026C2000-memory.dmp

    Filesize

    72KB

  • memory/4284-150-0x00000000026B0000-0x00000000026C2000-memory.dmp

    Filesize

    72KB

  • memory/4284-162-0x00000000026B0000-0x00000000026C2000-memory.dmp

    Filesize

    72KB

  • memory/4284-144-0x00000000026B0000-0x00000000026C2000-memory.dmp

    Filesize

    72KB

  • memory/4284-143-0x00000000026B0000-0x00000000026C2000-memory.dmp

    Filesize

    72KB

  • memory/4284-139-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4284-141-0x00000000027B0000-0x00000000027C0000-memory.dmp

    Filesize

    64KB

  • memory/4284-156-0x00000000026B0000-0x00000000026C2000-memory.dmp

    Filesize

    72KB