Analysis

  • max time kernel
    142s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-04-2023 07:02

General

  • Target

    25d21e4fc131a2fc482ad5257402e435f9679e6037797884e5d1ab13a8890d0a.exe

  • Size

    1.0MB

  • MD5

    f7e469503c0699679d8d960684826bf3

  • SHA1

    385d3213b1362cdef07145314571191890e73ed2

  • SHA256

    25d21e4fc131a2fc482ad5257402e435f9679e6037797884e5d1ab13a8890d0a

  • SHA512

    0561093e01cbf9844a74cc70e7ff5591a58f7a24dd1726624cab0d048b6b3b85d221bba7edbfd43f9b1fe026266c17fff8c28fce1f8e2ecfa79d748d4d15eeb0

  • SSDEEP

    24576:qtpqPLoJS2nPsuAVc2PStfnxdwZNYfrMXoIemTNFB3iLUI46B:tLssPa2InxyLYkoI5NriLUI

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 17 IoCs
  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\25d21e4fc131a2fc482ad5257402e435f9679e6037797884e5d1ab13a8890d0a.exe
    "C:\Users\Admin\AppData\Local\Temp\25d21e4fc131a2fc482ad5257402e435f9679e6037797884e5d1ab13a8890d0a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4928
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino4461.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino4461.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2920
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino6268.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino6268.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1396
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino0354.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino0354.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2428
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus6679.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus6679.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2164
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\con7032.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\con7032.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4144
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4144 -s 1096
              6⤵
              • Program crash
              PID:2352
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dtF55s07.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dtF55s07.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:3776
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4144 -ip 4144
    1⤵
      PID:3808

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino4461.exe

      Filesize

      777KB

      MD5

      40e17b7882e1b7779e51c063e5f3dcd4

      SHA1

      289cf988bb744b05c62f44dbc7d1ff80de7260a0

      SHA256

      a653981acf8c7fceca9d7d816afed40699b80c3d63b84eda17a1b3209aacab37

      SHA512

      66b777809b49272654bb56b318d536d1be4ecac6825b7042fe0844328196cb9de3002997ec65b8c4ec9f26bde2f7481daa2652799bdc1a5fe4d3594da3a1e3f4

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino4461.exe

      Filesize

      777KB

      MD5

      40e17b7882e1b7779e51c063e5f3dcd4

      SHA1

      289cf988bb744b05c62f44dbc7d1ff80de7260a0

      SHA256

      a653981acf8c7fceca9d7d816afed40699b80c3d63b84eda17a1b3209aacab37

      SHA512

      66b777809b49272654bb56b318d536d1be4ecac6825b7042fe0844328196cb9de3002997ec65b8c4ec9f26bde2f7481daa2652799bdc1a5fe4d3594da3a1e3f4

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino6268.exe

      Filesize

      635KB

      MD5

      f9f2b7c6e6b2e5c41fa1b2c771558de5

      SHA1

      8ab0eeda6e1dff07ac1cb0aaa50caea51120f468

      SHA256

      2af12fac864213e0f75a345c50731f9c8646754aceaf760d0a68d6721ded737e

      SHA512

      0dde26f4dffa08c27e4a91e0799c1ebbb8537a0d2216e3f984e6d9937807425d45deaaac40ce924e57344009b2764737b13be0ef60e97e53cbb324d17cf5731b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino6268.exe

      Filesize

      635KB

      MD5

      f9f2b7c6e6b2e5c41fa1b2c771558de5

      SHA1

      8ab0eeda6e1dff07ac1cb0aaa50caea51120f468

      SHA256

      2af12fac864213e0f75a345c50731f9c8646754aceaf760d0a68d6721ded737e

      SHA512

      0dde26f4dffa08c27e4a91e0799c1ebbb8537a0d2216e3f984e6d9937807425d45deaaac40ce924e57344009b2764737b13be0ef60e97e53cbb324d17cf5731b

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dtF55s07.exe

      Filesize

      283KB

      MD5

      3ef668543a6f7d73b132474398f33787

      SHA1

      41ce59d5e8f49a94725b93ccc1d05b360806385b

      SHA256

      ee7306ade345d7e5bf0fd00778d02875b57cabe7a9e24c9b1769ca08a4c9267d

      SHA512

      c8d09351a08b3ef0caddeab3dfa9e82c93d7d1e478121e564355f27b81a8196d9f1c65fe33622e7bd8660a730bfaff378c36ac096b3053fa0d4c2b3b10d43588

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dtF55s07.exe

      Filesize

      283KB

      MD5

      3ef668543a6f7d73b132474398f33787

      SHA1

      41ce59d5e8f49a94725b93ccc1d05b360806385b

      SHA256

      ee7306ade345d7e5bf0fd00778d02875b57cabe7a9e24c9b1769ca08a4c9267d

      SHA512

      c8d09351a08b3ef0caddeab3dfa9e82c93d7d1e478121e564355f27b81a8196d9f1c65fe33622e7bd8660a730bfaff378c36ac096b3053fa0d4c2b3b10d43588

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino0354.exe

      Filesize

      315KB

      MD5

      95577b2b8e1acfae23d1004e64f7de32

      SHA1

      131b16daa12da8ffc55840bb69ef36bd6a1443dc

      SHA256

      17c574a6be3246206ec7a934f2b0cd4e246e54e9dc169a01eb16fcb3ffe78fdb

      SHA512

      b85a3fd091044b71df25e1bf6bb3466faefd3a745b244c2d663e594d3661bd73118855eea18e58fb635553ef5f68cc62d46618be7c83b2ba1df4ec1903106d2b

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino0354.exe

      Filesize

      315KB

      MD5

      95577b2b8e1acfae23d1004e64f7de32

      SHA1

      131b16daa12da8ffc55840bb69ef36bd6a1443dc

      SHA256

      17c574a6be3246206ec7a934f2b0cd4e246e54e9dc169a01eb16fcb3ffe78fdb

      SHA512

      b85a3fd091044b71df25e1bf6bb3466faefd3a745b244c2d663e594d3661bd73118855eea18e58fb635553ef5f68cc62d46618be7c83b2ba1df4ec1903106d2b

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus6679.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus6679.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\con7032.exe

      Filesize

      226KB

      MD5

      6ec4e46cba5aa76b85ff5e5740c60a7f

      SHA1

      61f441e25a2a540f9db394d978541b02f57e8dea

      SHA256

      77fe2d3859e55e6fd759bd7193fc6b8548af991e231beaea30628b7366d3a785

      SHA512

      5fa870fecc863c72ce7b03141d6511d15671a984d7b3d50483576a22c45dce5cd9cfbb2ad8cd31a1df29c5d111af370fb73b2dd282cad82239c42d5bfc078ba1

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\con7032.exe

      Filesize

      226KB

      MD5

      6ec4e46cba5aa76b85ff5e5740c60a7f

      SHA1

      61f441e25a2a540f9db394d978541b02f57e8dea

      SHA256

      77fe2d3859e55e6fd759bd7193fc6b8548af991e231beaea30628b7366d3a785

      SHA512

      5fa870fecc863c72ce7b03141d6511d15671a984d7b3d50483576a22c45dce5cd9cfbb2ad8cd31a1df29c5d111af370fb73b2dd282cad82239c42d5bfc078ba1

    • memory/2164-163-0x0000000000ED0000-0x0000000000EDA000-memory.dmp

      Filesize

      40KB

    • memory/3776-371-0x00000000027B0000-0x00000000027C0000-memory.dmp

      Filesize

      64KB

    • memory/3776-240-0x0000000002730000-0x000000000276E000-memory.dmp

      Filesize

      248KB

    • memory/3776-1129-0x00000000027B0000-0x00000000027C0000-memory.dmp

      Filesize

      64KB

    • memory/3776-1128-0x0000000005A10000-0x0000000005A4C000-memory.dmp

      Filesize

      240KB

    • memory/3776-1127-0x00000000059F0000-0x0000000005A02000-memory.dmp

      Filesize

      72KB

    • memory/3776-1126-0x00000000058B0000-0x00000000059BA000-memory.dmp

      Filesize

      1.0MB

    • memory/3776-1125-0x0000000005210000-0x0000000005828000-memory.dmp

      Filesize

      6.1MB

    • memory/3776-216-0x0000000002730000-0x000000000276E000-memory.dmp

      Filesize

      248KB

    • memory/3776-367-0x00000000027B0000-0x00000000027C0000-memory.dmp

      Filesize

      64KB

    • memory/3776-370-0x00000000027B0000-0x00000000027C0000-memory.dmp

      Filesize

      64KB

    • memory/3776-366-0x0000000000620000-0x000000000066B000-memory.dmp

      Filesize

      300KB

    • memory/3776-244-0x0000000002730000-0x000000000276E000-memory.dmp

      Filesize

      248KB

    • memory/3776-242-0x0000000002730000-0x000000000276E000-memory.dmp

      Filesize

      248KB

    • memory/3776-1132-0x00000000027B0000-0x00000000027C0000-memory.dmp

      Filesize

      64KB

    • memory/3776-238-0x0000000002730000-0x000000000276E000-memory.dmp

      Filesize

      248KB

    • memory/3776-236-0x0000000002730000-0x000000000276E000-memory.dmp

      Filesize

      248KB

    • memory/3776-234-0x0000000002730000-0x000000000276E000-memory.dmp

      Filesize

      248KB

    • memory/3776-232-0x0000000002730000-0x000000000276E000-memory.dmp

      Filesize

      248KB

    • memory/3776-230-0x0000000002730000-0x000000000276E000-memory.dmp

      Filesize

      248KB

    • memory/3776-228-0x0000000002730000-0x000000000276E000-memory.dmp

      Filesize

      248KB

    • memory/3776-226-0x0000000002730000-0x000000000276E000-memory.dmp

      Filesize

      248KB

    • memory/3776-224-0x0000000002730000-0x000000000276E000-memory.dmp

      Filesize

      248KB

    • memory/3776-222-0x0000000002730000-0x000000000276E000-memory.dmp

      Filesize

      248KB

    • memory/3776-220-0x0000000002730000-0x000000000276E000-memory.dmp

      Filesize

      248KB

    • memory/3776-218-0x0000000002730000-0x000000000276E000-memory.dmp

      Filesize

      248KB

    • memory/3776-1133-0x00000000027B0000-0x00000000027C0000-memory.dmp

      Filesize

      64KB

    • memory/3776-1134-0x00000000027B0000-0x00000000027C0000-memory.dmp

      Filesize

      64KB

    • memory/3776-215-0x0000000002730000-0x000000000276E000-memory.dmp

      Filesize

      248KB

    • memory/4144-174-0x00000000025C0000-0x00000000025D0000-memory.dmp

      Filesize

      64KB

    • memory/4144-198-0x00000000025D0000-0x00000000025E2000-memory.dmp

      Filesize

      72KB

    • memory/4144-207-0x00000000025C0000-0x00000000025D0000-memory.dmp

      Filesize

      64KB

    • memory/4144-206-0x00000000025C0000-0x00000000025D0000-memory.dmp

      Filesize

      64KB

    • memory/4144-205-0x00000000025C0000-0x00000000025D0000-memory.dmp

      Filesize

      64KB

    • memory/4144-204-0x0000000000400000-0x00000000004B8000-memory.dmp

      Filesize

      736KB

    • memory/4144-180-0x00000000025D0000-0x00000000025E2000-memory.dmp

      Filesize

      72KB

    • memory/4144-182-0x00000000025D0000-0x00000000025E2000-memory.dmp

      Filesize

      72KB

    • memory/4144-184-0x00000000025D0000-0x00000000025E2000-memory.dmp

      Filesize

      72KB

    • memory/4144-186-0x00000000025D0000-0x00000000025E2000-memory.dmp

      Filesize

      72KB

    • memory/4144-188-0x00000000025D0000-0x00000000025E2000-memory.dmp

      Filesize

      72KB

    • memory/4144-194-0x00000000025D0000-0x00000000025E2000-memory.dmp

      Filesize

      72KB

    • memory/4144-196-0x00000000025D0000-0x00000000025E2000-memory.dmp

      Filesize

      72KB

    • memory/4144-209-0x0000000000400000-0x00000000004B8000-memory.dmp

      Filesize

      736KB

    • memory/4144-200-0x00000000025D0000-0x00000000025E2000-memory.dmp

      Filesize

      72KB

    • memory/4144-202-0x00000000025D0000-0x00000000025E2000-memory.dmp

      Filesize

      72KB

    • memory/4144-192-0x00000000025D0000-0x00000000025E2000-memory.dmp

      Filesize

      72KB

    • memory/4144-190-0x00000000025D0000-0x00000000025E2000-memory.dmp

      Filesize

      72KB

    • memory/4144-178-0x00000000025D0000-0x00000000025E2000-memory.dmp

      Filesize

      72KB

    • memory/4144-175-0x00000000025D0000-0x00000000025E2000-memory.dmp

      Filesize

      72KB

    • memory/4144-176-0x00000000025D0000-0x00000000025E2000-memory.dmp

      Filesize

      72KB

    • memory/4144-170-0x0000000000610000-0x000000000063D000-memory.dmp

      Filesize

      180KB

    • memory/4144-173-0x00000000025C0000-0x00000000025D0000-memory.dmp

      Filesize

      64KB

    • memory/4144-172-0x00000000025C0000-0x00000000025D0000-memory.dmp

      Filesize

      64KB

    • memory/4144-171-0x0000000004AC0000-0x0000000005064000-memory.dmp

      Filesize

      5.6MB

    • memory/4928-138-0x00000000025B0000-0x00000000026A1000-memory.dmp

      Filesize

      964KB

    • memory/4928-164-0x0000000000400000-0x0000000000581000-memory.dmp

      Filesize

      1.5MB