Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-04-2023 11:48

General

  • Target

    file.exe

  • Size

    980KB

  • MD5

    decba982a30f783c2ab5b031a9c62917

  • SHA1

    2a740df10598434978649c343cf7bb4ece2a48d0

  • SHA256

    6044fd753298adf002b66cb2fb1f237f73678b7422637c0148adf891a975f0d1

  • SHA512

    d985359bbc95b5aca29c5ed9c6fb2e6227cd04bc6183a928bf4147dd4c029765a6c6224a560686c36aa434b69b3a667a30e194e9405eafc87d2ed7e0f2349afc

  • SSDEEP

    24576:oySyHBlJ8craC/5pZmEeITDo75azoqrA9B+HG:vxhlu+kEeITDo8rA9Bq

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:516
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki132045.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki132045.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:872
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ki080924.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ki080924.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1636
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ki230171.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ki230171.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2636
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az336464.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az336464.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4996
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu582894.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu582894.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:996
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 996 -s 1080
              6⤵
              • Program crash
              PID:1096
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cor1531.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cor1531.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1552
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 996 -ip 996
    1⤵
      PID:3880

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki132045.exe
      Filesize

      838KB

      MD5

      41607f976f8ac908aae70e753e26e547

      SHA1

      19be1994b95e94567a416a77350fb7ebe421a511

      SHA256

      4fd823d815e40fb914ddb4ee53d3a3841056f397c3575e602a81ce1607914f23

      SHA512

      1ce20b99cd899558f7a8c6aa01b214ef677655ffe58ce15df2eb5d8c7b2aca3bbc29ee33d742d569061f4bd7b5aaf543a7402bb755adb03c911534241ad246af

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki132045.exe
      Filesize

      838KB

      MD5

      41607f976f8ac908aae70e753e26e547

      SHA1

      19be1994b95e94567a416a77350fb7ebe421a511

      SHA256

      4fd823d815e40fb914ddb4ee53d3a3841056f397c3575e602a81ce1607914f23

      SHA512

      1ce20b99cd899558f7a8c6aa01b214ef677655ffe58ce15df2eb5d8c7b2aca3bbc29ee33d742d569061f4bd7b5aaf543a7402bb755adb03c911534241ad246af

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ki080924.exe
      Filesize

      655KB

      MD5

      6b9929e7f129c58f3e1bcf3bf91463ad

      SHA1

      e0d64cee781b060ac112d8a82447addb82f0f7ba

      SHA256

      c42abd06a9d2081412673313acfacaf2da5e884074d55052957eb6f2b02ca33e

      SHA512

      60dfc5030487eb2e061510b090c22cfd674b3e43dd8bdfdbeba0179269f3b9dd8450e2680980535cb477c6aea4e71a8aa2f6a27ad936b9079287a909c7af0366

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ki080924.exe
      Filesize

      655KB

      MD5

      6b9929e7f129c58f3e1bcf3bf91463ad

      SHA1

      e0d64cee781b060ac112d8a82447addb82f0f7ba

      SHA256

      c42abd06a9d2081412673313acfacaf2da5e884074d55052957eb6f2b02ca33e

      SHA512

      60dfc5030487eb2e061510b090c22cfd674b3e43dd8bdfdbeba0179269f3b9dd8450e2680980535cb477c6aea4e71a8aa2f6a27ad936b9079287a909c7af0366

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cor1531.exe
      Filesize

      299KB

      MD5

      727946580b2446063171f97bd81f0896

      SHA1

      63a805158e3fd83ebc071cb2d6bdc6f6858938ff

      SHA256

      477b868bab8afbfa00bb450e9b2e3489ee51c7fa5f472d152e26c41ef2a9991e

      SHA512

      ca94359747afd8ea54e49e4ced2b4b1419f2da1e29da8678bc2e22cad4d10f5a6641fce4fbf810fdcfca9eb47113521e8ec78737dc59d7686bcbf55d1326a6f2

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cor1531.exe
      Filesize

      299KB

      MD5

      727946580b2446063171f97bd81f0896

      SHA1

      63a805158e3fd83ebc071cb2d6bdc6f6858938ff

      SHA256

      477b868bab8afbfa00bb450e9b2e3489ee51c7fa5f472d152e26c41ef2a9991e

      SHA512

      ca94359747afd8ea54e49e4ced2b4b1419f2da1e29da8678bc2e22cad4d10f5a6641fce4fbf810fdcfca9eb47113521e8ec78737dc59d7686bcbf55d1326a6f2

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ki230171.exe
      Filesize

      323KB

      MD5

      6753e38845827b3c6b7b4af4fff4d2bb

      SHA1

      24a9a247ba0adee846992e95bd897636dd6e8515

      SHA256

      78cf8b2766a833be2a6e6d8824873f1169f82a060411e7dc0fce795b33334ebd

      SHA512

      dfc7d98d339659f6320e6ce95e32c96dbc54b3209daecc98ca13cff09db250339a24f4f5a155be6f035225627bd35019fc13e22cfd64d40cb2e35073084ebec0

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ki230171.exe
      Filesize

      323KB

      MD5

      6753e38845827b3c6b7b4af4fff4d2bb

      SHA1

      24a9a247ba0adee846992e95bd897636dd6e8515

      SHA256

      78cf8b2766a833be2a6e6d8824873f1169f82a060411e7dc0fce795b33334ebd

      SHA512

      dfc7d98d339659f6320e6ce95e32c96dbc54b3209daecc98ca13cff09db250339a24f4f5a155be6f035225627bd35019fc13e22cfd64d40cb2e35073084ebec0

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az336464.exe
      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az336464.exe
      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu582894.exe
      Filesize

      239KB

      MD5

      34de0b45bbd1d4b93e342d9ae8eb7e34

      SHA1

      efdc6d2f47e40d62c26de29790fbb0cc2ded8839

      SHA256

      2cea2e0fa324635a1d0aad94d2d6d0cdadeb264b7980c58dc9461b8df85eec59

      SHA512

      b742bdeaa549a0065d500ce368714cb695204559d483a8b7840b85ba599c4f0570921401d8c2ddfc5332b425be4cb368020b2a745a9621aaa0207c2fb3782cc5

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu582894.exe
      Filesize

      239KB

      MD5

      34de0b45bbd1d4b93e342d9ae8eb7e34

      SHA1

      efdc6d2f47e40d62c26de29790fbb0cc2ded8839

      SHA256

      2cea2e0fa324635a1d0aad94d2d6d0cdadeb264b7980c58dc9461b8df85eec59

      SHA512

      b742bdeaa549a0065d500ce368714cb695204559d483a8b7840b85ba599c4f0570921401d8c2ddfc5332b425be4cb368020b2a745a9621aaa0207c2fb3782cc5

    • memory/996-167-0x0000000004AE0000-0x0000000005084000-memory.dmp
      Filesize

      5.6MB

    • memory/996-168-0x0000000002120000-0x000000000214D000-memory.dmp
      Filesize

      180KB

    • memory/996-170-0x0000000002470000-0x0000000002480000-memory.dmp
      Filesize

      64KB

    • memory/996-169-0x0000000002470000-0x0000000002480000-memory.dmp
      Filesize

      64KB

    • memory/996-171-0x0000000002470000-0x0000000002480000-memory.dmp
      Filesize

      64KB

    • memory/996-172-0x00000000024E0000-0x00000000024F2000-memory.dmp
      Filesize

      72KB

    • memory/996-173-0x00000000024E0000-0x00000000024F2000-memory.dmp
      Filesize

      72KB

    • memory/996-175-0x00000000024E0000-0x00000000024F2000-memory.dmp
      Filesize

      72KB

    • memory/996-177-0x00000000024E0000-0x00000000024F2000-memory.dmp
      Filesize

      72KB

    • memory/996-179-0x00000000024E0000-0x00000000024F2000-memory.dmp
      Filesize

      72KB

    • memory/996-181-0x00000000024E0000-0x00000000024F2000-memory.dmp
      Filesize

      72KB

    • memory/996-183-0x00000000024E0000-0x00000000024F2000-memory.dmp
      Filesize

      72KB

    • memory/996-185-0x00000000024E0000-0x00000000024F2000-memory.dmp
      Filesize

      72KB

    • memory/996-187-0x00000000024E0000-0x00000000024F2000-memory.dmp
      Filesize

      72KB

    • memory/996-189-0x00000000024E0000-0x00000000024F2000-memory.dmp
      Filesize

      72KB

    • memory/996-191-0x00000000024E0000-0x00000000024F2000-memory.dmp
      Filesize

      72KB

    • memory/996-193-0x00000000024E0000-0x00000000024F2000-memory.dmp
      Filesize

      72KB

    • memory/996-195-0x00000000024E0000-0x00000000024F2000-memory.dmp
      Filesize

      72KB

    • memory/996-197-0x00000000024E0000-0x00000000024F2000-memory.dmp
      Filesize

      72KB

    • memory/996-199-0x00000000024E0000-0x00000000024F2000-memory.dmp
      Filesize

      72KB

    • memory/996-200-0x0000000000400000-0x00000000004AA000-memory.dmp
      Filesize

      680KB

    • memory/996-201-0x0000000002470000-0x0000000002480000-memory.dmp
      Filesize

      64KB

    • memory/996-202-0x0000000002470000-0x0000000002480000-memory.dmp
      Filesize

      64KB

    • memory/996-203-0x0000000002470000-0x0000000002480000-memory.dmp
      Filesize

      64KB

    • memory/996-205-0x0000000000400000-0x00000000004AA000-memory.dmp
      Filesize

      680KB

    • memory/1552-210-0x0000000002750000-0x000000000278F000-memory.dmp
      Filesize

      252KB

    • memory/1552-211-0x0000000002750000-0x000000000278F000-memory.dmp
      Filesize

      252KB

    • memory/1552-213-0x0000000002750000-0x000000000278F000-memory.dmp
      Filesize

      252KB

    • memory/1552-215-0x0000000002750000-0x000000000278F000-memory.dmp
      Filesize

      252KB

    • memory/1552-217-0x0000000002750000-0x000000000278F000-memory.dmp
      Filesize

      252KB

    • memory/1552-218-0x0000000002030000-0x000000000207B000-memory.dmp
      Filesize

      300KB

    • memory/1552-220-0x0000000004B90000-0x0000000004BA0000-memory.dmp
      Filesize

      64KB

    • memory/1552-222-0x0000000004B90000-0x0000000004BA0000-memory.dmp
      Filesize

      64KB

    • memory/1552-223-0x0000000004B90000-0x0000000004BA0000-memory.dmp
      Filesize

      64KB

    • memory/1552-221-0x0000000002750000-0x000000000278F000-memory.dmp
      Filesize

      252KB

    • memory/1552-225-0x0000000002750000-0x000000000278F000-memory.dmp
      Filesize

      252KB

    • memory/1552-227-0x0000000002750000-0x000000000278F000-memory.dmp
      Filesize

      252KB

    • memory/1552-229-0x0000000002750000-0x000000000278F000-memory.dmp
      Filesize

      252KB

    • memory/1552-231-0x0000000002750000-0x000000000278F000-memory.dmp
      Filesize

      252KB

    • memory/1552-233-0x0000000002750000-0x000000000278F000-memory.dmp
      Filesize

      252KB

    • memory/1552-235-0x0000000002750000-0x000000000278F000-memory.dmp
      Filesize

      252KB

    • memory/1552-237-0x0000000002750000-0x000000000278F000-memory.dmp
      Filesize

      252KB

    • memory/1552-239-0x0000000002750000-0x000000000278F000-memory.dmp
      Filesize

      252KB

    • memory/1552-241-0x0000000002750000-0x000000000278F000-memory.dmp
      Filesize

      252KB

    • memory/1552-243-0x0000000002750000-0x000000000278F000-memory.dmp
      Filesize

      252KB

    • memory/1552-245-0x0000000002750000-0x000000000278F000-memory.dmp
      Filesize

      252KB

    • memory/1552-247-0x0000000002750000-0x000000000278F000-memory.dmp
      Filesize

      252KB

    • memory/1552-1120-0x0000000005250000-0x0000000005868000-memory.dmp
      Filesize

      6.1MB

    • memory/1552-1121-0x00000000058A0000-0x00000000059AA000-memory.dmp
      Filesize

      1.0MB

    • memory/1552-1122-0x00000000059E0000-0x00000000059F2000-memory.dmp
      Filesize

      72KB

    • memory/1552-1123-0x0000000005A00000-0x0000000005A3C000-memory.dmp
      Filesize

      240KB

    • memory/1552-1124-0x0000000004B90000-0x0000000004BA0000-memory.dmp
      Filesize

      64KB

    • memory/1552-1126-0x0000000004B90000-0x0000000004BA0000-memory.dmp
      Filesize

      64KB

    • memory/1552-1127-0x0000000004B90000-0x0000000004BA0000-memory.dmp
      Filesize

      64KB

    • memory/1552-1128-0x0000000004B90000-0x0000000004BA0000-memory.dmp
      Filesize

      64KB

    • memory/1552-1129-0x0000000004B90000-0x0000000004BA0000-memory.dmp
      Filesize

      64KB

    • memory/4996-161-0x0000000000040000-0x000000000004A000-memory.dmp
      Filesize

      40KB