Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-04-2023 11:48

General

  • Target

    bc33a029093cf0e66f59202761b462f52da8e944337242dc8f7037a8c204cbe8.exe

  • Size

    979KB

  • MD5

    abec0f609a00ae4c26fc3d0adbcb483a

  • SHA1

    03b6d03c8dbe780f5cea4b988e96b17b2e972113

  • SHA256

    bc33a029093cf0e66f59202761b462f52da8e944337242dc8f7037a8c204cbe8

  • SHA512

    0d7b928f115d979ed373c8e442beb85d51c5fb5c5bbdcb916e853c3656453cdbf70f051ff00e8a49a659aa86433067d2038a0577097a1e94d221c9f711da2a79

  • SSDEEP

    24576:+yhkooR3RxPDgnmbt2aAWXD5WRTorGol5Nf:NhkoO/bTxD5LKol5

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc33a029093cf0e66f59202761b462f52da8e944337242dc8f7037a8c204cbe8.exe
    "C:\Users\Admin\AppData\Local\Temp\bc33a029093cf0e66f59202761b462f52da8e944337242dc8f7037a8c204cbe8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4016
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina2774.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina2774.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4228
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina2523.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina2523.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4396
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina5810.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina5810.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4496
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az895287.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az895287.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4512
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu865317.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu865317.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3040
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 1084
              6⤵
              • Program crash
              PID:1104
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cor4915.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cor4915.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:3252
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3040 -ip 3040
    1⤵
      PID:5116

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina2774.exe
      Filesize

      837KB

      MD5

      fbd0251ce6397d5378db1a5575de6e27

      SHA1

      c46ab99733e81b8f8d3aea6b8b1c02e77a7f9180

      SHA256

      4727db1bd6d7b498350ebfa5db2ac9f960ccb16dfe1224abe1a059766837cf27

      SHA512

      dbb437e865eade5780e8632dd22e0bf2682ed96881fc67fd3c5d3bc20fc9d511e6948f2c354a3f828f60d049b246169031e80c46c54bd09bcf10e65f36413073

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina2774.exe
      Filesize

      837KB

      MD5

      fbd0251ce6397d5378db1a5575de6e27

      SHA1

      c46ab99733e81b8f8d3aea6b8b1c02e77a7f9180

      SHA256

      4727db1bd6d7b498350ebfa5db2ac9f960ccb16dfe1224abe1a059766837cf27

      SHA512

      dbb437e865eade5780e8632dd22e0bf2682ed96881fc67fd3c5d3bc20fc9d511e6948f2c354a3f828f60d049b246169031e80c46c54bd09bcf10e65f36413073

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina2523.exe
      Filesize

      655KB

      MD5

      fe174a46cb882f70dd9a54eaece00de8

      SHA1

      7d85ed954fd9f1ce0299c809b228d438d4024202

      SHA256

      7b378d05c65d36f8cf808057b031a4410f67f191f880f73581c2b165f587ab65

      SHA512

      4306e7deb9f7d2f5938a7c43c7dca38ba3992f5dce4a4723e51895c71c1062ecd0c7d92afa2c4bc9b20d67d71d1c8fae4fd9a4a70fead78614446e157188ec95

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina2523.exe
      Filesize

      655KB

      MD5

      fe174a46cb882f70dd9a54eaece00de8

      SHA1

      7d85ed954fd9f1ce0299c809b228d438d4024202

      SHA256

      7b378d05c65d36f8cf808057b031a4410f67f191f880f73581c2b165f587ab65

      SHA512

      4306e7deb9f7d2f5938a7c43c7dca38ba3992f5dce4a4723e51895c71c1062ecd0c7d92afa2c4bc9b20d67d71d1c8fae4fd9a4a70fead78614446e157188ec95

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cor4915.exe
      Filesize

      299KB

      MD5

      db6a376c623f25f509bdf8953bd009ea

      SHA1

      b9118cb4d52a836ec954385b4175d93c451bf3bc

      SHA256

      c14c4a3688f35a0e817ed99f184464d3b173969677114a3c87fefda626027d46

      SHA512

      61df588c3631515c9a687c9cf833a0b09ecb330e8ddd868776b1cc9bb057e2f23f769bc142cb64b5fb7c737a6a342ac2ee3a1c3e20c1f96b10d431395bbe1694

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cor4915.exe
      Filesize

      299KB

      MD5

      db6a376c623f25f509bdf8953bd009ea

      SHA1

      b9118cb4d52a836ec954385b4175d93c451bf3bc

      SHA256

      c14c4a3688f35a0e817ed99f184464d3b173969677114a3c87fefda626027d46

      SHA512

      61df588c3631515c9a687c9cf833a0b09ecb330e8ddd868776b1cc9bb057e2f23f769bc142cb64b5fb7c737a6a342ac2ee3a1c3e20c1f96b10d431395bbe1694

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina5810.exe
      Filesize

      323KB

      MD5

      afe96d331248a6cec2b61cb6cbbb99c0

      SHA1

      32f623b0ffbb6c6c98e746f522df1dbbb773ff03

      SHA256

      e9e319051e8d93d055122a8e1afae79b8cbff64feeeee2daf1827b99f91b431d

      SHA512

      bf04e99a9236e813fb8f28446aee8473757c6733a47797b9db41c533f40954bc575b8fde4a48f9e7aca49c16ff6ad7948814243e22a7a3094c33233622a4875f

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina5810.exe
      Filesize

      323KB

      MD5

      afe96d331248a6cec2b61cb6cbbb99c0

      SHA1

      32f623b0ffbb6c6c98e746f522df1dbbb773ff03

      SHA256

      e9e319051e8d93d055122a8e1afae79b8cbff64feeeee2daf1827b99f91b431d

      SHA512

      bf04e99a9236e813fb8f28446aee8473757c6733a47797b9db41c533f40954bc575b8fde4a48f9e7aca49c16ff6ad7948814243e22a7a3094c33233622a4875f

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az895287.exe
      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az895287.exe
      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu865317.exe
      Filesize

      239KB

      MD5

      e102ce18dbe8af2cfa51b3968f57e430

      SHA1

      4decef1af0a03cee52a176f89954a03873880ca0

      SHA256

      a9450963580debb781e47dee0609c8fa1a9515575fcb502ee5a21ccb0600d006

      SHA512

      671b79a7e454d2aba98ada22642b3795502288748114e78eb1fa75f5dc2a8fffb06c4559da50a4e643884b833dd26a120d4dea986fb3917900bf74793ce252a5

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu865317.exe
      Filesize

      239KB

      MD5

      e102ce18dbe8af2cfa51b3968f57e430

      SHA1

      4decef1af0a03cee52a176f89954a03873880ca0

      SHA256

      a9450963580debb781e47dee0609c8fa1a9515575fcb502ee5a21ccb0600d006

      SHA512

      671b79a7e454d2aba98ada22642b3795502288748114e78eb1fa75f5dc2a8fffb06c4559da50a4e643884b833dd26a120d4dea986fb3917900bf74793ce252a5

    • memory/3040-167-0x0000000004BF0000-0x0000000005194000-memory.dmp
      Filesize

      5.6MB

    • memory/3040-168-0x0000000000530000-0x000000000055D000-memory.dmp
      Filesize

      180KB

    • memory/3040-170-0x0000000002780000-0x0000000002790000-memory.dmp
      Filesize

      64KB

    • memory/3040-171-0x0000000002780000-0x0000000002790000-memory.dmp
      Filesize

      64KB

    • memory/3040-169-0x0000000002780000-0x0000000002790000-memory.dmp
      Filesize

      64KB

    • memory/3040-172-0x00000000026A0000-0x00000000026B2000-memory.dmp
      Filesize

      72KB

    • memory/3040-173-0x00000000026A0000-0x00000000026B2000-memory.dmp
      Filesize

      72KB

    • memory/3040-175-0x00000000026A0000-0x00000000026B2000-memory.dmp
      Filesize

      72KB

    • memory/3040-177-0x00000000026A0000-0x00000000026B2000-memory.dmp
      Filesize

      72KB

    • memory/3040-179-0x00000000026A0000-0x00000000026B2000-memory.dmp
      Filesize

      72KB

    • memory/3040-181-0x00000000026A0000-0x00000000026B2000-memory.dmp
      Filesize

      72KB

    • memory/3040-183-0x00000000026A0000-0x00000000026B2000-memory.dmp
      Filesize

      72KB

    • memory/3040-185-0x00000000026A0000-0x00000000026B2000-memory.dmp
      Filesize

      72KB

    • memory/3040-187-0x00000000026A0000-0x00000000026B2000-memory.dmp
      Filesize

      72KB

    • memory/3040-189-0x00000000026A0000-0x00000000026B2000-memory.dmp
      Filesize

      72KB

    • memory/3040-191-0x00000000026A0000-0x00000000026B2000-memory.dmp
      Filesize

      72KB

    • memory/3040-193-0x00000000026A0000-0x00000000026B2000-memory.dmp
      Filesize

      72KB

    • memory/3040-195-0x00000000026A0000-0x00000000026B2000-memory.dmp
      Filesize

      72KB

    • memory/3040-197-0x00000000026A0000-0x00000000026B2000-memory.dmp
      Filesize

      72KB

    • memory/3040-199-0x00000000026A0000-0x00000000026B2000-memory.dmp
      Filesize

      72KB

    • memory/3040-200-0x0000000000400000-0x00000000004AA000-memory.dmp
      Filesize

      680KB

    • memory/3040-201-0x0000000002780000-0x0000000002790000-memory.dmp
      Filesize

      64KB

    • memory/3040-202-0x0000000002780000-0x0000000002790000-memory.dmp
      Filesize

      64KB

    • memory/3040-203-0x0000000002780000-0x0000000002790000-memory.dmp
      Filesize

      64KB

    • memory/3040-205-0x0000000000400000-0x00000000004AA000-memory.dmp
      Filesize

      680KB

    • memory/3252-210-0x0000000002100000-0x000000000214B000-memory.dmp
      Filesize

      300KB

    • memory/3252-211-0x0000000004BD0000-0x0000000004BE0000-memory.dmp
      Filesize

      64KB

    • memory/3252-212-0x0000000004BD0000-0x0000000004BE0000-memory.dmp
      Filesize

      64KB

    • memory/3252-213-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3252-216-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3252-214-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3252-218-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3252-220-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3252-222-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3252-224-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3252-226-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3252-228-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3252-230-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3252-232-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3252-234-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3252-236-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3252-238-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3252-240-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3252-242-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3252-244-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3252-246-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3252-1119-0x0000000005290000-0x00000000058A8000-memory.dmp
      Filesize

      6.1MB

    • memory/3252-1120-0x00000000058B0000-0x00000000059BA000-memory.dmp
      Filesize

      1.0MB

    • memory/3252-1121-0x00000000059E0000-0x00000000059F2000-memory.dmp
      Filesize

      72KB

    • memory/3252-1122-0x0000000005A00000-0x0000000005A3C000-memory.dmp
      Filesize

      240KB

    • memory/3252-1123-0x0000000004BD0000-0x0000000004BE0000-memory.dmp
      Filesize

      64KB

    • memory/3252-1125-0x0000000004BD0000-0x0000000004BE0000-memory.dmp
      Filesize

      64KB

    • memory/3252-1126-0x0000000004BD0000-0x0000000004BE0000-memory.dmp
      Filesize

      64KB

    • memory/3252-1127-0x0000000004BD0000-0x0000000004BE0000-memory.dmp
      Filesize

      64KB

    • memory/3252-1128-0x0000000004BD0000-0x0000000004BE0000-memory.dmp
      Filesize

      64KB

    • memory/4512-161-0x0000000000910000-0x000000000091A000-memory.dmp
      Filesize

      40KB