Resubmissions

13-07-2024 16:26

240713-txqqbsybmj 3

13-07-2024 15:27

240713-sv4czawfkl 3

08-04-2024 13:45

240408-q2dpsaae25 10

21-11-2023 22:21

231121-196ewagh72 10

21-11-2023 22:20

231121-183ycshf5y 10

21-11-2023 22:06

231121-1z2c6sgh38 10

27-08-2023 18:38

230827-w98ssaee5z 10

01-06-2023 22:35

230601-2h4yeagg74 10

21-04-2023 17:56

230421-whz2kahb76 10

16-04-2023 14:28

230416-rtht7sad45 10

Analysis

  • max time kernel
    1793s
  • max time network
    1800s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-04-2023 14:28

General

  • Target

    106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exe

  • Size

    1.2MB

  • MD5

    5b3b6822964b4151c6200ecd89722a86

  • SHA1

    ce7a11dae532b2ade1c96619bbdc8a8325582049

  • SHA256

    106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34

  • SHA512

    2f0d99af35c326cf46810c7421325deb55ae7ca36a8edc2716a3d32d9e6769e0d374581a98912e22fceeb6973e972463ed8b2fa4d4399043c443fa100dfd17b0

  • SSDEEP

    24576:5yY4YriuQJ5X4SuIcmuBLahxwUzN1YyqoVKucvTNLF9:sY4FuIahGxRMoobNLF

Malware Config

Extracted

Family

redline

Botnet

ronur

C2

193.233.20.20:4134

Attributes
  • auth_value

    f88f86755a528d4b25f6f3628c460965

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exe
    "C:\Users\Admin\AppData\Local\Temp\106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3804
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sbO31En07.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sbO31En07.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:368
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\smS09II74.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\smS09II74.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4056
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\slc39Ad82.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\slc39Ad82.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1364
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\sko86jV13.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\sko86jV13.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1912
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\iwN36Rn.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\iwN36Rn.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1728
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\kLG98Ei.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\kLG98Ei.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:2876

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sbO31En07.exe

    Filesize

    1010KB

    MD5

    f8d3a0a73fbee1e94dcd0fedf9a31c4e

    SHA1

    71ef31102516e25e3b3aa347b5c697a85d237b16

    SHA256

    ad974386b5f8a42a0ff8d77d4f6e1919f2bfbe3f4008320acb1bc327e6f4947c

    SHA512

    81337186639f964ed048b288be37575ffaa989d9d6c6a91a27db8d6bfe5c4fb42f11d63ab32008e485f921bcb774304a6f96cb4e17778dcc38f1e4b072deca28

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sbO31En07.exe

    Filesize

    1010KB

    MD5

    f8d3a0a73fbee1e94dcd0fedf9a31c4e

    SHA1

    71ef31102516e25e3b3aa347b5c697a85d237b16

    SHA256

    ad974386b5f8a42a0ff8d77d4f6e1919f2bfbe3f4008320acb1bc327e6f4947c

    SHA512

    81337186639f964ed048b288be37575ffaa989d9d6c6a91a27db8d6bfe5c4fb42f11d63ab32008e485f921bcb774304a6f96cb4e17778dcc38f1e4b072deca28

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\smS09II74.exe

    Filesize

    869KB

    MD5

    5739bc2cafd62977daa950a317be8d14

    SHA1

    f7f582e1863642c4d5a8341e2005c06c0f3d9e74

    SHA256

    b3cad94dc96473ea46e9af91de2a2126ee2345d47a2d1a926182db447de2ecc9

    SHA512

    f55320fdf0383e3c7f8a9841c3444b58f9551d879d89ad1ee44388e9621b4b5f0f7e504915012e3acf24b3aa45a3d0f1e692ddee89a38d3987f95fe97d5bae8d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\smS09II74.exe

    Filesize

    869KB

    MD5

    5739bc2cafd62977daa950a317be8d14

    SHA1

    f7f582e1863642c4d5a8341e2005c06c0f3d9e74

    SHA256

    b3cad94dc96473ea46e9af91de2a2126ee2345d47a2d1a926182db447de2ecc9

    SHA512

    f55320fdf0383e3c7f8a9841c3444b58f9551d879d89ad1ee44388e9621b4b5f0f7e504915012e3acf24b3aa45a3d0f1e692ddee89a38d3987f95fe97d5bae8d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\slc39Ad82.exe

    Filesize

    651KB

    MD5

    e12e7b53183d3b1c6cd53ef42aa815f8

    SHA1

    9dedb739590a02e37c82e54cc8eb3e0ce57248ee

    SHA256

    63ac9bdbd61a661f5bc96825ad4408df1312b18f455472b63c66f6e5efb05e63

    SHA512

    5e4a61453476d524cf3b96743e2f5163c01f3ae1d8f05653d9ed3ffd0614b43afa013554e6c0b0294763e80beca5081fc088ad6e595a2af67115a62f4cce410c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\slc39Ad82.exe

    Filesize

    651KB

    MD5

    e12e7b53183d3b1c6cd53ef42aa815f8

    SHA1

    9dedb739590a02e37c82e54cc8eb3e0ce57248ee

    SHA256

    63ac9bdbd61a661f5bc96825ad4408df1312b18f455472b63c66f6e5efb05e63

    SHA512

    5e4a61453476d524cf3b96743e2f5163c01f3ae1d8f05653d9ed3ffd0614b43afa013554e6c0b0294763e80beca5081fc088ad6e595a2af67115a62f4cce410c

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\sko86jV13.exe

    Filesize

    383KB

    MD5

    7c29db2ac66b846cc00ca802838c116b

    SHA1

    23f9d79f7cf7d5fb41111bf4896645d3989b4f11

    SHA256

    e4519665ce98d8426aceadad26a6bbe92b455f59f6261a8240dcba5b40e6a51b

    SHA512

    a46c3d3a3e7ff2ae24cf67eed51367cd5b422cc793911d59de19d2ba0c763c29f569b9876ef41ad74ec3e9977ab280100c09755abdc6908e269bce4a1b761cb7

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\sko86jV13.exe

    Filesize

    383KB

    MD5

    7c29db2ac66b846cc00ca802838c116b

    SHA1

    23f9d79f7cf7d5fb41111bf4896645d3989b4f11

    SHA256

    e4519665ce98d8426aceadad26a6bbe92b455f59f6261a8240dcba5b40e6a51b

    SHA512

    a46c3d3a3e7ff2ae24cf67eed51367cd5b422cc793911d59de19d2ba0c763c29f569b9876ef41ad74ec3e9977ab280100c09755abdc6908e269bce4a1b761cb7

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\iwN36Rn.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\iwN36Rn.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\kLG98Ei.exe

    Filesize

    275KB

    MD5

    ef9dd5707f37f0e2f802b3d7856e7bbc

    SHA1

    e9cbeca90f2edece7174b0fcffe65f311b5b3689

    SHA256

    de4cdd6ab46f28034be20c1a3231035ac3dc1aafbb443e0ccaaadd3ccdf0fadf

    SHA512

    24d042eb4715e4a9ed98609fe264bbd1aded094c2efa410e59a3bd800fc36561242c1433e8573de9581bea6e38b9f269dcd6b2eba20e4548e5cdd893c9334b44

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\kLG98Ei.exe

    Filesize

    275KB

    MD5

    ef9dd5707f37f0e2f802b3d7856e7bbc

    SHA1

    e9cbeca90f2edece7174b0fcffe65f311b5b3689

    SHA256

    de4cdd6ab46f28034be20c1a3231035ac3dc1aafbb443e0ccaaadd3ccdf0fadf

    SHA512

    24d042eb4715e4a9ed98609fe264bbd1aded094c2efa410e59a3bd800fc36561242c1433e8573de9581bea6e38b9f269dcd6b2eba20e4548e5cdd893c9334b44

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\kLG98Ei.exe

    Filesize

    275KB

    MD5

    ef9dd5707f37f0e2f802b3d7856e7bbc

    SHA1

    e9cbeca90f2edece7174b0fcffe65f311b5b3689

    SHA256

    de4cdd6ab46f28034be20c1a3231035ac3dc1aafbb443e0ccaaadd3ccdf0fadf

    SHA512

    24d042eb4715e4a9ed98609fe264bbd1aded094c2efa410e59a3bd800fc36561242c1433e8573de9581bea6e38b9f269dcd6b2eba20e4548e5cdd893c9334b44

  • memory/1728-168-0x0000000000450000-0x000000000045A000-memory.dmp

    Filesize

    40KB

  • memory/2876-174-0x0000000004E30000-0x00000000053D4000-memory.dmp

    Filesize

    5.6MB

  • memory/2876-175-0x0000000000660000-0x00000000006AB000-memory.dmp

    Filesize

    300KB

  • memory/2876-177-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/2876-176-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/2876-178-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/2876-181-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/2876-183-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/2876-179-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/2876-185-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/2876-187-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/2876-189-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/2876-191-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/2876-193-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/2876-195-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/2876-197-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/2876-199-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/2876-201-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/2876-203-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/2876-205-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/2876-207-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/2876-209-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/2876-211-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/2876-213-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/2876-215-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/2876-217-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/2876-219-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/2876-221-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/2876-223-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/2876-225-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/2876-227-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/2876-229-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/2876-231-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/2876-233-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/2876-235-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/2876-237-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/2876-239-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/2876-241-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/2876-1084-0x00000000053E0000-0x00000000059F8000-memory.dmp

    Filesize

    6.1MB

  • memory/2876-1085-0x0000000005A00000-0x0000000005B0A000-memory.dmp

    Filesize

    1.0MB

  • memory/2876-1086-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

    Filesize

    72KB

  • memory/2876-1087-0x0000000004DE0000-0x0000000004E1C000-memory.dmp

    Filesize

    240KB

  • memory/2876-1088-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/2876-1090-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/2876-1091-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/2876-1092-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/2876-1093-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB