Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    05-06-2023 02:56

General

  • Target

    46bfe886ea2c9c0e7ffd450bf542b971eaae59e1aa417ded2d5d1347a445dd98.exe

  • Size

    581KB

  • MD5

    1253121fd4f3de775178f2d56f2a6f78

  • SHA1

    8abb80df6a2eb3bc5eb9fb0a68cb155aebe9ad9a

  • SHA256

    46bfe886ea2c9c0e7ffd450bf542b971eaae59e1aa417ded2d5d1347a445dd98

  • SHA512

    5960278d065faa9bf1c21d48ed3c5418828811d85142487ad0178387c79d7e5dc577edb48da31737769146ffb0fd0708be0e8771b4a437cd3a24c14b1d410d2a

  • SSDEEP

    12288:1Mr7y904FrRbN3jBun9OE43Z6xgPd40JELr6p6/:Gy1F33dunnWnUOp6/

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19046

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\46bfe886ea2c9c0e7ffd450bf542b971eaae59e1aa417ded2d5d1347a445dd98.exe
    "C:\Users\Admin\AppData\Local\Temp\46bfe886ea2c9c0e7ffd450bf542b971eaae59e1aa417ded2d5d1347a445dd98.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2920
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0317205.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0317205.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5066214.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5066214.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4928
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0567724.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0567724.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2772
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8835094.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8835094.exe
          4⤵
          • Executes dropped EXE
          PID:3884

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0317205.exe
    Filesize

    378KB

    MD5

    4441fa32e8a8b9b34a0100eebda411e7

    SHA1

    ac0dfe3f87e09b123012b0d9ed69b48420bbb637

    SHA256

    667f99a01f538e88fdd42e66755d56324915a9831314cc4afe88ef5754c9ba45

    SHA512

    05cfe838fe869153a266961064a935647c90d16894765882344699c4f4839de5c8a84b8e0499417e3c6fefa466fa14ce959baec98a60ecdf0c8fa9c3bf2fe28a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0317205.exe
    Filesize

    378KB

    MD5

    4441fa32e8a8b9b34a0100eebda411e7

    SHA1

    ac0dfe3f87e09b123012b0d9ed69b48420bbb637

    SHA256

    667f99a01f538e88fdd42e66755d56324915a9831314cc4afe88ef5754c9ba45

    SHA512

    05cfe838fe869153a266961064a935647c90d16894765882344699c4f4839de5c8a84b8e0499417e3c6fefa466fa14ce959baec98a60ecdf0c8fa9c3bf2fe28a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5066214.exe
    Filesize

    206KB

    MD5

    0da0446fc5f7d9688af8004550692f9f

    SHA1

    2cdb16773be7f1ba1a0f0b9a6933209577202a8c

    SHA256

    e1821a23c1deb014321b5e2a278765814565f9de448468b430a605140b3313f7

    SHA512

    c30ed83705a17c760d562069a96669ba5ccee2a50808ae25663e9cd7134c8c5c117d20401146a64fb4beab5543dc2f9c87068072551231808b64eed688d5c958

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5066214.exe
    Filesize

    206KB

    MD5

    0da0446fc5f7d9688af8004550692f9f

    SHA1

    2cdb16773be7f1ba1a0f0b9a6933209577202a8c

    SHA256

    e1821a23c1deb014321b5e2a278765814565f9de448468b430a605140b3313f7

    SHA512

    c30ed83705a17c760d562069a96669ba5ccee2a50808ae25663e9cd7134c8c5c117d20401146a64fb4beab5543dc2f9c87068072551231808b64eed688d5c958

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0567724.exe
    Filesize

    11KB

    MD5

    949999f1dc6995d322ae77b6e1e26bed

    SHA1

    4d70b171709dbc43766556069432751a4ad40fc7

    SHA256

    e0ce77e6c4116db0dd40c363eb739512c000d2b974d99e37ee861ec2a5f76880

    SHA512

    49e02db9926d15a5b0e796c8d407a3b3a5fa50ad982fe07489e84411f1e4ac68243112db0c26dddd04adcdb25d97b07df40c918437a8177a9cd3fd8644ef6e44

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0567724.exe
    Filesize

    11KB

    MD5

    949999f1dc6995d322ae77b6e1e26bed

    SHA1

    4d70b171709dbc43766556069432751a4ad40fc7

    SHA256

    e0ce77e6c4116db0dd40c363eb739512c000d2b974d99e37ee861ec2a5f76880

    SHA512

    49e02db9926d15a5b0e796c8d407a3b3a5fa50ad982fe07489e84411f1e4ac68243112db0c26dddd04adcdb25d97b07df40c918437a8177a9cd3fd8644ef6e44

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8835094.exe
    Filesize

    172KB

    MD5

    e8779f1f06ac00224a1f167b39dc59ac

    SHA1

    3f1e3bd4cc7644adb9d2a94a7ce35d08858e87e5

    SHA256

    388174c0b5ca64236b350449348644dcf92aaf2ee8465a8a3b4df0463c1b4c89

    SHA512

    43d3abf955a93d94c9330fe1c2c3c893b54c826e21bf7c26bf03e9b2586a45b2aa4fbf287c11b441a83cd68901cdba46722ab4700b3293a7e26d104d486d004d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8835094.exe
    Filesize

    172KB

    MD5

    e8779f1f06ac00224a1f167b39dc59ac

    SHA1

    3f1e3bd4cc7644adb9d2a94a7ce35d08858e87e5

    SHA256

    388174c0b5ca64236b350449348644dcf92aaf2ee8465a8a3b4df0463c1b4c89

    SHA512

    43d3abf955a93d94c9330fe1c2c3c893b54c826e21bf7c26bf03e9b2586a45b2aa4fbf287c11b441a83cd68901cdba46722ab4700b3293a7e26d104d486d004d

  • memory/2772-142-0x0000000000EA0000-0x0000000000EAA000-memory.dmp
    Filesize

    40KB

  • memory/3884-147-0x0000000000980000-0x00000000009B0000-memory.dmp
    Filesize

    192KB

  • memory/3884-148-0x0000000002B00000-0x0000000002B06000-memory.dmp
    Filesize

    24KB

  • memory/3884-149-0x0000000005940000-0x0000000005F46000-memory.dmp
    Filesize

    6.0MB

  • memory/3884-150-0x0000000005440000-0x000000000554A000-memory.dmp
    Filesize

    1.0MB

  • memory/3884-151-0x0000000005180000-0x0000000005192000-memory.dmp
    Filesize

    72KB

  • memory/3884-152-0x00000000051E0000-0x000000000521E000-memory.dmp
    Filesize

    248KB

  • memory/3884-153-0x0000000005220000-0x0000000005230000-memory.dmp
    Filesize

    64KB

  • memory/3884-154-0x0000000005330000-0x000000000537B000-memory.dmp
    Filesize

    300KB

  • memory/3884-155-0x0000000005220000-0x0000000005230000-memory.dmp
    Filesize

    64KB