Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    05-06-2023 05:41

General

  • Target

    909757acd131a67d24b91ced5ecd760e1e6164106cca1d7bfe1e3a6c337fc092.exe

  • Size

    580KB

  • MD5

    083f63f0a1b0e8341c707c51b16a5897

  • SHA1

    2ef9c680caf38f546e627032dbe8535556202450

  • SHA256

    909757acd131a67d24b91ced5ecd760e1e6164106cca1d7bfe1e3a6c337fc092

  • SHA512

    848e9f300c9a39c1c510e817b5d80d57b038cbfc9d35ae698206c0e450d17a7e2becda446e7d73d28ab253c479a7134c4042176991dd8e0852871f46e609c8b2

  • SSDEEP

    12288:OMrwy90FUAAylSXbwIob+5T3jHbhNIw3m8M0+qw1Cm:+yjaSXqb+RzHl6wTM05m

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19046

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\909757acd131a67d24b91ced5ecd760e1e6164106cca1d7bfe1e3a6c337fc092.exe
    "C:\Users\Admin\AppData\Local\Temp\909757acd131a67d24b91ced5ecd760e1e6164106cca1d7bfe1e3a6c337fc092.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4048
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4625882.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4625882.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1660
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4870264.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4870264.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2092
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a3084994.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a3084994.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4256
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5578171.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5578171.exe
          4⤵
          • Executes dropped EXE
          PID:4040

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4625882.exe
    Filesize

    377KB

    MD5

    251ce29304d38f6e57fde71830679502

    SHA1

    85ca03f0735d491fd209bca93d6a54dce59804d9

    SHA256

    a630029cb95f30e3b3e54ba180193cc5003bf43d856e40c1a2da019fc50648eb

    SHA512

    3302dcd516c14322e8bd165230d25bdbbad647b50d0c2556f284a6790edfaa1d3b275468a36a7dca79fa906152123f75cef4e117be0fd8a47b5b3f3d270c6976

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4625882.exe
    Filesize

    377KB

    MD5

    251ce29304d38f6e57fde71830679502

    SHA1

    85ca03f0735d491fd209bca93d6a54dce59804d9

    SHA256

    a630029cb95f30e3b3e54ba180193cc5003bf43d856e40c1a2da019fc50648eb

    SHA512

    3302dcd516c14322e8bd165230d25bdbbad647b50d0c2556f284a6790edfaa1d3b275468a36a7dca79fa906152123f75cef4e117be0fd8a47b5b3f3d270c6976

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4870264.exe
    Filesize

    206KB

    MD5

    3334b86ef11c42eef0b4884c21430231

    SHA1

    db99757552ca74d33830d722bc872c8ce39390ff

    SHA256

    84a713e8ce7a8e6de1cce03bb58138a719803afa3b1397c57bd509ae1de28527

    SHA512

    987c7cda1399308ce9e67d1ef3111863a95176c3c24d096ee91c0b00c71929ce65522d70652419449097d30574bb24a41fff1886ddb92ef089c599929e1d4002

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4870264.exe
    Filesize

    206KB

    MD5

    3334b86ef11c42eef0b4884c21430231

    SHA1

    db99757552ca74d33830d722bc872c8ce39390ff

    SHA256

    84a713e8ce7a8e6de1cce03bb58138a719803afa3b1397c57bd509ae1de28527

    SHA512

    987c7cda1399308ce9e67d1ef3111863a95176c3c24d096ee91c0b00c71929ce65522d70652419449097d30574bb24a41fff1886ddb92ef089c599929e1d4002

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a3084994.exe
    Filesize

    11KB

    MD5

    0d1adc464e416783f91dd522d8f713c1

    SHA1

    f46e2095c91d0e5ebf4ddc42fbac6f28802ec227

    SHA256

    3d7562c74cd97c0dbe54d3a56f77458a78f90476c1cc76cf7a157a06c856c609

    SHA512

    fb56f426e3b1811843002a88f4ca094b0279302aeb18c5abeeec4f79ae01e1c637405f3996656b644bb2edb9141aecb422dda327e410a4dfde59dadc272bc0e1

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a3084994.exe
    Filesize

    11KB

    MD5

    0d1adc464e416783f91dd522d8f713c1

    SHA1

    f46e2095c91d0e5ebf4ddc42fbac6f28802ec227

    SHA256

    3d7562c74cd97c0dbe54d3a56f77458a78f90476c1cc76cf7a157a06c856c609

    SHA512

    fb56f426e3b1811843002a88f4ca094b0279302aeb18c5abeeec4f79ae01e1c637405f3996656b644bb2edb9141aecb422dda327e410a4dfde59dadc272bc0e1

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5578171.exe
    Filesize

    172KB

    MD5

    b79c132485010267b0f7ffd9de8f487c

    SHA1

    54c65492eb6b9f5b9cead9b87e9c186af21cbf55

    SHA256

    aa9d9d1e84e24620de2e527c81f3d9dc86f248a8e6817831243a21b2779c41d2

    SHA512

    4e91b29608f1b4dcc0497c81495e8b8ad568caeaca87f1817cda533a914fb6c33e06a2af75122ddbbd40f1c1f1f1054d177e89a5a162bd319100ba7dab682aee

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5578171.exe
    Filesize

    172KB

    MD5

    b79c132485010267b0f7ffd9de8f487c

    SHA1

    54c65492eb6b9f5b9cead9b87e9c186af21cbf55

    SHA256

    aa9d9d1e84e24620de2e527c81f3d9dc86f248a8e6817831243a21b2779c41d2

    SHA512

    4e91b29608f1b4dcc0497c81495e8b8ad568caeaca87f1817cda533a914fb6c33e06a2af75122ddbbd40f1c1f1f1054d177e89a5a162bd319100ba7dab682aee

  • memory/4040-146-0x0000000000440000-0x0000000000470000-memory.dmp
    Filesize

    192KB

  • memory/4040-147-0x0000000004CF0000-0x0000000004CF6000-memory.dmp
    Filesize

    24KB

  • memory/4040-148-0x000000000A830000-0x000000000AE36000-memory.dmp
    Filesize

    6.0MB

  • memory/4040-149-0x000000000A380000-0x000000000A48A000-memory.dmp
    Filesize

    1.0MB

  • memory/4040-150-0x000000000A2B0000-0x000000000A2C2000-memory.dmp
    Filesize

    72KB

  • memory/4040-151-0x000000000A310000-0x000000000A34E000-memory.dmp
    Filesize

    248KB

  • memory/4040-152-0x0000000004D90000-0x0000000004DA0000-memory.dmp
    Filesize

    64KB

  • memory/4040-153-0x000000000A490000-0x000000000A4DB000-memory.dmp
    Filesize

    300KB

  • memory/4256-141-0x0000000000CC0000-0x0000000000CCA000-memory.dmp
    Filesize

    40KB