Analysis

  • max time kernel
    129s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/10/2023, 12:22

General

  • Target

    613e735191106de1515ecf0317f1bc32ed151f55826397012ad75b17217167c8.exe

  • Size

    1.7MB

  • MD5

    63358e1da536987d9e9a3fe360359009

  • SHA1

    867cf936dcd83c1e08e16492f58a31cc36329977

  • SHA256

    613e735191106de1515ecf0317f1bc32ed151f55826397012ad75b17217167c8

  • SHA512

    09561aade3f716d7333c0a900fd082ba6ae41079bcbb65ab6f6e1284c73138cbc7a6a41d0b963a246b6d40495932df77cb9a09ce0b75f45cbe0ddcefaa5ff9ee

  • SSDEEP

    49152:7EnD7zXyX6qwEFnCdrrg301IGnX6cfXWn1:oyX6lExCJreNGX7+1

Malware Config

Extracted

Family

redline

Botnet

kinder

C2

109.107.182.133:19084

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\613e735191106de1515ecf0317f1bc32ed151f55826397012ad75b17217167c8.exe
    "C:\Users\Admin\AppData\Local\Temp\613e735191106de1515ecf0317f1bc32ed151f55826397012ad75b17217167c8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2616
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\IC0QC3sG.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\IC0QC3sG.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3756
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rN0ZI3FD.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rN0ZI3FD.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1296
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bZ6zF1VZ.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bZ6zF1VZ.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3596
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ZN5Sr2kV.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ZN5Sr2kV.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:4940
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Vq62BL6.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Vq62BL6.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:3892
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:1500
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 540
                    8⤵
                    • Program crash
                    PID:224
              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Lh729ZF.exe
                C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Lh729ZF.exe
                6⤵
                • Executes dropped EXE
                PID:4792
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1500 -ip 1500
      1⤵
        PID:620

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\IC0QC3sG.exe

        Filesize

        1.5MB

        MD5

        77ecb212b9ba13cb242fbbe62067671a

        SHA1

        1aa390c68cd90e62343192afcf7ced0f2474f269

        SHA256

        00cd105fa3282d9d4a57dea85bfab92832883117e81b4b8c56e45ded9ff8aa58

        SHA512

        0b8b9d616b6c89b71aba249457a430b8ad12675fbdf742b4db7655ed6e65134bbf71530ad20df240c7f5210cb3191deed3b27045ba654bfcc868b13d934c54ce

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\IC0QC3sG.exe

        Filesize

        1.5MB

        MD5

        77ecb212b9ba13cb242fbbe62067671a

        SHA1

        1aa390c68cd90e62343192afcf7ced0f2474f269

        SHA256

        00cd105fa3282d9d4a57dea85bfab92832883117e81b4b8c56e45ded9ff8aa58

        SHA512

        0b8b9d616b6c89b71aba249457a430b8ad12675fbdf742b4db7655ed6e65134bbf71530ad20df240c7f5210cb3191deed3b27045ba654bfcc868b13d934c54ce

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rN0ZI3FD.exe

        Filesize

        1.4MB

        MD5

        72675dcbb0068b69e31776254f379a7b

        SHA1

        d07ca366ad1437ce987abb926ab85a7529916365

        SHA256

        588b456e00d3c61ca3d47ea4d777672e122f4a9c905b7e40ceaf350177bb0f50

        SHA512

        2fed0b990563dbeb48694e08a7138982ad86cf2c87f8135031afae23d36190b36a7a5a35c9ce92967aa6ca09b026798b1d1b4df71f0d7b7b41fdbf763e725149

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rN0ZI3FD.exe

        Filesize

        1.4MB

        MD5

        72675dcbb0068b69e31776254f379a7b

        SHA1

        d07ca366ad1437ce987abb926ab85a7529916365

        SHA256

        588b456e00d3c61ca3d47ea4d777672e122f4a9c905b7e40ceaf350177bb0f50

        SHA512

        2fed0b990563dbeb48694e08a7138982ad86cf2c87f8135031afae23d36190b36a7a5a35c9ce92967aa6ca09b026798b1d1b4df71f0d7b7b41fdbf763e725149

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bZ6zF1VZ.exe

        Filesize

        870KB

        MD5

        5e7ff263cbed8f1a648910d8392c76aa

        SHA1

        c41fd74829f16d72c1be172c427e23ed53a59e3c

        SHA256

        2037acf2b36e0ed68f16e5dca0738724541d179766ad125ee34611e5be41e482

        SHA512

        d17f60486d7290256a2b17017aebf601ce99a723d3ea853e025e282c9b75a37d716a9b62a73b967d19899f6f529a859027ca3a37bbe7bbcee6a7f5e3077c350c

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bZ6zF1VZ.exe

        Filesize

        870KB

        MD5

        5e7ff263cbed8f1a648910d8392c76aa

        SHA1

        c41fd74829f16d72c1be172c427e23ed53a59e3c

        SHA256

        2037acf2b36e0ed68f16e5dca0738724541d179766ad125ee34611e5be41e482

        SHA512

        d17f60486d7290256a2b17017aebf601ce99a723d3ea853e025e282c9b75a37d716a9b62a73b967d19899f6f529a859027ca3a37bbe7bbcee6a7f5e3077c350c

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ZN5Sr2kV.exe

        Filesize

        675KB

        MD5

        9505de3a20d7def40791b2d2464b727b

        SHA1

        bdd9519ef2e37ee80f70f251454ccd3160ffe95f

        SHA256

        9e883f93d5d2ef9fa27abeb79944f326da87bf0adedb0aca066f6480f930ddc8

        SHA512

        83bb3826d0a080a1d0356ee00405e33557068d338f38716bda4bcc3ccea2fdcbe46ffba966b72943c690739418d3493ea10a679e41c638c9d8ee3fcb5a9d3699

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ZN5Sr2kV.exe

        Filesize

        675KB

        MD5

        9505de3a20d7def40791b2d2464b727b

        SHA1

        bdd9519ef2e37ee80f70f251454ccd3160ffe95f

        SHA256

        9e883f93d5d2ef9fa27abeb79944f326da87bf0adedb0aca066f6480f930ddc8

        SHA512

        83bb3826d0a080a1d0356ee00405e33557068d338f38716bda4bcc3ccea2fdcbe46ffba966b72943c690739418d3493ea10a679e41c638c9d8ee3fcb5a9d3699

      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Vq62BL6.exe

        Filesize

        1.8MB

        MD5

        902347e5c9abe4c735890f232e32d4f7

        SHA1

        b179c18eec7a558237058f67eefc761f0b504731

        SHA256

        8c73c86989820afdbd6c3a60d9bdc8dcaeb03ced67560124f24b9282650ada36

        SHA512

        96cbe726241d4700a148c32434187dd85272b29bdcb049cec3532b0b1f16a84cd418757ac940aa7b2884c812bbff9107a3876408e6945da2cd71fb7172757dc6

      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Vq62BL6.exe

        Filesize

        1.8MB

        MD5

        902347e5c9abe4c735890f232e32d4f7

        SHA1

        b179c18eec7a558237058f67eefc761f0b504731

        SHA256

        8c73c86989820afdbd6c3a60d9bdc8dcaeb03ced67560124f24b9282650ada36

        SHA512

        96cbe726241d4700a148c32434187dd85272b29bdcb049cec3532b0b1f16a84cd418757ac940aa7b2884c812bbff9107a3876408e6945da2cd71fb7172757dc6

      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Lh729ZF.exe

        Filesize

        222KB

        MD5

        20e83f9a953179abb98d13a57d7d5160

        SHA1

        d93171d75b2faab95dc8ca13aa590eb2260e4577

        SHA256

        2184393a87c4cbf6d02e57efdf3eb21e12aa6b8496202d485ef5ce02c77000d2

        SHA512

        00cab7b80b646f78c7f3fe298316ee2d21806ef98b285dff7aa6f4e1ab39e64fe77b532f38715424d5838f065ac775f33bd02cb70c5efc80776ffdb5d4569d72

      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Lh729ZF.exe

        Filesize

        222KB

        MD5

        20e83f9a953179abb98d13a57d7d5160

        SHA1

        d93171d75b2faab95dc8ca13aa590eb2260e4577

        SHA256

        2184393a87c4cbf6d02e57efdf3eb21e12aa6b8496202d485ef5ce02c77000d2

        SHA512

        00cab7b80b646f78c7f3fe298316ee2d21806ef98b285dff7aa6f4e1ab39e64fe77b532f38715424d5838f065ac775f33bd02cb70c5efc80776ffdb5d4569d72

      • memory/1500-36-0x0000000000400000-0x0000000000432000-memory.dmp

        Filesize

        200KB

      • memory/1500-37-0x0000000000400000-0x0000000000432000-memory.dmp

        Filesize

        200KB

      • memory/1500-39-0x0000000000400000-0x0000000000432000-memory.dmp

        Filesize

        200KB

      • memory/1500-35-0x0000000000400000-0x0000000000432000-memory.dmp

        Filesize

        200KB

      • memory/4792-46-0x0000000007B10000-0x0000000007BA2000-memory.dmp

        Filesize

        584KB

      • memory/4792-44-0x0000000000C20000-0x0000000000C5E000-memory.dmp

        Filesize

        248KB

      • memory/4792-45-0x0000000008020000-0x00000000085C4000-memory.dmp

        Filesize

        5.6MB

      • memory/4792-43-0x0000000074950000-0x0000000075100000-memory.dmp

        Filesize

        7.7MB

      • memory/4792-47-0x0000000007A90000-0x0000000007AA0000-memory.dmp

        Filesize

        64KB

      • memory/4792-48-0x0000000007CE0000-0x0000000007CEA000-memory.dmp

        Filesize

        40KB

      • memory/4792-49-0x0000000008BF0000-0x0000000009208000-memory.dmp

        Filesize

        6.1MB

      • memory/4792-50-0x0000000074950000-0x0000000075100000-memory.dmp

        Filesize

        7.7MB

      • memory/4792-51-0x0000000007E90000-0x0000000007F9A000-memory.dmp

        Filesize

        1.0MB

      • memory/4792-52-0x0000000007DC0000-0x0000000007DD2000-memory.dmp

        Filesize

        72KB

      • memory/4792-53-0x0000000007E20000-0x0000000007E5C000-memory.dmp

        Filesize

        240KB

      • memory/4792-54-0x0000000007FA0000-0x0000000007FEC000-memory.dmp

        Filesize

        304KB

      • memory/4792-55-0x0000000007A90000-0x0000000007AA0000-memory.dmp

        Filesize

        64KB