Analysis

  • max time kernel
    143s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-05-2024 10:53

General

  • Target

    224cc5582a9ac886fdd93fbf84f5c94ce0cbf206de2d7defc6c50dc8e03974c7.exe

  • Size

    488KB

  • MD5

    c970c0f3c54d3b026f962562c9c31562

  • SHA1

    2726deeff32a0c3d297d80e27f0f2bb9347ed051

  • SHA256

    224cc5582a9ac886fdd93fbf84f5c94ce0cbf206de2d7defc6c50dc8e03974c7

  • SHA512

    fe5098ddd3804fae377bfefc852ee66d9d478854daec8d40547ce1f5b6dcb76db5d83e2d24902a7a63e034f6ede8f2fd37106adc77cdabdc73419de893012395

  • SSDEEP

    12288:JMr7y90GoBdBgIjV9jZIHS494fEgp7IMwbj/8ymW:CyOBdJV9ji8fL7IMMj/8ymW

Malware Config

Extracted

Family

redline

Botnet

mixa

C2

185.161.248.75:4132

Attributes
  • auth_value

    9d14534b25ac495ab25b59800acf3bb2

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\224cc5582a9ac886fdd93fbf84f5c94ce0cbf206de2d7defc6c50dc8e03974c7.exe
    "C:\Users\Admin\AppData\Local\Temp\224cc5582a9ac886fdd93fbf84f5c94ce0cbf206de2d7defc6c50dc8e03974c7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3734810.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3734810.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4712
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a9144132.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a9144132.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4836
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6453357.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6453357.exe
        3⤵
        • Executes dropped EXE
        PID:1096
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3804,i,1809100026287847100,9768898026582633513,262144 --variations-seed-version --mojo-platform-channel-handle=4068 /prefetch:8
    1⤵
      PID:2912

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3734810.exe

      Filesize

      316KB

      MD5

      802e28be0e67c369681af9376222910a

      SHA1

      19ee07bc3befb9e2af0a8e28130941b8ad16d2a3

      SHA256

      3dc73b4f6d23faab7a9c9989da9da63b5a19429e50f38b9dbe628e0e665538ce

      SHA512

      b6f01f052ca9109e3941d7d38fd68b0539943f3cc376c5772f784c1eb96f68f72e6f01d1015485bd20246c01229c6586180181c458980600250184894365d66d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a9144132.exe

      Filesize

      184KB

      MD5

      d4c640fb500618ad6c9fc5fe7d3e784d

      SHA1

      850df0880e1685ce709b44afbbb365cab4f0fec4

      SHA256

      a511ae2083565f7f66afa9902f2d6aaa5bdf56c8a148609bfe949880a74ff44b

      SHA512

      a28a51e937a11c9d72f7450b86469609d972a1e65c176bf92a47922eaf9cf72d3a49f0d40702f6f22bfd3f2c9f9e36edfefecdd263e1d49f3546f44d4817cecd

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6453357.exe

      Filesize

      168KB

      MD5

      81504a0df94ffa60528b8cc8c83771f2

      SHA1

      89e60bdd2fdf6320c7c4d4359278be07f76e8a32

      SHA256

      78b5d3fe679c54908e0122f6defa53527799672a92bdcad94d2f5dbed7852ebf

      SHA512

      0ab7748e6eb1a73146c07a576bed00f817beaf7941f98727aa1b34bf0544d1b021b14eaf2ff7578cadd38a156e1a9556f26d2cdd8eda8fd65ffe7583efff9ae3

    • memory/1096-60-0x0000000004F70000-0x0000000004FBC000-memory.dmp

      Filesize

      304KB

    • memory/1096-59-0x000000000AA80000-0x000000000AABC000-memory.dmp

      Filesize

      240KB

    • memory/1096-58-0x000000000AA20000-0x000000000AA32000-memory.dmp

      Filesize

      72KB

    • memory/1096-57-0x000000000AAF0000-0x000000000ABFA000-memory.dmp

      Filesize

      1.0MB

    • memory/1096-56-0x000000000AFC0000-0x000000000B5D8000-memory.dmp

      Filesize

      6.1MB

    • memory/1096-55-0x0000000002E20000-0x0000000002E26000-memory.dmp

      Filesize

      24KB

    • memory/1096-54-0x0000000000C80000-0x0000000000CAE000-memory.dmp

      Filesize

      184KB

    • memory/4836-28-0x0000000002420000-0x0000000002436000-memory.dmp

      Filesize

      88KB

    • memory/4836-38-0x0000000002420000-0x0000000002436000-memory.dmp

      Filesize

      88KB

    • memory/4836-36-0x0000000002420000-0x0000000002436000-memory.dmp

      Filesize

      88KB

    • memory/4836-34-0x0000000002420000-0x0000000002436000-memory.dmp

      Filesize

      88KB

    • memory/4836-32-0x0000000002420000-0x0000000002436000-memory.dmp

      Filesize

      88KB

    • memory/4836-30-0x0000000002420000-0x0000000002436000-memory.dmp

      Filesize

      88KB

    • memory/4836-44-0x0000000002420000-0x0000000002436000-memory.dmp

      Filesize

      88KB

    • memory/4836-26-0x0000000002420000-0x0000000002436000-memory.dmp

      Filesize

      88KB

    • memory/4836-24-0x0000000002420000-0x0000000002436000-memory.dmp

      Filesize

      88KB

    • memory/4836-22-0x0000000002420000-0x0000000002436000-memory.dmp

      Filesize

      88KB

    • memory/4836-40-0x0000000002420000-0x0000000002436000-memory.dmp

      Filesize

      88KB

    • memory/4836-42-0x0000000002420000-0x0000000002436000-memory.dmp

      Filesize

      88KB

    • memory/4836-47-0x0000000074630000-0x0000000074DE0000-memory.dmp

      Filesize

      7.7MB

    • memory/4836-48-0x0000000074630000-0x0000000074DE0000-memory.dmp

      Filesize

      7.7MB

    • memory/4836-50-0x0000000074630000-0x0000000074DE0000-memory.dmp

      Filesize

      7.7MB

    • memory/4836-46-0x0000000002420000-0x0000000002436000-memory.dmp

      Filesize

      88KB

    • memory/4836-19-0x0000000002420000-0x0000000002436000-memory.dmp

      Filesize

      88KB

    • memory/4836-20-0x0000000002420000-0x0000000002436000-memory.dmp

      Filesize

      88KB

    • memory/4836-18-0x0000000002420000-0x000000000243C000-memory.dmp

      Filesize

      112KB

    • memory/4836-17-0x0000000074630000-0x0000000074DE0000-memory.dmp

      Filesize

      7.7MB

    • memory/4836-16-0x0000000004AB0000-0x0000000005054000-memory.dmp

      Filesize

      5.6MB

    • memory/4836-15-0x0000000002020000-0x000000000203E000-memory.dmp

      Filesize

      120KB

    • memory/4836-14-0x000000007463E000-0x000000007463F000-memory.dmp

      Filesize

      4KB