Analysis

  • max time kernel
    139s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-05-2024 11:47

General

  • Target

    3977873bc268ae6753444ae27567678d7b4f321c373d4aacda1270a4232fd045.exe

  • Size

    488KB

  • MD5

    b7c4563fa302629d4ebcf1f4048cc461

  • SHA1

    9d329d67b692668e3d703cb506773bde5ef15de2

  • SHA256

    3977873bc268ae6753444ae27567678d7b4f321c373d4aacda1270a4232fd045

  • SHA512

    723267956cd1cc13c5545772fbc6827e9303321be7975c1f812a9598b6bb624a16c2814c07af2701d47e01cf7ef626f2bf7d06224d8456d873e29c4bde9b6f69

  • SSDEEP

    12288:EMr1y90oGSWE26NkBjo4f9fpVpvkKJqLE:JyJ3N0nfrV7QI

Malware Config

Extracted

Family

redline

Botnet

mixa

C2

185.161.248.75:4132

Attributes
  • auth_value

    9d14534b25ac495ab25b59800acf3bb2

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3977873bc268ae6753444ae27567678d7b4f321c373d4aacda1270a4232fd045.exe
    "C:\Users\Admin\AppData\Local\Temp\3977873bc268ae6753444ae27567678d7b4f321c373d4aacda1270a4232fd045.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4136
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6900645.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6900645.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1268
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4351002.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4351002.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2680
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b7156165.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b7156165.exe
        3⤵
        • Executes dropped EXE
        PID:708
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1036 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:3700

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6900645.exe

      Filesize

      316KB

      MD5

      1d060e9c5937f86820bb3a4063fbfe1e

      SHA1

      9b4f5cfa8c6916eccbdfb615c0e56af78654a231

      SHA256

      cdcdd36fe8f5c94dfb4bd673a5b599115e348f0484b4e5e0f16c6049d2c557d7

      SHA512

      22807d0f01845a241b93af6dca63905233ca62e42863e939be88648bad5d77fd2efd37140f1a72aca39f3116394d1c98973fea33d06037c9f7adee97d84acedf

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4351002.exe

      Filesize

      184KB

      MD5

      d4c640fb500618ad6c9fc5fe7d3e784d

      SHA1

      850df0880e1685ce709b44afbbb365cab4f0fec4

      SHA256

      a511ae2083565f7f66afa9902f2d6aaa5bdf56c8a148609bfe949880a74ff44b

      SHA512

      a28a51e937a11c9d72f7450b86469609d972a1e65c176bf92a47922eaf9cf72d3a49f0d40702f6f22bfd3f2c9f9e36edfefecdd263e1d49f3546f44d4817cecd

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b7156165.exe

      Filesize

      168KB

      MD5

      d29161d70d50a279b32f17fe98d9c9bf

      SHA1

      f1248258ffe013d7b0110ebb0ec33ad6063a48e2

      SHA256

      14e64a7d652e90c96bd345b648d0125a8779679b4b71872c7620a779006f90a5

      SHA512

      da099673f8f5071f06a792aed6ca51d41b0d88013b33f0edea8fe37d406382c5c6aeed0ddeb95780055c64e42329b1250245640e1e7a1c3ab1ed28ed116a101a

    • memory/708-60-0x00000000053A0000-0x00000000053EC000-memory.dmp

      Filesize

      304KB

    • memory/708-59-0x0000000005220000-0x000000000525C000-memory.dmp

      Filesize

      240KB

    • memory/708-58-0x00000000051C0000-0x00000000051D2000-memory.dmp

      Filesize

      72KB

    • memory/708-57-0x0000000005290000-0x000000000539A000-memory.dmp

      Filesize

      1.0MB

    • memory/708-56-0x0000000005790000-0x0000000005DA8000-memory.dmp

      Filesize

      6.1MB

    • memory/708-55-0x0000000005020000-0x0000000005026000-memory.dmp

      Filesize

      24KB

    • memory/708-54-0x0000000000700000-0x000000000072E000-memory.dmp

      Filesize

      184KB

    • memory/2680-40-0x00000000049A0000-0x00000000049B6000-memory.dmp

      Filesize

      88KB

    • memory/2680-30-0x00000000049A0000-0x00000000049B6000-memory.dmp

      Filesize

      88KB

    • memory/2680-48-0x00000000049A0000-0x00000000049B6000-memory.dmp

      Filesize

      88KB

    • memory/2680-46-0x00000000049A0000-0x00000000049B6000-memory.dmp

      Filesize

      88KB

    • memory/2680-44-0x00000000049A0000-0x00000000049B6000-memory.dmp

      Filesize

      88KB

    • memory/2680-42-0x00000000049A0000-0x00000000049B6000-memory.dmp

      Filesize

      88KB

    • memory/2680-28-0x00000000049A0000-0x00000000049B6000-memory.dmp

      Filesize

      88KB

    • memory/2680-38-0x00000000049A0000-0x00000000049B6000-memory.dmp

      Filesize

      88KB

    • memory/2680-37-0x00000000049A0000-0x00000000049B6000-memory.dmp

      Filesize

      88KB

    • memory/2680-34-0x00000000049A0000-0x00000000049B6000-memory.dmp

      Filesize

      88KB

    • memory/2680-32-0x00000000049A0000-0x00000000049B6000-memory.dmp

      Filesize

      88KB

    • memory/2680-22-0x00000000049A0000-0x00000000049B6000-memory.dmp

      Filesize

      88KB

    • memory/2680-26-0x00000000049A0000-0x00000000049B6000-memory.dmp

      Filesize

      88KB

    • memory/2680-24-0x00000000049A0000-0x00000000049B6000-memory.dmp

      Filesize

      88KB

    • memory/2680-50-0x0000000074390000-0x0000000074B40000-memory.dmp

      Filesize

      7.7MB

    • memory/2680-21-0x00000000049A0000-0x00000000049B6000-memory.dmp

      Filesize

      88KB

    • memory/2680-20-0x00000000049A0000-0x00000000049BC000-memory.dmp

      Filesize

      112KB

    • memory/2680-19-0x0000000004B10000-0x00000000050B4000-memory.dmp

      Filesize

      5.6MB

    • memory/2680-18-0x0000000074390000-0x0000000074B40000-memory.dmp

      Filesize

      7.7MB

    • memory/2680-17-0x0000000074390000-0x0000000074B40000-memory.dmp

      Filesize

      7.7MB

    • memory/2680-16-0x0000000002410000-0x000000000242E000-memory.dmp

      Filesize

      120KB

    • memory/2680-15-0x0000000074390000-0x0000000074B40000-memory.dmp

      Filesize

      7.7MB

    • memory/2680-14-0x000000007439E000-0x000000007439F000-memory.dmp

      Filesize

      4KB