Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-05-2024 17:44

General

  • Target

    224cc5582a9ac886fdd93fbf84f5c94ce0cbf206de2d7defc6c50dc8e03974c7.exe

  • Size

    488KB

  • MD5

    c970c0f3c54d3b026f962562c9c31562

  • SHA1

    2726deeff32a0c3d297d80e27f0f2bb9347ed051

  • SHA256

    224cc5582a9ac886fdd93fbf84f5c94ce0cbf206de2d7defc6c50dc8e03974c7

  • SHA512

    fe5098ddd3804fae377bfefc852ee66d9d478854daec8d40547ce1f5b6dcb76db5d83e2d24902a7a63e034f6ede8f2fd37106adc77cdabdc73419de893012395

  • SSDEEP

    12288:JMr7y90GoBdBgIjV9jZIHS494fEgp7IMwbj/8ymW:CyOBdJV9ji8fL7IMMj/8ymW

Malware Config

Extracted

Family

redline

Botnet

mixa

C2

185.161.248.75:4132

Attributes
  • auth_value

    9d14534b25ac495ab25b59800acf3bb2

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\224cc5582a9ac886fdd93fbf84f5c94ce0cbf206de2d7defc6c50dc8e03974c7.exe
    "C:\Users\Admin\AppData\Local\Temp\224cc5582a9ac886fdd93fbf84f5c94ce0cbf206de2d7defc6c50dc8e03974c7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3596
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3734810.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3734810.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2012
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a9144132.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a9144132.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4664
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6453357.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6453357.exe
        3⤵
        • Executes dropped EXE
        PID:4716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3734810.exe

    Filesize

    316KB

    MD5

    802e28be0e67c369681af9376222910a

    SHA1

    19ee07bc3befb9e2af0a8e28130941b8ad16d2a3

    SHA256

    3dc73b4f6d23faab7a9c9989da9da63b5a19429e50f38b9dbe628e0e665538ce

    SHA512

    b6f01f052ca9109e3941d7d38fd68b0539943f3cc376c5772f784c1eb96f68f72e6f01d1015485bd20246c01229c6586180181c458980600250184894365d66d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a9144132.exe

    Filesize

    184KB

    MD5

    d4c640fb500618ad6c9fc5fe7d3e784d

    SHA1

    850df0880e1685ce709b44afbbb365cab4f0fec4

    SHA256

    a511ae2083565f7f66afa9902f2d6aaa5bdf56c8a148609bfe949880a74ff44b

    SHA512

    a28a51e937a11c9d72f7450b86469609d972a1e65c176bf92a47922eaf9cf72d3a49f0d40702f6f22bfd3f2c9f9e36edfefecdd263e1d49f3546f44d4817cecd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6453357.exe

    Filesize

    168KB

    MD5

    81504a0df94ffa60528b8cc8c83771f2

    SHA1

    89e60bdd2fdf6320c7c4d4359278be07f76e8a32

    SHA256

    78b5d3fe679c54908e0122f6defa53527799672a92bdcad94d2f5dbed7852ebf

    SHA512

    0ab7748e6eb1a73146c07a576bed00f817beaf7941f98727aa1b34bf0544d1b021b14eaf2ff7578cadd38a156e1a9556f26d2cdd8eda8fd65ffe7583efff9ae3

  • memory/4664-29-0x0000000004F70000-0x0000000004F86000-memory.dmp

    Filesize

    88KB

  • memory/4664-16-0x0000000004980000-0x0000000004F24000-memory.dmp

    Filesize

    5.6MB

  • memory/4664-25-0x0000000004F70000-0x0000000004F86000-memory.dmp

    Filesize

    88KB

  • memory/4664-18-0x0000000004F70000-0x0000000004F8C000-memory.dmp

    Filesize

    112KB

  • memory/4664-19-0x0000000074450000-0x0000000074C00000-memory.dmp

    Filesize

    7.7MB

  • memory/4664-45-0x0000000004F70000-0x0000000004F86000-memory.dmp

    Filesize

    88KB

  • memory/4664-47-0x0000000004F70000-0x0000000004F86000-memory.dmp

    Filesize

    88KB

  • memory/4664-43-0x0000000004F70000-0x0000000004F86000-memory.dmp

    Filesize

    88KB

  • memory/4664-41-0x0000000004F70000-0x0000000004F86000-memory.dmp

    Filesize

    88KB

  • memory/4664-39-0x0000000004F70000-0x0000000004F86000-memory.dmp

    Filesize

    88KB

  • memory/4664-37-0x0000000004F70000-0x0000000004F86000-memory.dmp

    Filesize

    88KB

  • memory/4664-35-0x0000000004F70000-0x0000000004F86000-memory.dmp

    Filesize

    88KB

  • memory/4664-31-0x0000000004F70000-0x0000000004F86000-memory.dmp

    Filesize

    88KB

  • memory/4664-15-0x00000000021B0000-0x00000000021CE000-memory.dmp

    Filesize

    120KB

  • memory/4664-27-0x0000000004F70000-0x0000000004F86000-memory.dmp

    Filesize

    88KB

  • memory/4664-17-0x0000000074450000-0x0000000074C00000-memory.dmp

    Filesize

    7.7MB

  • memory/4664-23-0x0000000004F70000-0x0000000004F86000-memory.dmp

    Filesize

    88KB

  • memory/4664-21-0x0000000004F70000-0x0000000004F86000-memory.dmp

    Filesize

    88KB

  • memory/4664-20-0x0000000004F70000-0x0000000004F86000-memory.dmp

    Filesize

    88KB

  • memory/4664-33-0x0000000004F70000-0x0000000004F86000-memory.dmp

    Filesize

    88KB

  • memory/4664-48-0x0000000074450000-0x0000000074C00000-memory.dmp

    Filesize

    7.7MB

  • memory/4664-50-0x0000000074450000-0x0000000074C00000-memory.dmp

    Filesize

    7.7MB

  • memory/4664-14-0x000000007445E000-0x000000007445F000-memory.dmp

    Filesize

    4KB

  • memory/4716-54-0x00000000005E0000-0x000000000060E000-memory.dmp

    Filesize

    184KB

  • memory/4716-55-0x0000000002770000-0x0000000002776000-memory.dmp

    Filesize

    24KB

  • memory/4716-56-0x0000000005620000-0x0000000005C38000-memory.dmp

    Filesize

    6.1MB

  • memory/4716-57-0x0000000005170000-0x000000000527A000-memory.dmp

    Filesize

    1.0MB

  • memory/4716-58-0x00000000050A0000-0x00000000050B2000-memory.dmp

    Filesize

    72KB

  • memory/4716-59-0x0000000005100000-0x000000000513C000-memory.dmp

    Filesize

    240KB

  • memory/4716-60-0x0000000005280000-0x00000000052CC000-memory.dmp

    Filesize

    304KB