Analysis

  • max time kernel
    145s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    11/03/2023, 23:10

General

  • Target

    003eb019ceeb7a12857e25737af3012d18ca83453f024dbcae06695897147793.exe

  • Size

    535KB

  • MD5

    5bea591f7d715e3f1ef60f92cb8898d4

  • SHA1

    f5d6010e0ef2c8915958d22cfebc3435581fae8e

  • SHA256

    003eb019ceeb7a12857e25737af3012d18ca83453f024dbcae06695897147793

  • SHA512

    cc7de593bc23e43b0ca9184ad3b6024a3dc159ce10fa7682d5a6f57004668027dc9f2af73f3b5bc57401db5260854b31f999cfd064e97f78dde88b9a5f703fda

  • SSDEEP

    12288:rMrry90WgdnUB4DzErO8dAh0mGhTS2Bodl/eGgHZr:wyjgnUCz4hTUlRgHZr

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 37 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\003eb019ceeb7a12857e25737af3012d18ca83453f024dbcae06695897147793.exe
    "C:\Users\Admin\AppData\Local\Temp\003eb019ceeb7a12857e25737af3012d18ca83453f024dbcae06695897147793.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vun5684nQ.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vun5684nQ.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1256
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw45Qv92DL18.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw45Qv92DL18.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2044
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tij28xj13.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tij28xj13.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1056

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vun5684nQ.exe

    Filesize

    391KB

    MD5

    bae8951c131acb4c4f760627e2627655

    SHA1

    a0d4126321c8e98989ec2674546f788072ae9f1b

    SHA256

    61668f126c78fb22cc21bddce71845dc8712ad59dfa1eb27df0a0d5c962fb9c2

    SHA512

    d43922755fa9578e7553f848849d27f1890d16e30f516732be17e006cec5c41c1b2546246879f3a2b231421547a39f6748bf8e19ee58443c30f648415f4d34e6

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vun5684nQ.exe

    Filesize

    391KB

    MD5

    bae8951c131acb4c4f760627e2627655

    SHA1

    a0d4126321c8e98989ec2674546f788072ae9f1b

    SHA256

    61668f126c78fb22cc21bddce71845dc8712ad59dfa1eb27df0a0d5c962fb9c2

    SHA512

    d43922755fa9578e7553f848849d27f1890d16e30f516732be17e006cec5c41c1b2546246879f3a2b231421547a39f6748bf8e19ee58443c30f648415f4d34e6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw45Qv92DL18.exe

    Filesize

    16KB

    MD5

    f9211303ae5d3eb275fa0a86f9666a5d

    SHA1

    80793df568bba1b724ec45fe58bfc7640cb1ef48

    SHA256

    1e8d5111a4e06348d4fe75a71445a3a9c5430313617ed9e6b7acc3d8dae1e0a0

    SHA512

    8763ab4e5edad2acaecc44217c8da46a8706c56bbe42aed17e69ec4e98f7fb64edb776164160232aa878b95ea46d1718c467b61b9378064446b920e234b5c008

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw45Qv92DL18.exe

    Filesize

    16KB

    MD5

    f9211303ae5d3eb275fa0a86f9666a5d

    SHA1

    80793df568bba1b724ec45fe58bfc7640cb1ef48

    SHA256

    1e8d5111a4e06348d4fe75a71445a3a9c5430313617ed9e6b7acc3d8dae1e0a0

    SHA512

    8763ab4e5edad2acaecc44217c8da46a8706c56bbe42aed17e69ec4e98f7fb64edb776164160232aa878b95ea46d1718c467b61b9378064446b920e234b5c008

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tij28xj13.exe

    Filesize

    301KB

    MD5

    0b1fc7b6b5f423e268221516747427e9

    SHA1

    46193a7985ffd4b645fb2abf9eb10bc11a78a537

    SHA256

    d798407025621d1aab6e51a2cd6b6b8db9b0832b5ff932001ae3a42789c69bc2

    SHA512

    120304b76de795816e47f07555c149c65dc52a152b92dafc5f5e4ff4dc4c09e8a1ca3b71c043d0cecb2f4c74e434ba0ec9ae4bd15a3cf22bb880326c77be02e8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tij28xj13.exe

    Filesize

    301KB

    MD5

    0b1fc7b6b5f423e268221516747427e9

    SHA1

    46193a7985ffd4b645fb2abf9eb10bc11a78a537

    SHA256

    d798407025621d1aab6e51a2cd6b6b8db9b0832b5ff932001ae3a42789c69bc2

    SHA512

    120304b76de795816e47f07555c149c65dc52a152b92dafc5f5e4ff4dc4c09e8a1ca3b71c043d0cecb2f4c74e434ba0ec9ae4bd15a3cf22bb880326c77be02e8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tij28xj13.exe

    Filesize

    301KB

    MD5

    0b1fc7b6b5f423e268221516747427e9

    SHA1

    46193a7985ffd4b645fb2abf9eb10bc11a78a537

    SHA256

    d798407025621d1aab6e51a2cd6b6b8db9b0832b5ff932001ae3a42789c69bc2

    SHA512

    120304b76de795816e47f07555c149c65dc52a152b92dafc5f5e4ff4dc4c09e8a1ca3b71c043d0cecb2f4c74e434ba0ec9ae4bd15a3cf22bb880326c77be02e8

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\vun5684nQ.exe

    Filesize

    391KB

    MD5

    bae8951c131acb4c4f760627e2627655

    SHA1

    a0d4126321c8e98989ec2674546f788072ae9f1b

    SHA256

    61668f126c78fb22cc21bddce71845dc8712ad59dfa1eb27df0a0d5c962fb9c2

    SHA512

    d43922755fa9578e7553f848849d27f1890d16e30f516732be17e006cec5c41c1b2546246879f3a2b231421547a39f6748bf8e19ee58443c30f648415f4d34e6

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\vun5684nQ.exe

    Filesize

    391KB

    MD5

    bae8951c131acb4c4f760627e2627655

    SHA1

    a0d4126321c8e98989ec2674546f788072ae9f1b

    SHA256

    61668f126c78fb22cc21bddce71845dc8712ad59dfa1eb27df0a0d5c962fb9c2

    SHA512

    d43922755fa9578e7553f848849d27f1890d16e30f516732be17e006cec5c41c1b2546246879f3a2b231421547a39f6748bf8e19ee58443c30f648415f4d34e6

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\sw45Qv92DL18.exe

    Filesize

    16KB

    MD5

    f9211303ae5d3eb275fa0a86f9666a5d

    SHA1

    80793df568bba1b724ec45fe58bfc7640cb1ef48

    SHA256

    1e8d5111a4e06348d4fe75a71445a3a9c5430313617ed9e6b7acc3d8dae1e0a0

    SHA512

    8763ab4e5edad2acaecc44217c8da46a8706c56bbe42aed17e69ec4e98f7fb64edb776164160232aa878b95ea46d1718c467b61b9378064446b920e234b5c008

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\tij28xj13.exe

    Filesize

    301KB

    MD5

    0b1fc7b6b5f423e268221516747427e9

    SHA1

    46193a7985ffd4b645fb2abf9eb10bc11a78a537

    SHA256

    d798407025621d1aab6e51a2cd6b6b8db9b0832b5ff932001ae3a42789c69bc2

    SHA512

    120304b76de795816e47f07555c149c65dc52a152b92dafc5f5e4ff4dc4c09e8a1ca3b71c043d0cecb2f4c74e434ba0ec9ae4bd15a3cf22bb880326c77be02e8

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\tij28xj13.exe

    Filesize

    301KB

    MD5

    0b1fc7b6b5f423e268221516747427e9

    SHA1

    46193a7985ffd4b645fb2abf9eb10bc11a78a537

    SHA256

    d798407025621d1aab6e51a2cd6b6b8db9b0832b5ff932001ae3a42789c69bc2

    SHA512

    120304b76de795816e47f07555c149c65dc52a152b92dafc5f5e4ff4dc4c09e8a1ca3b71c043d0cecb2f4c74e434ba0ec9ae4bd15a3cf22bb880326c77be02e8

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\tij28xj13.exe

    Filesize

    301KB

    MD5

    0b1fc7b6b5f423e268221516747427e9

    SHA1

    46193a7985ffd4b645fb2abf9eb10bc11a78a537

    SHA256

    d798407025621d1aab6e51a2cd6b6b8db9b0832b5ff932001ae3a42789c69bc2

    SHA512

    120304b76de795816e47f07555c149c65dc52a152b92dafc5f5e4ff4dc4c09e8a1ca3b71c043d0cecb2f4c74e434ba0ec9ae4bd15a3cf22bb880326c77be02e8

  • memory/1056-102-0x0000000002260000-0x000000000229E000-memory.dmp

    Filesize

    248KB

  • memory/1056-117-0x0000000002260000-0x000000000229E000-memory.dmp

    Filesize

    248KB

  • memory/1056-84-0x0000000002260000-0x00000000022A4000-memory.dmp

    Filesize

    272KB

  • memory/1056-85-0x0000000002260000-0x000000000229E000-memory.dmp

    Filesize

    248KB

  • memory/1056-86-0x0000000002260000-0x000000000229E000-memory.dmp

    Filesize

    248KB

  • memory/1056-88-0x0000000002260000-0x000000000229E000-memory.dmp

    Filesize

    248KB

  • memory/1056-90-0x0000000002260000-0x000000000229E000-memory.dmp

    Filesize

    248KB

  • memory/1056-92-0x0000000002260000-0x000000000229E000-memory.dmp

    Filesize

    248KB

  • memory/1056-94-0x0000000002260000-0x000000000229E000-memory.dmp

    Filesize

    248KB

  • memory/1056-96-0x0000000002260000-0x000000000229E000-memory.dmp

    Filesize

    248KB

  • memory/1056-98-0x0000000002260000-0x000000000229E000-memory.dmp

    Filesize

    248KB

  • memory/1056-100-0x0000000002260000-0x000000000229E000-memory.dmp

    Filesize

    248KB

  • memory/1056-103-0x0000000000360000-0x00000000003AB000-memory.dmp

    Filesize

    300KB

  • memory/1056-998-0x0000000002420000-0x0000000002460000-memory.dmp

    Filesize

    256KB

  • memory/1056-105-0x0000000002420000-0x0000000002460000-memory.dmp

    Filesize

    256KB

  • memory/1056-107-0x0000000002420000-0x0000000002460000-memory.dmp

    Filesize

    256KB

  • memory/1056-106-0x0000000002260000-0x000000000229E000-memory.dmp

    Filesize

    248KB

  • memory/1056-109-0x0000000002260000-0x000000000229E000-memory.dmp

    Filesize

    248KB

  • memory/1056-111-0x0000000002260000-0x000000000229E000-memory.dmp

    Filesize

    248KB

  • memory/1056-113-0x0000000002260000-0x000000000229E000-memory.dmp

    Filesize

    248KB

  • memory/1056-115-0x0000000002260000-0x000000000229E000-memory.dmp

    Filesize

    248KB

  • memory/1056-83-0x0000000002220000-0x0000000002266000-memory.dmp

    Filesize

    280KB

  • memory/1056-119-0x0000000002260000-0x000000000229E000-memory.dmp

    Filesize

    248KB

  • memory/1056-121-0x0000000002260000-0x000000000229E000-memory.dmp

    Filesize

    248KB

  • memory/1056-123-0x0000000002260000-0x000000000229E000-memory.dmp

    Filesize

    248KB

  • memory/1056-125-0x0000000002260000-0x000000000229E000-memory.dmp

    Filesize

    248KB

  • memory/1056-127-0x0000000002260000-0x000000000229E000-memory.dmp

    Filesize

    248KB

  • memory/1056-129-0x0000000002260000-0x000000000229E000-memory.dmp

    Filesize

    248KB

  • memory/1056-131-0x0000000002260000-0x000000000229E000-memory.dmp

    Filesize

    248KB

  • memory/1056-133-0x0000000002260000-0x000000000229E000-memory.dmp

    Filesize

    248KB

  • memory/1056-135-0x0000000002260000-0x000000000229E000-memory.dmp

    Filesize

    248KB

  • memory/1056-137-0x0000000002260000-0x000000000229E000-memory.dmp

    Filesize

    248KB

  • memory/1056-139-0x0000000002260000-0x000000000229E000-memory.dmp

    Filesize

    248KB

  • memory/1056-141-0x0000000002260000-0x000000000229E000-memory.dmp

    Filesize

    248KB

  • memory/1056-143-0x0000000002260000-0x000000000229E000-memory.dmp

    Filesize

    248KB

  • memory/1056-147-0x0000000002260000-0x000000000229E000-memory.dmp

    Filesize

    248KB

  • memory/1056-149-0x0000000002260000-0x000000000229E000-memory.dmp

    Filesize

    248KB

  • memory/1056-145-0x0000000002260000-0x000000000229E000-memory.dmp

    Filesize

    248KB

  • memory/1056-151-0x0000000002260000-0x000000000229E000-memory.dmp

    Filesize

    248KB

  • memory/1056-994-0x0000000002420000-0x0000000002460000-memory.dmp

    Filesize

    256KB

  • memory/1056-996-0x0000000002420000-0x0000000002460000-memory.dmp

    Filesize

    256KB

  • memory/2044-72-0x00000000002F0000-0x00000000002FA000-memory.dmp

    Filesize

    40KB