Analysis

  • max time kernel
    117s
  • max time network
    161s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01/05/2023, 18:58

General

  • Target

    ea069d6d262ba19288d5a3873a2ec85b86158d62d28dcef445be960c9e30a81b.exe

  • Size

    891KB

  • MD5

    3d2a29a183fb2b4233e1d50a39412449

  • SHA1

    28ea1ba696b5f6ca84b9c71188f17cf9d6edc910

  • SHA256

    ea069d6d262ba19288d5a3873a2ec85b86158d62d28dcef445be960c9e30a81b

  • SHA512

    8547d5a3c2c41908070db588aaeb0cfd6a70388fad57a157b877515e1bfe61ad9eb32eb0eb961d793d7416ca0b226a3ec96708dc18697de1834a0bbbb2a1cf41

  • SSDEEP

    24576:YyVXWZ/apOdjrnjt8kZqTsRD/leUlLpS:fUMgjtBkAZ4

Malware Config

Extracted

Family

redline

Botnet

dark

C2

185.161.248.73:4164

Attributes
  • auth_value

    ae85b01f66afe8770afeed560513fc2d

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea069d6d262ba19288d5a3873a2ec85b86158d62d28dcef445be960c9e30a81b.exe
    "C:\Users\Admin\AppData\Local\Temp\ea069d6d262ba19288d5a3873a2ec85b86158d62d28dcef445be960c9e30a81b.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st684479.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st684479.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1504
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\87109421.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\87109421.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1484
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1600
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp829850.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp829850.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:832
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr825846.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr825846.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1196

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr825846.exe

          Filesize

          170KB

          MD5

          a234a7ac617389a1131fb3e239e37887

          SHA1

          91f1ed8f7ab9f2c2aa6da87c34b5c1b47e17603a

          SHA256

          4126858967aa585df6d4dc10c2fad2e7eee712b390ce43d22cd93c066a6f63ae

          SHA512

          522bd2184787f34c7839e68b30b50c315af0c9468ec4230143f30ee2c3cbcc3e21115c7bbeb0cad44376370d7d9d79188fbe46eb02f69bd58e6c6b1f4abaad3f

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr825846.exe

          Filesize

          170KB

          MD5

          a234a7ac617389a1131fb3e239e37887

          SHA1

          91f1ed8f7ab9f2c2aa6da87c34b5c1b47e17603a

          SHA256

          4126858967aa585df6d4dc10c2fad2e7eee712b390ce43d22cd93c066a6f63ae

          SHA512

          522bd2184787f34c7839e68b30b50c315af0c9468ec4230143f30ee2c3cbcc3e21115c7bbeb0cad44376370d7d9d79188fbe46eb02f69bd58e6c6b1f4abaad3f

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st684479.exe

          Filesize

          738KB

          MD5

          4bb6d46f974957e2ae24b9aaa934281d

          SHA1

          c9f6de3ed68554fe05879470261c29c49a66de56

          SHA256

          a8290f74dace47654dafebe12e434c08efe5e922020dbe193181acad6545b9d3

          SHA512

          4982b2e00442dd618ec4e15e4d4112d9716c9c48bedbedc34edd1ecc4804c0487e65c24c9035f56d0b746b8396516edd7ec5bc55a46e40d16a27958b8e9bf432

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st684479.exe

          Filesize

          738KB

          MD5

          4bb6d46f974957e2ae24b9aaa934281d

          SHA1

          c9f6de3ed68554fe05879470261c29c49a66de56

          SHA256

          a8290f74dace47654dafebe12e434c08efe5e922020dbe193181acad6545b9d3

          SHA512

          4982b2e00442dd618ec4e15e4d4112d9716c9c48bedbedc34edd1ecc4804c0487e65c24c9035f56d0b746b8396516edd7ec5bc55a46e40d16a27958b8e9bf432

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\87109421.exe

          Filesize

          303KB

          MD5

          719ccc722b3cd7c6be49ce5e49b96d44

          SHA1

          9d6c18cef2672f1843bae94088610bc098d50505

          SHA256

          78037bc4ee8ae5fed119c6ddd9aa54b69e25eb8aa8b7c1c155344853c97def07

          SHA512

          d09f8c6cfeaf6f68b94f9b50cd2a2dd5a32b9ae5e5aada520b1703e8586feea7d97c58f95f9bcca91d9b6a6f1d3432161d8cc5a557a3a340658b28e659937bd4

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\87109421.exe

          Filesize

          303KB

          MD5

          719ccc722b3cd7c6be49ce5e49b96d44

          SHA1

          9d6c18cef2672f1843bae94088610bc098d50505

          SHA256

          78037bc4ee8ae5fed119c6ddd9aa54b69e25eb8aa8b7c1c155344853c97def07

          SHA512

          d09f8c6cfeaf6f68b94f9b50cd2a2dd5a32b9ae5e5aada520b1703e8586feea7d97c58f95f9bcca91d9b6a6f1d3432161d8cc5a557a3a340658b28e659937bd4

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp829850.exe

          Filesize

          574KB

          MD5

          115a5c4d8100ce97d60b2e276c4770ba

          SHA1

          453fded92c860d717cbc4bb8c2601e5d48ff78ce

          SHA256

          cf96e1fb079f6d0ec0ffd1dafbf673930f4e14554657476e1ff5b463de525518

          SHA512

          35ef07482aa4e09d02e4c61a26f94e99a4e9bfcd0310a022f864d1e531f45ae035331b987676123bf42075df6dede79f57dba1a1fb9b6d6c56ef5466bfd8e317

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp829850.exe

          Filesize

          574KB

          MD5

          115a5c4d8100ce97d60b2e276c4770ba

          SHA1

          453fded92c860d717cbc4bb8c2601e5d48ff78ce

          SHA256

          cf96e1fb079f6d0ec0ffd1dafbf673930f4e14554657476e1ff5b463de525518

          SHA512

          35ef07482aa4e09d02e4c61a26f94e99a4e9bfcd0310a022f864d1e531f45ae035331b987676123bf42075df6dede79f57dba1a1fb9b6d6c56ef5466bfd8e317

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp829850.exe

          Filesize

          574KB

          MD5

          115a5c4d8100ce97d60b2e276c4770ba

          SHA1

          453fded92c860d717cbc4bb8c2601e5d48ff78ce

          SHA256

          cf96e1fb079f6d0ec0ffd1dafbf673930f4e14554657476e1ff5b463de525518

          SHA512

          35ef07482aa4e09d02e4c61a26f94e99a4e9bfcd0310a022f864d1e531f45ae035331b987676123bf42075df6dede79f57dba1a1fb9b6d6c56ef5466bfd8e317

        • C:\Windows\Temp\1.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Windows\Temp\1.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\lr825846.exe

          Filesize

          170KB

          MD5

          a234a7ac617389a1131fb3e239e37887

          SHA1

          91f1ed8f7ab9f2c2aa6da87c34b5c1b47e17603a

          SHA256

          4126858967aa585df6d4dc10c2fad2e7eee712b390ce43d22cd93c066a6f63ae

          SHA512

          522bd2184787f34c7839e68b30b50c315af0c9468ec4230143f30ee2c3cbcc3e21115c7bbeb0cad44376370d7d9d79188fbe46eb02f69bd58e6c6b1f4abaad3f

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\lr825846.exe

          Filesize

          170KB

          MD5

          a234a7ac617389a1131fb3e239e37887

          SHA1

          91f1ed8f7ab9f2c2aa6da87c34b5c1b47e17603a

          SHA256

          4126858967aa585df6d4dc10c2fad2e7eee712b390ce43d22cd93c066a6f63ae

          SHA512

          522bd2184787f34c7839e68b30b50c315af0c9468ec4230143f30ee2c3cbcc3e21115c7bbeb0cad44376370d7d9d79188fbe46eb02f69bd58e6c6b1f4abaad3f

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st684479.exe

          Filesize

          738KB

          MD5

          4bb6d46f974957e2ae24b9aaa934281d

          SHA1

          c9f6de3ed68554fe05879470261c29c49a66de56

          SHA256

          a8290f74dace47654dafebe12e434c08efe5e922020dbe193181acad6545b9d3

          SHA512

          4982b2e00442dd618ec4e15e4d4112d9716c9c48bedbedc34edd1ecc4804c0487e65c24c9035f56d0b746b8396516edd7ec5bc55a46e40d16a27958b8e9bf432

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st684479.exe

          Filesize

          738KB

          MD5

          4bb6d46f974957e2ae24b9aaa934281d

          SHA1

          c9f6de3ed68554fe05879470261c29c49a66de56

          SHA256

          a8290f74dace47654dafebe12e434c08efe5e922020dbe193181acad6545b9d3

          SHA512

          4982b2e00442dd618ec4e15e4d4112d9716c9c48bedbedc34edd1ecc4804c0487e65c24c9035f56d0b746b8396516edd7ec5bc55a46e40d16a27958b8e9bf432

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\87109421.exe

          Filesize

          303KB

          MD5

          719ccc722b3cd7c6be49ce5e49b96d44

          SHA1

          9d6c18cef2672f1843bae94088610bc098d50505

          SHA256

          78037bc4ee8ae5fed119c6ddd9aa54b69e25eb8aa8b7c1c155344853c97def07

          SHA512

          d09f8c6cfeaf6f68b94f9b50cd2a2dd5a32b9ae5e5aada520b1703e8586feea7d97c58f95f9bcca91d9b6a6f1d3432161d8cc5a557a3a340658b28e659937bd4

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\87109421.exe

          Filesize

          303KB

          MD5

          719ccc722b3cd7c6be49ce5e49b96d44

          SHA1

          9d6c18cef2672f1843bae94088610bc098d50505

          SHA256

          78037bc4ee8ae5fed119c6ddd9aa54b69e25eb8aa8b7c1c155344853c97def07

          SHA512

          d09f8c6cfeaf6f68b94f9b50cd2a2dd5a32b9ae5e5aada520b1703e8586feea7d97c58f95f9bcca91d9b6a6f1d3432161d8cc5a557a3a340658b28e659937bd4

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp829850.exe

          Filesize

          574KB

          MD5

          115a5c4d8100ce97d60b2e276c4770ba

          SHA1

          453fded92c860d717cbc4bb8c2601e5d48ff78ce

          SHA256

          cf96e1fb079f6d0ec0ffd1dafbf673930f4e14554657476e1ff5b463de525518

          SHA512

          35ef07482aa4e09d02e4c61a26f94e99a4e9bfcd0310a022f864d1e531f45ae035331b987676123bf42075df6dede79f57dba1a1fb9b6d6c56ef5466bfd8e317

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp829850.exe

          Filesize

          574KB

          MD5

          115a5c4d8100ce97d60b2e276c4770ba

          SHA1

          453fded92c860d717cbc4bb8c2601e5d48ff78ce

          SHA256

          cf96e1fb079f6d0ec0ffd1dafbf673930f4e14554657476e1ff5b463de525518

          SHA512

          35ef07482aa4e09d02e4c61a26f94e99a4e9bfcd0310a022f864d1e531f45ae035331b987676123bf42075df6dede79f57dba1a1fb9b6d6c56ef5466bfd8e317

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp829850.exe

          Filesize

          574KB

          MD5

          115a5c4d8100ce97d60b2e276c4770ba

          SHA1

          453fded92c860d717cbc4bb8c2601e5d48ff78ce

          SHA256

          cf96e1fb079f6d0ec0ffd1dafbf673930f4e14554657476e1ff5b463de525518

          SHA512

          35ef07482aa4e09d02e4c61a26f94e99a4e9bfcd0310a022f864d1e531f45ae035331b987676123bf42075df6dede79f57dba1a1fb9b6d6c56ef5466bfd8e317

        • \Windows\Temp\1.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • memory/832-2517-0x0000000000380000-0x00000000003DB000-memory.dmp

          Filesize

          364KB

        • memory/832-2520-0x0000000004E20000-0x0000000004E60000-memory.dmp

          Filesize

          256KB

        • memory/832-2518-0x0000000004E20000-0x0000000004E60000-memory.dmp

          Filesize

          256KB

        • memory/832-4375-0x0000000002860000-0x0000000002892000-memory.dmp

          Filesize

          200KB

        • memory/832-2225-0x0000000004DC0000-0x0000000004E26000-memory.dmp

          Filesize

          408KB

        • memory/832-2224-0x0000000004E60000-0x0000000004EC8000-memory.dmp

          Filesize

          416KB

        • memory/832-4376-0x0000000004E20000-0x0000000004E60000-memory.dmp

          Filesize

          256KB

        • memory/832-4379-0x0000000004E20000-0x0000000004E60000-memory.dmp

          Filesize

          256KB

        • memory/832-4378-0x0000000004E20000-0x0000000004E60000-memory.dmp

          Filesize

          256KB

        • memory/832-4380-0x0000000004E20000-0x0000000004E60000-memory.dmp

          Filesize

          256KB

        • memory/1196-4388-0x0000000001020000-0x0000000001050000-memory.dmp

          Filesize

          192KB

        • memory/1196-4389-0x0000000000370000-0x0000000000376000-memory.dmp

          Filesize

          24KB

        • memory/1196-4390-0x0000000004890000-0x00000000048D0000-memory.dmp

          Filesize

          256KB

        • memory/1196-4391-0x0000000004890000-0x00000000048D0000-memory.dmp

          Filesize

          256KB

        • memory/1484-91-0x0000000002120000-0x0000000002171000-memory.dmp

          Filesize

          324KB

        • memory/1484-111-0x0000000002120000-0x0000000002171000-memory.dmp

          Filesize

          324KB

        • memory/1484-137-0x0000000002120000-0x0000000002171000-memory.dmp

          Filesize

          324KB

        • memory/1484-139-0x0000000002120000-0x0000000002171000-memory.dmp

          Filesize

          324KB

        • memory/1484-141-0x0000000002120000-0x0000000002171000-memory.dmp

          Filesize

          324KB

        • memory/1484-131-0x0000000002120000-0x0000000002171000-memory.dmp

          Filesize

          324KB

        • memory/1484-120-0x0000000004D20000-0x0000000004D60000-memory.dmp

          Filesize

          256KB

        • memory/1484-119-0x0000000004D20000-0x0000000004D60000-memory.dmp

          Filesize

          256KB

        • memory/1484-115-0x0000000002120000-0x0000000002171000-memory.dmp

          Filesize

          324KB

        • memory/1484-97-0x0000000002120000-0x0000000002171000-memory.dmp

          Filesize

          324KB

        • memory/1484-2206-0x00000000007C0000-0x00000000007CA000-memory.dmp

          Filesize

          40KB

        • memory/1484-133-0x0000000002120000-0x0000000002171000-memory.dmp

          Filesize

          324KB

        • memory/1484-129-0x0000000002120000-0x0000000002171000-memory.dmp

          Filesize

          324KB

        • memory/1484-127-0x0000000002120000-0x0000000002171000-memory.dmp

          Filesize

          324KB

        • memory/1484-125-0x0000000002120000-0x0000000002171000-memory.dmp

          Filesize

          324KB

        • memory/1484-123-0x0000000002120000-0x0000000002171000-memory.dmp

          Filesize

          324KB

        • memory/1484-121-0x0000000002120000-0x0000000002171000-memory.dmp

          Filesize

          324KB

        • memory/1484-117-0x0000000002120000-0x0000000002171000-memory.dmp

          Filesize

          324KB

        • memory/1484-113-0x0000000002120000-0x0000000002171000-memory.dmp

          Filesize

          324KB

        • memory/1484-135-0x0000000002120000-0x0000000002171000-memory.dmp

          Filesize

          324KB

        • memory/1484-109-0x0000000002120000-0x0000000002171000-memory.dmp

          Filesize

          324KB

        • memory/1484-74-0x00000000020C0000-0x0000000002118000-memory.dmp

          Filesize

          352KB

        • memory/1484-107-0x0000000002120000-0x0000000002171000-memory.dmp

          Filesize

          324KB

        • memory/1484-105-0x0000000002120000-0x0000000002171000-memory.dmp

          Filesize

          324KB

        • memory/1484-103-0x0000000002120000-0x0000000002171000-memory.dmp

          Filesize

          324KB

        • memory/1484-101-0x0000000002120000-0x0000000002171000-memory.dmp

          Filesize

          324KB

        • memory/1484-99-0x0000000002120000-0x0000000002171000-memory.dmp

          Filesize

          324KB

        • memory/1484-93-0x0000000002120000-0x0000000002171000-memory.dmp

          Filesize

          324KB

        • memory/1484-95-0x0000000002120000-0x0000000002171000-memory.dmp

          Filesize

          324KB

        • memory/1484-89-0x0000000002120000-0x0000000002171000-memory.dmp

          Filesize

          324KB

        • memory/1484-87-0x0000000002120000-0x0000000002171000-memory.dmp

          Filesize

          324KB

        • memory/1484-85-0x0000000002120000-0x0000000002171000-memory.dmp

          Filesize

          324KB

        • memory/1484-83-0x0000000002120000-0x0000000002171000-memory.dmp

          Filesize

          324KB

        • memory/1484-81-0x0000000002120000-0x0000000002171000-memory.dmp

          Filesize

          324KB

        • memory/1484-79-0x0000000002120000-0x0000000002171000-memory.dmp

          Filesize

          324KB

        • memory/1484-77-0x0000000002120000-0x0000000002171000-memory.dmp

          Filesize

          324KB

        • memory/1484-76-0x0000000002120000-0x0000000002171000-memory.dmp

          Filesize

          324KB

        • memory/1484-75-0x0000000002120000-0x0000000002176000-memory.dmp

          Filesize

          344KB

        • memory/1600-2223-0x00000000011E0000-0x00000000011EA000-memory.dmp

          Filesize

          40KB