Analysis

  • max time kernel
    178s
  • max time network
    198s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05-05-2023 18:33

General

  • Target

    7e381dc6ed27aad28240e19ca8ce69f20aeba2eff253a246eb722b86f6a337c3.exe

  • Size

    1.5MB

  • MD5

    ff284da9454b1b2202daac0826e279e6

  • SHA1

    9baa769e12fef2d18553a7f8ab38f955d78aba88

  • SHA256

    7e381dc6ed27aad28240e19ca8ce69f20aeba2eff253a246eb722b86f6a337c3

  • SHA512

    c5ae52c56f4693f82efb14500c71f35d66c528cb326962c020b38f76111a8b60bc2d9bd814a3d302223b2635134eb4016e2458995042a8d8ed25a781c8aee597

  • SSDEEP

    24576:jywRErvx0bDhOQz8wbYv0ipLm1kZPxEj05VZBs5bcRRtnp1N4eiKo2s6xr2wS:2wRaJHQFbYhLm1kZZEj0Ao3vwKo2s6

Malware Config

Extracted

Family

redline

Botnet

maxbi

C2

185.161.248.73:4164

Attributes
  • auth_value

    6aa7dba884fe45693dfa04c91440daef

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e381dc6ed27aad28240e19ca8ce69f20aeba2eff253a246eb722b86f6a337c3.exe
    "C:\Users\Admin\AppData\Local\Temp\7e381dc6ed27aad28240e19ca8ce69f20aeba2eff253a246eb722b86f6a337c3.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i45987781.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i45987781.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:268
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i69763979.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i69763979.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1912
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i28107940.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i28107940.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1972
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i64204160.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i64204160.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1476
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a14609536.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a14609536.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Loads dropped DLL
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:620
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b33249662.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b33249662.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1932

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i45987781.exe

    Filesize

    1.3MB

    MD5

    e4324f15707e225c1bc183fef8c57ecc

    SHA1

    58e7e6cac92fb23a3f32584eaa4ed5da0c027241

    SHA256

    4ef8dfa216dc88079ac5d75ac4b19dc35b4b079eddc7dea8157e6b1a1e5a8c93

    SHA512

    5d1a3d905a867a198fa70949fb321f780459a4f8ff37b65bc0cc702956bfb15d0c72ed692175e60feffadcd22f15e8829e2e3d7ba4d35e416a83f85070813b4a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i45987781.exe

    Filesize

    1.3MB

    MD5

    e4324f15707e225c1bc183fef8c57ecc

    SHA1

    58e7e6cac92fb23a3f32584eaa4ed5da0c027241

    SHA256

    4ef8dfa216dc88079ac5d75ac4b19dc35b4b079eddc7dea8157e6b1a1e5a8c93

    SHA512

    5d1a3d905a867a198fa70949fb321f780459a4f8ff37b65bc0cc702956bfb15d0c72ed692175e60feffadcd22f15e8829e2e3d7ba4d35e416a83f85070813b4a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i69763979.exe

    Filesize

    1.1MB

    MD5

    f62b8c3ff9cc407fbb4f33522c12a7b8

    SHA1

    b141101171fa09eaad00835389b6af493b7fd2d2

    SHA256

    8272fe0601366df231e36b9a8f5152b5a37cce3a8a0862197bf758a8912ade17

    SHA512

    27456f590acd48bd9f4814f6ffa74fa1902e16a1c600c5add0cf8e8a223ef836ec964cd42cbd699110b1f9f902667bde8ecdb43dbce8da3f2ac4cab9d5af9a1e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i69763979.exe

    Filesize

    1.1MB

    MD5

    f62b8c3ff9cc407fbb4f33522c12a7b8

    SHA1

    b141101171fa09eaad00835389b6af493b7fd2d2

    SHA256

    8272fe0601366df231e36b9a8f5152b5a37cce3a8a0862197bf758a8912ade17

    SHA512

    27456f590acd48bd9f4814f6ffa74fa1902e16a1c600c5add0cf8e8a223ef836ec964cd42cbd699110b1f9f902667bde8ecdb43dbce8da3f2ac4cab9d5af9a1e

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i28107940.exe

    Filesize

    686KB

    MD5

    3e69647532ded1d71128177e00479a5a

    SHA1

    dcff48417e51c6f65703a41cdcc6440cb32f5da2

    SHA256

    2b0336cde0821701552e92242214dbc453e938abb66917d927d6468d4c9d6175

    SHA512

    bff1387fe7a80cf9bef96129d827b5832176b391411a4950b115764e15120f9f51c8109ee929e3acdfd296e3cb8a6b0bc84b3a5ab2607aa98ff3a11f7780f084

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i28107940.exe

    Filesize

    686KB

    MD5

    3e69647532ded1d71128177e00479a5a

    SHA1

    dcff48417e51c6f65703a41cdcc6440cb32f5da2

    SHA256

    2b0336cde0821701552e92242214dbc453e938abb66917d927d6468d4c9d6175

    SHA512

    bff1387fe7a80cf9bef96129d827b5832176b391411a4950b115764e15120f9f51c8109ee929e3acdfd296e3cb8a6b0bc84b3a5ab2607aa98ff3a11f7780f084

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i64204160.exe

    Filesize

    405KB

    MD5

    77817c26289d95fe71b846bd0ce2be3e

    SHA1

    02dccbf0228a75db188dc71721fbb2ee08073a75

    SHA256

    e28e8a6c58403d10ddad277c83453897af0dcd36a448369f707f2a9d1ddc4050

    SHA512

    70a0bcb8f8b788a0eaeb8bbed80a7b40581d758daa23bf449ccd68bfb3e670ebf73c460bbb6fba393376148125fe8eab56df9f23af972ed53250419033172168

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i64204160.exe

    Filesize

    405KB

    MD5

    77817c26289d95fe71b846bd0ce2be3e

    SHA1

    02dccbf0228a75db188dc71721fbb2ee08073a75

    SHA256

    e28e8a6c58403d10ddad277c83453897af0dcd36a448369f707f2a9d1ddc4050

    SHA512

    70a0bcb8f8b788a0eaeb8bbed80a7b40581d758daa23bf449ccd68bfb3e670ebf73c460bbb6fba393376148125fe8eab56df9f23af972ed53250419033172168

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a14609536.exe

    Filesize

    345KB

    MD5

    bf24dab0dacf543d81abe62951069a20

    SHA1

    29346525e00f0c34442db07ab9fa062ea0d05189

    SHA256

    8404cce8edc1cbce2b4df8b29a13abaffa80add9bcfebdd1aede46d0f8231c19

    SHA512

    e3b54b77129fae1977c4a930787a72326339237af3800b5d1438b9643c3bbf5fec9e57b66eab70838a46ec12f6d6e829c6800452994d0d1c14f1708913803224

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a14609536.exe

    Filesize

    345KB

    MD5

    bf24dab0dacf543d81abe62951069a20

    SHA1

    29346525e00f0c34442db07ab9fa062ea0d05189

    SHA256

    8404cce8edc1cbce2b4df8b29a13abaffa80add9bcfebdd1aede46d0f8231c19

    SHA512

    e3b54b77129fae1977c4a930787a72326339237af3800b5d1438b9643c3bbf5fec9e57b66eab70838a46ec12f6d6e829c6800452994d0d1c14f1708913803224

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a14609536.exe

    Filesize

    345KB

    MD5

    bf24dab0dacf543d81abe62951069a20

    SHA1

    29346525e00f0c34442db07ab9fa062ea0d05189

    SHA256

    8404cce8edc1cbce2b4df8b29a13abaffa80add9bcfebdd1aede46d0f8231c19

    SHA512

    e3b54b77129fae1977c4a930787a72326339237af3800b5d1438b9643c3bbf5fec9e57b66eab70838a46ec12f6d6e829c6800452994d0d1c14f1708913803224

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b33249662.exe

    Filesize

    168KB

    MD5

    8c2d003d7cd9c535347752d141027498

    SHA1

    b3fd918cba2f1b0539d3c3c4421b8e602dd8601e

    SHA256

    4ad49407ec74d97fcf746262839b21fe2c5c14ffe4e2697ede87aca7a73c501c

    SHA512

    66d9650fc6079d1a1b93a2961834bc9fc41984e3bdfeb37fbc47f9392a88174f664ceabb9644ed6c32c590f2d627964c29cd170b5daaedd8c4b2bfcc49946ac9

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b33249662.exe

    Filesize

    168KB

    MD5

    8c2d003d7cd9c535347752d141027498

    SHA1

    b3fd918cba2f1b0539d3c3c4421b8e602dd8601e

    SHA256

    4ad49407ec74d97fcf746262839b21fe2c5c14ffe4e2697ede87aca7a73c501c

    SHA512

    66d9650fc6079d1a1b93a2961834bc9fc41984e3bdfeb37fbc47f9392a88174f664ceabb9644ed6c32c590f2d627964c29cd170b5daaedd8c4b2bfcc49946ac9

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\i45987781.exe

    Filesize

    1.3MB

    MD5

    e4324f15707e225c1bc183fef8c57ecc

    SHA1

    58e7e6cac92fb23a3f32584eaa4ed5da0c027241

    SHA256

    4ef8dfa216dc88079ac5d75ac4b19dc35b4b079eddc7dea8157e6b1a1e5a8c93

    SHA512

    5d1a3d905a867a198fa70949fb321f780459a4f8ff37b65bc0cc702956bfb15d0c72ed692175e60feffadcd22f15e8829e2e3d7ba4d35e416a83f85070813b4a

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\i45987781.exe

    Filesize

    1.3MB

    MD5

    e4324f15707e225c1bc183fef8c57ecc

    SHA1

    58e7e6cac92fb23a3f32584eaa4ed5da0c027241

    SHA256

    4ef8dfa216dc88079ac5d75ac4b19dc35b4b079eddc7dea8157e6b1a1e5a8c93

    SHA512

    5d1a3d905a867a198fa70949fb321f780459a4f8ff37b65bc0cc702956bfb15d0c72ed692175e60feffadcd22f15e8829e2e3d7ba4d35e416a83f85070813b4a

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\i69763979.exe

    Filesize

    1.1MB

    MD5

    f62b8c3ff9cc407fbb4f33522c12a7b8

    SHA1

    b141101171fa09eaad00835389b6af493b7fd2d2

    SHA256

    8272fe0601366df231e36b9a8f5152b5a37cce3a8a0862197bf758a8912ade17

    SHA512

    27456f590acd48bd9f4814f6ffa74fa1902e16a1c600c5add0cf8e8a223ef836ec964cd42cbd699110b1f9f902667bde8ecdb43dbce8da3f2ac4cab9d5af9a1e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\i69763979.exe

    Filesize

    1.1MB

    MD5

    f62b8c3ff9cc407fbb4f33522c12a7b8

    SHA1

    b141101171fa09eaad00835389b6af493b7fd2d2

    SHA256

    8272fe0601366df231e36b9a8f5152b5a37cce3a8a0862197bf758a8912ade17

    SHA512

    27456f590acd48bd9f4814f6ffa74fa1902e16a1c600c5add0cf8e8a223ef836ec964cd42cbd699110b1f9f902667bde8ecdb43dbce8da3f2ac4cab9d5af9a1e

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\i28107940.exe

    Filesize

    686KB

    MD5

    3e69647532ded1d71128177e00479a5a

    SHA1

    dcff48417e51c6f65703a41cdcc6440cb32f5da2

    SHA256

    2b0336cde0821701552e92242214dbc453e938abb66917d927d6468d4c9d6175

    SHA512

    bff1387fe7a80cf9bef96129d827b5832176b391411a4950b115764e15120f9f51c8109ee929e3acdfd296e3cb8a6b0bc84b3a5ab2607aa98ff3a11f7780f084

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\i28107940.exe

    Filesize

    686KB

    MD5

    3e69647532ded1d71128177e00479a5a

    SHA1

    dcff48417e51c6f65703a41cdcc6440cb32f5da2

    SHA256

    2b0336cde0821701552e92242214dbc453e938abb66917d927d6468d4c9d6175

    SHA512

    bff1387fe7a80cf9bef96129d827b5832176b391411a4950b115764e15120f9f51c8109ee929e3acdfd296e3cb8a6b0bc84b3a5ab2607aa98ff3a11f7780f084

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\i64204160.exe

    Filesize

    405KB

    MD5

    77817c26289d95fe71b846bd0ce2be3e

    SHA1

    02dccbf0228a75db188dc71721fbb2ee08073a75

    SHA256

    e28e8a6c58403d10ddad277c83453897af0dcd36a448369f707f2a9d1ddc4050

    SHA512

    70a0bcb8f8b788a0eaeb8bbed80a7b40581d758daa23bf449ccd68bfb3e670ebf73c460bbb6fba393376148125fe8eab56df9f23af972ed53250419033172168

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\i64204160.exe

    Filesize

    405KB

    MD5

    77817c26289d95fe71b846bd0ce2be3e

    SHA1

    02dccbf0228a75db188dc71721fbb2ee08073a75

    SHA256

    e28e8a6c58403d10ddad277c83453897af0dcd36a448369f707f2a9d1ddc4050

    SHA512

    70a0bcb8f8b788a0eaeb8bbed80a7b40581d758daa23bf449ccd68bfb3e670ebf73c460bbb6fba393376148125fe8eab56df9f23af972ed53250419033172168

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a14609536.exe

    Filesize

    345KB

    MD5

    bf24dab0dacf543d81abe62951069a20

    SHA1

    29346525e00f0c34442db07ab9fa062ea0d05189

    SHA256

    8404cce8edc1cbce2b4df8b29a13abaffa80add9bcfebdd1aede46d0f8231c19

    SHA512

    e3b54b77129fae1977c4a930787a72326339237af3800b5d1438b9643c3bbf5fec9e57b66eab70838a46ec12f6d6e829c6800452994d0d1c14f1708913803224

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a14609536.exe

    Filesize

    345KB

    MD5

    bf24dab0dacf543d81abe62951069a20

    SHA1

    29346525e00f0c34442db07ab9fa062ea0d05189

    SHA256

    8404cce8edc1cbce2b4df8b29a13abaffa80add9bcfebdd1aede46d0f8231c19

    SHA512

    e3b54b77129fae1977c4a930787a72326339237af3800b5d1438b9643c3bbf5fec9e57b66eab70838a46ec12f6d6e829c6800452994d0d1c14f1708913803224

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a14609536.exe

    Filesize

    345KB

    MD5

    bf24dab0dacf543d81abe62951069a20

    SHA1

    29346525e00f0c34442db07ab9fa062ea0d05189

    SHA256

    8404cce8edc1cbce2b4df8b29a13abaffa80add9bcfebdd1aede46d0f8231c19

    SHA512

    e3b54b77129fae1977c4a930787a72326339237af3800b5d1438b9643c3bbf5fec9e57b66eab70838a46ec12f6d6e829c6800452994d0d1c14f1708913803224

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b33249662.exe

    Filesize

    168KB

    MD5

    8c2d003d7cd9c535347752d141027498

    SHA1

    b3fd918cba2f1b0539d3c3c4421b8e602dd8601e

    SHA256

    4ad49407ec74d97fcf746262839b21fe2c5c14ffe4e2697ede87aca7a73c501c

    SHA512

    66d9650fc6079d1a1b93a2961834bc9fc41984e3bdfeb37fbc47f9392a88174f664ceabb9644ed6c32c590f2d627964c29cd170b5daaedd8c4b2bfcc49946ac9

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b33249662.exe

    Filesize

    168KB

    MD5

    8c2d003d7cd9c535347752d141027498

    SHA1

    b3fd918cba2f1b0539d3c3c4421b8e602dd8601e

    SHA256

    4ad49407ec74d97fcf746262839b21fe2c5c14ffe4e2697ede87aca7a73c501c

    SHA512

    66d9650fc6079d1a1b93a2961834bc9fc41984e3bdfeb37fbc47f9392a88174f664ceabb9644ed6c32c590f2d627964c29cd170b5daaedd8c4b2bfcc49946ac9

  • memory/620-114-0x0000000000400000-0x0000000000A67000-memory.dmp

    Filesize

    6.4MB

  • memory/620-137-0x0000000002460000-0x0000000002472000-memory.dmp

    Filesize

    72KB

  • memory/620-112-0x00000000051F0000-0x0000000005230000-memory.dmp

    Filesize

    256KB

  • memory/620-115-0x00000000051F0000-0x0000000005230000-memory.dmp

    Filesize

    256KB

  • memory/620-117-0x00000000051F0000-0x0000000005230000-memory.dmp

    Filesize

    256KB

  • memory/620-118-0x0000000002460000-0x0000000002472000-memory.dmp

    Filesize

    72KB

  • memory/620-119-0x0000000002460000-0x0000000002472000-memory.dmp

    Filesize

    72KB

  • memory/620-121-0x0000000002460000-0x0000000002472000-memory.dmp

    Filesize

    72KB

  • memory/620-123-0x0000000002460000-0x0000000002472000-memory.dmp

    Filesize

    72KB

  • memory/620-125-0x0000000002460000-0x0000000002472000-memory.dmp

    Filesize

    72KB

  • memory/620-127-0x0000000002460000-0x0000000002472000-memory.dmp

    Filesize

    72KB

  • memory/620-129-0x0000000002460000-0x0000000002472000-memory.dmp

    Filesize

    72KB

  • memory/620-131-0x0000000002460000-0x0000000002472000-memory.dmp

    Filesize

    72KB

  • memory/620-133-0x0000000002460000-0x0000000002472000-memory.dmp

    Filesize

    72KB

  • memory/620-135-0x0000000002460000-0x0000000002472000-memory.dmp

    Filesize

    72KB

  • memory/620-113-0x00000000051F0000-0x0000000005230000-memory.dmp

    Filesize

    256KB

  • memory/620-139-0x0000000002460000-0x0000000002472000-memory.dmp

    Filesize

    72KB

  • memory/620-141-0x0000000002460000-0x0000000002472000-memory.dmp

    Filesize

    72KB

  • memory/620-143-0x0000000002460000-0x0000000002472000-memory.dmp

    Filesize

    72KB

  • memory/620-145-0x0000000002460000-0x0000000002472000-memory.dmp

    Filesize

    72KB

  • memory/620-149-0x0000000000400000-0x0000000000A67000-memory.dmp

    Filesize

    6.4MB

  • memory/620-150-0x0000000000400000-0x0000000000A67000-memory.dmp

    Filesize

    6.4MB

  • memory/620-111-0x0000000002460000-0x0000000002478000-memory.dmp

    Filesize

    96KB

  • memory/620-110-0x0000000000E70000-0x0000000000E8A000-memory.dmp

    Filesize

    104KB

  • memory/620-109-0x00000000051F0000-0x0000000005230000-memory.dmp

    Filesize

    256KB

  • memory/620-108-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/1932-157-0x0000000000100000-0x0000000000130000-memory.dmp

    Filesize

    192KB

  • memory/1932-158-0x0000000000410000-0x0000000000416000-memory.dmp

    Filesize

    24KB

  • memory/1932-159-0x0000000002350000-0x0000000002390000-memory.dmp

    Filesize

    256KB

  • memory/1932-160-0x0000000002350000-0x0000000002390000-memory.dmp

    Filesize

    256KB