Analysis

  • max time kernel
    128s
  • max time network
    163s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05-05-2023 18:10

General

  • Target

    14656a7f8c5a007bc00c2a48085f0c0c83b2e16616b046e5b223471c6db4e744.exe

  • Size

    1.2MB

  • MD5

    e6503e99a5ec0ec9c4b6ea542cce17ab

  • SHA1

    70a457aece1b398bdaeca23287308be4e2aa14ab

  • SHA256

    14656a7f8c5a007bc00c2a48085f0c0c83b2e16616b046e5b223471c6db4e744

  • SHA512

    daeb6385855070423785f96d9ac16790ecb2e7e4fc243851865387ac475ca30e4d6deec28a339c263e8e799936e09f670a7e440bcaf8da1d6f0405258453794b

  • SSDEEP

    24576:dy1G22qT4lPzFAXQSXX2cq3I0DWnJE1r8LxHlKPcnP4A:41PBMlbgv2caIKAqV8ZwP

Malware Config

Extracted

Family

redline

Botnet

lofa

C2

185.161.248.73:4164

Attributes
  • auth_value

    3442ba767c6a30cde747101942f34a3a

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 10 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14656a7f8c5a007bc00c2a48085f0c0c83b2e16616b046e5b223471c6db4e744.exe
    "C:\Users\Admin\AppData\Local\Temp\14656a7f8c5a007bc00c2a48085f0c0c83b2e16616b046e5b223471c6db4e744.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z37947390.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z37947390.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1968
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z77304489.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z77304489.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:588
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z70922630.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z70922630.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2040
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s69918260.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s69918260.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:872
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t73113683.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t73113683.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1212

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z37947390.exe

    Filesize

    977KB

    MD5

    6f7f1c3d5263a6f93c7c903d077a770b

    SHA1

    e7609ac36be56adc9ac81458dddf594b77461c88

    SHA256

    bf384e39584c6dd1f18f7ab6134ebe21853409b6ff2bbcddfaa1133ae3ad97b8

    SHA512

    4105e790e94c9bb07ed41e62de3a810e07ece9bbfa665b666bfd6fffa494b6970a6b79863b5731944656ea1f141535e03e67f8de7fd238fd92df8e4590429edd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z37947390.exe

    Filesize

    977KB

    MD5

    6f7f1c3d5263a6f93c7c903d077a770b

    SHA1

    e7609ac36be56adc9ac81458dddf594b77461c88

    SHA256

    bf384e39584c6dd1f18f7ab6134ebe21853409b6ff2bbcddfaa1133ae3ad97b8

    SHA512

    4105e790e94c9bb07ed41e62de3a810e07ece9bbfa665b666bfd6fffa494b6970a6b79863b5731944656ea1f141535e03e67f8de7fd238fd92df8e4590429edd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z77304489.exe

    Filesize

    795KB

    MD5

    a623203b8a5c663da05c5fd63ef12586

    SHA1

    ecfc887b1d013a080871a7765704527b3eefee7c

    SHA256

    4662b5906b6d171c8c394e0e1a749bddf1aa9e5789f29c6494d4b351d201b79d

    SHA512

    42857eb6173776bfe48b9725e12896a53cd37085ce29b154756c688c14c65c9a04ebc04ea97afd2461b6d4af7bfb27211572460e0c7a7a1fde048b1c13f4821a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z77304489.exe

    Filesize

    795KB

    MD5

    a623203b8a5c663da05c5fd63ef12586

    SHA1

    ecfc887b1d013a080871a7765704527b3eefee7c

    SHA256

    4662b5906b6d171c8c394e0e1a749bddf1aa9e5789f29c6494d4b351d201b79d

    SHA512

    42857eb6173776bfe48b9725e12896a53cd37085ce29b154756c688c14c65c9a04ebc04ea97afd2461b6d4af7bfb27211572460e0c7a7a1fde048b1c13f4821a

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z70922630.exe

    Filesize

    310KB

    MD5

    b262b665c720e15342bb413b15fa8a4c

    SHA1

    8a5899eceaa07e96c7b8705971ad41bfbade78fc

    SHA256

    73e5f6bc880180cb8fc2fcaa26edf959b4853227d429579871a03141ae51f310

    SHA512

    f8f40aeb97746db943aefefb4a7019bdc486c8600c9bfb6324f8364546721061f2e14805134ee5487e2f631afaaaed06cda61b7e873f8374ae489cf034d27f14

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z70922630.exe

    Filesize

    310KB

    MD5

    b262b665c720e15342bb413b15fa8a4c

    SHA1

    8a5899eceaa07e96c7b8705971ad41bfbade78fc

    SHA256

    73e5f6bc880180cb8fc2fcaa26edf959b4853227d429579871a03141ae51f310

    SHA512

    f8f40aeb97746db943aefefb4a7019bdc486c8600c9bfb6324f8364546721061f2e14805134ee5487e2f631afaaaed06cda61b7e873f8374ae489cf034d27f14

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s69918260.exe

    Filesize

    176KB

    MD5

    711ec7b73a48604e88f6666b9963b2e4

    SHA1

    1da877e011316ad4249ff30da0a5ab544a746cc0

    SHA256

    241d23410c347d7ceef78379a9043206ff61177a40e7301b427edf1f162bb13b

    SHA512

    e3897fc43e3de0e48781cc3edf984da5ad0b1826f02b111f713637d169f0aa77b24088ad859c4142bed29ab010dfbf614c6f9e0a9732924ce702c457a93f82ee

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s69918260.exe

    Filesize

    176KB

    MD5

    711ec7b73a48604e88f6666b9963b2e4

    SHA1

    1da877e011316ad4249ff30da0a5ab544a746cc0

    SHA256

    241d23410c347d7ceef78379a9043206ff61177a40e7301b427edf1f162bb13b

    SHA512

    e3897fc43e3de0e48781cc3edf984da5ad0b1826f02b111f713637d169f0aa77b24088ad859c4142bed29ab010dfbf614c6f9e0a9732924ce702c457a93f82ee

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t73113683.exe

    Filesize

    168KB

    MD5

    6d45e53d319f2017b0339ab17f1cc396

    SHA1

    631e5f116c308414a209aa86b531c6adc6d98d11

    SHA256

    bccd8d4cc1049d03f31bee69b596f779a2a8a05ef93d8d830180a38943689f12

    SHA512

    55913e7d918ed342935bc440e7ff31de6e97f2895a60e74095e0c21e4590b723498de407f5d7f5fd94daf07cb751afc83357236a06634e5633819ac536b40077

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t73113683.exe

    Filesize

    168KB

    MD5

    6d45e53d319f2017b0339ab17f1cc396

    SHA1

    631e5f116c308414a209aa86b531c6adc6d98d11

    SHA256

    bccd8d4cc1049d03f31bee69b596f779a2a8a05ef93d8d830180a38943689f12

    SHA512

    55913e7d918ed342935bc440e7ff31de6e97f2895a60e74095e0c21e4590b723498de407f5d7f5fd94daf07cb751afc83357236a06634e5633819ac536b40077

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z37947390.exe

    Filesize

    977KB

    MD5

    6f7f1c3d5263a6f93c7c903d077a770b

    SHA1

    e7609ac36be56adc9ac81458dddf594b77461c88

    SHA256

    bf384e39584c6dd1f18f7ab6134ebe21853409b6ff2bbcddfaa1133ae3ad97b8

    SHA512

    4105e790e94c9bb07ed41e62de3a810e07ece9bbfa665b666bfd6fffa494b6970a6b79863b5731944656ea1f141535e03e67f8de7fd238fd92df8e4590429edd

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z37947390.exe

    Filesize

    977KB

    MD5

    6f7f1c3d5263a6f93c7c903d077a770b

    SHA1

    e7609ac36be56adc9ac81458dddf594b77461c88

    SHA256

    bf384e39584c6dd1f18f7ab6134ebe21853409b6ff2bbcddfaa1133ae3ad97b8

    SHA512

    4105e790e94c9bb07ed41e62de3a810e07ece9bbfa665b666bfd6fffa494b6970a6b79863b5731944656ea1f141535e03e67f8de7fd238fd92df8e4590429edd

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z77304489.exe

    Filesize

    795KB

    MD5

    a623203b8a5c663da05c5fd63ef12586

    SHA1

    ecfc887b1d013a080871a7765704527b3eefee7c

    SHA256

    4662b5906b6d171c8c394e0e1a749bddf1aa9e5789f29c6494d4b351d201b79d

    SHA512

    42857eb6173776bfe48b9725e12896a53cd37085ce29b154756c688c14c65c9a04ebc04ea97afd2461b6d4af7bfb27211572460e0c7a7a1fde048b1c13f4821a

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z77304489.exe

    Filesize

    795KB

    MD5

    a623203b8a5c663da05c5fd63ef12586

    SHA1

    ecfc887b1d013a080871a7765704527b3eefee7c

    SHA256

    4662b5906b6d171c8c394e0e1a749bddf1aa9e5789f29c6494d4b351d201b79d

    SHA512

    42857eb6173776bfe48b9725e12896a53cd37085ce29b154756c688c14c65c9a04ebc04ea97afd2461b6d4af7bfb27211572460e0c7a7a1fde048b1c13f4821a

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z70922630.exe

    Filesize

    310KB

    MD5

    b262b665c720e15342bb413b15fa8a4c

    SHA1

    8a5899eceaa07e96c7b8705971ad41bfbade78fc

    SHA256

    73e5f6bc880180cb8fc2fcaa26edf959b4853227d429579871a03141ae51f310

    SHA512

    f8f40aeb97746db943aefefb4a7019bdc486c8600c9bfb6324f8364546721061f2e14805134ee5487e2f631afaaaed06cda61b7e873f8374ae489cf034d27f14

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z70922630.exe

    Filesize

    310KB

    MD5

    b262b665c720e15342bb413b15fa8a4c

    SHA1

    8a5899eceaa07e96c7b8705971ad41bfbade78fc

    SHA256

    73e5f6bc880180cb8fc2fcaa26edf959b4853227d429579871a03141ae51f310

    SHA512

    f8f40aeb97746db943aefefb4a7019bdc486c8600c9bfb6324f8364546721061f2e14805134ee5487e2f631afaaaed06cda61b7e873f8374ae489cf034d27f14

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\s69918260.exe

    Filesize

    176KB

    MD5

    711ec7b73a48604e88f6666b9963b2e4

    SHA1

    1da877e011316ad4249ff30da0a5ab544a746cc0

    SHA256

    241d23410c347d7ceef78379a9043206ff61177a40e7301b427edf1f162bb13b

    SHA512

    e3897fc43e3de0e48781cc3edf984da5ad0b1826f02b111f713637d169f0aa77b24088ad859c4142bed29ab010dfbf614c6f9e0a9732924ce702c457a93f82ee

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\s69918260.exe

    Filesize

    176KB

    MD5

    711ec7b73a48604e88f6666b9963b2e4

    SHA1

    1da877e011316ad4249ff30da0a5ab544a746cc0

    SHA256

    241d23410c347d7ceef78379a9043206ff61177a40e7301b427edf1f162bb13b

    SHA512

    e3897fc43e3de0e48781cc3edf984da5ad0b1826f02b111f713637d169f0aa77b24088ad859c4142bed29ab010dfbf614c6f9e0a9732924ce702c457a93f82ee

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\t73113683.exe

    Filesize

    168KB

    MD5

    6d45e53d319f2017b0339ab17f1cc396

    SHA1

    631e5f116c308414a209aa86b531c6adc6d98d11

    SHA256

    bccd8d4cc1049d03f31bee69b596f779a2a8a05ef93d8d830180a38943689f12

    SHA512

    55913e7d918ed342935bc440e7ff31de6e97f2895a60e74095e0c21e4590b723498de407f5d7f5fd94daf07cb751afc83357236a06634e5633819ac536b40077

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\t73113683.exe

    Filesize

    168KB

    MD5

    6d45e53d319f2017b0339ab17f1cc396

    SHA1

    631e5f116c308414a209aa86b531c6adc6d98d11

    SHA256

    bccd8d4cc1049d03f31bee69b596f779a2a8a05ef93d8d830180a38943689f12

    SHA512

    55913e7d918ed342935bc440e7ff31de6e97f2895a60e74095e0c21e4590b723498de407f5d7f5fd94daf07cb751afc83357236a06634e5633819ac536b40077

  • memory/872-120-0x0000000000A60000-0x0000000000A72000-memory.dmp

    Filesize

    72KB

  • memory/872-104-0x0000000000A60000-0x0000000000A72000-memory.dmp

    Filesize

    72KB

  • memory/872-97-0x0000000000A60000-0x0000000000A72000-memory.dmp

    Filesize

    72KB

  • memory/872-124-0x0000000000A60000-0x0000000000A72000-memory.dmp

    Filesize

    72KB

  • memory/872-122-0x0000000000A60000-0x0000000000A72000-memory.dmp

    Filesize

    72KB

  • memory/872-118-0x0000000000A60000-0x0000000000A72000-memory.dmp

    Filesize

    72KB

  • memory/872-116-0x0000000000A60000-0x0000000000A72000-memory.dmp

    Filesize

    72KB

  • memory/872-114-0x0000000000A60000-0x0000000000A72000-memory.dmp

    Filesize

    72KB

  • memory/872-112-0x0000000000A60000-0x0000000000A72000-memory.dmp

    Filesize

    72KB

  • memory/872-110-0x0000000000A60000-0x0000000000A72000-memory.dmp

    Filesize

    72KB

  • memory/872-108-0x0000000000A60000-0x0000000000A72000-memory.dmp

    Filesize

    72KB

  • memory/872-106-0x0000000000A60000-0x0000000000A72000-memory.dmp

    Filesize

    72KB

  • memory/872-102-0x0000000000A60000-0x0000000000A72000-memory.dmp

    Filesize

    72KB

  • memory/872-100-0x0000000000A60000-0x0000000000A72000-memory.dmp

    Filesize

    72KB

  • memory/872-125-0x00000000048F0000-0x0000000004930000-memory.dmp

    Filesize

    256KB

  • memory/872-126-0x00000000048F0000-0x0000000004930000-memory.dmp

    Filesize

    256KB

  • memory/872-98-0x0000000000A60000-0x0000000000A72000-memory.dmp

    Filesize

    72KB

  • memory/872-96-0x0000000000A60000-0x0000000000A78000-memory.dmp

    Filesize

    96KB

  • memory/872-95-0x00000000003D0000-0x00000000003EA000-memory.dmp

    Filesize

    104KB

  • memory/872-94-0x00000000048F0000-0x0000000004930000-memory.dmp

    Filesize

    256KB

  • memory/1212-133-0x00000000009E0000-0x0000000000A0E000-memory.dmp

    Filesize

    184KB

  • memory/1212-134-0x0000000000310000-0x0000000000316000-memory.dmp

    Filesize

    24KB

  • memory/1212-135-0x0000000004B80000-0x0000000004BC0000-memory.dmp

    Filesize

    256KB

  • memory/1212-136-0x0000000004B80000-0x0000000004BC0000-memory.dmp

    Filesize

    256KB