Analysis

  • max time kernel
    133s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05-05-2023 18:19

General

  • Target

    3bbd402d2d675fab413e9310c8719377ede054dfa8a21f3a394098a28ec874ec.exe

  • Size

    1.4MB

  • MD5

    afd448d2adbd259e497e57a1178fbccd

  • SHA1

    7e98d3512e36c195db6078c6f1012cbfe4ae2c59

  • SHA256

    3bbd402d2d675fab413e9310c8719377ede054dfa8a21f3a394098a28ec874ec

  • SHA512

    3723d1c0fcf265636c5039e9d865e72ee39854b32bc2e3fd21cbc0e595583121ab24c50492c1d2173a828f40820f1e89b39d61a5f6810381850894a4f0cb7c05

  • SSDEEP

    24576:Ey9rvA4PBSse5pE8xw/lxVlcT2nWulbelIyeSB77TfnSonuSdL5j1ScWH:Thvex2lxA0lW7/VuQj1S5

Malware Config

Extracted

Family

redline

Botnet

maxbi

C2

185.161.248.73:4164

Attributes
  • auth_value

    6aa7dba884fe45693dfa04c91440daef

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3bbd402d2d675fab413e9310c8719377ede054dfa8a21f3a394098a28ec874ec.exe
    "C:\Users\Admin\AppData\Local\Temp\3bbd402d2d675fab413e9310c8719377ede054dfa8a21f3a394098a28ec874ec.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i79842986.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i79842986.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1144
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i07872435.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i07872435.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:576
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i87130228.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i87130228.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:584
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i10002623.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i10002623.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1500
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a92405775.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a92405775.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Loads dropped DLL
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1068
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b18432150.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b18432150.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1916

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i79842986.exe

    Filesize

    1.3MB

    MD5

    2358394257a6977f9f162d108faaffab

    SHA1

    c1b1adaf5fbb8bfe0baad1205ff737a438c3d25d

    SHA256

    8bc7e3f6beac9ac2136aef9fc29d1a59419d25fa4623375cc9f3762d817de7a0

    SHA512

    1650e531c1e4628f9a34817049ec7fc8f5e8a5d1cd3bee98bce80621ea51c937508e086bc741a8b132a3f7c88224679b361bcbc4a5cdb0f31a6fa4334ad5d09f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i79842986.exe

    Filesize

    1.3MB

    MD5

    2358394257a6977f9f162d108faaffab

    SHA1

    c1b1adaf5fbb8bfe0baad1205ff737a438c3d25d

    SHA256

    8bc7e3f6beac9ac2136aef9fc29d1a59419d25fa4623375cc9f3762d817de7a0

    SHA512

    1650e531c1e4628f9a34817049ec7fc8f5e8a5d1cd3bee98bce80621ea51c937508e086bc741a8b132a3f7c88224679b361bcbc4a5cdb0f31a6fa4334ad5d09f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i07872435.exe

    Filesize

    1.1MB

    MD5

    32e49ee897d4e41469f3269e4e20f8e5

    SHA1

    6990b3d6a9712a6cdcc0c9ce2d06ade8df129bcd

    SHA256

    41ff106c9495c134b8cfa99a9fe3c0df9dd6c069e2979d734bbe7856cd62bb5f

    SHA512

    cd8484326cc4fd45684e6119183af20705ae82ca13bc0574261402a18f4f74d08cbf78e0c2bc2a0472a20607defb8537a2951f5333da03b6acdb3f6509cbaeaa

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i07872435.exe

    Filesize

    1.1MB

    MD5

    32e49ee897d4e41469f3269e4e20f8e5

    SHA1

    6990b3d6a9712a6cdcc0c9ce2d06ade8df129bcd

    SHA256

    41ff106c9495c134b8cfa99a9fe3c0df9dd6c069e2979d734bbe7856cd62bb5f

    SHA512

    cd8484326cc4fd45684e6119183af20705ae82ca13bc0574261402a18f4f74d08cbf78e0c2bc2a0472a20607defb8537a2951f5333da03b6acdb3f6509cbaeaa

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i87130228.exe

    Filesize

    644KB

    MD5

    5ec16d6bb952d0ffbd7c0c42fb633fd8

    SHA1

    63fb781bcbe5dc91d8cb63a066f2b8ad8fcab1a3

    SHA256

    7e85ccc19f83171de021b916590932e421a0c33a5b830166ffc24120af99d848

    SHA512

    42456d21cf214fcaf81fb97e7f1e96ea2c54dacc462a7fe5baf3aeb64f4e627c7249496ba7c63ff7c53cdb72011243437f6880bfe345ec0e8aebd9fbc4760738

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i87130228.exe

    Filesize

    644KB

    MD5

    5ec16d6bb952d0ffbd7c0c42fb633fd8

    SHA1

    63fb781bcbe5dc91d8cb63a066f2b8ad8fcab1a3

    SHA256

    7e85ccc19f83171de021b916590932e421a0c33a5b830166ffc24120af99d848

    SHA512

    42456d21cf214fcaf81fb97e7f1e96ea2c54dacc462a7fe5baf3aeb64f4e627c7249496ba7c63ff7c53cdb72011243437f6880bfe345ec0e8aebd9fbc4760738

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i10002623.exe

    Filesize

    385KB

    MD5

    84b9335fba6769263b80c8eb90c95c00

    SHA1

    4cf4ea7d200e53ee731bf0757ae7efc3b253046e

    SHA256

    541cecd2fe318b8102042fda4b8322d3308eb9ea417db33d74eb4cc06c85c0c1

    SHA512

    341d752cad51a3203bda876e6b9dda231c023ce8e2f6c9fa650f57122c812fa1351df58c2a2c118ac14dce2a9788625c1cfb60a7071f19c033f06b1e1a1eec94

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i10002623.exe

    Filesize

    385KB

    MD5

    84b9335fba6769263b80c8eb90c95c00

    SHA1

    4cf4ea7d200e53ee731bf0757ae7efc3b253046e

    SHA256

    541cecd2fe318b8102042fda4b8322d3308eb9ea417db33d74eb4cc06c85c0c1

    SHA512

    341d752cad51a3203bda876e6b9dda231c023ce8e2f6c9fa650f57122c812fa1351df58c2a2c118ac14dce2a9788625c1cfb60a7071f19c033f06b1e1a1eec94

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a92405775.exe

    Filesize

    291KB

    MD5

    ce27553a2a3454e82a427b2a8a7847b8

    SHA1

    572ce8d9daf60ba37132dfef202a22bf1db391e0

    SHA256

    97734c5b3a6cc99d4baaafd1ca3e844e27b35b5c2072b2dd2fc258b3504a5373

    SHA512

    036a00e8a137b9d746573598d4b4d51fe9c5f835abe72af0992261fc96e7a6d575209f4daafdeb6910fffcf7ef85fc10a42957c3d5c25d76b55c5fb31b1fda37

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a92405775.exe

    Filesize

    291KB

    MD5

    ce27553a2a3454e82a427b2a8a7847b8

    SHA1

    572ce8d9daf60ba37132dfef202a22bf1db391e0

    SHA256

    97734c5b3a6cc99d4baaafd1ca3e844e27b35b5c2072b2dd2fc258b3504a5373

    SHA512

    036a00e8a137b9d746573598d4b4d51fe9c5f835abe72af0992261fc96e7a6d575209f4daafdeb6910fffcf7ef85fc10a42957c3d5c25d76b55c5fb31b1fda37

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a92405775.exe

    Filesize

    291KB

    MD5

    ce27553a2a3454e82a427b2a8a7847b8

    SHA1

    572ce8d9daf60ba37132dfef202a22bf1db391e0

    SHA256

    97734c5b3a6cc99d4baaafd1ca3e844e27b35b5c2072b2dd2fc258b3504a5373

    SHA512

    036a00e8a137b9d746573598d4b4d51fe9c5f835abe72af0992261fc96e7a6d575209f4daafdeb6910fffcf7ef85fc10a42957c3d5c25d76b55c5fb31b1fda37

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b18432150.exe

    Filesize

    168KB

    MD5

    df9334955bb2461c384e61f8f8d7a628

    SHA1

    8a277eeb18bf974fdd58c5e5825c6779fde6ae51

    SHA256

    827f9a77b86cb4745363cfeb07be2d2ab04149536a4085324289b9de1011bb5e

    SHA512

    0055f0fe6417ff86d1d1ccb4cf8af88e1c481b325366922d1829281d1d3b957a54efaafa12f6fd8249ed96e1985d50f44d9aca8600e9fc2bcb5deec40a28019c

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b18432150.exe

    Filesize

    168KB

    MD5

    df9334955bb2461c384e61f8f8d7a628

    SHA1

    8a277eeb18bf974fdd58c5e5825c6779fde6ae51

    SHA256

    827f9a77b86cb4745363cfeb07be2d2ab04149536a4085324289b9de1011bb5e

    SHA512

    0055f0fe6417ff86d1d1ccb4cf8af88e1c481b325366922d1829281d1d3b957a54efaafa12f6fd8249ed96e1985d50f44d9aca8600e9fc2bcb5deec40a28019c

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\i79842986.exe

    Filesize

    1.3MB

    MD5

    2358394257a6977f9f162d108faaffab

    SHA1

    c1b1adaf5fbb8bfe0baad1205ff737a438c3d25d

    SHA256

    8bc7e3f6beac9ac2136aef9fc29d1a59419d25fa4623375cc9f3762d817de7a0

    SHA512

    1650e531c1e4628f9a34817049ec7fc8f5e8a5d1cd3bee98bce80621ea51c937508e086bc741a8b132a3f7c88224679b361bcbc4a5cdb0f31a6fa4334ad5d09f

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\i79842986.exe

    Filesize

    1.3MB

    MD5

    2358394257a6977f9f162d108faaffab

    SHA1

    c1b1adaf5fbb8bfe0baad1205ff737a438c3d25d

    SHA256

    8bc7e3f6beac9ac2136aef9fc29d1a59419d25fa4623375cc9f3762d817de7a0

    SHA512

    1650e531c1e4628f9a34817049ec7fc8f5e8a5d1cd3bee98bce80621ea51c937508e086bc741a8b132a3f7c88224679b361bcbc4a5cdb0f31a6fa4334ad5d09f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\i07872435.exe

    Filesize

    1.1MB

    MD5

    32e49ee897d4e41469f3269e4e20f8e5

    SHA1

    6990b3d6a9712a6cdcc0c9ce2d06ade8df129bcd

    SHA256

    41ff106c9495c134b8cfa99a9fe3c0df9dd6c069e2979d734bbe7856cd62bb5f

    SHA512

    cd8484326cc4fd45684e6119183af20705ae82ca13bc0574261402a18f4f74d08cbf78e0c2bc2a0472a20607defb8537a2951f5333da03b6acdb3f6509cbaeaa

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\i07872435.exe

    Filesize

    1.1MB

    MD5

    32e49ee897d4e41469f3269e4e20f8e5

    SHA1

    6990b3d6a9712a6cdcc0c9ce2d06ade8df129bcd

    SHA256

    41ff106c9495c134b8cfa99a9fe3c0df9dd6c069e2979d734bbe7856cd62bb5f

    SHA512

    cd8484326cc4fd45684e6119183af20705ae82ca13bc0574261402a18f4f74d08cbf78e0c2bc2a0472a20607defb8537a2951f5333da03b6acdb3f6509cbaeaa

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\i87130228.exe

    Filesize

    644KB

    MD5

    5ec16d6bb952d0ffbd7c0c42fb633fd8

    SHA1

    63fb781bcbe5dc91d8cb63a066f2b8ad8fcab1a3

    SHA256

    7e85ccc19f83171de021b916590932e421a0c33a5b830166ffc24120af99d848

    SHA512

    42456d21cf214fcaf81fb97e7f1e96ea2c54dacc462a7fe5baf3aeb64f4e627c7249496ba7c63ff7c53cdb72011243437f6880bfe345ec0e8aebd9fbc4760738

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\i87130228.exe

    Filesize

    644KB

    MD5

    5ec16d6bb952d0ffbd7c0c42fb633fd8

    SHA1

    63fb781bcbe5dc91d8cb63a066f2b8ad8fcab1a3

    SHA256

    7e85ccc19f83171de021b916590932e421a0c33a5b830166ffc24120af99d848

    SHA512

    42456d21cf214fcaf81fb97e7f1e96ea2c54dacc462a7fe5baf3aeb64f4e627c7249496ba7c63ff7c53cdb72011243437f6880bfe345ec0e8aebd9fbc4760738

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\i10002623.exe

    Filesize

    385KB

    MD5

    84b9335fba6769263b80c8eb90c95c00

    SHA1

    4cf4ea7d200e53ee731bf0757ae7efc3b253046e

    SHA256

    541cecd2fe318b8102042fda4b8322d3308eb9ea417db33d74eb4cc06c85c0c1

    SHA512

    341d752cad51a3203bda876e6b9dda231c023ce8e2f6c9fa650f57122c812fa1351df58c2a2c118ac14dce2a9788625c1cfb60a7071f19c033f06b1e1a1eec94

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\i10002623.exe

    Filesize

    385KB

    MD5

    84b9335fba6769263b80c8eb90c95c00

    SHA1

    4cf4ea7d200e53ee731bf0757ae7efc3b253046e

    SHA256

    541cecd2fe318b8102042fda4b8322d3308eb9ea417db33d74eb4cc06c85c0c1

    SHA512

    341d752cad51a3203bda876e6b9dda231c023ce8e2f6c9fa650f57122c812fa1351df58c2a2c118ac14dce2a9788625c1cfb60a7071f19c033f06b1e1a1eec94

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a92405775.exe

    Filesize

    291KB

    MD5

    ce27553a2a3454e82a427b2a8a7847b8

    SHA1

    572ce8d9daf60ba37132dfef202a22bf1db391e0

    SHA256

    97734c5b3a6cc99d4baaafd1ca3e844e27b35b5c2072b2dd2fc258b3504a5373

    SHA512

    036a00e8a137b9d746573598d4b4d51fe9c5f835abe72af0992261fc96e7a6d575209f4daafdeb6910fffcf7ef85fc10a42957c3d5c25d76b55c5fb31b1fda37

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a92405775.exe

    Filesize

    291KB

    MD5

    ce27553a2a3454e82a427b2a8a7847b8

    SHA1

    572ce8d9daf60ba37132dfef202a22bf1db391e0

    SHA256

    97734c5b3a6cc99d4baaafd1ca3e844e27b35b5c2072b2dd2fc258b3504a5373

    SHA512

    036a00e8a137b9d746573598d4b4d51fe9c5f835abe72af0992261fc96e7a6d575209f4daafdeb6910fffcf7ef85fc10a42957c3d5c25d76b55c5fb31b1fda37

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a92405775.exe

    Filesize

    291KB

    MD5

    ce27553a2a3454e82a427b2a8a7847b8

    SHA1

    572ce8d9daf60ba37132dfef202a22bf1db391e0

    SHA256

    97734c5b3a6cc99d4baaafd1ca3e844e27b35b5c2072b2dd2fc258b3504a5373

    SHA512

    036a00e8a137b9d746573598d4b4d51fe9c5f835abe72af0992261fc96e7a6d575209f4daafdeb6910fffcf7ef85fc10a42957c3d5c25d76b55c5fb31b1fda37

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b18432150.exe

    Filesize

    168KB

    MD5

    df9334955bb2461c384e61f8f8d7a628

    SHA1

    8a277eeb18bf974fdd58c5e5825c6779fde6ae51

    SHA256

    827f9a77b86cb4745363cfeb07be2d2ab04149536a4085324289b9de1011bb5e

    SHA512

    0055f0fe6417ff86d1d1ccb4cf8af88e1c481b325366922d1829281d1d3b957a54efaafa12f6fd8249ed96e1985d50f44d9aca8600e9fc2bcb5deec40a28019c

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b18432150.exe

    Filesize

    168KB

    MD5

    df9334955bb2461c384e61f8f8d7a628

    SHA1

    8a277eeb18bf974fdd58c5e5825c6779fde6ae51

    SHA256

    827f9a77b86cb4745363cfeb07be2d2ab04149536a4085324289b9de1011bb5e

    SHA512

    0055f0fe6417ff86d1d1ccb4cf8af88e1c481b325366922d1829281d1d3b957a54efaafa12f6fd8249ed96e1985d50f44d9aca8600e9fc2bcb5deec40a28019c

  • memory/1068-113-0x00000000023E0000-0x00000000023F2000-memory.dmp

    Filesize

    72KB

  • memory/1068-137-0x00000000023E0000-0x00000000023F2000-memory.dmp

    Filesize

    72KB

  • memory/1068-115-0x00000000023E0000-0x00000000023F2000-memory.dmp

    Filesize

    72KB

  • memory/1068-117-0x00000000023E0000-0x00000000023F2000-memory.dmp

    Filesize

    72KB

  • memory/1068-119-0x00000000023E0000-0x00000000023F2000-memory.dmp

    Filesize

    72KB

  • memory/1068-121-0x00000000023E0000-0x00000000023F2000-memory.dmp

    Filesize

    72KB

  • memory/1068-123-0x00000000023E0000-0x00000000023F2000-memory.dmp

    Filesize

    72KB

  • memory/1068-125-0x00000000023E0000-0x00000000023F2000-memory.dmp

    Filesize

    72KB

  • memory/1068-127-0x00000000023E0000-0x00000000023F2000-memory.dmp

    Filesize

    72KB

  • memory/1068-129-0x00000000023E0000-0x00000000023F2000-memory.dmp

    Filesize

    72KB

  • memory/1068-135-0x00000000023E0000-0x00000000023F2000-memory.dmp

    Filesize

    72KB

  • memory/1068-133-0x00000000023E0000-0x00000000023F2000-memory.dmp

    Filesize

    72KB

  • memory/1068-131-0x00000000023E0000-0x00000000023F2000-memory.dmp

    Filesize

    72KB

  • memory/1068-112-0x00000000023E0000-0x00000000023F2000-memory.dmp

    Filesize

    72KB

  • memory/1068-139-0x00000000023E0000-0x00000000023F2000-memory.dmp

    Filesize

    72KB

  • memory/1068-140-0x00000000024C0000-0x0000000002500000-memory.dmp

    Filesize

    256KB

  • memory/1068-141-0x0000000000400000-0x00000000006C9000-memory.dmp

    Filesize

    2.8MB

  • memory/1068-142-0x00000000024C0000-0x0000000002500000-memory.dmp

    Filesize

    256KB

  • memory/1068-143-0x0000000000400000-0x00000000006C9000-memory.dmp

    Filesize

    2.8MB

  • memory/1068-111-0x00000000023E0000-0x00000000023F8000-memory.dmp

    Filesize

    96KB

  • memory/1068-110-0x00000000024C0000-0x0000000002500000-memory.dmp

    Filesize

    256KB

  • memory/1068-109-0x0000000000330000-0x000000000035D000-memory.dmp

    Filesize

    180KB

  • memory/1068-108-0x0000000000750000-0x000000000076A000-memory.dmp

    Filesize

    104KB

  • memory/1916-150-0x00000000010A0000-0x00000000010D0000-memory.dmp

    Filesize

    192KB

  • memory/1916-151-0x0000000000330000-0x0000000000336000-memory.dmp

    Filesize

    24KB

  • memory/1916-152-0x0000000000A40000-0x0000000000A80000-memory.dmp

    Filesize

    256KB

  • memory/1916-153-0x0000000000A40000-0x0000000000A80000-memory.dmp

    Filesize

    256KB