Analysis

  • max time kernel
    132s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05-05-2023 18:48

General

  • Target

    a45b3ac0d54f74237c09e1722fd234b7beb1cc560408a5846234ae2ce952fa3b.exe

  • Size

    1.3MB

  • MD5

    cbedc989ed8d9872f1d696366848d10e

  • SHA1

    a7467f46e03678b5a4a81dcac94bf4c091e8856b

  • SHA256

    a45b3ac0d54f74237c09e1722fd234b7beb1cc560408a5846234ae2ce952fa3b

  • SHA512

    56c3a8fef58a48fe16bc4e49ae7d59302a16b32d91895a1aa4fe56362f8c9cdcf94972ff9fd9895560ab2991a917fcf14c10960f50fc759da6af33706d855474

  • SSDEEP

    24576:kyi/egwMjKKF/Mfj9YnmBFNJysmxU0UtuUmON8o86AuopvBkJf4lW:z6egVKc0fj+nmR85TU8qPAuGud4

Malware Config

Extracted

Family

redline

Botnet

luser

C2

185.161.248.73:4164

Attributes
  • auth_value

    cf14a84de9a3b6b7b8981202f3b616fb

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 11 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a45b3ac0d54f74237c09e1722fd234b7beb1cc560408a5846234ae2ce952fa3b.exe
    "C:\Users\Admin\AppData\Local\Temp\a45b3ac0d54f74237c09e1722fd234b7beb1cc560408a5846234ae2ce952fa3b.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1092
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z92145068.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z92145068.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1736
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z68677973.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z68677973.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:672
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z52559985.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z52559985.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:520
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s49833757.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s49833757.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1272
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t79882300.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t79882300.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:540

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z92145068.exe

    Filesize

    1.1MB

    MD5

    cefef0c5c49d094b952cdbc9afc486f3

    SHA1

    beaa4dcf85dfaa86e7f718dd7994d8c15d7a79ee

    SHA256

    ed487e245c698b104ae2db1138858a4c38e83e8400e477ef415f015be83203bf

    SHA512

    aed531a3dd28c919e0a037009d2cf53ff4a06a8e2ec463441e70db9030acc92b1c6836b23b38f06690e9350004b37a8b80553c32608d29f137b9c649f2e516ae

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z92145068.exe

    Filesize

    1.1MB

    MD5

    cefef0c5c49d094b952cdbc9afc486f3

    SHA1

    beaa4dcf85dfaa86e7f718dd7994d8c15d7a79ee

    SHA256

    ed487e245c698b104ae2db1138858a4c38e83e8400e477ef415f015be83203bf

    SHA512

    aed531a3dd28c919e0a037009d2cf53ff4a06a8e2ec463441e70db9030acc92b1c6836b23b38f06690e9350004b37a8b80553c32608d29f137b9c649f2e516ae

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z68677973.exe

    Filesize

    895KB

    MD5

    b5cd3919fde92f3d441f43c24f4a88ce

    SHA1

    62b9097e2d9e41a6b7e30de690ef7da54aaafe41

    SHA256

    1be527bc2ee8a7d40f45cc6a5959cab9cc7459dd4e23163cdcf8e3e94cf64dcc

    SHA512

    f1665c38970614a42a319a0251c8b3f79cf1ecbf4d8eed66ac93dde2118e53574befe6838fc95cba1de4d57a19306c762a10f10e8da18edf94a6a18f7663df35

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z68677973.exe

    Filesize

    895KB

    MD5

    b5cd3919fde92f3d441f43c24f4a88ce

    SHA1

    62b9097e2d9e41a6b7e30de690ef7da54aaafe41

    SHA256

    1be527bc2ee8a7d40f45cc6a5959cab9cc7459dd4e23163cdcf8e3e94cf64dcc

    SHA512

    f1665c38970614a42a319a0251c8b3f79cf1ecbf4d8eed66ac93dde2118e53574befe6838fc95cba1de4d57a19306c762a10f10e8da18edf94a6a18f7663df35

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z52559985.exe

    Filesize

    410KB

    MD5

    5b7db11974a25a79f395ff425cb61b8e

    SHA1

    587b660abaddc27e0d728047d05e40f01e959274

    SHA256

    3bbba3929a2a916580e573e6811cc67938b27cdde94935ad169c4f9d54bf0256

    SHA512

    e5037212b3c44246893936bc559e86ee5bf4a88889a5b8b0b0394bcbfe0658d17de51c3f35ff4996d6efbd439ac9db60c25175d0e440d0370d7a4a6ded9853a4

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z52559985.exe

    Filesize

    410KB

    MD5

    5b7db11974a25a79f395ff425cb61b8e

    SHA1

    587b660abaddc27e0d728047d05e40f01e959274

    SHA256

    3bbba3929a2a916580e573e6811cc67938b27cdde94935ad169c4f9d54bf0256

    SHA512

    e5037212b3c44246893936bc559e86ee5bf4a88889a5b8b0b0394bcbfe0658d17de51c3f35ff4996d6efbd439ac9db60c25175d0e440d0370d7a4a6ded9853a4

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s49833757.exe

    Filesize

    347KB

    MD5

    1bc6419a91b007056d89b8868e46b537

    SHA1

    c1cef88f3b9dc6f987f03374616b6fa76d74b7c5

    SHA256

    466ef23fa27b4bb5ad3fe87208c17246faa94255c488ff16c30a9c3a075a1457

    SHA512

    7847ccb8f8d71cf93daaf9cca5a26226d7129eb02c418ec6a64fddadbace6f5f6946a867fc84038ec74e95ddadfadde395b703f6ddb8c13450d4229736449377

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s49833757.exe

    Filesize

    347KB

    MD5

    1bc6419a91b007056d89b8868e46b537

    SHA1

    c1cef88f3b9dc6f987f03374616b6fa76d74b7c5

    SHA256

    466ef23fa27b4bb5ad3fe87208c17246faa94255c488ff16c30a9c3a075a1457

    SHA512

    7847ccb8f8d71cf93daaf9cca5a26226d7129eb02c418ec6a64fddadbace6f5f6946a867fc84038ec74e95ddadfadde395b703f6ddb8c13450d4229736449377

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s49833757.exe

    Filesize

    347KB

    MD5

    1bc6419a91b007056d89b8868e46b537

    SHA1

    c1cef88f3b9dc6f987f03374616b6fa76d74b7c5

    SHA256

    466ef23fa27b4bb5ad3fe87208c17246faa94255c488ff16c30a9c3a075a1457

    SHA512

    7847ccb8f8d71cf93daaf9cca5a26226d7129eb02c418ec6a64fddadbace6f5f6946a867fc84038ec74e95ddadfadde395b703f6ddb8c13450d4229736449377

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t79882300.exe

    Filesize

    168KB

    MD5

    b8b66c5068d42dfe5a5881afee5255d6

    SHA1

    d64180fa8c84df12980cd512c5558e64570f05c1

    SHA256

    4e99dbd9e05496bd8f2f310a03d5ae714fe0b10ad20c906c81b23d74df7d7af8

    SHA512

    28e96750076d6ad1dd1c4ca54965f95b2edf19ff601f02901f2671751cc2a262ceda31ca4b3b9eb60ac0f571ce75cf1b98916de8125440fa54ac1869eb469b6e

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t79882300.exe

    Filesize

    168KB

    MD5

    b8b66c5068d42dfe5a5881afee5255d6

    SHA1

    d64180fa8c84df12980cd512c5558e64570f05c1

    SHA256

    4e99dbd9e05496bd8f2f310a03d5ae714fe0b10ad20c906c81b23d74df7d7af8

    SHA512

    28e96750076d6ad1dd1c4ca54965f95b2edf19ff601f02901f2671751cc2a262ceda31ca4b3b9eb60ac0f571ce75cf1b98916de8125440fa54ac1869eb469b6e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z92145068.exe

    Filesize

    1.1MB

    MD5

    cefef0c5c49d094b952cdbc9afc486f3

    SHA1

    beaa4dcf85dfaa86e7f718dd7994d8c15d7a79ee

    SHA256

    ed487e245c698b104ae2db1138858a4c38e83e8400e477ef415f015be83203bf

    SHA512

    aed531a3dd28c919e0a037009d2cf53ff4a06a8e2ec463441e70db9030acc92b1c6836b23b38f06690e9350004b37a8b80553c32608d29f137b9c649f2e516ae

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z92145068.exe

    Filesize

    1.1MB

    MD5

    cefef0c5c49d094b952cdbc9afc486f3

    SHA1

    beaa4dcf85dfaa86e7f718dd7994d8c15d7a79ee

    SHA256

    ed487e245c698b104ae2db1138858a4c38e83e8400e477ef415f015be83203bf

    SHA512

    aed531a3dd28c919e0a037009d2cf53ff4a06a8e2ec463441e70db9030acc92b1c6836b23b38f06690e9350004b37a8b80553c32608d29f137b9c649f2e516ae

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z68677973.exe

    Filesize

    895KB

    MD5

    b5cd3919fde92f3d441f43c24f4a88ce

    SHA1

    62b9097e2d9e41a6b7e30de690ef7da54aaafe41

    SHA256

    1be527bc2ee8a7d40f45cc6a5959cab9cc7459dd4e23163cdcf8e3e94cf64dcc

    SHA512

    f1665c38970614a42a319a0251c8b3f79cf1ecbf4d8eed66ac93dde2118e53574befe6838fc95cba1de4d57a19306c762a10f10e8da18edf94a6a18f7663df35

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z68677973.exe

    Filesize

    895KB

    MD5

    b5cd3919fde92f3d441f43c24f4a88ce

    SHA1

    62b9097e2d9e41a6b7e30de690ef7da54aaafe41

    SHA256

    1be527bc2ee8a7d40f45cc6a5959cab9cc7459dd4e23163cdcf8e3e94cf64dcc

    SHA512

    f1665c38970614a42a319a0251c8b3f79cf1ecbf4d8eed66ac93dde2118e53574befe6838fc95cba1de4d57a19306c762a10f10e8da18edf94a6a18f7663df35

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z52559985.exe

    Filesize

    410KB

    MD5

    5b7db11974a25a79f395ff425cb61b8e

    SHA1

    587b660abaddc27e0d728047d05e40f01e959274

    SHA256

    3bbba3929a2a916580e573e6811cc67938b27cdde94935ad169c4f9d54bf0256

    SHA512

    e5037212b3c44246893936bc559e86ee5bf4a88889a5b8b0b0394bcbfe0658d17de51c3f35ff4996d6efbd439ac9db60c25175d0e440d0370d7a4a6ded9853a4

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z52559985.exe

    Filesize

    410KB

    MD5

    5b7db11974a25a79f395ff425cb61b8e

    SHA1

    587b660abaddc27e0d728047d05e40f01e959274

    SHA256

    3bbba3929a2a916580e573e6811cc67938b27cdde94935ad169c4f9d54bf0256

    SHA512

    e5037212b3c44246893936bc559e86ee5bf4a88889a5b8b0b0394bcbfe0658d17de51c3f35ff4996d6efbd439ac9db60c25175d0e440d0370d7a4a6ded9853a4

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\s49833757.exe

    Filesize

    347KB

    MD5

    1bc6419a91b007056d89b8868e46b537

    SHA1

    c1cef88f3b9dc6f987f03374616b6fa76d74b7c5

    SHA256

    466ef23fa27b4bb5ad3fe87208c17246faa94255c488ff16c30a9c3a075a1457

    SHA512

    7847ccb8f8d71cf93daaf9cca5a26226d7129eb02c418ec6a64fddadbace6f5f6946a867fc84038ec74e95ddadfadde395b703f6ddb8c13450d4229736449377

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\s49833757.exe

    Filesize

    347KB

    MD5

    1bc6419a91b007056d89b8868e46b537

    SHA1

    c1cef88f3b9dc6f987f03374616b6fa76d74b7c5

    SHA256

    466ef23fa27b4bb5ad3fe87208c17246faa94255c488ff16c30a9c3a075a1457

    SHA512

    7847ccb8f8d71cf93daaf9cca5a26226d7129eb02c418ec6a64fddadbace6f5f6946a867fc84038ec74e95ddadfadde395b703f6ddb8c13450d4229736449377

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\s49833757.exe

    Filesize

    347KB

    MD5

    1bc6419a91b007056d89b8868e46b537

    SHA1

    c1cef88f3b9dc6f987f03374616b6fa76d74b7c5

    SHA256

    466ef23fa27b4bb5ad3fe87208c17246faa94255c488ff16c30a9c3a075a1457

    SHA512

    7847ccb8f8d71cf93daaf9cca5a26226d7129eb02c418ec6a64fddadbace6f5f6946a867fc84038ec74e95ddadfadde395b703f6ddb8c13450d4229736449377

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\t79882300.exe

    Filesize

    168KB

    MD5

    b8b66c5068d42dfe5a5881afee5255d6

    SHA1

    d64180fa8c84df12980cd512c5558e64570f05c1

    SHA256

    4e99dbd9e05496bd8f2f310a03d5ae714fe0b10ad20c906c81b23d74df7d7af8

    SHA512

    28e96750076d6ad1dd1c4ca54965f95b2edf19ff601f02901f2671751cc2a262ceda31ca4b3b9eb60ac0f571ce75cf1b98916de8125440fa54ac1869eb469b6e

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\t79882300.exe

    Filesize

    168KB

    MD5

    b8b66c5068d42dfe5a5881afee5255d6

    SHA1

    d64180fa8c84df12980cd512c5558e64570f05c1

    SHA256

    4e99dbd9e05496bd8f2f310a03d5ae714fe0b10ad20c906c81b23d74df7d7af8

    SHA512

    28e96750076d6ad1dd1c4ca54965f95b2edf19ff601f02901f2671751cc2a262ceda31ca4b3b9eb60ac0f571ce75cf1b98916de8125440fa54ac1869eb469b6e

  • memory/540-142-0x0000000001140000-0x0000000001180000-memory.dmp

    Filesize

    256KB

  • memory/540-141-0x0000000001140000-0x0000000001180000-memory.dmp

    Filesize

    256KB

  • memory/540-140-0x0000000000570000-0x0000000000576000-memory.dmp

    Filesize

    24KB

  • memory/540-139-0x00000000011C0000-0x00000000011EE000-memory.dmp

    Filesize

    184KB

  • memory/1272-117-0x0000000000620000-0x0000000000632000-memory.dmp

    Filesize

    72KB

  • memory/1272-123-0x0000000000620000-0x0000000000632000-memory.dmp

    Filesize

    72KB

  • memory/1272-121-0x0000000000620000-0x0000000000632000-memory.dmp

    Filesize

    72KB

  • memory/1272-119-0x0000000000620000-0x0000000000632000-memory.dmp

    Filesize

    72KB

  • memory/1272-115-0x0000000000620000-0x0000000000632000-memory.dmp

    Filesize

    72KB

  • memory/1272-113-0x0000000000620000-0x0000000000632000-memory.dmp

    Filesize

    72KB

  • memory/1272-111-0x0000000000620000-0x0000000000632000-memory.dmp

    Filesize

    72KB

  • memory/1272-107-0x0000000000620000-0x0000000000632000-memory.dmp

    Filesize

    72KB

  • memory/1272-105-0x0000000000620000-0x0000000000632000-memory.dmp

    Filesize

    72KB

  • memory/1272-129-0x0000000002020000-0x0000000002060000-memory.dmp

    Filesize

    256KB

  • memory/1272-130-0x0000000002020000-0x0000000002060000-memory.dmp

    Filesize

    256KB

  • memory/1272-128-0x00000000002C0000-0x00000000002ED000-memory.dmp

    Filesize

    180KB

  • memory/1272-131-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/1272-132-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/1272-127-0x0000000000620000-0x0000000000632000-memory.dmp

    Filesize

    72KB

  • memory/1272-125-0x0000000000620000-0x0000000000632000-memory.dmp

    Filesize

    72KB

  • memory/1272-109-0x0000000000620000-0x0000000000632000-memory.dmp

    Filesize

    72KB

  • memory/1272-103-0x0000000000620000-0x0000000000632000-memory.dmp

    Filesize

    72KB

  • memory/1272-101-0x0000000000620000-0x0000000000632000-memory.dmp

    Filesize

    72KB

  • memory/1272-100-0x0000000000620000-0x0000000000632000-memory.dmp

    Filesize

    72KB

  • memory/1272-99-0x0000000000620000-0x0000000000638000-memory.dmp

    Filesize

    96KB

  • memory/1272-98-0x00000000004B0000-0x00000000004CA000-memory.dmp

    Filesize

    104KB