Analysis

  • max time kernel
    133s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05/05/2023, 18:54

General

  • Target

    a9edeb6d9129c63697fb2593235da1393001ad05f71e16918acf45ca8f1473ab.exe

  • Size

    1.5MB

  • MD5

    7c93ba6f14cb15e2cd7ec2c9ca772d35

  • SHA1

    f59dd3369527868c0234a325d6ab95eb7a83c66a

  • SHA256

    a9edeb6d9129c63697fb2593235da1393001ad05f71e16918acf45ca8f1473ab

  • SHA512

    90dc3888642b4a35dbc09498aac0b6a115db7c71b4681ae4fdf102bfa3f8bb8a2870710addaf145cec41bd55c61583577e0abd02c66d82c10cd826868a6cf24b

  • SSDEEP

    24576:cyv54O1b4Cc4BDP1WHlM1H9A1SDCBdGRM0E99wsWMeltMAUCnidgE78/z:Lhhjc4l18lGVIgRlE99ws9/+qQ

Malware Config

Extracted

Family

redline

Botnet

massa

C2

185.161.248.73:4164

Attributes
  • auth_value

    413bf908ab27d959c62bef532780f511

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9edeb6d9129c63697fb2593235da1393001ad05f71e16918acf45ca8f1473ab.exe
    "C:\Users\Admin\AppData\Local\Temp\a9edeb6d9129c63697fb2593235da1393001ad05f71e16918acf45ca8f1473ab.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1300
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i75893031.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i75893031.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2040
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i30204576.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i30204576.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:552
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i40031515.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i40031515.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:880
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i43676956.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i43676956.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1772
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a17544659.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a17544659.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Loads dropped DLL
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1372
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b23201416.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b23201416.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1220

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i75893031.exe

    Filesize

    1.3MB

    MD5

    03f33f84a1f02f5b0e23db15b3512fec

    SHA1

    3a8b655addedba7b2d9eaa24a1366e65e70a1ae1

    SHA256

    a0f171e40fc5bf774ff31662614e56e9ba8aeeebc758dd722c7772d2c9e5cf78

    SHA512

    1dfc552de543f8af5a2a62e6eb5b67384070f8a887ab7e27126e96aaf8b10fac677b0cc415aadfcc37c862198e520ae09fc2418cc50496e22758f828c732b5b3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i75893031.exe

    Filesize

    1.3MB

    MD5

    03f33f84a1f02f5b0e23db15b3512fec

    SHA1

    3a8b655addedba7b2d9eaa24a1366e65e70a1ae1

    SHA256

    a0f171e40fc5bf774ff31662614e56e9ba8aeeebc758dd722c7772d2c9e5cf78

    SHA512

    1dfc552de543f8af5a2a62e6eb5b67384070f8a887ab7e27126e96aaf8b10fac677b0cc415aadfcc37c862198e520ae09fc2418cc50496e22758f828c732b5b3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i30204576.exe

    Filesize

    1.1MB

    MD5

    9130b21eab226af8fccce328980efbf8

    SHA1

    e0c19fa69c3889e380e6eaf19b451ae0631c6ee9

    SHA256

    d189bd96eb797e0b74d49f612c2ed59648e29f2f06f77c8cfd3c4f3f2d49b306

    SHA512

    6a771352c996fd412518c7eb933a8c03cb28c555055b97cc9b0eccad2ecd9c8707f8684fa093637867b4cfbd838401a2bc2d49a07dcb0418a9cb309f7459be73

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i30204576.exe

    Filesize

    1.1MB

    MD5

    9130b21eab226af8fccce328980efbf8

    SHA1

    e0c19fa69c3889e380e6eaf19b451ae0631c6ee9

    SHA256

    d189bd96eb797e0b74d49f612c2ed59648e29f2f06f77c8cfd3c4f3f2d49b306

    SHA512

    6a771352c996fd412518c7eb933a8c03cb28c555055b97cc9b0eccad2ecd9c8707f8684fa093637867b4cfbd838401a2bc2d49a07dcb0418a9cb309f7459be73

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i40031515.exe

    Filesize

    644KB

    MD5

    f068e78aa4c9349ec58eed6911b4a58e

    SHA1

    1449538d8a861afe0b8d9da4b81f123f33fdde76

    SHA256

    50b42962104c66427a7a79b3532d29488281eb055e97acef117da586c733dddd

    SHA512

    a952e47665fc5e3727e9996a68067b68608a80c249612ffbd1454f181ac82bc545d9987e75b43cba27317cb598644eb072fd580c48898486886f815bc1f6dacf

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i40031515.exe

    Filesize

    644KB

    MD5

    f068e78aa4c9349ec58eed6911b4a58e

    SHA1

    1449538d8a861afe0b8d9da4b81f123f33fdde76

    SHA256

    50b42962104c66427a7a79b3532d29488281eb055e97acef117da586c733dddd

    SHA512

    a952e47665fc5e3727e9996a68067b68608a80c249612ffbd1454f181ac82bc545d9987e75b43cba27317cb598644eb072fd580c48898486886f815bc1f6dacf

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i43676956.exe

    Filesize

    385KB

    MD5

    e95d2df7064012a1bf379fca0ad906fe

    SHA1

    7e92762fba8cc5fa92c194d410197e9eef57b0ef

    SHA256

    3b1c021014916674664b39ca67c647ca03018e86f688a12a8fd08926a3b5af12

    SHA512

    0702ec117913d1eb6d41fc0441c1d575060a6e8990d3596b5ba95f5514a4810fd385a79e76753f7bcfde40f19b41da64531762f93a5f24454a8342c9be65b3c2

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i43676956.exe

    Filesize

    385KB

    MD5

    e95d2df7064012a1bf379fca0ad906fe

    SHA1

    7e92762fba8cc5fa92c194d410197e9eef57b0ef

    SHA256

    3b1c021014916674664b39ca67c647ca03018e86f688a12a8fd08926a3b5af12

    SHA512

    0702ec117913d1eb6d41fc0441c1d575060a6e8990d3596b5ba95f5514a4810fd385a79e76753f7bcfde40f19b41da64531762f93a5f24454a8342c9be65b3c2

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a17544659.exe

    Filesize

    291KB

    MD5

    08b5d15772543cf3736bacf5db8b1a05

    SHA1

    1c01f27c3857be9e36dfac59730f4be9e7c0cea1

    SHA256

    b9e8a36cd5e8d1bbaf143913d8f941345af38e714894337f0d1f5e56360ba628

    SHA512

    846a10bf9be2a6e5cf9e5c7476ea7839c08e7c86bb4b97ad93141a6c26bbd1f8ced8293cbe289f474966bad80b7687f09d2790542154409bad26de6ea65025fd

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a17544659.exe

    Filesize

    291KB

    MD5

    08b5d15772543cf3736bacf5db8b1a05

    SHA1

    1c01f27c3857be9e36dfac59730f4be9e7c0cea1

    SHA256

    b9e8a36cd5e8d1bbaf143913d8f941345af38e714894337f0d1f5e56360ba628

    SHA512

    846a10bf9be2a6e5cf9e5c7476ea7839c08e7c86bb4b97ad93141a6c26bbd1f8ced8293cbe289f474966bad80b7687f09d2790542154409bad26de6ea65025fd

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a17544659.exe

    Filesize

    291KB

    MD5

    08b5d15772543cf3736bacf5db8b1a05

    SHA1

    1c01f27c3857be9e36dfac59730f4be9e7c0cea1

    SHA256

    b9e8a36cd5e8d1bbaf143913d8f941345af38e714894337f0d1f5e56360ba628

    SHA512

    846a10bf9be2a6e5cf9e5c7476ea7839c08e7c86bb4b97ad93141a6c26bbd1f8ced8293cbe289f474966bad80b7687f09d2790542154409bad26de6ea65025fd

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b23201416.exe

    Filesize

    168KB

    MD5

    823d3599f475b873a2b69ca1dab0ce71

    SHA1

    4be33a963291e3532d6362014a0e32cae56ff2b2

    SHA256

    007ae853c7683ac289cd2fd2512c154646a0fc4f229322fa249d78811938fa35

    SHA512

    862c7f492663fe0164d54c90acdfd1fdb1e812c14e0c6ceec6dbf1ec8bb9d2e90a8799087de522f7d3fc6661a8d5ea35491c4bf8b884e373447c87591e1aa63d

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b23201416.exe

    Filesize

    168KB

    MD5

    823d3599f475b873a2b69ca1dab0ce71

    SHA1

    4be33a963291e3532d6362014a0e32cae56ff2b2

    SHA256

    007ae853c7683ac289cd2fd2512c154646a0fc4f229322fa249d78811938fa35

    SHA512

    862c7f492663fe0164d54c90acdfd1fdb1e812c14e0c6ceec6dbf1ec8bb9d2e90a8799087de522f7d3fc6661a8d5ea35491c4bf8b884e373447c87591e1aa63d

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\i75893031.exe

    Filesize

    1.3MB

    MD5

    03f33f84a1f02f5b0e23db15b3512fec

    SHA1

    3a8b655addedba7b2d9eaa24a1366e65e70a1ae1

    SHA256

    a0f171e40fc5bf774ff31662614e56e9ba8aeeebc758dd722c7772d2c9e5cf78

    SHA512

    1dfc552de543f8af5a2a62e6eb5b67384070f8a887ab7e27126e96aaf8b10fac677b0cc415aadfcc37c862198e520ae09fc2418cc50496e22758f828c732b5b3

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\i75893031.exe

    Filesize

    1.3MB

    MD5

    03f33f84a1f02f5b0e23db15b3512fec

    SHA1

    3a8b655addedba7b2d9eaa24a1366e65e70a1ae1

    SHA256

    a0f171e40fc5bf774ff31662614e56e9ba8aeeebc758dd722c7772d2c9e5cf78

    SHA512

    1dfc552de543f8af5a2a62e6eb5b67384070f8a887ab7e27126e96aaf8b10fac677b0cc415aadfcc37c862198e520ae09fc2418cc50496e22758f828c732b5b3

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\i30204576.exe

    Filesize

    1.1MB

    MD5

    9130b21eab226af8fccce328980efbf8

    SHA1

    e0c19fa69c3889e380e6eaf19b451ae0631c6ee9

    SHA256

    d189bd96eb797e0b74d49f612c2ed59648e29f2f06f77c8cfd3c4f3f2d49b306

    SHA512

    6a771352c996fd412518c7eb933a8c03cb28c555055b97cc9b0eccad2ecd9c8707f8684fa093637867b4cfbd838401a2bc2d49a07dcb0418a9cb309f7459be73

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\i30204576.exe

    Filesize

    1.1MB

    MD5

    9130b21eab226af8fccce328980efbf8

    SHA1

    e0c19fa69c3889e380e6eaf19b451ae0631c6ee9

    SHA256

    d189bd96eb797e0b74d49f612c2ed59648e29f2f06f77c8cfd3c4f3f2d49b306

    SHA512

    6a771352c996fd412518c7eb933a8c03cb28c555055b97cc9b0eccad2ecd9c8707f8684fa093637867b4cfbd838401a2bc2d49a07dcb0418a9cb309f7459be73

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\i40031515.exe

    Filesize

    644KB

    MD5

    f068e78aa4c9349ec58eed6911b4a58e

    SHA1

    1449538d8a861afe0b8d9da4b81f123f33fdde76

    SHA256

    50b42962104c66427a7a79b3532d29488281eb055e97acef117da586c733dddd

    SHA512

    a952e47665fc5e3727e9996a68067b68608a80c249612ffbd1454f181ac82bc545d9987e75b43cba27317cb598644eb072fd580c48898486886f815bc1f6dacf

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\i40031515.exe

    Filesize

    644KB

    MD5

    f068e78aa4c9349ec58eed6911b4a58e

    SHA1

    1449538d8a861afe0b8d9da4b81f123f33fdde76

    SHA256

    50b42962104c66427a7a79b3532d29488281eb055e97acef117da586c733dddd

    SHA512

    a952e47665fc5e3727e9996a68067b68608a80c249612ffbd1454f181ac82bc545d9987e75b43cba27317cb598644eb072fd580c48898486886f815bc1f6dacf

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\i43676956.exe

    Filesize

    385KB

    MD5

    e95d2df7064012a1bf379fca0ad906fe

    SHA1

    7e92762fba8cc5fa92c194d410197e9eef57b0ef

    SHA256

    3b1c021014916674664b39ca67c647ca03018e86f688a12a8fd08926a3b5af12

    SHA512

    0702ec117913d1eb6d41fc0441c1d575060a6e8990d3596b5ba95f5514a4810fd385a79e76753f7bcfde40f19b41da64531762f93a5f24454a8342c9be65b3c2

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\i43676956.exe

    Filesize

    385KB

    MD5

    e95d2df7064012a1bf379fca0ad906fe

    SHA1

    7e92762fba8cc5fa92c194d410197e9eef57b0ef

    SHA256

    3b1c021014916674664b39ca67c647ca03018e86f688a12a8fd08926a3b5af12

    SHA512

    0702ec117913d1eb6d41fc0441c1d575060a6e8990d3596b5ba95f5514a4810fd385a79e76753f7bcfde40f19b41da64531762f93a5f24454a8342c9be65b3c2

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a17544659.exe

    Filesize

    291KB

    MD5

    08b5d15772543cf3736bacf5db8b1a05

    SHA1

    1c01f27c3857be9e36dfac59730f4be9e7c0cea1

    SHA256

    b9e8a36cd5e8d1bbaf143913d8f941345af38e714894337f0d1f5e56360ba628

    SHA512

    846a10bf9be2a6e5cf9e5c7476ea7839c08e7c86bb4b97ad93141a6c26bbd1f8ced8293cbe289f474966bad80b7687f09d2790542154409bad26de6ea65025fd

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a17544659.exe

    Filesize

    291KB

    MD5

    08b5d15772543cf3736bacf5db8b1a05

    SHA1

    1c01f27c3857be9e36dfac59730f4be9e7c0cea1

    SHA256

    b9e8a36cd5e8d1bbaf143913d8f941345af38e714894337f0d1f5e56360ba628

    SHA512

    846a10bf9be2a6e5cf9e5c7476ea7839c08e7c86bb4b97ad93141a6c26bbd1f8ced8293cbe289f474966bad80b7687f09d2790542154409bad26de6ea65025fd

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a17544659.exe

    Filesize

    291KB

    MD5

    08b5d15772543cf3736bacf5db8b1a05

    SHA1

    1c01f27c3857be9e36dfac59730f4be9e7c0cea1

    SHA256

    b9e8a36cd5e8d1bbaf143913d8f941345af38e714894337f0d1f5e56360ba628

    SHA512

    846a10bf9be2a6e5cf9e5c7476ea7839c08e7c86bb4b97ad93141a6c26bbd1f8ced8293cbe289f474966bad80b7687f09d2790542154409bad26de6ea65025fd

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b23201416.exe

    Filesize

    168KB

    MD5

    823d3599f475b873a2b69ca1dab0ce71

    SHA1

    4be33a963291e3532d6362014a0e32cae56ff2b2

    SHA256

    007ae853c7683ac289cd2fd2512c154646a0fc4f229322fa249d78811938fa35

    SHA512

    862c7f492663fe0164d54c90acdfd1fdb1e812c14e0c6ceec6dbf1ec8bb9d2e90a8799087de522f7d3fc6661a8d5ea35491c4bf8b884e373447c87591e1aa63d

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b23201416.exe

    Filesize

    168KB

    MD5

    823d3599f475b873a2b69ca1dab0ce71

    SHA1

    4be33a963291e3532d6362014a0e32cae56ff2b2

    SHA256

    007ae853c7683ac289cd2fd2512c154646a0fc4f229322fa249d78811938fa35

    SHA512

    862c7f492663fe0164d54c90acdfd1fdb1e812c14e0c6ceec6dbf1ec8bb9d2e90a8799087de522f7d3fc6661a8d5ea35491c4bf8b884e373447c87591e1aa63d

  • memory/1220-152-0x0000000002310000-0x0000000002350000-memory.dmp

    Filesize

    256KB

  • memory/1220-151-0x0000000002310000-0x0000000002350000-memory.dmp

    Filesize

    256KB

  • memory/1220-150-0x0000000000560000-0x0000000000566000-memory.dmp

    Filesize

    24KB

  • memory/1220-149-0x00000000002C0000-0x00000000002F0000-memory.dmp

    Filesize

    192KB

  • memory/1372-113-0x0000000000CF0000-0x0000000000D02000-memory.dmp

    Filesize

    72KB

  • memory/1372-123-0x0000000000CF0000-0x0000000000D02000-memory.dmp

    Filesize

    72KB

  • memory/1372-125-0x0000000000CF0000-0x0000000000D02000-memory.dmp

    Filesize

    72KB

  • memory/1372-127-0x0000000000CF0000-0x0000000000D02000-memory.dmp

    Filesize

    72KB

  • memory/1372-129-0x0000000000CF0000-0x0000000000D02000-memory.dmp

    Filesize

    72KB

  • memory/1372-131-0x0000000000CF0000-0x0000000000D02000-memory.dmp

    Filesize

    72KB

  • memory/1372-133-0x0000000000CF0000-0x0000000000D02000-memory.dmp

    Filesize

    72KB

  • memory/1372-135-0x0000000000CF0000-0x0000000000D02000-memory.dmp

    Filesize

    72KB

  • memory/1372-137-0x0000000000CF0000-0x0000000000D02000-memory.dmp

    Filesize

    72KB

  • memory/1372-138-0x0000000000240000-0x000000000026D000-memory.dmp

    Filesize

    180KB

  • memory/1372-139-0x0000000004E10000-0x0000000004E50000-memory.dmp

    Filesize

    256KB

  • memory/1372-140-0x0000000004E10000-0x0000000004E50000-memory.dmp

    Filesize

    256KB

  • memory/1372-141-0x0000000000400000-0x00000000006C9000-memory.dmp

    Filesize

    2.8MB

  • memory/1372-142-0x0000000000400000-0x00000000006C9000-memory.dmp

    Filesize

    2.8MB

  • memory/1372-121-0x0000000000CF0000-0x0000000000D02000-memory.dmp

    Filesize

    72KB

  • memory/1372-119-0x0000000000CF0000-0x0000000000D02000-memory.dmp

    Filesize

    72KB

  • memory/1372-117-0x0000000000CF0000-0x0000000000D02000-memory.dmp

    Filesize

    72KB

  • memory/1372-115-0x0000000000CF0000-0x0000000000D02000-memory.dmp

    Filesize

    72KB

  • memory/1372-111-0x0000000000CF0000-0x0000000000D02000-memory.dmp

    Filesize

    72KB

  • memory/1372-110-0x0000000000CF0000-0x0000000000D02000-memory.dmp

    Filesize

    72KB

  • memory/1372-109-0x0000000000CF0000-0x0000000000D08000-memory.dmp

    Filesize

    96KB

  • memory/1372-108-0x0000000000AB0000-0x0000000000ACA000-memory.dmp

    Filesize

    104KB