Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05-05-2023 19:36

General

  • Target

    caddb88bafcb35d541d3aee61d1b066eced0cc5111dd59a12a3bed7fab91e702.exe

  • Size

    1.2MB

  • MD5

    a281d670149537a1e76be55f94b8d6a0

  • SHA1

    073da2dbf2a50a9851ddb719d7a5e85a92c4d347

  • SHA256

    caddb88bafcb35d541d3aee61d1b066eced0cc5111dd59a12a3bed7fab91e702

  • SHA512

    d5ea1953dbc0d7f18549c1b70c7337e725e08fea5c73ecdea3e1c1c73a7f21a25b560dec4ccfa24c09a8d26b2c543bb26ae4baca75a6f30e532d3056c07872de

  • SSDEEP

    24576:Xy9WGn+mYhkp4pUCJvf/2X/acJLg1k4m2caDJUrMuUu8BrJaQ:iEGn+mQcYJX+PacZg1kT2cacMtc

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

life

C2

185.161.248.73:4164

Attributes
  • auth_value

    8685d11953530b68ad5ec703809d9f91

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\caddb88bafcb35d541d3aee61d1b066eced0cc5111dd59a12a3bed7fab91e702.exe
    "C:\Users\Admin\AppData\Local\Temp\caddb88bafcb35d541d3aee61d1b066eced0cc5111dd59a12a3bed7fab91e702.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:920
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z24433129.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z24433129.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:556
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z85718859.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z85718859.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:472
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z67943034.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z67943034.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:632
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s03555321.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s03555321.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1428
            • C:\Windows\Temp\1.exe
              "C:\Windows\Temp\1.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1740
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t79103961.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t79103961.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:624

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z24433129.exe

    Filesize

    1.0MB

    MD5

    cd40a6586e84f6014e88f2be38f1ca00

    SHA1

    f192f5eac152af4e43ae1685794174b85b739c8a

    SHA256

    c7bfecf1399702c82866f0f6eec06593258288afe5e985f428f5736ade56402e

    SHA512

    ffeb22f91259362080fec13cafab9beda70965816d731dfb5a09aff5249477087e55d67bb8668d3c6213d36afab920e070860eb0ac0aec24ce6a98292f47120f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z24433129.exe

    Filesize

    1.0MB

    MD5

    cd40a6586e84f6014e88f2be38f1ca00

    SHA1

    f192f5eac152af4e43ae1685794174b85b739c8a

    SHA256

    c7bfecf1399702c82866f0f6eec06593258288afe5e985f428f5736ade56402e

    SHA512

    ffeb22f91259362080fec13cafab9beda70965816d731dfb5a09aff5249477087e55d67bb8668d3c6213d36afab920e070860eb0ac0aec24ce6a98292f47120f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z85718859.exe

    Filesize

    752KB

    MD5

    8b71c258757cd49ddfe44ceff9deef73

    SHA1

    bb88851efaee14c3c9cebec4746818d2a0211fb7

    SHA256

    684b722e05f3d466da084305df72a0a4e97b1339f5b60e9dbfb2144253a33f9b

    SHA512

    f23c6dc71a71ee6baadd82b9422b9ef5b183fbf6e41ea890a543e86736f3f0fc1c11830d1079ef43dc0fda52173c44cb92bb3d65b6519c017c2e5db6e8b97077

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z85718859.exe

    Filesize

    752KB

    MD5

    8b71c258757cd49ddfe44ceff9deef73

    SHA1

    bb88851efaee14c3c9cebec4746818d2a0211fb7

    SHA256

    684b722e05f3d466da084305df72a0a4e97b1339f5b60e9dbfb2144253a33f9b

    SHA512

    f23c6dc71a71ee6baadd82b9422b9ef5b183fbf6e41ea890a543e86736f3f0fc1c11830d1079ef43dc0fda52173c44cb92bb3d65b6519c017c2e5db6e8b97077

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z67943034.exe

    Filesize

    570KB

    MD5

    0651074aa9169ef994839c0eeaa976ba

    SHA1

    b8d5f21d70a1ca7b88fdc06fd4dc7a628056db97

    SHA256

    e7e05df09b66290107e796e716d793ed925e49e85fd7fb8504a0a982c1c98463

    SHA512

    f65f280aeb843fe801bde32a39ca92b3eae9ce0f1aee8bdf5779e3922a3308ddf14cabc1ee275dfb12e27b888e8998f9dce2b5956d4169d15352493c26e8c248

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z67943034.exe

    Filesize

    570KB

    MD5

    0651074aa9169ef994839c0eeaa976ba

    SHA1

    b8d5f21d70a1ca7b88fdc06fd4dc7a628056db97

    SHA256

    e7e05df09b66290107e796e716d793ed925e49e85fd7fb8504a0a982c1c98463

    SHA512

    f65f280aeb843fe801bde32a39ca92b3eae9ce0f1aee8bdf5779e3922a3308ddf14cabc1ee275dfb12e27b888e8998f9dce2b5956d4169d15352493c26e8c248

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s03555321.exe

    Filesize

    488KB

    MD5

    6ba9b364205b4b9b759ede67d77fb893

    SHA1

    efedb83a3e0ea81cfff2a3c56f00fe3e50712c3f

    SHA256

    55e8a78e318da9c0cddf8b8b750e0cee8790861ba4e786965ce3f7845b5dfd03

    SHA512

    7ee3869c8509014eca1f7a7179c3708cf563bcbfaf260309ba8c3d4ea601ed42b3947bf245270996976e713c5cd290e7b2ca53e40eba476526c4449fc55faee3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s03555321.exe

    Filesize

    488KB

    MD5

    6ba9b364205b4b9b759ede67d77fb893

    SHA1

    efedb83a3e0ea81cfff2a3c56f00fe3e50712c3f

    SHA256

    55e8a78e318da9c0cddf8b8b750e0cee8790861ba4e786965ce3f7845b5dfd03

    SHA512

    7ee3869c8509014eca1f7a7179c3708cf563bcbfaf260309ba8c3d4ea601ed42b3947bf245270996976e713c5cd290e7b2ca53e40eba476526c4449fc55faee3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s03555321.exe

    Filesize

    488KB

    MD5

    6ba9b364205b4b9b759ede67d77fb893

    SHA1

    efedb83a3e0ea81cfff2a3c56f00fe3e50712c3f

    SHA256

    55e8a78e318da9c0cddf8b8b750e0cee8790861ba4e786965ce3f7845b5dfd03

    SHA512

    7ee3869c8509014eca1f7a7179c3708cf563bcbfaf260309ba8c3d4ea601ed42b3947bf245270996976e713c5cd290e7b2ca53e40eba476526c4449fc55faee3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t79103961.exe

    Filesize

    169KB

    MD5

    4439d2f2df343c4759027a1b0026fb45

    SHA1

    afd7f61816d22d9bc3a785978ed2c7f636fe229c

    SHA256

    e6e8649000ca6e77e6c5f23e6d9f79623eccb8b7de28900bb87ae2fa050281a8

    SHA512

    81e0a9a753f236f33c052ea43447881df67ef4a2373695b508b90f23b5749680b73e0b12c0d8692d487d4de0b5abc1cc1b0e2a63c2c9c78a99c439bd3f298498

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z24433129.exe

    Filesize

    1.0MB

    MD5

    cd40a6586e84f6014e88f2be38f1ca00

    SHA1

    f192f5eac152af4e43ae1685794174b85b739c8a

    SHA256

    c7bfecf1399702c82866f0f6eec06593258288afe5e985f428f5736ade56402e

    SHA512

    ffeb22f91259362080fec13cafab9beda70965816d731dfb5a09aff5249477087e55d67bb8668d3c6213d36afab920e070860eb0ac0aec24ce6a98292f47120f

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z24433129.exe

    Filesize

    1.0MB

    MD5

    cd40a6586e84f6014e88f2be38f1ca00

    SHA1

    f192f5eac152af4e43ae1685794174b85b739c8a

    SHA256

    c7bfecf1399702c82866f0f6eec06593258288afe5e985f428f5736ade56402e

    SHA512

    ffeb22f91259362080fec13cafab9beda70965816d731dfb5a09aff5249477087e55d67bb8668d3c6213d36afab920e070860eb0ac0aec24ce6a98292f47120f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z85718859.exe

    Filesize

    752KB

    MD5

    8b71c258757cd49ddfe44ceff9deef73

    SHA1

    bb88851efaee14c3c9cebec4746818d2a0211fb7

    SHA256

    684b722e05f3d466da084305df72a0a4e97b1339f5b60e9dbfb2144253a33f9b

    SHA512

    f23c6dc71a71ee6baadd82b9422b9ef5b183fbf6e41ea890a543e86736f3f0fc1c11830d1079ef43dc0fda52173c44cb92bb3d65b6519c017c2e5db6e8b97077

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z85718859.exe

    Filesize

    752KB

    MD5

    8b71c258757cd49ddfe44ceff9deef73

    SHA1

    bb88851efaee14c3c9cebec4746818d2a0211fb7

    SHA256

    684b722e05f3d466da084305df72a0a4e97b1339f5b60e9dbfb2144253a33f9b

    SHA512

    f23c6dc71a71ee6baadd82b9422b9ef5b183fbf6e41ea890a543e86736f3f0fc1c11830d1079ef43dc0fda52173c44cb92bb3d65b6519c017c2e5db6e8b97077

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z67943034.exe

    Filesize

    570KB

    MD5

    0651074aa9169ef994839c0eeaa976ba

    SHA1

    b8d5f21d70a1ca7b88fdc06fd4dc7a628056db97

    SHA256

    e7e05df09b66290107e796e716d793ed925e49e85fd7fb8504a0a982c1c98463

    SHA512

    f65f280aeb843fe801bde32a39ca92b3eae9ce0f1aee8bdf5779e3922a3308ddf14cabc1ee275dfb12e27b888e8998f9dce2b5956d4169d15352493c26e8c248

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z67943034.exe

    Filesize

    570KB

    MD5

    0651074aa9169ef994839c0eeaa976ba

    SHA1

    b8d5f21d70a1ca7b88fdc06fd4dc7a628056db97

    SHA256

    e7e05df09b66290107e796e716d793ed925e49e85fd7fb8504a0a982c1c98463

    SHA512

    f65f280aeb843fe801bde32a39ca92b3eae9ce0f1aee8bdf5779e3922a3308ddf14cabc1ee275dfb12e27b888e8998f9dce2b5956d4169d15352493c26e8c248

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\s03555321.exe

    Filesize

    488KB

    MD5

    6ba9b364205b4b9b759ede67d77fb893

    SHA1

    efedb83a3e0ea81cfff2a3c56f00fe3e50712c3f

    SHA256

    55e8a78e318da9c0cddf8b8b750e0cee8790861ba4e786965ce3f7845b5dfd03

    SHA512

    7ee3869c8509014eca1f7a7179c3708cf563bcbfaf260309ba8c3d4ea601ed42b3947bf245270996976e713c5cd290e7b2ca53e40eba476526c4449fc55faee3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\s03555321.exe

    Filesize

    488KB

    MD5

    6ba9b364205b4b9b759ede67d77fb893

    SHA1

    efedb83a3e0ea81cfff2a3c56f00fe3e50712c3f

    SHA256

    55e8a78e318da9c0cddf8b8b750e0cee8790861ba4e786965ce3f7845b5dfd03

    SHA512

    7ee3869c8509014eca1f7a7179c3708cf563bcbfaf260309ba8c3d4ea601ed42b3947bf245270996976e713c5cd290e7b2ca53e40eba476526c4449fc55faee3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\s03555321.exe

    Filesize

    488KB

    MD5

    6ba9b364205b4b9b759ede67d77fb893

    SHA1

    efedb83a3e0ea81cfff2a3c56f00fe3e50712c3f

    SHA256

    55e8a78e318da9c0cddf8b8b750e0cee8790861ba4e786965ce3f7845b5dfd03

    SHA512

    7ee3869c8509014eca1f7a7179c3708cf563bcbfaf260309ba8c3d4ea601ed42b3947bf245270996976e713c5cd290e7b2ca53e40eba476526c4449fc55faee3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\t79103961.exe

    Filesize

    169KB

    MD5

    4439d2f2df343c4759027a1b0026fb45

    SHA1

    afd7f61816d22d9bc3a785978ed2c7f636fe229c

    SHA256

    e6e8649000ca6e77e6c5f23e6d9f79623eccb8b7de28900bb87ae2fa050281a8

    SHA512

    81e0a9a753f236f33c052ea43447881df67ef4a2373695b508b90f23b5749680b73e0b12c0d8692d487d4de0b5abc1cc1b0e2a63c2c9c78a99c439bd3f298498

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\t79103961.exe

    Filesize

    169KB

    MD5

    4439d2f2df343c4759027a1b0026fb45

    SHA1

    afd7f61816d22d9bc3a785978ed2c7f636fe229c

    SHA256

    e6e8649000ca6e77e6c5f23e6d9f79623eccb8b7de28900bb87ae2fa050281a8

    SHA512

    81e0a9a753f236f33c052ea43447881df67ef4a2373695b508b90f23b5749680b73e0b12c0d8692d487d4de0b5abc1cc1b0e2a63c2c9c78a99c439bd3f298498

  • \Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • \Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • memory/1428-123-0x0000000002670000-0x00000000026D0000-memory.dmp

    Filesize

    384KB

  • memory/1428-153-0x0000000002670000-0x00000000026D0000-memory.dmp

    Filesize

    384KB

  • memory/1428-109-0x0000000002670000-0x00000000026D0000-memory.dmp

    Filesize

    384KB

  • memory/1428-113-0x0000000002670000-0x00000000026D0000-memory.dmp

    Filesize

    384KB

  • memory/1428-115-0x0000000002670000-0x00000000026D0000-memory.dmp

    Filesize

    384KB

  • memory/1428-117-0x0000000002670000-0x00000000026D0000-memory.dmp

    Filesize

    384KB

  • memory/1428-119-0x0000000002670000-0x00000000026D0000-memory.dmp

    Filesize

    384KB

  • memory/1428-121-0x0000000002670000-0x00000000026D0000-memory.dmp

    Filesize

    384KB

  • memory/1428-125-0x0000000002670000-0x00000000026D0000-memory.dmp

    Filesize

    384KB

  • memory/1428-108-0x0000000002670000-0x00000000026D0000-memory.dmp

    Filesize

    384KB

  • memory/1428-131-0x0000000002670000-0x00000000026D0000-memory.dmp

    Filesize

    384KB

  • memory/1428-129-0x0000000002670000-0x00000000026D0000-memory.dmp

    Filesize

    384KB

  • memory/1428-127-0x0000000002670000-0x00000000026D0000-memory.dmp

    Filesize

    384KB

  • memory/1428-135-0x0000000002670000-0x00000000026D0000-memory.dmp

    Filesize

    384KB

  • memory/1428-133-0x0000000002670000-0x00000000026D0000-memory.dmp

    Filesize

    384KB

  • memory/1428-137-0x0000000002670000-0x00000000026D0000-memory.dmp

    Filesize

    384KB

  • memory/1428-139-0x0000000002670000-0x00000000026D0000-memory.dmp

    Filesize

    384KB

  • memory/1428-141-0x0000000002670000-0x00000000026D0000-memory.dmp

    Filesize

    384KB

  • memory/1428-145-0x0000000002670000-0x00000000026D0000-memory.dmp

    Filesize

    384KB

  • memory/1428-147-0x0000000002670000-0x00000000026D0000-memory.dmp

    Filesize

    384KB

  • memory/1428-143-0x0000000002670000-0x00000000026D0000-memory.dmp

    Filesize

    384KB

  • memory/1428-151-0x0000000002670000-0x00000000026D0000-memory.dmp

    Filesize

    384KB

  • memory/1428-149-0x0000000002670000-0x00000000026D0000-memory.dmp

    Filesize

    384KB

  • memory/1428-111-0x0000000002670000-0x00000000026D0000-memory.dmp

    Filesize

    384KB

  • memory/1428-155-0x0000000002670000-0x00000000026D0000-memory.dmp

    Filesize

    384KB

  • memory/1428-157-0x0000000002670000-0x00000000026D0000-memory.dmp

    Filesize

    384KB

  • memory/1428-159-0x0000000002670000-0x00000000026D0000-memory.dmp

    Filesize

    384KB

  • memory/1428-161-0x0000000002670000-0x00000000026D0000-memory.dmp

    Filesize

    384KB

  • memory/1428-163-0x0000000002670000-0x00000000026D0000-memory.dmp

    Filesize

    384KB

  • memory/1428-165-0x0000000002670000-0x00000000026D0000-memory.dmp

    Filesize

    384KB

  • memory/1428-167-0x0000000002670000-0x00000000026D0000-memory.dmp

    Filesize

    384KB

  • memory/1428-2255-0x0000000005150000-0x0000000005190000-memory.dmp

    Filesize

    256KB

  • memory/1428-2257-0x00000000025E0000-0x0000000002612000-memory.dmp

    Filesize

    200KB

  • memory/1428-107-0x0000000002670000-0x00000000026D6000-memory.dmp

    Filesize

    408KB

  • memory/1428-2262-0x0000000005150000-0x0000000005190000-memory.dmp

    Filesize

    256KB

  • memory/1428-106-0x0000000005150000-0x0000000005190000-memory.dmp

    Filesize

    256KB

  • memory/1428-105-0x0000000005150000-0x0000000005190000-memory.dmp

    Filesize

    256KB

  • memory/1428-104-0x0000000005150000-0x0000000005190000-memory.dmp

    Filesize

    256KB

  • memory/1428-98-0x0000000000400000-0x0000000000820000-memory.dmp

    Filesize

    4.1MB

  • memory/1428-103-0x0000000002570000-0x00000000025D8000-memory.dmp

    Filesize

    416KB

  • memory/1428-99-0x0000000000280000-0x00000000002DB000-memory.dmp

    Filesize

    364KB

  • memory/1740-2268-0x00000000012C0000-0x00000000012EE000-memory.dmp

    Filesize

    184KB

  • memory/1740-2274-0x0000000000330000-0x0000000000336000-memory.dmp

    Filesize

    24KB

  • memory/1740-2275-0x00000000010E0000-0x0000000001120000-memory.dmp

    Filesize

    256KB

  • memory/1740-2278-0x00000000010E0000-0x0000000001120000-memory.dmp

    Filesize

    256KB