Analysis

  • max time kernel
    148s
  • max time network
    166s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06-05-2023 22:15

General

  • Target

    642e3439663a82f6acbe45cebceeb33038c5e32147b9f5b3702f1ed9f55c06b0.exe

  • Size

    1.4MB

  • MD5

    103c2e2f438000173e7f3101dcc67209

  • SHA1

    65441bb71aed935f31030ce567f5e62f93b54f12

  • SHA256

    642e3439663a82f6acbe45cebceeb33038c5e32147b9f5b3702f1ed9f55c06b0

  • SHA512

    04498a32cbcac966838b1f7f2920f4a882960de3e6e4a768de920f933b792ffd38bde9ffc5a8285ca8e27e5cca07959525d54718e20f26c3d2a07d897bffdef7

  • SSDEEP

    24576:+yGuVrCNg4/e5eiINfHZmyxYLVZWH4zU4/U6gQ3dWQNRmJd/dvu/lpS+/llEqN:NGG586yxYLVZx0fQ37uj/dPzq

Malware Config

Extracted

Family

redline

Botnet

mask

C2

217.196.96.56:4138

Attributes
  • auth_value

    31aef25be0febb8e491794ef7f502c50

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\642e3439663a82f6acbe45cebceeb33038c5e32147b9f5b3702f1ed9f55c06b0.exe
    "C:\Users\Admin\AppData\Local\Temp\642e3439663a82f6acbe45cebceeb33038c5e32147b9f5b3702f1ed9f55c06b0.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:928
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7673122.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7673122.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1784
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5701997.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5701997.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:280
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9895797.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9895797.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:268
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6381090.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6381090.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:832
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a8499471.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a8499471.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Loads dropped DLL
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:292
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b6344224.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b6344224.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1316

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7673122.exe

    Filesize

    1.3MB

    MD5

    11b8f88f4e7c478bf2f059502f32f1b8

    SHA1

    23d119999e475c0e49c3c6afb1324ad70efb4192

    SHA256

    3c1ec353559c5ef30e45d2feb25facdb54482745c6987fe184d5a63ac4ad7637

    SHA512

    c9bfbc3c7a7d1af8dc7f0adafe4c5d392dd18c444044a3cf950c089e9f313406893926492ee101bc9f3d69b225f9e06c8ecf95f428b9782912b02a34f99a7e6d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7673122.exe

    Filesize

    1.3MB

    MD5

    11b8f88f4e7c478bf2f059502f32f1b8

    SHA1

    23d119999e475c0e49c3c6afb1324ad70efb4192

    SHA256

    3c1ec353559c5ef30e45d2feb25facdb54482745c6987fe184d5a63ac4ad7637

    SHA512

    c9bfbc3c7a7d1af8dc7f0adafe4c5d392dd18c444044a3cf950c089e9f313406893926492ee101bc9f3d69b225f9e06c8ecf95f428b9782912b02a34f99a7e6d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5701997.exe

    Filesize

    845KB

    MD5

    c59535d9b12afc5a2d5aaa8a22d4ddda

    SHA1

    23445e468a3bd60b2cde7044682ccaeda9199b17

    SHA256

    9bcb8d83be80741b5aa720740533c1533e3b057deb6a0f56b24839b3a0cfa813

    SHA512

    a6992af7a51a41e6b94887f44a473444efa05b37be5031c016e8e480bbe84efba917d86b3cec859067e8ec1131bc28d138c2e11a17380946433bd276ff715966

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5701997.exe

    Filesize

    845KB

    MD5

    c59535d9b12afc5a2d5aaa8a22d4ddda

    SHA1

    23445e468a3bd60b2cde7044682ccaeda9199b17

    SHA256

    9bcb8d83be80741b5aa720740533c1533e3b057deb6a0f56b24839b3a0cfa813

    SHA512

    a6992af7a51a41e6b94887f44a473444efa05b37be5031c016e8e480bbe84efba917d86b3cec859067e8ec1131bc28d138c2e11a17380946433bd276ff715966

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9895797.exe

    Filesize

    641KB

    MD5

    af4408db541ca5a4f842e1ce2a02d7ae

    SHA1

    a8e9ed2c1eb4d0856db7ba4dbece24b9dff75517

    SHA256

    f3357510e76300360d3adc1ba7af7856a261525103902e4afb7aeb6b3bc8256b

    SHA512

    7eba6ecd53548a31d5d18704de34ea781a4dd44ae3cab3fc042e7d107f0bfb4a2121f47a9e1a9c759651c5b3bd0f5d85387d619cd3ec3d3df640e5b0b95ec3cc

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9895797.exe

    Filesize

    641KB

    MD5

    af4408db541ca5a4f842e1ce2a02d7ae

    SHA1

    a8e9ed2c1eb4d0856db7ba4dbece24b9dff75517

    SHA256

    f3357510e76300360d3adc1ba7af7856a261525103902e4afb7aeb6b3bc8256b

    SHA512

    7eba6ecd53548a31d5d18704de34ea781a4dd44ae3cab3fc042e7d107f0bfb4a2121f47a9e1a9c759651c5b3bd0f5d85387d619cd3ec3d3df640e5b0b95ec3cc

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6381090.exe

    Filesize

    383KB

    MD5

    00fc0b9dcde48acdfc84b889145c7ae5

    SHA1

    51f5f29bf9cf98c3eaa859be9136981e61f80f90

    SHA256

    982b8a55aca99efbe728b801bb58a2180fe646cb88371fe18e095215832bd825

    SHA512

    c06c6f581c2f44bc54940f1008089569212a554af6f23d1fa081a2cbb64f86f5dac0fb659e701da8d84f480dd2821498a254529a32b8560bba983152b578ba0c

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6381090.exe

    Filesize

    383KB

    MD5

    00fc0b9dcde48acdfc84b889145c7ae5

    SHA1

    51f5f29bf9cf98c3eaa859be9136981e61f80f90

    SHA256

    982b8a55aca99efbe728b801bb58a2180fe646cb88371fe18e095215832bd825

    SHA512

    c06c6f581c2f44bc54940f1008089569212a554af6f23d1fa081a2cbb64f86f5dac0fb659e701da8d84f480dd2821498a254529a32b8560bba983152b578ba0c

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a8499471.exe

    Filesize

    289KB

    MD5

    83e99af17aab61558912335cc98ac17f

    SHA1

    57a1bb160393f69344020f46522aa0a38062f062

    SHA256

    ee3be50598850f5ea0a520442e4aaa078a1d69540cd404aa7025b28722ee02a9

    SHA512

    9c103241e9c2ba838ee485417c4e0542297e2f7bd0df10a744ca91920d208463849c798544e6de91b88f930c89953115f0b9b778b082ed9200bbfe2b285ca741

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a8499471.exe

    Filesize

    289KB

    MD5

    83e99af17aab61558912335cc98ac17f

    SHA1

    57a1bb160393f69344020f46522aa0a38062f062

    SHA256

    ee3be50598850f5ea0a520442e4aaa078a1d69540cd404aa7025b28722ee02a9

    SHA512

    9c103241e9c2ba838ee485417c4e0542297e2f7bd0df10a744ca91920d208463849c798544e6de91b88f930c89953115f0b9b778b082ed9200bbfe2b285ca741

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a8499471.exe

    Filesize

    289KB

    MD5

    83e99af17aab61558912335cc98ac17f

    SHA1

    57a1bb160393f69344020f46522aa0a38062f062

    SHA256

    ee3be50598850f5ea0a520442e4aaa078a1d69540cd404aa7025b28722ee02a9

    SHA512

    9c103241e9c2ba838ee485417c4e0542297e2f7bd0df10a744ca91920d208463849c798544e6de91b88f930c89953115f0b9b778b082ed9200bbfe2b285ca741

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b6344224.exe

    Filesize

    168KB

    MD5

    54d6e42967cd4de3b6e6bc112ceabe90

    SHA1

    833e3f00fb9d8760db235433a3cf92afb320d2be

    SHA256

    5b69ea70c4a4c69cce432576c000894da8d9db4375bb352154c52be899f54d34

    SHA512

    628ae08a8a62634afb819ff5d5982139c80f8ce62bc674272299bb8e123fe4eee79fa5b882d8816685ebf90623f5313d20803a1f694764f67053270767687947

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b6344224.exe

    Filesize

    168KB

    MD5

    54d6e42967cd4de3b6e6bc112ceabe90

    SHA1

    833e3f00fb9d8760db235433a3cf92afb320d2be

    SHA256

    5b69ea70c4a4c69cce432576c000894da8d9db4375bb352154c52be899f54d34

    SHA512

    628ae08a8a62634afb819ff5d5982139c80f8ce62bc674272299bb8e123fe4eee79fa5b882d8816685ebf90623f5313d20803a1f694764f67053270767687947

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v7673122.exe

    Filesize

    1.3MB

    MD5

    11b8f88f4e7c478bf2f059502f32f1b8

    SHA1

    23d119999e475c0e49c3c6afb1324ad70efb4192

    SHA256

    3c1ec353559c5ef30e45d2feb25facdb54482745c6987fe184d5a63ac4ad7637

    SHA512

    c9bfbc3c7a7d1af8dc7f0adafe4c5d392dd18c444044a3cf950c089e9f313406893926492ee101bc9f3d69b225f9e06c8ecf95f428b9782912b02a34f99a7e6d

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v7673122.exe

    Filesize

    1.3MB

    MD5

    11b8f88f4e7c478bf2f059502f32f1b8

    SHA1

    23d119999e475c0e49c3c6afb1324ad70efb4192

    SHA256

    3c1ec353559c5ef30e45d2feb25facdb54482745c6987fe184d5a63ac4ad7637

    SHA512

    c9bfbc3c7a7d1af8dc7f0adafe4c5d392dd18c444044a3cf950c089e9f313406893926492ee101bc9f3d69b225f9e06c8ecf95f428b9782912b02a34f99a7e6d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v5701997.exe

    Filesize

    845KB

    MD5

    c59535d9b12afc5a2d5aaa8a22d4ddda

    SHA1

    23445e468a3bd60b2cde7044682ccaeda9199b17

    SHA256

    9bcb8d83be80741b5aa720740533c1533e3b057deb6a0f56b24839b3a0cfa813

    SHA512

    a6992af7a51a41e6b94887f44a473444efa05b37be5031c016e8e480bbe84efba917d86b3cec859067e8ec1131bc28d138c2e11a17380946433bd276ff715966

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v5701997.exe

    Filesize

    845KB

    MD5

    c59535d9b12afc5a2d5aaa8a22d4ddda

    SHA1

    23445e468a3bd60b2cde7044682ccaeda9199b17

    SHA256

    9bcb8d83be80741b5aa720740533c1533e3b057deb6a0f56b24839b3a0cfa813

    SHA512

    a6992af7a51a41e6b94887f44a473444efa05b37be5031c016e8e480bbe84efba917d86b3cec859067e8ec1131bc28d138c2e11a17380946433bd276ff715966

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v9895797.exe

    Filesize

    641KB

    MD5

    af4408db541ca5a4f842e1ce2a02d7ae

    SHA1

    a8e9ed2c1eb4d0856db7ba4dbece24b9dff75517

    SHA256

    f3357510e76300360d3adc1ba7af7856a261525103902e4afb7aeb6b3bc8256b

    SHA512

    7eba6ecd53548a31d5d18704de34ea781a4dd44ae3cab3fc042e7d107f0bfb4a2121f47a9e1a9c759651c5b3bd0f5d85387d619cd3ec3d3df640e5b0b95ec3cc

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v9895797.exe

    Filesize

    641KB

    MD5

    af4408db541ca5a4f842e1ce2a02d7ae

    SHA1

    a8e9ed2c1eb4d0856db7ba4dbece24b9dff75517

    SHA256

    f3357510e76300360d3adc1ba7af7856a261525103902e4afb7aeb6b3bc8256b

    SHA512

    7eba6ecd53548a31d5d18704de34ea781a4dd44ae3cab3fc042e7d107f0bfb4a2121f47a9e1a9c759651c5b3bd0f5d85387d619cd3ec3d3df640e5b0b95ec3cc

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v6381090.exe

    Filesize

    383KB

    MD5

    00fc0b9dcde48acdfc84b889145c7ae5

    SHA1

    51f5f29bf9cf98c3eaa859be9136981e61f80f90

    SHA256

    982b8a55aca99efbe728b801bb58a2180fe646cb88371fe18e095215832bd825

    SHA512

    c06c6f581c2f44bc54940f1008089569212a554af6f23d1fa081a2cbb64f86f5dac0fb659e701da8d84f480dd2821498a254529a32b8560bba983152b578ba0c

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v6381090.exe

    Filesize

    383KB

    MD5

    00fc0b9dcde48acdfc84b889145c7ae5

    SHA1

    51f5f29bf9cf98c3eaa859be9136981e61f80f90

    SHA256

    982b8a55aca99efbe728b801bb58a2180fe646cb88371fe18e095215832bd825

    SHA512

    c06c6f581c2f44bc54940f1008089569212a554af6f23d1fa081a2cbb64f86f5dac0fb659e701da8d84f480dd2821498a254529a32b8560bba983152b578ba0c

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a8499471.exe

    Filesize

    289KB

    MD5

    83e99af17aab61558912335cc98ac17f

    SHA1

    57a1bb160393f69344020f46522aa0a38062f062

    SHA256

    ee3be50598850f5ea0a520442e4aaa078a1d69540cd404aa7025b28722ee02a9

    SHA512

    9c103241e9c2ba838ee485417c4e0542297e2f7bd0df10a744ca91920d208463849c798544e6de91b88f930c89953115f0b9b778b082ed9200bbfe2b285ca741

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a8499471.exe

    Filesize

    289KB

    MD5

    83e99af17aab61558912335cc98ac17f

    SHA1

    57a1bb160393f69344020f46522aa0a38062f062

    SHA256

    ee3be50598850f5ea0a520442e4aaa078a1d69540cd404aa7025b28722ee02a9

    SHA512

    9c103241e9c2ba838ee485417c4e0542297e2f7bd0df10a744ca91920d208463849c798544e6de91b88f930c89953115f0b9b778b082ed9200bbfe2b285ca741

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a8499471.exe

    Filesize

    289KB

    MD5

    83e99af17aab61558912335cc98ac17f

    SHA1

    57a1bb160393f69344020f46522aa0a38062f062

    SHA256

    ee3be50598850f5ea0a520442e4aaa078a1d69540cd404aa7025b28722ee02a9

    SHA512

    9c103241e9c2ba838ee485417c4e0542297e2f7bd0df10a744ca91920d208463849c798544e6de91b88f930c89953115f0b9b778b082ed9200bbfe2b285ca741

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b6344224.exe

    Filesize

    168KB

    MD5

    54d6e42967cd4de3b6e6bc112ceabe90

    SHA1

    833e3f00fb9d8760db235433a3cf92afb320d2be

    SHA256

    5b69ea70c4a4c69cce432576c000894da8d9db4375bb352154c52be899f54d34

    SHA512

    628ae08a8a62634afb819ff5d5982139c80f8ce62bc674272299bb8e123fe4eee79fa5b882d8816685ebf90623f5313d20803a1f694764f67053270767687947

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b6344224.exe

    Filesize

    168KB

    MD5

    54d6e42967cd4de3b6e6bc112ceabe90

    SHA1

    833e3f00fb9d8760db235433a3cf92afb320d2be

    SHA256

    5b69ea70c4a4c69cce432576c000894da8d9db4375bb352154c52be899f54d34

    SHA512

    628ae08a8a62634afb819ff5d5982139c80f8ce62bc674272299bb8e123fe4eee79fa5b882d8816685ebf90623f5313d20803a1f694764f67053270767687947

  • memory/292-110-0x0000000000B20000-0x0000000000B32000-memory.dmp

    Filesize

    72KB

  • memory/292-119-0x0000000000B20000-0x0000000000B32000-memory.dmp

    Filesize

    72KB

  • memory/292-117-0x0000000000B20000-0x0000000000B32000-memory.dmp

    Filesize

    72KB

  • memory/292-123-0x0000000000B20000-0x0000000000B32000-memory.dmp

    Filesize

    72KB

  • memory/292-115-0x0000000000B20000-0x0000000000B32000-memory.dmp

    Filesize

    72KB

  • memory/292-113-0x0000000000B20000-0x0000000000B32000-memory.dmp

    Filesize

    72KB

  • memory/292-125-0x0000000000B20000-0x0000000000B32000-memory.dmp

    Filesize

    72KB

  • memory/292-127-0x0000000000B20000-0x0000000000B32000-memory.dmp

    Filesize

    72KB

  • memory/292-129-0x0000000000B20000-0x0000000000B32000-memory.dmp

    Filesize

    72KB

  • memory/292-131-0x0000000000B20000-0x0000000000B32000-memory.dmp

    Filesize

    72KB

  • memory/292-133-0x0000000000B20000-0x0000000000B32000-memory.dmp

    Filesize

    72KB

  • memory/292-135-0x0000000000B20000-0x0000000000B32000-memory.dmp

    Filesize

    72KB

  • memory/292-137-0x0000000000B20000-0x0000000000B32000-memory.dmp

    Filesize

    72KB

  • memory/292-138-0x0000000000260000-0x000000000028D000-memory.dmp

    Filesize

    180KB

  • memory/292-139-0x0000000004B10000-0x0000000004B50000-memory.dmp

    Filesize

    256KB

  • memory/292-140-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/292-142-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/292-121-0x0000000000B20000-0x0000000000B32000-memory.dmp

    Filesize

    72KB

  • memory/292-111-0x0000000000B20000-0x0000000000B32000-memory.dmp

    Filesize

    72KB

  • memory/292-109-0x0000000000B20000-0x0000000000B38000-memory.dmp

    Filesize

    96KB

  • memory/292-108-0x0000000000650000-0x000000000066A000-memory.dmp

    Filesize

    104KB

  • memory/1316-149-0x0000000000890000-0x00000000008C0000-memory.dmp

    Filesize

    192KB

  • memory/1316-150-0x00000000001E0000-0x00000000001E6000-memory.dmp

    Filesize

    24KB

  • memory/1316-151-0x0000000000AC0000-0x0000000000B00000-memory.dmp

    Filesize

    256KB

  • memory/1316-152-0x0000000000AC0000-0x0000000000B00000-memory.dmp

    Filesize

    256KB