Analysis

  • max time kernel
    145s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 21:49

General

  • Target

    4deeb34259b61af02cd23155b8d54b03a4079470ac2b7d786001ff81558cf264.exe

  • Size

    1.5MB

  • MD5

    05333c6e9ab624acd82046f7ed959453

  • SHA1

    cf68659059044b9dbcdea93147293ff434ea648d

  • SHA256

    4deeb34259b61af02cd23155b8d54b03a4079470ac2b7d786001ff81558cf264

  • SHA512

    8dac8cde92ce86d2d907cb208993b9592b9eae03ff4ba2941c78a30d1e5f81dd0c1d158679effd5febbbad23d90c76f398986ee231cde9d3fd695f518b625e01

  • SSDEEP

    49152:nzEke+Pp/kVadWl3pNd31sqb+NPM2ZVNXtqxKQk1s:zEke+PpcVSURsc27NX00Qk1

Malware Config

Extracted

Family

redline

Botnet

mazda

C2

217.196.96.56:4138

Attributes
  • auth_value

    3d2870537d84a4c6d7aeecd002871c51

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4deeb34259b61af02cd23155b8d54b03a4079470ac2b7d786001ff81558cf264.exe
    "C:\Users\Admin\AppData\Local\Temp\4deeb34259b61af02cd23155b8d54b03a4079470ac2b7d786001ff81558cf264.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0529233.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0529233.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1988
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0708119.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0708119.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:764
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5030332.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5030332.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1392
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2323692.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2323692.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1636
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a8108139.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a8108139.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Loads dropped DLL
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:568
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b6368521.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b6368521.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1216

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0529233.exe

    Filesize

    1.4MB

    MD5

    b6344b2a0542d6e76015720f86f62fc0

    SHA1

    052f4bc1c62269ff22aba0ab73332fac511e6645

    SHA256

    bf0dc9280f04b38f6750db476b2e15c7cec0cc9cea561bbb7c0e4a4391757fd2

    SHA512

    7408133e5002f95836420b7f68caf2b48f3900a75d70e02da41608fd2dadd08f833ef6c329736ab3002e860feebce87ce28a995866fc694c9d9911bdd8f6fbdb

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0529233.exe

    Filesize

    1.4MB

    MD5

    b6344b2a0542d6e76015720f86f62fc0

    SHA1

    052f4bc1c62269ff22aba0ab73332fac511e6645

    SHA256

    bf0dc9280f04b38f6750db476b2e15c7cec0cc9cea561bbb7c0e4a4391757fd2

    SHA512

    7408133e5002f95836420b7f68caf2b48f3900a75d70e02da41608fd2dadd08f833ef6c329736ab3002e860feebce87ce28a995866fc694c9d9911bdd8f6fbdb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0708119.exe

    Filesize

    915KB

    MD5

    11e08976d5d40eaa5752553d6f77be56

    SHA1

    6bb3a48613f04b1b30093f892c0fff19974bf6c4

    SHA256

    68bb07d699412f112a65c041ab79f4dff7c8118b704ca0c758ef0a091c87b935

    SHA512

    6c5dd06ee027e0f973ebd9c38500ad41a302f89dc53e7d2bcc72ca3d327bd1396f4d06d1e81fc19327085b06171639f37a44787d6631a36ef882b52a411c265a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0708119.exe

    Filesize

    915KB

    MD5

    11e08976d5d40eaa5752553d6f77be56

    SHA1

    6bb3a48613f04b1b30093f892c0fff19974bf6c4

    SHA256

    68bb07d699412f112a65c041ab79f4dff7c8118b704ca0c758ef0a091c87b935

    SHA512

    6c5dd06ee027e0f973ebd9c38500ad41a302f89dc53e7d2bcc72ca3d327bd1396f4d06d1e81fc19327085b06171639f37a44787d6631a36ef882b52a411c265a

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5030332.exe

    Filesize

    711KB

    MD5

    317722185fa5908c9ff13d870c2647a2

    SHA1

    7d562b65bbf011277463816e4997aee9d6ec95a3

    SHA256

    0458c799cc36a73c58ea2d0d5b5ccf35930ca7d94528ddd622f39047e3897f66

    SHA512

    1dc34ecc79342dd9a7f5effc8049d7e75cf6d4c1a8e0bd8b6a5a9d94d4f84d85521810da213f992671bd0b359d38557df7cb3efe2e7bcd2ea0f1f6a835f7c59c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5030332.exe

    Filesize

    711KB

    MD5

    317722185fa5908c9ff13d870c2647a2

    SHA1

    7d562b65bbf011277463816e4997aee9d6ec95a3

    SHA256

    0458c799cc36a73c58ea2d0d5b5ccf35930ca7d94528ddd622f39047e3897f66

    SHA512

    1dc34ecc79342dd9a7f5effc8049d7e75cf6d4c1a8e0bd8b6a5a9d94d4f84d85521810da213f992671bd0b359d38557df7cb3efe2e7bcd2ea0f1f6a835f7c59c

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2323692.exe

    Filesize

    416KB

    MD5

    0cc72b7b8368db24b9b235865ba4abfa

    SHA1

    a164e3a1d84dbf03ac5693ec06ba6efe60500f5b

    SHA256

    daf07105fe55731a99db61c43483c691ba3f802c934f464cba105ddb36650c17

    SHA512

    47755c6672955415bc8ed6457d79cc63e9455a3fb618a8ebd2a2cc60097482af2b45129661165db4934eebcf9d05b6fb1337ca9b52fdf3565efd2dafbcae9298

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2323692.exe

    Filesize

    416KB

    MD5

    0cc72b7b8368db24b9b235865ba4abfa

    SHA1

    a164e3a1d84dbf03ac5693ec06ba6efe60500f5b

    SHA256

    daf07105fe55731a99db61c43483c691ba3f802c934f464cba105ddb36650c17

    SHA512

    47755c6672955415bc8ed6457d79cc63e9455a3fb618a8ebd2a2cc60097482af2b45129661165db4934eebcf9d05b6fb1337ca9b52fdf3565efd2dafbcae9298

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a8108139.exe

    Filesize

    360KB

    MD5

    97aef50973908384a7c4bb42e6eabf02

    SHA1

    fcd3415f06eadcbce48ce042c18b52660925fe14

    SHA256

    aba074bbd077812b81ee74228e26399d814e51b6e30a4ddb2283925ae597c4b4

    SHA512

    6167b1e29aa013958dd075a67647d4dde6c679c992030517ee1eba7ce0641504dcb5235500879167ab3c85fa5013c848ddc52c8b5729201df14c5d5017f899e9

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a8108139.exe

    Filesize

    360KB

    MD5

    97aef50973908384a7c4bb42e6eabf02

    SHA1

    fcd3415f06eadcbce48ce042c18b52660925fe14

    SHA256

    aba074bbd077812b81ee74228e26399d814e51b6e30a4ddb2283925ae597c4b4

    SHA512

    6167b1e29aa013958dd075a67647d4dde6c679c992030517ee1eba7ce0641504dcb5235500879167ab3c85fa5013c848ddc52c8b5729201df14c5d5017f899e9

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a8108139.exe

    Filesize

    360KB

    MD5

    97aef50973908384a7c4bb42e6eabf02

    SHA1

    fcd3415f06eadcbce48ce042c18b52660925fe14

    SHA256

    aba074bbd077812b81ee74228e26399d814e51b6e30a4ddb2283925ae597c4b4

    SHA512

    6167b1e29aa013958dd075a67647d4dde6c679c992030517ee1eba7ce0641504dcb5235500879167ab3c85fa5013c848ddc52c8b5729201df14c5d5017f899e9

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b6368521.exe

    Filesize

    168KB

    MD5

    196e08e880784cf66bb2f417aa736a88

    SHA1

    ac1e3234e494039ffe859ace14094803c5d25a47

    SHA256

    2c5de0654d5611a9c4a7a763540fb7fcb59e8a43ebc6aab0a16664529a946df0

    SHA512

    725d03d5fb86de4d748efe59656f796476eb1372ce291a5623596d4a91a956480e4c0444fbdeb7cea384da708e754dbb2dd4bd9d11a0b95a4e6dd0fb102194b8

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b6368521.exe

    Filesize

    168KB

    MD5

    196e08e880784cf66bb2f417aa736a88

    SHA1

    ac1e3234e494039ffe859ace14094803c5d25a47

    SHA256

    2c5de0654d5611a9c4a7a763540fb7fcb59e8a43ebc6aab0a16664529a946df0

    SHA512

    725d03d5fb86de4d748efe59656f796476eb1372ce291a5623596d4a91a956480e4c0444fbdeb7cea384da708e754dbb2dd4bd9d11a0b95a4e6dd0fb102194b8

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v0529233.exe

    Filesize

    1.4MB

    MD5

    b6344b2a0542d6e76015720f86f62fc0

    SHA1

    052f4bc1c62269ff22aba0ab73332fac511e6645

    SHA256

    bf0dc9280f04b38f6750db476b2e15c7cec0cc9cea561bbb7c0e4a4391757fd2

    SHA512

    7408133e5002f95836420b7f68caf2b48f3900a75d70e02da41608fd2dadd08f833ef6c329736ab3002e860feebce87ce28a995866fc694c9d9911bdd8f6fbdb

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v0529233.exe

    Filesize

    1.4MB

    MD5

    b6344b2a0542d6e76015720f86f62fc0

    SHA1

    052f4bc1c62269ff22aba0ab73332fac511e6645

    SHA256

    bf0dc9280f04b38f6750db476b2e15c7cec0cc9cea561bbb7c0e4a4391757fd2

    SHA512

    7408133e5002f95836420b7f68caf2b48f3900a75d70e02da41608fd2dadd08f833ef6c329736ab3002e860feebce87ce28a995866fc694c9d9911bdd8f6fbdb

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v0708119.exe

    Filesize

    915KB

    MD5

    11e08976d5d40eaa5752553d6f77be56

    SHA1

    6bb3a48613f04b1b30093f892c0fff19974bf6c4

    SHA256

    68bb07d699412f112a65c041ab79f4dff7c8118b704ca0c758ef0a091c87b935

    SHA512

    6c5dd06ee027e0f973ebd9c38500ad41a302f89dc53e7d2bcc72ca3d327bd1396f4d06d1e81fc19327085b06171639f37a44787d6631a36ef882b52a411c265a

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v0708119.exe

    Filesize

    915KB

    MD5

    11e08976d5d40eaa5752553d6f77be56

    SHA1

    6bb3a48613f04b1b30093f892c0fff19974bf6c4

    SHA256

    68bb07d699412f112a65c041ab79f4dff7c8118b704ca0c758ef0a091c87b935

    SHA512

    6c5dd06ee027e0f973ebd9c38500ad41a302f89dc53e7d2bcc72ca3d327bd1396f4d06d1e81fc19327085b06171639f37a44787d6631a36ef882b52a411c265a

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v5030332.exe

    Filesize

    711KB

    MD5

    317722185fa5908c9ff13d870c2647a2

    SHA1

    7d562b65bbf011277463816e4997aee9d6ec95a3

    SHA256

    0458c799cc36a73c58ea2d0d5b5ccf35930ca7d94528ddd622f39047e3897f66

    SHA512

    1dc34ecc79342dd9a7f5effc8049d7e75cf6d4c1a8e0bd8b6a5a9d94d4f84d85521810da213f992671bd0b359d38557df7cb3efe2e7bcd2ea0f1f6a835f7c59c

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v5030332.exe

    Filesize

    711KB

    MD5

    317722185fa5908c9ff13d870c2647a2

    SHA1

    7d562b65bbf011277463816e4997aee9d6ec95a3

    SHA256

    0458c799cc36a73c58ea2d0d5b5ccf35930ca7d94528ddd622f39047e3897f66

    SHA512

    1dc34ecc79342dd9a7f5effc8049d7e75cf6d4c1a8e0bd8b6a5a9d94d4f84d85521810da213f992671bd0b359d38557df7cb3efe2e7bcd2ea0f1f6a835f7c59c

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v2323692.exe

    Filesize

    416KB

    MD5

    0cc72b7b8368db24b9b235865ba4abfa

    SHA1

    a164e3a1d84dbf03ac5693ec06ba6efe60500f5b

    SHA256

    daf07105fe55731a99db61c43483c691ba3f802c934f464cba105ddb36650c17

    SHA512

    47755c6672955415bc8ed6457d79cc63e9455a3fb618a8ebd2a2cc60097482af2b45129661165db4934eebcf9d05b6fb1337ca9b52fdf3565efd2dafbcae9298

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v2323692.exe

    Filesize

    416KB

    MD5

    0cc72b7b8368db24b9b235865ba4abfa

    SHA1

    a164e3a1d84dbf03ac5693ec06ba6efe60500f5b

    SHA256

    daf07105fe55731a99db61c43483c691ba3f802c934f464cba105ddb36650c17

    SHA512

    47755c6672955415bc8ed6457d79cc63e9455a3fb618a8ebd2a2cc60097482af2b45129661165db4934eebcf9d05b6fb1337ca9b52fdf3565efd2dafbcae9298

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a8108139.exe

    Filesize

    360KB

    MD5

    97aef50973908384a7c4bb42e6eabf02

    SHA1

    fcd3415f06eadcbce48ce042c18b52660925fe14

    SHA256

    aba074bbd077812b81ee74228e26399d814e51b6e30a4ddb2283925ae597c4b4

    SHA512

    6167b1e29aa013958dd075a67647d4dde6c679c992030517ee1eba7ce0641504dcb5235500879167ab3c85fa5013c848ddc52c8b5729201df14c5d5017f899e9

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a8108139.exe

    Filesize

    360KB

    MD5

    97aef50973908384a7c4bb42e6eabf02

    SHA1

    fcd3415f06eadcbce48ce042c18b52660925fe14

    SHA256

    aba074bbd077812b81ee74228e26399d814e51b6e30a4ddb2283925ae597c4b4

    SHA512

    6167b1e29aa013958dd075a67647d4dde6c679c992030517ee1eba7ce0641504dcb5235500879167ab3c85fa5013c848ddc52c8b5729201df14c5d5017f899e9

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a8108139.exe

    Filesize

    360KB

    MD5

    97aef50973908384a7c4bb42e6eabf02

    SHA1

    fcd3415f06eadcbce48ce042c18b52660925fe14

    SHA256

    aba074bbd077812b81ee74228e26399d814e51b6e30a4ddb2283925ae597c4b4

    SHA512

    6167b1e29aa013958dd075a67647d4dde6c679c992030517ee1eba7ce0641504dcb5235500879167ab3c85fa5013c848ddc52c8b5729201df14c5d5017f899e9

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b6368521.exe

    Filesize

    168KB

    MD5

    196e08e880784cf66bb2f417aa736a88

    SHA1

    ac1e3234e494039ffe859ace14094803c5d25a47

    SHA256

    2c5de0654d5611a9c4a7a763540fb7fcb59e8a43ebc6aab0a16664529a946df0

    SHA512

    725d03d5fb86de4d748efe59656f796476eb1372ce291a5623596d4a91a956480e4c0444fbdeb7cea384da708e754dbb2dd4bd9d11a0b95a4e6dd0fb102194b8

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b6368521.exe

    Filesize

    168KB

    MD5

    196e08e880784cf66bb2f417aa736a88

    SHA1

    ac1e3234e494039ffe859ace14094803c5d25a47

    SHA256

    2c5de0654d5611a9c4a7a763540fb7fcb59e8a43ebc6aab0a16664529a946df0

    SHA512

    725d03d5fb86de4d748efe59656f796476eb1372ce291a5623596d4a91a956480e4c0444fbdeb7cea384da708e754dbb2dd4bd9d11a0b95a4e6dd0fb102194b8

  • memory/568-113-0x00000000023F0000-0x0000000002402000-memory.dmp

    Filesize

    72KB

  • memory/568-138-0x00000000001E0000-0x000000000020D000-memory.dmp

    Filesize

    180KB

  • memory/568-117-0x00000000023F0000-0x0000000002402000-memory.dmp

    Filesize

    72KB

  • memory/568-119-0x00000000023F0000-0x0000000002402000-memory.dmp

    Filesize

    72KB

  • memory/568-121-0x00000000023F0000-0x0000000002402000-memory.dmp

    Filesize

    72KB

  • memory/568-123-0x00000000023F0000-0x0000000002402000-memory.dmp

    Filesize

    72KB

  • memory/568-125-0x00000000023F0000-0x0000000002402000-memory.dmp

    Filesize

    72KB

  • memory/568-127-0x00000000023F0000-0x0000000002402000-memory.dmp

    Filesize

    72KB

  • memory/568-129-0x00000000023F0000-0x0000000002402000-memory.dmp

    Filesize

    72KB

  • memory/568-131-0x00000000023F0000-0x0000000002402000-memory.dmp

    Filesize

    72KB

  • memory/568-133-0x00000000023F0000-0x0000000002402000-memory.dmp

    Filesize

    72KB

  • memory/568-135-0x00000000023F0000-0x0000000002402000-memory.dmp

    Filesize

    72KB

  • memory/568-137-0x00000000023F0000-0x0000000002402000-memory.dmp

    Filesize

    72KB

  • memory/568-115-0x00000000023F0000-0x0000000002402000-memory.dmp

    Filesize

    72KB

  • memory/568-139-0x0000000002460000-0x00000000024A0000-memory.dmp

    Filesize

    256KB

  • memory/568-140-0x0000000002460000-0x00000000024A0000-memory.dmp

    Filesize

    256KB

  • memory/568-141-0x0000000000400000-0x00000000006F4000-memory.dmp

    Filesize

    3.0MB

  • memory/568-142-0x0000000002460000-0x00000000024A0000-memory.dmp

    Filesize

    256KB

  • memory/568-147-0x0000000000400000-0x00000000006F4000-memory.dmp

    Filesize

    3.0MB

  • memory/568-111-0x00000000023F0000-0x0000000002402000-memory.dmp

    Filesize

    72KB

  • memory/568-110-0x00000000023F0000-0x0000000002402000-memory.dmp

    Filesize

    72KB

  • memory/568-109-0x00000000023F0000-0x0000000002408000-memory.dmp

    Filesize

    96KB

  • memory/568-108-0x0000000000DC0000-0x0000000000DDA000-memory.dmp

    Filesize

    104KB

  • memory/1216-154-0x0000000000D00000-0x0000000000D30000-memory.dmp

    Filesize

    192KB

  • memory/1216-155-0x0000000000440000-0x0000000000446000-memory.dmp

    Filesize

    24KB

  • memory/1216-156-0x0000000004DE0000-0x0000000004E20000-memory.dmp

    Filesize

    256KB

  • memory/1216-157-0x0000000004DE0000-0x0000000004E20000-memory.dmp

    Filesize

    256KB