Analysis

  • max time kernel
    145s
  • max time network
    185s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 22:03

General

  • Target

    597ad14101937d820933b6161f6fa027f80c556958d88d08782dc9bc10478b55.exe

  • Size

    924KB

  • MD5

    cd00bd99e5cdffbcabb6b929378e937e

  • SHA1

    6a341567793c2354821b1572af152d4c73bcaa28

  • SHA256

    597ad14101937d820933b6161f6fa027f80c556958d88d08782dc9bc10478b55

  • SHA512

    e0f9183c2c509f972bde8ffcd0f328f3972b1339caad9a2f8cf250548c28e8ffd1f941d831876abc0a50b5f439febb7d900f16ca55a6826e48a5d26b24c9813b

  • SSDEEP

    24576:2yo/JQt86cO5dhHVZXDRpXgFpaVtVkiJDexh2fHiOUt4F:F0JQt8uDVbgFetZKhMCB

Malware Config

Extracted

Family

redline

Botnet

lupa

C2

217.196.96.56:4138

Attributes
  • auth_value

    fcb02fce9bc10c56a9841d56974bd7b8

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 11 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\597ad14101937d820933b6161f6fa027f80c556958d88d08782dc9bc10478b55.exe
    "C:\Users\Admin\AppData\Local\Temp\597ad14101937d820933b6161f6fa027f80c556958d88d08782dc9bc10478b55.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1764
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3308507.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3308507.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1352
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1968800.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1968800.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1164
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1729814.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1729814.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1720
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n4742381.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n4742381.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:744
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o9359259.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o9359259.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1808

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3308507.exe

          Filesize

          770KB

          MD5

          818b951c2c8d0a1101ba5bd655dbf034

          SHA1

          6b455f44bcd0c090107c606ea4727063db777452

          SHA256

          56b504bbb65d6c36ddbda8aeda8ee249b14995c057492d77619f91429ed17bd3

          SHA512

          4969fd3fe5aac0966c148f2c62ed125e633fcd6b8e87fee949a11965a5fec835602e17700c132e6e551fb2a652b2a7f5ea80bb0cdac8d272176fa4337165dfa2

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3308507.exe

          Filesize

          770KB

          MD5

          818b951c2c8d0a1101ba5bd655dbf034

          SHA1

          6b455f44bcd0c090107c606ea4727063db777452

          SHA256

          56b504bbb65d6c36ddbda8aeda8ee249b14995c057492d77619f91429ed17bd3

          SHA512

          4969fd3fe5aac0966c148f2c62ed125e633fcd6b8e87fee949a11965a5fec835602e17700c132e6e551fb2a652b2a7f5ea80bb0cdac8d272176fa4337165dfa2

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1968800.exe

          Filesize

          587KB

          MD5

          64a634539946139366eefe0b27fc2cae

          SHA1

          e32eaa329bcfa7d0131c798e509c49da293ab631

          SHA256

          9ff2ab738dbc95233a68ae84d12b3b52ec0e2a3ce650f09081111b91a905ff3c

          SHA512

          be0307fb8d2fdf6a942fee0f86828c42a21bdd67d28a41ea9f2e6e6b06255a7ace0865a912f32dd2c61c39abedde77dc726a5b2eb746b7139154689e56385de7

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1968800.exe

          Filesize

          587KB

          MD5

          64a634539946139366eefe0b27fc2cae

          SHA1

          e32eaa329bcfa7d0131c798e509c49da293ab631

          SHA256

          9ff2ab738dbc95233a68ae84d12b3b52ec0e2a3ce650f09081111b91a905ff3c

          SHA512

          be0307fb8d2fdf6a942fee0f86828c42a21bdd67d28a41ea9f2e6e6b06255a7ace0865a912f32dd2c61c39abedde77dc726a5b2eb746b7139154689e56385de7

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1729814.exe

          Filesize

          383KB

          MD5

          b1853755fa96436605fe10167c693c46

          SHA1

          308541d46a8e5ad61a6e4fdb22de0a9f3d0deb60

          SHA256

          72b4b6e8d420a8ab0f595233937363a19e90f4454e94e06fec075e48a9e19fe3

          SHA512

          f159203becba02aa5d3eb1418f65efe5d2b1f1eb4b3018cb0af99e022f06fbf80a7da28f8fefb502a2619f73a46c2136341744ed68e38ecdcc08fe16d72bee40

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1729814.exe

          Filesize

          383KB

          MD5

          b1853755fa96436605fe10167c693c46

          SHA1

          308541d46a8e5ad61a6e4fdb22de0a9f3d0deb60

          SHA256

          72b4b6e8d420a8ab0f595233937363a19e90f4454e94e06fec075e48a9e19fe3

          SHA512

          f159203becba02aa5d3eb1418f65efe5d2b1f1eb4b3018cb0af99e022f06fbf80a7da28f8fefb502a2619f73a46c2136341744ed68e38ecdcc08fe16d72bee40

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n4742381.exe

          Filesize

          283KB

          MD5

          0a40d30912286951b184698aead7a116

          SHA1

          6ed8eaa7393a6a0711b9378384b060a0787769de

          SHA256

          93fe586c264fac97bdf1d4fcb6779f0c02c4390a11dd462a71d6d5b3062fb0c1

          SHA512

          b6c85628ad9f7cfdbd822a6376615f7242786a2810b585156cd85d8a2ab5b6856128e9152553f6b6763c4e4e1df3118cdca9d14fe8d7908e7bece4f6b7f40c87

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n4742381.exe

          Filesize

          283KB

          MD5

          0a40d30912286951b184698aead7a116

          SHA1

          6ed8eaa7393a6a0711b9378384b060a0787769de

          SHA256

          93fe586c264fac97bdf1d4fcb6779f0c02c4390a11dd462a71d6d5b3062fb0c1

          SHA512

          b6c85628ad9f7cfdbd822a6376615f7242786a2810b585156cd85d8a2ab5b6856128e9152553f6b6763c4e4e1df3118cdca9d14fe8d7908e7bece4f6b7f40c87

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n4742381.exe

          Filesize

          283KB

          MD5

          0a40d30912286951b184698aead7a116

          SHA1

          6ed8eaa7393a6a0711b9378384b060a0787769de

          SHA256

          93fe586c264fac97bdf1d4fcb6779f0c02c4390a11dd462a71d6d5b3062fb0c1

          SHA512

          b6c85628ad9f7cfdbd822a6376615f7242786a2810b585156cd85d8a2ab5b6856128e9152553f6b6763c4e4e1df3118cdca9d14fe8d7908e7bece4f6b7f40c87

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o9359259.exe

          Filesize

          168KB

          MD5

          05634d7cc649fa6730cea53c210ea2b0

          SHA1

          52963e0f23a5e817a6f7e41c421963c5c8742ac1

          SHA256

          463c0c93b56779ff33d330ea6a9919c79cbf11a9a68d76340f474cf595830e65

          SHA512

          e943be47d18b72a8262c1e68fa47814eb7d8feeed3e241ca23a079f69a9a8944314432201495df97381fbeddf139134bf93aadbe917cbb191bd5294b4fea00cc

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o9359259.exe

          Filesize

          168KB

          MD5

          05634d7cc649fa6730cea53c210ea2b0

          SHA1

          52963e0f23a5e817a6f7e41c421963c5c8742ac1

          SHA256

          463c0c93b56779ff33d330ea6a9919c79cbf11a9a68d76340f474cf595830e65

          SHA512

          e943be47d18b72a8262c1e68fa47814eb7d8feeed3e241ca23a079f69a9a8944314432201495df97381fbeddf139134bf93aadbe917cbb191bd5294b4fea00cc

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o9359259.exe

          Filesize

          168KB

          MD5

          05634d7cc649fa6730cea53c210ea2b0

          SHA1

          52963e0f23a5e817a6f7e41c421963c5c8742ac1

          SHA256

          463c0c93b56779ff33d330ea6a9919c79cbf11a9a68d76340f474cf595830e65

          SHA512

          e943be47d18b72a8262c1e68fa47814eb7d8feeed3e241ca23a079f69a9a8944314432201495df97381fbeddf139134bf93aadbe917cbb191bd5294b4fea00cc

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z3308507.exe

          Filesize

          770KB

          MD5

          818b951c2c8d0a1101ba5bd655dbf034

          SHA1

          6b455f44bcd0c090107c606ea4727063db777452

          SHA256

          56b504bbb65d6c36ddbda8aeda8ee249b14995c057492d77619f91429ed17bd3

          SHA512

          4969fd3fe5aac0966c148f2c62ed125e633fcd6b8e87fee949a11965a5fec835602e17700c132e6e551fb2a652b2a7f5ea80bb0cdac8d272176fa4337165dfa2

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z3308507.exe

          Filesize

          770KB

          MD5

          818b951c2c8d0a1101ba5bd655dbf034

          SHA1

          6b455f44bcd0c090107c606ea4727063db777452

          SHA256

          56b504bbb65d6c36ddbda8aeda8ee249b14995c057492d77619f91429ed17bd3

          SHA512

          4969fd3fe5aac0966c148f2c62ed125e633fcd6b8e87fee949a11965a5fec835602e17700c132e6e551fb2a652b2a7f5ea80bb0cdac8d272176fa4337165dfa2

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z1968800.exe

          Filesize

          587KB

          MD5

          64a634539946139366eefe0b27fc2cae

          SHA1

          e32eaa329bcfa7d0131c798e509c49da293ab631

          SHA256

          9ff2ab738dbc95233a68ae84d12b3b52ec0e2a3ce650f09081111b91a905ff3c

          SHA512

          be0307fb8d2fdf6a942fee0f86828c42a21bdd67d28a41ea9f2e6e6b06255a7ace0865a912f32dd2c61c39abedde77dc726a5b2eb746b7139154689e56385de7

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z1968800.exe

          Filesize

          587KB

          MD5

          64a634539946139366eefe0b27fc2cae

          SHA1

          e32eaa329bcfa7d0131c798e509c49da293ab631

          SHA256

          9ff2ab738dbc95233a68ae84d12b3b52ec0e2a3ce650f09081111b91a905ff3c

          SHA512

          be0307fb8d2fdf6a942fee0f86828c42a21bdd67d28a41ea9f2e6e6b06255a7ace0865a912f32dd2c61c39abedde77dc726a5b2eb746b7139154689e56385de7

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z1729814.exe

          Filesize

          383KB

          MD5

          b1853755fa96436605fe10167c693c46

          SHA1

          308541d46a8e5ad61a6e4fdb22de0a9f3d0deb60

          SHA256

          72b4b6e8d420a8ab0f595233937363a19e90f4454e94e06fec075e48a9e19fe3

          SHA512

          f159203becba02aa5d3eb1418f65efe5d2b1f1eb4b3018cb0af99e022f06fbf80a7da28f8fefb502a2619f73a46c2136341744ed68e38ecdcc08fe16d72bee40

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z1729814.exe

          Filesize

          383KB

          MD5

          b1853755fa96436605fe10167c693c46

          SHA1

          308541d46a8e5ad61a6e4fdb22de0a9f3d0deb60

          SHA256

          72b4b6e8d420a8ab0f595233937363a19e90f4454e94e06fec075e48a9e19fe3

          SHA512

          f159203becba02aa5d3eb1418f65efe5d2b1f1eb4b3018cb0af99e022f06fbf80a7da28f8fefb502a2619f73a46c2136341744ed68e38ecdcc08fe16d72bee40

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\n4742381.exe

          Filesize

          283KB

          MD5

          0a40d30912286951b184698aead7a116

          SHA1

          6ed8eaa7393a6a0711b9378384b060a0787769de

          SHA256

          93fe586c264fac97bdf1d4fcb6779f0c02c4390a11dd462a71d6d5b3062fb0c1

          SHA512

          b6c85628ad9f7cfdbd822a6376615f7242786a2810b585156cd85d8a2ab5b6856128e9152553f6b6763c4e4e1df3118cdca9d14fe8d7908e7bece4f6b7f40c87

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\n4742381.exe

          Filesize

          283KB

          MD5

          0a40d30912286951b184698aead7a116

          SHA1

          6ed8eaa7393a6a0711b9378384b060a0787769de

          SHA256

          93fe586c264fac97bdf1d4fcb6779f0c02c4390a11dd462a71d6d5b3062fb0c1

          SHA512

          b6c85628ad9f7cfdbd822a6376615f7242786a2810b585156cd85d8a2ab5b6856128e9152553f6b6763c4e4e1df3118cdca9d14fe8d7908e7bece4f6b7f40c87

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\n4742381.exe

          Filesize

          283KB

          MD5

          0a40d30912286951b184698aead7a116

          SHA1

          6ed8eaa7393a6a0711b9378384b060a0787769de

          SHA256

          93fe586c264fac97bdf1d4fcb6779f0c02c4390a11dd462a71d6d5b3062fb0c1

          SHA512

          b6c85628ad9f7cfdbd822a6376615f7242786a2810b585156cd85d8a2ab5b6856128e9152553f6b6763c4e4e1df3118cdca9d14fe8d7908e7bece4f6b7f40c87

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\o9359259.exe

          Filesize

          168KB

          MD5

          05634d7cc649fa6730cea53c210ea2b0

          SHA1

          52963e0f23a5e817a6f7e41c421963c5c8742ac1

          SHA256

          463c0c93b56779ff33d330ea6a9919c79cbf11a9a68d76340f474cf595830e65

          SHA512

          e943be47d18b72a8262c1e68fa47814eb7d8feeed3e241ca23a079f69a9a8944314432201495df97381fbeddf139134bf93aadbe917cbb191bd5294b4fea00cc

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\o9359259.exe

          Filesize

          168KB

          MD5

          05634d7cc649fa6730cea53c210ea2b0

          SHA1

          52963e0f23a5e817a6f7e41c421963c5c8742ac1

          SHA256

          463c0c93b56779ff33d330ea6a9919c79cbf11a9a68d76340f474cf595830e65

          SHA512

          e943be47d18b72a8262c1e68fa47814eb7d8feeed3e241ca23a079f69a9a8944314432201495df97381fbeddf139134bf93aadbe917cbb191bd5294b4fea00cc

        • memory/744-107-0x00000000023A0000-0x00000000023B2000-memory.dmp

          Filesize

          72KB

        • memory/744-128-0x0000000000260000-0x000000000028D000-memory.dmp

          Filesize

          180KB

        • memory/744-109-0x00000000023A0000-0x00000000023B2000-memory.dmp

          Filesize

          72KB

        • memory/744-111-0x00000000023A0000-0x00000000023B2000-memory.dmp

          Filesize

          72KB

        • memory/744-113-0x00000000023A0000-0x00000000023B2000-memory.dmp

          Filesize

          72KB

        • memory/744-115-0x00000000023A0000-0x00000000023B2000-memory.dmp

          Filesize

          72KB

        • memory/744-117-0x00000000023A0000-0x00000000023B2000-memory.dmp

          Filesize

          72KB

        • memory/744-119-0x00000000023A0000-0x00000000023B2000-memory.dmp

          Filesize

          72KB

        • memory/744-121-0x00000000023A0000-0x00000000023B2000-memory.dmp

          Filesize

          72KB

        • memory/744-123-0x00000000023A0000-0x00000000023B2000-memory.dmp

          Filesize

          72KB

        • memory/744-127-0x00000000023A0000-0x00000000023B2000-memory.dmp

          Filesize

          72KB

        • memory/744-125-0x00000000023A0000-0x00000000023B2000-memory.dmp

          Filesize

          72KB

        • memory/744-129-0x0000000002500000-0x0000000002540000-memory.dmp

          Filesize

          256KB

        • memory/744-105-0x00000000023A0000-0x00000000023B2000-memory.dmp

          Filesize

          72KB

        • memory/744-130-0x0000000000400000-0x00000000006C7000-memory.dmp

          Filesize

          2.8MB

        • memory/744-131-0x0000000000400000-0x00000000006C7000-memory.dmp

          Filesize

          2.8MB

        • memory/744-132-0x0000000000400000-0x00000000006C7000-memory.dmp

          Filesize

          2.8MB

        • memory/744-103-0x00000000023A0000-0x00000000023B2000-memory.dmp

          Filesize

          72KB

        • memory/744-101-0x00000000023A0000-0x00000000023B2000-memory.dmp

          Filesize

          72KB

        • memory/744-100-0x00000000023A0000-0x00000000023B2000-memory.dmp

          Filesize

          72KB

        • memory/744-99-0x00000000023A0000-0x00000000023B8000-memory.dmp

          Filesize

          96KB

        • memory/744-98-0x0000000000810000-0x000000000082A000-memory.dmp

          Filesize

          104KB

        • memory/1808-139-0x0000000000CB0000-0x0000000000CDE000-memory.dmp

          Filesize

          184KB

        • memory/1808-140-0x0000000000320000-0x0000000000326000-memory.dmp

          Filesize

          24KB

        • memory/1808-141-0x0000000000890000-0x00000000008D0000-memory.dmp

          Filesize

          256KB

        • memory/1808-142-0x0000000000890000-0x00000000008D0000-memory.dmp

          Filesize

          256KB