Analysis

  • max time kernel
    170s
  • max time network
    210s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 22:26

General

  • Target

    6e96748d1f93f53406b975d4bbc6b8cda351204932ab2473f802c644697fa80f.exe

  • Size

    1.2MB

  • MD5

    8b3eaa8f14c275b452d084531f34af6d

  • SHA1

    bdb7c22cfa3a753bf28a5b17f11f851bb124466a

  • SHA256

    6e96748d1f93f53406b975d4bbc6b8cda351204932ab2473f802c644697fa80f

  • SHA512

    48502bb5ff66ab287bc0f583cfb77767a9e56341c1b0b840599d09b59dccbb7a5c98575bd9c4007d66a4660e47b90992e58d6f206db29bf88d96efdabe09a075

  • SSDEEP

    24576:eyZdtOhCiWtF36eIwAl3JNs+4q172lZeA6khRxXxZMbedItcPTx7/eCUWFq:tv+ClfDAj4VTeAPhRtfxCc7Z/ew

Malware Config

Extracted

Family

redline

Botnet

lakio

C2

217.196.96.56:4138

Attributes
  • auth_value

    5a2372e90cce274157a245c74afe9d6e

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 11 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e96748d1f93f53406b975d4bbc6b8cda351204932ab2473f802c644697fa80f.exe
    "C:\Users\Admin\AppData\Local\Temp\6e96748d1f93f53406b975d4bbc6b8cda351204932ab2473f802c644697fa80f.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5695676.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5695676.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1248
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5016329.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5016329.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1852
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4192400.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4192400.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1152
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n1478062.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n1478062.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1496
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o2295037.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o2295037.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1504

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5695676.exe

    Filesize

    1.0MB

    MD5

    3200663462e997348e6633d13748234a

    SHA1

    31286a020ccf58eb73b18cfceb85a7c3e41f8ec8

    SHA256

    90f887da49cf4ae3a6c1163bfc0e07497ad643f37b0038fe7c6aebc4e25c1a2f

    SHA512

    0a1b745bde2ed4a521926c53a892b2377d7cb7919ae79116d6dad4fc835fadaa51ee2c87f2756e5fc247bc091700908705debc05dcbae2a1359a255605d089ea

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5695676.exe

    Filesize

    1.0MB

    MD5

    3200663462e997348e6633d13748234a

    SHA1

    31286a020ccf58eb73b18cfceb85a7c3e41f8ec8

    SHA256

    90f887da49cf4ae3a6c1163bfc0e07497ad643f37b0038fe7c6aebc4e25c1a2f

    SHA512

    0a1b745bde2ed4a521926c53a892b2377d7cb7919ae79116d6dad4fc835fadaa51ee2c87f2756e5fc247bc091700908705debc05dcbae2a1359a255605d089ea

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5016329.exe

    Filesize

    597KB

    MD5

    d7ac91a0d75bb955232365c1a31b29a0

    SHA1

    f283c9067aeb94215f0cb18da0e15ff9935628f2

    SHA256

    48db151fc353c74fc9ce35abbd373744d282db2c6d5c87c04f581393f8b43aa7

    SHA512

    96cb8b98f4ced160c4646dd5844c49622a3784c8486c543f8bebc831b3eb87d0be94877f72f26a9809aa896c8062a9d7b69b8d9742cb56baa1e9e367a4053700

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5016329.exe

    Filesize

    597KB

    MD5

    d7ac91a0d75bb955232365c1a31b29a0

    SHA1

    f283c9067aeb94215f0cb18da0e15ff9935628f2

    SHA256

    48db151fc353c74fc9ce35abbd373744d282db2c6d5c87c04f581393f8b43aa7

    SHA512

    96cb8b98f4ced160c4646dd5844c49622a3784c8486c543f8bebc831b3eb87d0be94877f72f26a9809aa896c8062a9d7b69b8d9742cb56baa1e9e367a4053700

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4192400.exe

    Filesize

    393KB

    MD5

    ec4da8217b74e0d0be3e036bc900480d

    SHA1

    c5f6b4b4085c037c4e907e2e22f025838affc5d6

    SHA256

    3e5bfbd1903a464e1f4a529a1c5d286d728dea26de90cff7d06dd5ef517f4784

    SHA512

    e11a7d4aa8d4c925d07f3c1abd064d5086feb52667a53c1c88fa96b59baf5a122f51722e2d8d65ec5abb07319a7958e3d441b49a3ab9645167c6b592edcc577e

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4192400.exe

    Filesize

    393KB

    MD5

    ec4da8217b74e0d0be3e036bc900480d

    SHA1

    c5f6b4b4085c037c4e907e2e22f025838affc5d6

    SHA256

    3e5bfbd1903a464e1f4a529a1c5d286d728dea26de90cff7d06dd5ef517f4784

    SHA512

    e11a7d4aa8d4c925d07f3c1abd064d5086feb52667a53c1c88fa96b59baf5a122f51722e2d8d65ec5abb07319a7958e3d441b49a3ab9645167c6b592edcc577e

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n1478062.exe

    Filesize

    315KB

    MD5

    93b2849d3616cae91aa194d4a444cbc5

    SHA1

    8d863c6fd33844674faf9107e4c7fe46b8fe28f0

    SHA256

    80ba299d2c9a29f1fd19eb946b8c8151d24053e32b885886583afa7aec9102ed

    SHA512

    1ba88b450a6238100b51de1e77130fc7c7a8fda4cc39c7153d93f13425856aeaabc2c1561e77b29dbd829c9c1bf13c3c177a687d5c42f634ecbce78793fea038

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n1478062.exe

    Filesize

    315KB

    MD5

    93b2849d3616cae91aa194d4a444cbc5

    SHA1

    8d863c6fd33844674faf9107e4c7fe46b8fe28f0

    SHA256

    80ba299d2c9a29f1fd19eb946b8c8151d24053e32b885886583afa7aec9102ed

    SHA512

    1ba88b450a6238100b51de1e77130fc7c7a8fda4cc39c7153d93f13425856aeaabc2c1561e77b29dbd829c9c1bf13c3c177a687d5c42f634ecbce78793fea038

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n1478062.exe

    Filesize

    315KB

    MD5

    93b2849d3616cae91aa194d4a444cbc5

    SHA1

    8d863c6fd33844674faf9107e4c7fe46b8fe28f0

    SHA256

    80ba299d2c9a29f1fd19eb946b8c8151d24053e32b885886583afa7aec9102ed

    SHA512

    1ba88b450a6238100b51de1e77130fc7c7a8fda4cc39c7153d93f13425856aeaabc2c1561e77b29dbd829c9c1bf13c3c177a687d5c42f634ecbce78793fea038

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o2295037.exe

    Filesize

    168KB

    MD5

    5b914f9078cd5be1a32b580f6e90fad5

    SHA1

    265c67d0268949d90406ed2d6b2083c4cf91fdba

    SHA256

    5839e3842f5f2dcf9f7a4b0af16a1d602c2dc43bbd5226199d0785c5be7509b8

    SHA512

    b9274e5f343a43bbd3563b1b8a2c9e7a537333fb5f5be8173f1d13a90b1866357dc9efdbad7f3cf127f30de2732038df8348ca5c41d4d4c5a6634533248be628

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o2295037.exe

    Filesize

    168KB

    MD5

    5b914f9078cd5be1a32b580f6e90fad5

    SHA1

    265c67d0268949d90406ed2d6b2083c4cf91fdba

    SHA256

    5839e3842f5f2dcf9f7a4b0af16a1d602c2dc43bbd5226199d0785c5be7509b8

    SHA512

    b9274e5f343a43bbd3563b1b8a2c9e7a537333fb5f5be8173f1d13a90b1866357dc9efdbad7f3cf127f30de2732038df8348ca5c41d4d4c5a6634533248be628

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z5695676.exe

    Filesize

    1.0MB

    MD5

    3200663462e997348e6633d13748234a

    SHA1

    31286a020ccf58eb73b18cfceb85a7c3e41f8ec8

    SHA256

    90f887da49cf4ae3a6c1163bfc0e07497ad643f37b0038fe7c6aebc4e25c1a2f

    SHA512

    0a1b745bde2ed4a521926c53a892b2377d7cb7919ae79116d6dad4fc835fadaa51ee2c87f2756e5fc247bc091700908705debc05dcbae2a1359a255605d089ea

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z5695676.exe

    Filesize

    1.0MB

    MD5

    3200663462e997348e6633d13748234a

    SHA1

    31286a020ccf58eb73b18cfceb85a7c3e41f8ec8

    SHA256

    90f887da49cf4ae3a6c1163bfc0e07497ad643f37b0038fe7c6aebc4e25c1a2f

    SHA512

    0a1b745bde2ed4a521926c53a892b2377d7cb7919ae79116d6dad4fc835fadaa51ee2c87f2756e5fc247bc091700908705debc05dcbae2a1359a255605d089ea

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z5016329.exe

    Filesize

    597KB

    MD5

    d7ac91a0d75bb955232365c1a31b29a0

    SHA1

    f283c9067aeb94215f0cb18da0e15ff9935628f2

    SHA256

    48db151fc353c74fc9ce35abbd373744d282db2c6d5c87c04f581393f8b43aa7

    SHA512

    96cb8b98f4ced160c4646dd5844c49622a3784c8486c543f8bebc831b3eb87d0be94877f72f26a9809aa896c8062a9d7b69b8d9742cb56baa1e9e367a4053700

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z5016329.exe

    Filesize

    597KB

    MD5

    d7ac91a0d75bb955232365c1a31b29a0

    SHA1

    f283c9067aeb94215f0cb18da0e15ff9935628f2

    SHA256

    48db151fc353c74fc9ce35abbd373744d282db2c6d5c87c04f581393f8b43aa7

    SHA512

    96cb8b98f4ced160c4646dd5844c49622a3784c8486c543f8bebc831b3eb87d0be94877f72f26a9809aa896c8062a9d7b69b8d9742cb56baa1e9e367a4053700

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z4192400.exe

    Filesize

    393KB

    MD5

    ec4da8217b74e0d0be3e036bc900480d

    SHA1

    c5f6b4b4085c037c4e907e2e22f025838affc5d6

    SHA256

    3e5bfbd1903a464e1f4a529a1c5d286d728dea26de90cff7d06dd5ef517f4784

    SHA512

    e11a7d4aa8d4c925d07f3c1abd064d5086feb52667a53c1c88fa96b59baf5a122f51722e2d8d65ec5abb07319a7958e3d441b49a3ab9645167c6b592edcc577e

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z4192400.exe

    Filesize

    393KB

    MD5

    ec4da8217b74e0d0be3e036bc900480d

    SHA1

    c5f6b4b4085c037c4e907e2e22f025838affc5d6

    SHA256

    3e5bfbd1903a464e1f4a529a1c5d286d728dea26de90cff7d06dd5ef517f4784

    SHA512

    e11a7d4aa8d4c925d07f3c1abd064d5086feb52667a53c1c88fa96b59baf5a122f51722e2d8d65ec5abb07319a7958e3d441b49a3ab9645167c6b592edcc577e

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\n1478062.exe

    Filesize

    315KB

    MD5

    93b2849d3616cae91aa194d4a444cbc5

    SHA1

    8d863c6fd33844674faf9107e4c7fe46b8fe28f0

    SHA256

    80ba299d2c9a29f1fd19eb946b8c8151d24053e32b885886583afa7aec9102ed

    SHA512

    1ba88b450a6238100b51de1e77130fc7c7a8fda4cc39c7153d93f13425856aeaabc2c1561e77b29dbd829c9c1bf13c3c177a687d5c42f634ecbce78793fea038

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\n1478062.exe

    Filesize

    315KB

    MD5

    93b2849d3616cae91aa194d4a444cbc5

    SHA1

    8d863c6fd33844674faf9107e4c7fe46b8fe28f0

    SHA256

    80ba299d2c9a29f1fd19eb946b8c8151d24053e32b885886583afa7aec9102ed

    SHA512

    1ba88b450a6238100b51de1e77130fc7c7a8fda4cc39c7153d93f13425856aeaabc2c1561e77b29dbd829c9c1bf13c3c177a687d5c42f634ecbce78793fea038

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\n1478062.exe

    Filesize

    315KB

    MD5

    93b2849d3616cae91aa194d4a444cbc5

    SHA1

    8d863c6fd33844674faf9107e4c7fe46b8fe28f0

    SHA256

    80ba299d2c9a29f1fd19eb946b8c8151d24053e32b885886583afa7aec9102ed

    SHA512

    1ba88b450a6238100b51de1e77130fc7c7a8fda4cc39c7153d93f13425856aeaabc2c1561e77b29dbd829c9c1bf13c3c177a687d5c42f634ecbce78793fea038

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\o2295037.exe

    Filesize

    168KB

    MD5

    5b914f9078cd5be1a32b580f6e90fad5

    SHA1

    265c67d0268949d90406ed2d6b2083c4cf91fdba

    SHA256

    5839e3842f5f2dcf9f7a4b0af16a1d602c2dc43bbd5226199d0785c5be7509b8

    SHA512

    b9274e5f343a43bbd3563b1b8a2c9e7a537333fb5f5be8173f1d13a90b1866357dc9efdbad7f3cf127f30de2732038df8348ca5c41d4d4c5a6634533248be628

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\o2295037.exe

    Filesize

    168KB

    MD5

    5b914f9078cd5be1a32b580f6e90fad5

    SHA1

    265c67d0268949d90406ed2d6b2083c4cf91fdba

    SHA256

    5839e3842f5f2dcf9f7a4b0af16a1d602c2dc43bbd5226199d0785c5be7509b8

    SHA512

    b9274e5f343a43bbd3563b1b8a2c9e7a537333fb5f5be8173f1d13a90b1866357dc9efdbad7f3cf127f30de2732038df8348ca5c41d4d4c5a6634533248be628

  • memory/1496-106-0x0000000001DD0000-0x0000000001DE2000-memory.dmp

    Filesize

    72KB

  • memory/1496-128-0x0000000001DD0000-0x0000000001DE2000-memory.dmp

    Filesize

    72KB

  • memory/1496-102-0x0000000001DD0000-0x0000000001DE2000-memory.dmp

    Filesize

    72KB

  • memory/1496-108-0x0000000001DD0000-0x0000000001DE2000-memory.dmp

    Filesize

    72KB

  • memory/1496-110-0x0000000001DD0000-0x0000000001DE2000-memory.dmp

    Filesize

    72KB

  • memory/1496-112-0x0000000001DD0000-0x0000000001DE2000-memory.dmp

    Filesize

    72KB

  • memory/1496-114-0x0000000001DD0000-0x0000000001DE2000-memory.dmp

    Filesize

    72KB

  • memory/1496-116-0x0000000001DD0000-0x0000000001DE2000-memory.dmp

    Filesize

    72KB

  • memory/1496-118-0x0000000001DD0000-0x0000000001DE2000-memory.dmp

    Filesize

    72KB

  • memory/1496-120-0x0000000001DD0000-0x0000000001DE2000-memory.dmp

    Filesize

    72KB

  • memory/1496-122-0x0000000001DD0000-0x0000000001DE2000-memory.dmp

    Filesize

    72KB

  • memory/1496-124-0x0000000001DD0000-0x0000000001DE2000-memory.dmp

    Filesize

    72KB

  • memory/1496-126-0x0000000001DD0000-0x0000000001DE2000-memory.dmp

    Filesize

    72KB

  • memory/1496-104-0x0000000001DD0000-0x0000000001DE2000-memory.dmp

    Filesize

    72KB

  • memory/1496-130-0x0000000004BD0000-0x0000000004C10000-memory.dmp

    Filesize

    256KB

  • memory/1496-129-0x0000000004BD0000-0x0000000004C10000-memory.dmp

    Filesize

    256KB

  • memory/1496-131-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/1496-132-0x0000000000250000-0x000000000027D000-memory.dmp

    Filesize

    180KB

  • memory/1496-136-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/1496-101-0x0000000001DD0000-0x0000000001DE2000-memory.dmp

    Filesize

    72KB

  • memory/1496-100-0x0000000001DD0000-0x0000000001DE8000-memory.dmp

    Filesize

    96KB

  • memory/1496-99-0x0000000000350000-0x000000000036A000-memory.dmp

    Filesize

    104KB

  • memory/1496-98-0x0000000000250000-0x000000000027D000-memory.dmp

    Filesize

    180KB

  • memory/1504-143-0x00000000010B0000-0x00000000010DE000-memory.dmp

    Filesize

    184KB

  • memory/1504-144-0x0000000000310000-0x0000000000316000-memory.dmp

    Filesize

    24KB

  • memory/1504-145-0x0000000001030000-0x0000000001070000-memory.dmp

    Filesize

    256KB

  • memory/1504-146-0x0000000001030000-0x0000000001070000-memory.dmp

    Filesize

    256KB