Analysis

  • max time kernel
    182s
  • max time network
    189s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 22:27

General

  • Target

    6f461b2a6c0a5543de355d2fe6cf7e4648274f50cdfc3638c4605eab4220981a.exe

  • Size

    976KB

  • MD5

    d664f278fdd4c7eb14f6e7dbc91aeab4

  • SHA1

    5a8c246893490b823ba22f36abe116cfea988e1d

  • SHA256

    6f461b2a6c0a5543de355d2fe6cf7e4648274f50cdfc3638c4605eab4220981a

  • SHA512

    11e9881bb061552d6344b35f68dbef734593bfc2dfea12062e48a9259f749c381f14cba87548627d52803d09f6c7e8b20e6bc5d53cabb6a86fe8ce3fd5bafa3d

  • SSDEEP

    24576:4yHqztUyYJZQkqlW8QzJJq/mm3Q+r9YDQJHtC:/CCyqqJQmum3Q+ruc

Malware Config

Extracted

Family

redline

Botnet

dark

C2

185.161.248.73:4164

Attributes
  • auth_value

    ae85b01f66afe8770afeed560513fc2d

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 11 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f461b2a6c0a5543de355d2fe6cf7e4648274f50cdfc3638c4605eab4220981a.exe
    "C:\Users\Admin\AppData\Local\Temp\6f461b2a6c0a5543de355d2fe6cf7e4648274f50cdfc3638c4605eab4220981a.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:880
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un341486.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un341486.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:844
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\10001243.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\10001243.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:320
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:624
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk942907.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk942907.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1504
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si896318.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si896318.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:896

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si896318.exe

          Filesize

          168KB

          MD5

          16cf18c8ef1d4be89b36e27c8fb88e9d

          SHA1

          7811ba84f75a1adc6d995c2c1121ec996d1cc003

          SHA256

          116156cc3af0bf4d81d9b2fba83c569cf9f4c9055b9c9cd5731538de036417e8

          SHA512

          4cb9e29db63d28c802c7c1799fd53e00b5facdc0b63d08b76d619c7a9be6cc06f11c0d435ad035bf3f9c3c96687e03e5157ae2ce7494a621c0762bc8083d9fbd

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si896318.exe

          Filesize

          168KB

          MD5

          16cf18c8ef1d4be89b36e27c8fb88e9d

          SHA1

          7811ba84f75a1adc6d995c2c1121ec996d1cc003

          SHA256

          116156cc3af0bf4d81d9b2fba83c569cf9f4c9055b9c9cd5731538de036417e8

          SHA512

          4cb9e29db63d28c802c7c1799fd53e00b5facdc0b63d08b76d619c7a9be6cc06f11c0d435ad035bf3f9c3c96687e03e5157ae2ce7494a621c0762bc8083d9fbd

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un341486.exe

          Filesize

          822KB

          MD5

          55d5546c2b39235f0dec7c5f8525b61c

          SHA1

          7ce22a322d9554fc92458a41fd0872d91ad30d4f

          SHA256

          95dd9be7600873bce8bc1d0da0e4faeabd4805551f30584115457fcf302eed23

          SHA512

          bd26741263c9aa8020dddfd001f0408d5a0e63162a13be211f5a21a812637926a073e233d2d5aa1c7552e2857617f6c687c868e05ca15a1c97a72af5ee561c6a

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un341486.exe

          Filesize

          822KB

          MD5

          55d5546c2b39235f0dec7c5f8525b61c

          SHA1

          7ce22a322d9554fc92458a41fd0872d91ad30d4f

          SHA256

          95dd9be7600873bce8bc1d0da0e4faeabd4805551f30584115457fcf302eed23

          SHA512

          bd26741263c9aa8020dddfd001f0408d5a0e63162a13be211f5a21a812637926a073e233d2d5aa1c7552e2857617f6c687c868e05ca15a1c97a72af5ee561c6a

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\10001243.exe

          Filesize

          528KB

          MD5

          4eb3338daef35283405d9311ac96c60e

          SHA1

          83a6704c65f894cf58c613da948eadfa55c0860b

          SHA256

          9fa176d96745949f59269ecf0972673a7c577ea92015bed42b4c7a05808ada71

          SHA512

          4688c1e8e36e54238bd68611bab009ef8430c1b59344a94861400179ac8694755411aede57bcbc22520edefb1eb0b54de1fcc25baf1bc64ff1dc4d20e8ff8179

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\10001243.exe

          Filesize

          528KB

          MD5

          4eb3338daef35283405d9311ac96c60e

          SHA1

          83a6704c65f894cf58c613da948eadfa55c0860b

          SHA256

          9fa176d96745949f59269ecf0972673a7c577ea92015bed42b4c7a05808ada71

          SHA512

          4688c1e8e36e54238bd68611bab009ef8430c1b59344a94861400179ac8694755411aede57bcbc22520edefb1eb0b54de1fcc25baf1bc64ff1dc4d20e8ff8179

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\10001243.exe

          Filesize

          528KB

          MD5

          4eb3338daef35283405d9311ac96c60e

          SHA1

          83a6704c65f894cf58c613da948eadfa55c0860b

          SHA256

          9fa176d96745949f59269ecf0972673a7c577ea92015bed42b4c7a05808ada71

          SHA512

          4688c1e8e36e54238bd68611bab009ef8430c1b59344a94861400179ac8694755411aede57bcbc22520edefb1eb0b54de1fcc25baf1bc64ff1dc4d20e8ff8179

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk942907.exe

          Filesize

          589KB

          MD5

          8c57c2cca4838933e611405874f1e06b

          SHA1

          baee3cf653d4ad4c4f570551a93d1b73e77e6e61

          SHA256

          f6252b2fb2e5dc5838881bb5264674a0420a474fe75c966a89189ab6c4a0367e

          SHA512

          0c9a26f8aae3aa5dd91228fdb12fefe42d211ba78ee050c9a08d3eece591c867e9fd9797813fbaae3152dafe5705c3374bf6a6c8ba65d9a7a245d4edbbc0b9f6

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk942907.exe

          Filesize

          589KB

          MD5

          8c57c2cca4838933e611405874f1e06b

          SHA1

          baee3cf653d4ad4c4f570551a93d1b73e77e6e61

          SHA256

          f6252b2fb2e5dc5838881bb5264674a0420a474fe75c966a89189ab6c4a0367e

          SHA512

          0c9a26f8aae3aa5dd91228fdb12fefe42d211ba78ee050c9a08d3eece591c867e9fd9797813fbaae3152dafe5705c3374bf6a6c8ba65d9a7a245d4edbbc0b9f6

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk942907.exe

          Filesize

          589KB

          MD5

          8c57c2cca4838933e611405874f1e06b

          SHA1

          baee3cf653d4ad4c4f570551a93d1b73e77e6e61

          SHA256

          f6252b2fb2e5dc5838881bb5264674a0420a474fe75c966a89189ab6c4a0367e

          SHA512

          0c9a26f8aae3aa5dd91228fdb12fefe42d211ba78ee050c9a08d3eece591c867e9fd9797813fbaae3152dafe5705c3374bf6a6c8ba65d9a7a245d4edbbc0b9f6

        • C:\Windows\Temp\1.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Windows\Temp\1.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\si896318.exe

          Filesize

          168KB

          MD5

          16cf18c8ef1d4be89b36e27c8fb88e9d

          SHA1

          7811ba84f75a1adc6d995c2c1121ec996d1cc003

          SHA256

          116156cc3af0bf4d81d9b2fba83c569cf9f4c9055b9c9cd5731538de036417e8

          SHA512

          4cb9e29db63d28c802c7c1799fd53e00b5facdc0b63d08b76d619c7a9be6cc06f11c0d435ad035bf3f9c3c96687e03e5157ae2ce7494a621c0762bc8083d9fbd

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\si896318.exe

          Filesize

          168KB

          MD5

          16cf18c8ef1d4be89b36e27c8fb88e9d

          SHA1

          7811ba84f75a1adc6d995c2c1121ec996d1cc003

          SHA256

          116156cc3af0bf4d81d9b2fba83c569cf9f4c9055b9c9cd5731538de036417e8

          SHA512

          4cb9e29db63d28c802c7c1799fd53e00b5facdc0b63d08b76d619c7a9be6cc06f11c0d435ad035bf3f9c3c96687e03e5157ae2ce7494a621c0762bc8083d9fbd

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un341486.exe

          Filesize

          822KB

          MD5

          55d5546c2b39235f0dec7c5f8525b61c

          SHA1

          7ce22a322d9554fc92458a41fd0872d91ad30d4f

          SHA256

          95dd9be7600873bce8bc1d0da0e4faeabd4805551f30584115457fcf302eed23

          SHA512

          bd26741263c9aa8020dddfd001f0408d5a0e63162a13be211f5a21a812637926a073e233d2d5aa1c7552e2857617f6c687c868e05ca15a1c97a72af5ee561c6a

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un341486.exe

          Filesize

          822KB

          MD5

          55d5546c2b39235f0dec7c5f8525b61c

          SHA1

          7ce22a322d9554fc92458a41fd0872d91ad30d4f

          SHA256

          95dd9be7600873bce8bc1d0da0e4faeabd4805551f30584115457fcf302eed23

          SHA512

          bd26741263c9aa8020dddfd001f0408d5a0e63162a13be211f5a21a812637926a073e233d2d5aa1c7552e2857617f6c687c868e05ca15a1c97a72af5ee561c6a

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\10001243.exe

          Filesize

          528KB

          MD5

          4eb3338daef35283405d9311ac96c60e

          SHA1

          83a6704c65f894cf58c613da948eadfa55c0860b

          SHA256

          9fa176d96745949f59269ecf0972673a7c577ea92015bed42b4c7a05808ada71

          SHA512

          4688c1e8e36e54238bd68611bab009ef8430c1b59344a94861400179ac8694755411aede57bcbc22520edefb1eb0b54de1fcc25baf1bc64ff1dc4d20e8ff8179

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\10001243.exe

          Filesize

          528KB

          MD5

          4eb3338daef35283405d9311ac96c60e

          SHA1

          83a6704c65f894cf58c613da948eadfa55c0860b

          SHA256

          9fa176d96745949f59269ecf0972673a7c577ea92015bed42b4c7a05808ada71

          SHA512

          4688c1e8e36e54238bd68611bab009ef8430c1b59344a94861400179ac8694755411aede57bcbc22520edefb1eb0b54de1fcc25baf1bc64ff1dc4d20e8ff8179

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\10001243.exe

          Filesize

          528KB

          MD5

          4eb3338daef35283405d9311ac96c60e

          SHA1

          83a6704c65f894cf58c613da948eadfa55c0860b

          SHA256

          9fa176d96745949f59269ecf0972673a7c577ea92015bed42b4c7a05808ada71

          SHA512

          4688c1e8e36e54238bd68611bab009ef8430c1b59344a94861400179ac8694755411aede57bcbc22520edefb1eb0b54de1fcc25baf1bc64ff1dc4d20e8ff8179

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk942907.exe

          Filesize

          589KB

          MD5

          8c57c2cca4838933e611405874f1e06b

          SHA1

          baee3cf653d4ad4c4f570551a93d1b73e77e6e61

          SHA256

          f6252b2fb2e5dc5838881bb5264674a0420a474fe75c966a89189ab6c4a0367e

          SHA512

          0c9a26f8aae3aa5dd91228fdb12fefe42d211ba78ee050c9a08d3eece591c867e9fd9797813fbaae3152dafe5705c3374bf6a6c8ba65d9a7a245d4edbbc0b9f6

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk942907.exe

          Filesize

          589KB

          MD5

          8c57c2cca4838933e611405874f1e06b

          SHA1

          baee3cf653d4ad4c4f570551a93d1b73e77e6e61

          SHA256

          f6252b2fb2e5dc5838881bb5264674a0420a474fe75c966a89189ab6c4a0367e

          SHA512

          0c9a26f8aae3aa5dd91228fdb12fefe42d211ba78ee050c9a08d3eece591c867e9fd9797813fbaae3152dafe5705c3374bf6a6c8ba65d9a7a245d4edbbc0b9f6

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk942907.exe

          Filesize

          589KB

          MD5

          8c57c2cca4838933e611405874f1e06b

          SHA1

          baee3cf653d4ad4c4f570551a93d1b73e77e6e61

          SHA256

          f6252b2fb2e5dc5838881bb5264674a0420a474fe75c966a89189ab6c4a0367e

          SHA512

          0c9a26f8aae3aa5dd91228fdb12fefe42d211ba78ee050c9a08d3eece591c867e9fd9797813fbaae3152dafe5705c3374bf6a6c8ba65d9a7a245d4edbbc0b9f6

        • \Windows\Temp\1.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • memory/320-93-0x0000000002750000-0x00000000027A1000-memory.dmp

          Filesize

          324KB

        • memory/320-99-0x0000000002750000-0x00000000027A1000-memory.dmp

          Filesize

          324KB

        • memory/320-103-0x0000000002750000-0x00000000027A1000-memory.dmp

          Filesize

          324KB

        • memory/320-105-0x0000000002750000-0x00000000027A1000-memory.dmp

          Filesize

          324KB

        • memory/320-107-0x0000000002750000-0x00000000027A1000-memory.dmp

          Filesize

          324KB

        • memory/320-109-0x0000000002750000-0x00000000027A1000-memory.dmp

          Filesize

          324KB

        • memory/320-111-0x0000000002750000-0x00000000027A1000-memory.dmp

          Filesize

          324KB

        • memory/320-113-0x0000000002750000-0x00000000027A1000-memory.dmp

          Filesize

          324KB

        • memory/320-117-0x0000000002750000-0x00000000027A1000-memory.dmp

          Filesize

          324KB

        • memory/320-115-0x0000000002750000-0x00000000027A1000-memory.dmp

          Filesize

          324KB

        • memory/320-121-0x0000000002750000-0x00000000027A1000-memory.dmp

          Filesize

          324KB

        • memory/320-123-0x0000000002750000-0x00000000027A1000-memory.dmp

          Filesize

          324KB

        • memory/320-119-0x0000000002750000-0x00000000027A1000-memory.dmp

          Filesize

          324KB

        • memory/320-127-0x0000000002750000-0x00000000027A1000-memory.dmp

          Filesize

          324KB

        • memory/320-125-0x0000000002750000-0x00000000027A1000-memory.dmp

          Filesize

          324KB

        • memory/320-131-0x0000000002750000-0x00000000027A1000-memory.dmp

          Filesize

          324KB

        • memory/320-129-0x0000000002750000-0x00000000027A1000-memory.dmp

          Filesize

          324KB

        • memory/320-137-0x0000000002750000-0x00000000027A1000-memory.dmp

          Filesize

          324KB

        • memory/320-135-0x0000000002750000-0x00000000027A1000-memory.dmp

          Filesize

          324KB

        • memory/320-133-0x0000000002750000-0x00000000027A1000-memory.dmp

          Filesize

          324KB

        • memory/320-141-0x0000000002750000-0x00000000027A1000-memory.dmp

          Filesize

          324KB

        • memory/320-139-0x0000000002750000-0x00000000027A1000-memory.dmp

          Filesize

          324KB

        • memory/320-143-0x0000000002750000-0x00000000027A1000-memory.dmp

          Filesize

          324KB

        • memory/320-145-0x0000000002750000-0x00000000027A1000-memory.dmp

          Filesize

          324KB

        • memory/320-2210-0x00000000008D0000-0x00000000008DA000-memory.dmp

          Filesize

          40KB

        • memory/320-101-0x0000000002750000-0x00000000027A1000-memory.dmp

          Filesize

          324KB

        • memory/320-95-0x0000000002750000-0x00000000027A1000-memory.dmp

          Filesize

          324KB

        • memory/320-97-0x0000000002750000-0x00000000027A1000-memory.dmp

          Filesize

          324KB

        • memory/320-89-0x0000000002750000-0x00000000027A1000-memory.dmp

          Filesize

          324KB

        • memory/320-91-0x0000000002750000-0x00000000027A1000-memory.dmp

          Filesize

          324KB

        • memory/320-87-0x0000000002750000-0x00000000027A1000-memory.dmp

          Filesize

          324KB

        • memory/320-85-0x0000000002750000-0x00000000027A1000-memory.dmp

          Filesize

          324KB

        • memory/320-83-0x0000000002750000-0x00000000027A1000-memory.dmp

          Filesize

          324KB

        • memory/320-82-0x0000000002750000-0x00000000027A1000-memory.dmp

          Filesize

          324KB

        • memory/320-78-0x0000000002670000-0x00000000026C8000-memory.dmp

          Filesize

          352KB

        • memory/320-79-0x0000000002750000-0x00000000027A6000-memory.dmp

          Filesize

          344KB

        • memory/320-80-0x0000000000240000-0x000000000028C000-memory.dmp

          Filesize

          304KB

        • memory/320-81-0x0000000004E80000-0x0000000004EC0000-memory.dmp

          Filesize

          256KB

        • memory/624-2227-0x0000000000A10000-0x0000000000A1A000-memory.dmp

          Filesize

          40KB

        • memory/896-4390-0x0000000000DF0000-0x0000000000E20000-memory.dmp

          Filesize

          192KB

        • memory/896-4391-0x0000000000580000-0x0000000000586000-memory.dmp

          Filesize

          24KB

        • memory/896-4392-0x00000000008A0000-0x00000000008E0000-memory.dmp

          Filesize

          256KB

        • memory/896-4393-0x00000000008A0000-0x00000000008E0000-memory.dmp

          Filesize

          256KB

        • memory/1504-2748-0x0000000005040000-0x0000000005080000-memory.dmp

          Filesize

          256KB

        • memory/1504-2750-0x0000000005040000-0x0000000005080000-memory.dmp

          Filesize

          256KB

        • memory/1504-4380-0x0000000002640000-0x0000000002672000-memory.dmp

          Filesize

          200KB

        • memory/1504-4381-0x0000000005040000-0x0000000005080000-memory.dmp

          Filesize

          256KB

        • memory/1504-2746-0x0000000000260000-0x00000000002BB000-memory.dmp

          Filesize

          364KB

        • memory/1504-2230-0x00000000025E0000-0x0000000002646000-memory.dmp

          Filesize

          408KB

        • memory/1504-2229-0x0000000002510000-0x0000000002578000-memory.dmp

          Filesize

          416KB