Analysis

  • max time kernel
    147s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 22:42

General

  • Target

    06686d082ee968ec1eb61a35e4ea6bd0a1677649afc4896bb05c35d44c28a828.exe

  • Size

    923KB

  • MD5

    e1bbf84bca043cfb5f635688d3510e6e

  • SHA1

    df8343e15187721cc6e30289243a4f3ca957ce2b

  • SHA256

    06686d082ee968ec1eb61a35e4ea6bd0a1677649afc4896bb05c35d44c28a828

  • SHA512

    88adb2205dce95202fcdfb4f6c40abd8c909c2e6363a7205b6862270da356e06aac01a7cdd1fe6f471aec5dbf4ccd606102b10a40b38e7d38d45628d1b20200d

  • SSDEEP

    24576:AyS/I+ln8IbgUfrgJD2V11rkC188T4l3TYainP1SS:HPUnhLIujrTRT4ljenP

Malware Config

Extracted

Family

redline

Botnet

lupa

C2

217.196.96.56:4138

Attributes
  • auth_value

    fcb02fce9bc10c56a9841d56974bd7b8

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 11 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06686d082ee968ec1eb61a35e4ea6bd0a1677649afc4896bb05c35d44c28a828.exe
    "C:\Users\Admin\AppData\Local\Temp\06686d082ee968ec1eb61a35e4ea6bd0a1677649afc4896bb05c35d44c28a828.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3345017.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3345017.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1964
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9394679.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9394679.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1056
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6475234.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6475234.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1096
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n3155638.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n3155638.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:936
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o1891181.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o1891181.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1052

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3345017.exe

          Filesize

          769KB

          MD5

          fe8c4be477cf82cb0546cbbced4cdb6a

          SHA1

          00b32d7d2a6a4adc46b546d279b1bba799f7950e

          SHA256

          ddbd2a5a7fe40cd3368858f51b207c159ad5a84286d8e3ac9f8232154bea427d

          SHA512

          e8f0ec157ed117b3a313b9c46491a4c6899cdaf02b7cbf77d3086824644ed496842de5e0c4de2ff3a43b2f7c01a19d0e2c6fa9ba6952f3d9551e159324ef7847

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3345017.exe

          Filesize

          769KB

          MD5

          fe8c4be477cf82cb0546cbbced4cdb6a

          SHA1

          00b32d7d2a6a4adc46b546d279b1bba799f7950e

          SHA256

          ddbd2a5a7fe40cd3368858f51b207c159ad5a84286d8e3ac9f8232154bea427d

          SHA512

          e8f0ec157ed117b3a313b9c46491a4c6899cdaf02b7cbf77d3086824644ed496842de5e0c4de2ff3a43b2f7c01a19d0e2c6fa9ba6952f3d9551e159324ef7847

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9394679.exe

          Filesize

          587KB

          MD5

          b4dc0f3a670043f76f75f7c5fb936080

          SHA1

          cae4082e15915d70e3fcc7f4db768c746753531d

          SHA256

          d4c5df6d558b217b3858edc1964944a28fa8e066b089bab3397b71596022b104

          SHA512

          969f30f8707dff518a5cd722e975021e4139e21615ef36c2d1abc536d0be0a0be5c960789d99397c0b8d45c2dff62c8b38b5a38485dc13590b13dc5a9946156b

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9394679.exe

          Filesize

          587KB

          MD5

          b4dc0f3a670043f76f75f7c5fb936080

          SHA1

          cae4082e15915d70e3fcc7f4db768c746753531d

          SHA256

          d4c5df6d558b217b3858edc1964944a28fa8e066b089bab3397b71596022b104

          SHA512

          969f30f8707dff518a5cd722e975021e4139e21615ef36c2d1abc536d0be0a0be5c960789d99397c0b8d45c2dff62c8b38b5a38485dc13590b13dc5a9946156b

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6475234.exe

          Filesize

          383KB

          MD5

          3e96672d42377b33e8f6c194b525044b

          SHA1

          29a3a64cf2f8c21074f27018a8dc59ed02d70702

          SHA256

          fa2e8a6463dfd90cffbe6bd75615cb92e1e2a29b7245d856c9482b42f2a90a5b

          SHA512

          67c2d24e09e6a7a5d1882f6dabdea28b12b5d2be1c19b8d02f7794cde426cb59bc053505b0376771613fbce6cf431cd90c781204c7eacc77eebe5a598c93a213

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6475234.exe

          Filesize

          383KB

          MD5

          3e96672d42377b33e8f6c194b525044b

          SHA1

          29a3a64cf2f8c21074f27018a8dc59ed02d70702

          SHA256

          fa2e8a6463dfd90cffbe6bd75615cb92e1e2a29b7245d856c9482b42f2a90a5b

          SHA512

          67c2d24e09e6a7a5d1882f6dabdea28b12b5d2be1c19b8d02f7794cde426cb59bc053505b0376771613fbce6cf431cd90c781204c7eacc77eebe5a598c93a213

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n3155638.exe

          Filesize

          283KB

          MD5

          65d19ea339911c94b1549c8bb4aca41a

          SHA1

          21eacbdc813a6da558dfa501931870896496bdf5

          SHA256

          ac9599ad806bb46046c8deb66b86fa54f3d3e494bfc21ca84c2f120930076b64

          SHA512

          67642c6d99168de6053cb818154adb01f6a8786ec7bca987ac6c51936a80832d46e8bea1fc9dbe7d794c270850ead6a58d4b3d901043c9c0f45346095cafc157

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n3155638.exe

          Filesize

          283KB

          MD5

          65d19ea339911c94b1549c8bb4aca41a

          SHA1

          21eacbdc813a6da558dfa501931870896496bdf5

          SHA256

          ac9599ad806bb46046c8deb66b86fa54f3d3e494bfc21ca84c2f120930076b64

          SHA512

          67642c6d99168de6053cb818154adb01f6a8786ec7bca987ac6c51936a80832d46e8bea1fc9dbe7d794c270850ead6a58d4b3d901043c9c0f45346095cafc157

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n3155638.exe

          Filesize

          283KB

          MD5

          65d19ea339911c94b1549c8bb4aca41a

          SHA1

          21eacbdc813a6da558dfa501931870896496bdf5

          SHA256

          ac9599ad806bb46046c8deb66b86fa54f3d3e494bfc21ca84c2f120930076b64

          SHA512

          67642c6d99168de6053cb818154adb01f6a8786ec7bca987ac6c51936a80832d46e8bea1fc9dbe7d794c270850ead6a58d4b3d901043c9c0f45346095cafc157

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o1891181.exe

          Filesize

          168KB

          MD5

          55e148536b96cf7b87bf573b5f3da1d1

          SHA1

          e7ad5cef0bce14aba3d38bfefcc189f3da87ff3d

          SHA256

          c0de614d94efc776ec414f71288103b1f1a3cbca88a43e789cd201edf070ed77

          SHA512

          b2a201297fb65fdb77480315b4553c7be43e9d273dd04951a36c3bbd9ad6f29bfc738d74cfdafd96301c043f2b7243b5e4fc6ccab1f44edad8b98ad8ae26a9b4

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o1891181.exe

          Filesize

          168KB

          MD5

          55e148536b96cf7b87bf573b5f3da1d1

          SHA1

          e7ad5cef0bce14aba3d38bfefcc189f3da87ff3d

          SHA256

          c0de614d94efc776ec414f71288103b1f1a3cbca88a43e789cd201edf070ed77

          SHA512

          b2a201297fb65fdb77480315b4553c7be43e9d273dd04951a36c3bbd9ad6f29bfc738d74cfdafd96301c043f2b7243b5e4fc6ccab1f44edad8b98ad8ae26a9b4

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o1891181.exe

          Filesize

          168KB

          MD5

          55e148536b96cf7b87bf573b5f3da1d1

          SHA1

          e7ad5cef0bce14aba3d38bfefcc189f3da87ff3d

          SHA256

          c0de614d94efc776ec414f71288103b1f1a3cbca88a43e789cd201edf070ed77

          SHA512

          b2a201297fb65fdb77480315b4553c7be43e9d273dd04951a36c3bbd9ad6f29bfc738d74cfdafd96301c043f2b7243b5e4fc6ccab1f44edad8b98ad8ae26a9b4

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z3345017.exe

          Filesize

          769KB

          MD5

          fe8c4be477cf82cb0546cbbced4cdb6a

          SHA1

          00b32d7d2a6a4adc46b546d279b1bba799f7950e

          SHA256

          ddbd2a5a7fe40cd3368858f51b207c159ad5a84286d8e3ac9f8232154bea427d

          SHA512

          e8f0ec157ed117b3a313b9c46491a4c6899cdaf02b7cbf77d3086824644ed496842de5e0c4de2ff3a43b2f7c01a19d0e2c6fa9ba6952f3d9551e159324ef7847

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z3345017.exe

          Filesize

          769KB

          MD5

          fe8c4be477cf82cb0546cbbced4cdb6a

          SHA1

          00b32d7d2a6a4adc46b546d279b1bba799f7950e

          SHA256

          ddbd2a5a7fe40cd3368858f51b207c159ad5a84286d8e3ac9f8232154bea427d

          SHA512

          e8f0ec157ed117b3a313b9c46491a4c6899cdaf02b7cbf77d3086824644ed496842de5e0c4de2ff3a43b2f7c01a19d0e2c6fa9ba6952f3d9551e159324ef7847

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z9394679.exe

          Filesize

          587KB

          MD5

          b4dc0f3a670043f76f75f7c5fb936080

          SHA1

          cae4082e15915d70e3fcc7f4db768c746753531d

          SHA256

          d4c5df6d558b217b3858edc1964944a28fa8e066b089bab3397b71596022b104

          SHA512

          969f30f8707dff518a5cd722e975021e4139e21615ef36c2d1abc536d0be0a0be5c960789d99397c0b8d45c2dff62c8b38b5a38485dc13590b13dc5a9946156b

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z9394679.exe

          Filesize

          587KB

          MD5

          b4dc0f3a670043f76f75f7c5fb936080

          SHA1

          cae4082e15915d70e3fcc7f4db768c746753531d

          SHA256

          d4c5df6d558b217b3858edc1964944a28fa8e066b089bab3397b71596022b104

          SHA512

          969f30f8707dff518a5cd722e975021e4139e21615ef36c2d1abc536d0be0a0be5c960789d99397c0b8d45c2dff62c8b38b5a38485dc13590b13dc5a9946156b

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z6475234.exe

          Filesize

          383KB

          MD5

          3e96672d42377b33e8f6c194b525044b

          SHA1

          29a3a64cf2f8c21074f27018a8dc59ed02d70702

          SHA256

          fa2e8a6463dfd90cffbe6bd75615cb92e1e2a29b7245d856c9482b42f2a90a5b

          SHA512

          67c2d24e09e6a7a5d1882f6dabdea28b12b5d2be1c19b8d02f7794cde426cb59bc053505b0376771613fbce6cf431cd90c781204c7eacc77eebe5a598c93a213

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z6475234.exe

          Filesize

          383KB

          MD5

          3e96672d42377b33e8f6c194b525044b

          SHA1

          29a3a64cf2f8c21074f27018a8dc59ed02d70702

          SHA256

          fa2e8a6463dfd90cffbe6bd75615cb92e1e2a29b7245d856c9482b42f2a90a5b

          SHA512

          67c2d24e09e6a7a5d1882f6dabdea28b12b5d2be1c19b8d02f7794cde426cb59bc053505b0376771613fbce6cf431cd90c781204c7eacc77eebe5a598c93a213

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\n3155638.exe

          Filesize

          283KB

          MD5

          65d19ea339911c94b1549c8bb4aca41a

          SHA1

          21eacbdc813a6da558dfa501931870896496bdf5

          SHA256

          ac9599ad806bb46046c8deb66b86fa54f3d3e494bfc21ca84c2f120930076b64

          SHA512

          67642c6d99168de6053cb818154adb01f6a8786ec7bca987ac6c51936a80832d46e8bea1fc9dbe7d794c270850ead6a58d4b3d901043c9c0f45346095cafc157

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\n3155638.exe

          Filesize

          283KB

          MD5

          65d19ea339911c94b1549c8bb4aca41a

          SHA1

          21eacbdc813a6da558dfa501931870896496bdf5

          SHA256

          ac9599ad806bb46046c8deb66b86fa54f3d3e494bfc21ca84c2f120930076b64

          SHA512

          67642c6d99168de6053cb818154adb01f6a8786ec7bca987ac6c51936a80832d46e8bea1fc9dbe7d794c270850ead6a58d4b3d901043c9c0f45346095cafc157

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\n3155638.exe

          Filesize

          283KB

          MD5

          65d19ea339911c94b1549c8bb4aca41a

          SHA1

          21eacbdc813a6da558dfa501931870896496bdf5

          SHA256

          ac9599ad806bb46046c8deb66b86fa54f3d3e494bfc21ca84c2f120930076b64

          SHA512

          67642c6d99168de6053cb818154adb01f6a8786ec7bca987ac6c51936a80832d46e8bea1fc9dbe7d794c270850ead6a58d4b3d901043c9c0f45346095cafc157

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\o1891181.exe

          Filesize

          168KB

          MD5

          55e148536b96cf7b87bf573b5f3da1d1

          SHA1

          e7ad5cef0bce14aba3d38bfefcc189f3da87ff3d

          SHA256

          c0de614d94efc776ec414f71288103b1f1a3cbca88a43e789cd201edf070ed77

          SHA512

          b2a201297fb65fdb77480315b4553c7be43e9d273dd04951a36c3bbd9ad6f29bfc738d74cfdafd96301c043f2b7243b5e4fc6ccab1f44edad8b98ad8ae26a9b4

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\o1891181.exe

          Filesize

          168KB

          MD5

          55e148536b96cf7b87bf573b5f3da1d1

          SHA1

          e7ad5cef0bce14aba3d38bfefcc189f3da87ff3d

          SHA256

          c0de614d94efc776ec414f71288103b1f1a3cbca88a43e789cd201edf070ed77

          SHA512

          b2a201297fb65fdb77480315b4553c7be43e9d273dd04951a36c3bbd9ad6f29bfc738d74cfdafd96301c043f2b7243b5e4fc6ccab1f44edad8b98ad8ae26a9b4

        • memory/936-104-0x00000000006E0000-0x00000000006F2000-memory.dmp

          Filesize

          72KB

        • memory/936-128-0x00000000006E0000-0x00000000006F2000-memory.dmp

          Filesize

          72KB

        • memory/936-106-0x00000000006E0000-0x00000000006F2000-memory.dmp

          Filesize

          72KB

        • memory/936-108-0x00000000006E0000-0x00000000006F2000-memory.dmp

          Filesize

          72KB

        • memory/936-110-0x00000000006E0000-0x00000000006F2000-memory.dmp

          Filesize

          72KB

        • memory/936-112-0x00000000006E0000-0x00000000006F2000-memory.dmp

          Filesize

          72KB

        • memory/936-114-0x00000000006E0000-0x00000000006F2000-memory.dmp

          Filesize

          72KB

        • memory/936-116-0x00000000006E0000-0x00000000006F2000-memory.dmp

          Filesize

          72KB

        • memory/936-118-0x00000000006E0000-0x00000000006F2000-memory.dmp

          Filesize

          72KB

        • memory/936-120-0x00000000006E0000-0x00000000006F2000-memory.dmp

          Filesize

          72KB

        • memory/936-122-0x00000000006E0000-0x00000000006F2000-memory.dmp

          Filesize

          72KB

        • memory/936-124-0x00000000006E0000-0x00000000006F2000-memory.dmp

          Filesize

          72KB

        • memory/936-126-0x00000000006E0000-0x00000000006F2000-memory.dmp

          Filesize

          72KB

        • memory/936-103-0x00000000006E0000-0x00000000006F2000-memory.dmp

          Filesize

          72KB

        • memory/936-130-0x00000000006E0000-0x00000000006F2000-memory.dmp

          Filesize

          72KB

        • memory/936-131-0x0000000000400000-0x00000000006C7000-memory.dmp

          Filesize

          2.8MB

        • memory/936-133-0x0000000000400000-0x00000000006C7000-memory.dmp

          Filesize

          2.8MB

        • memory/936-102-0x00000000006E0000-0x00000000006F8000-memory.dmp

          Filesize

          96KB

        • memory/936-100-0x0000000004D60000-0x0000000004DA0000-memory.dmp

          Filesize

          256KB

        • memory/936-101-0x0000000004D60000-0x0000000004DA0000-memory.dmp

          Filesize

          256KB

        • memory/936-99-0x00000000003C0000-0x00000000003DA000-memory.dmp

          Filesize

          104KB

        • memory/936-98-0x00000000002D0000-0x00000000002FD000-memory.dmp

          Filesize

          180KB

        • memory/1052-140-0x0000000000320000-0x000000000034E000-memory.dmp

          Filesize

          184KB

        • memory/1052-141-0x00000000002D0000-0x00000000002D6000-memory.dmp

          Filesize

          24KB

        • memory/1052-142-0x0000000004BE0000-0x0000000004C20000-memory.dmp

          Filesize

          256KB

        • memory/1052-143-0x0000000004BE0000-0x0000000004C20000-memory.dmp

          Filesize

          256KB