Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 20:18

General

  • Target

    0682776c3f3712e96fad5e39c305e367.exe

  • Size

    1.5MB

  • MD5

    0682776c3f3712e96fad5e39c305e367

  • SHA1

    6e1de890cf9d8597f3087bb096dfc8c4cebad33a

  • SHA256

    3cbb4d611c6a1ecc866aa6b754c18ad59d5d5cee34e62952f9cbba5161df322a

  • SHA512

    d0e51c1f0bae66f5d6ff443406fac535c336885d9624ffe4f27f51e10bc4549e99b3b8533df500538535f5bf1955e82fde6c8a3cca49cab4fe219076c99ee89e

  • SSDEEP

    24576:KyWNKPiwXUiMsVeQuMvj4ylCH1GF6ZY1N9wTXYjNKtayaSu/e7bEtcQ+0a3XV3du:RJiwXUiMsgdFwCy6Zw9wXtjiUEcfhnF

Malware Config

Extracted

Family

redline

Botnet

mazda

C2

217.196.96.56:4138

Attributes
  • auth_value

    3d2870537d84a4c6d7aeecd002871c51

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0682776c3f3712e96fad5e39c305e367.exe
    "C:\Users\Admin\AppData\Local\Temp\0682776c3f3712e96fad5e39c305e367.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1408
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3081334.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3081334.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1684
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1430661.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1430661.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1108
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4221566.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4221566.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:860
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8510283.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8510283.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1764
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a0441326.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a0441326.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Loads dropped DLL
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:824
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b7669377.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b7669377.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:944

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3081334.exe

    Filesize

    1.3MB

    MD5

    469df909bed6062a67cdb790d4e8dfc8

    SHA1

    8b5d9ec5733da545c6f03a71abd1c4a8c2fe898b

    SHA256

    756287ec466985793e12452bfb4d3a6e7ea2bc5561527bcc9a9b71bd741c2715

    SHA512

    0ecddeb817bf6cda56704f10290239137ae346e2fd72527470be100447549f7fb8b305494766dcf08f133ed6af05ec43988909ffda3a6843ccac4640a9632108

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3081334.exe

    Filesize

    1.3MB

    MD5

    469df909bed6062a67cdb790d4e8dfc8

    SHA1

    8b5d9ec5733da545c6f03a71abd1c4a8c2fe898b

    SHA256

    756287ec466985793e12452bfb4d3a6e7ea2bc5561527bcc9a9b71bd741c2715

    SHA512

    0ecddeb817bf6cda56704f10290239137ae346e2fd72527470be100447549f7fb8b305494766dcf08f133ed6af05ec43988909ffda3a6843ccac4640a9632108

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1430661.exe

    Filesize

    867KB

    MD5

    de394b0f7eacc4b40723a79ec88b99c8

    SHA1

    f55d1bac69f23c3f0c17f6c34c7cb8335cb28f58

    SHA256

    4d2a19d8498925c8f0034f7112d0fec4140288d689ea1a79972f7bcea292f23b

    SHA512

    12fa302ce9a8f7fad256283425cb947b7a0e3531b9a8adb40d8a8257ba399c83e5605ba8f87aaaaf8052a73863bb5abb1d45724c089e050b70214f460f57ca9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1430661.exe

    Filesize

    867KB

    MD5

    de394b0f7eacc4b40723a79ec88b99c8

    SHA1

    f55d1bac69f23c3f0c17f6c34c7cb8335cb28f58

    SHA256

    4d2a19d8498925c8f0034f7112d0fec4140288d689ea1a79972f7bcea292f23b

    SHA512

    12fa302ce9a8f7fad256283425cb947b7a0e3531b9a8adb40d8a8257ba399c83e5605ba8f87aaaaf8052a73863bb5abb1d45724c089e050b70214f460f57ca9f

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4221566.exe

    Filesize

    664KB

    MD5

    609d998516c5e61b81c84eb5ac9fc47f

    SHA1

    6c7d7321709e6868028270a74c5782d469a312ce

    SHA256

    aa354b633796b0f6f1e95e58a94ecc3e73ebd7d4854353263945ad7394474802

    SHA512

    24b1fb50ab3856ffd4157cd15ae1530b5b46d5b256dc7fe38a63e52b1b341c96a12649ace52f688922eaedc3a478913ecada03ebb8983309096f590c2b8d3f81

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4221566.exe

    Filesize

    664KB

    MD5

    609d998516c5e61b81c84eb5ac9fc47f

    SHA1

    6c7d7321709e6868028270a74c5782d469a312ce

    SHA256

    aa354b633796b0f6f1e95e58a94ecc3e73ebd7d4854353263945ad7394474802

    SHA512

    24b1fb50ab3856ffd4157cd15ae1530b5b46d5b256dc7fe38a63e52b1b341c96a12649ace52f688922eaedc3a478913ecada03ebb8983309096f590c2b8d3f81

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8510283.exe

    Filesize

    394KB

    MD5

    d482f1054107477f6c31b8082a4eb869

    SHA1

    90a29b8ca35ff1e0f3c2bb49399fd2f89af17c74

    SHA256

    99e8a9c5120b325aa7e97c9180e4610799a49b223fc41ebfb16d5444d0dbfedc

    SHA512

    66ee8bb38f030c3344eb841ce967e4187c690db120675a711eca1ac1e3ef3f47be70b5225ef87ee9aa7d0ddb97667dbfcb345733c121b1d83e7977165fa65079

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8510283.exe

    Filesize

    394KB

    MD5

    d482f1054107477f6c31b8082a4eb869

    SHA1

    90a29b8ca35ff1e0f3c2bb49399fd2f89af17c74

    SHA256

    99e8a9c5120b325aa7e97c9180e4610799a49b223fc41ebfb16d5444d0dbfedc

    SHA512

    66ee8bb38f030c3344eb841ce967e4187c690db120675a711eca1ac1e3ef3f47be70b5225ef87ee9aa7d0ddb97667dbfcb345733c121b1d83e7977165fa65079

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a0441326.exe

    Filesize

    315KB

    MD5

    cbdc8d4a1501154a08bd6f1eba38ad3f

    SHA1

    0f0b2cdea468e032059e9f41434ca3d2c72dc99e

    SHA256

    fd4e13b15227771c2ad7380c5ab533882d187dd35cbaa42c7678dd2f769a752c

    SHA512

    6fd4cf59e7e29c4e7aaa5db7963f11ea2d1bb586c43e7decbce1fc5fef2115ff7516a07af3c8006ff27056e44863496c922df958811594d88d2d10ea94840f95

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a0441326.exe

    Filesize

    315KB

    MD5

    cbdc8d4a1501154a08bd6f1eba38ad3f

    SHA1

    0f0b2cdea468e032059e9f41434ca3d2c72dc99e

    SHA256

    fd4e13b15227771c2ad7380c5ab533882d187dd35cbaa42c7678dd2f769a752c

    SHA512

    6fd4cf59e7e29c4e7aaa5db7963f11ea2d1bb586c43e7decbce1fc5fef2115ff7516a07af3c8006ff27056e44863496c922df958811594d88d2d10ea94840f95

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a0441326.exe

    Filesize

    315KB

    MD5

    cbdc8d4a1501154a08bd6f1eba38ad3f

    SHA1

    0f0b2cdea468e032059e9f41434ca3d2c72dc99e

    SHA256

    fd4e13b15227771c2ad7380c5ab533882d187dd35cbaa42c7678dd2f769a752c

    SHA512

    6fd4cf59e7e29c4e7aaa5db7963f11ea2d1bb586c43e7decbce1fc5fef2115ff7516a07af3c8006ff27056e44863496c922df958811594d88d2d10ea94840f95

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b7669377.exe

    Filesize

    168KB

    MD5

    fd56235f8cda5c872f3564f70d4dbcca

    SHA1

    0a3e47ada5f00765c39e08b6e593ef05e7b0ddc4

    SHA256

    7f75425881ca14248394c4e29802f3441f47187dcebb027da70e099729de8a86

    SHA512

    bb2f54d17ebf63a42fed3923e03359d090b6fe67638ee193c233fbbab0f61b60be92e2b71e8950993371b78bcea69f53678f46020a4d7f752b96f8185fee50e6

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b7669377.exe

    Filesize

    168KB

    MD5

    fd56235f8cda5c872f3564f70d4dbcca

    SHA1

    0a3e47ada5f00765c39e08b6e593ef05e7b0ddc4

    SHA256

    7f75425881ca14248394c4e29802f3441f47187dcebb027da70e099729de8a86

    SHA512

    bb2f54d17ebf63a42fed3923e03359d090b6fe67638ee193c233fbbab0f61b60be92e2b71e8950993371b78bcea69f53678f46020a4d7f752b96f8185fee50e6

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v3081334.exe

    Filesize

    1.3MB

    MD5

    469df909bed6062a67cdb790d4e8dfc8

    SHA1

    8b5d9ec5733da545c6f03a71abd1c4a8c2fe898b

    SHA256

    756287ec466985793e12452bfb4d3a6e7ea2bc5561527bcc9a9b71bd741c2715

    SHA512

    0ecddeb817bf6cda56704f10290239137ae346e2fd72527470be100447549f7fb8b305494766dcf08f133ed6af05ec43988909ffda3a6843ccac4640a9632108

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v3081334.exe

    Filesize

    1.3MB

    MD5

    469df909bed6062a67cdb790d4e8dfc8

    SHA1

    8b5d9ec5733da545c6f03a71abd1c4a8c2fe898b

    SHA256

    756287ec466985793e12452bfb4d3a6e7ea2bc5561527bcc9a9b71bd741c2715

    SHA512

    0ecddeb817bf6cda56704f10290239137ae346e2fd72527470be100447549f7fb8b305494766dcf08f133ed6af05ec43988909ffda3a6843ccac4640a9632108

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v1430661.exe

    Filesize

    867KB

    MD5

    de394b0f7eacc4b40723a79ec88b99c8

    SHA1

    f55d1bac69f23c3f0c17f6c34c7cb8335cb28f58

    SHA256

    4d2a19d8498925c8f0034f7112d0fec4140288d689ea1a79972f7bcea292f23b

    SHA512

    12fa302ce9a8f7fad256283425cb947b7a0e3531b9a8adb40d8a8257ba399c83e5605ba8f87aaaaf8052a73863bb5abb1d45724c089e050b70214f460f57ca9f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v1430661.exe

    Filesize

    867KB

    MD5

    de394b0f7eacc4b40723a79ec88b99c8

    SHA1

    f55d1bac69f23c3f0c17f6c34c7cb8335cb28f58

    SHA256

    4d2a19d8498925c8f0034f7112d0fec4140288d689ea1a79972f7bcea292f23b

    SHA512

    12fa302ce9a8f7fad256283425cb947b7a0e3531b9a8adb40d8a8257ba399c83e5605ba8f87aaaaf8052a73863bb5abb1d45724c089e050b70214f460f57ca9f

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v4221566.exe

    Filesize

    664KB

    MD5

    609d998516c5e61b81c84eb5ac9fc47f

    SHA1

    6c7d7321709e6868028270a74c5782d469a312ce

    SHA256

    aa354b633796b0f6f1e95e58a94ecc3e73ebd7d4854353263945ad7394474802

    SHA512

    24b1fb50ab3856ffd4157cd15ae1530b5b46d5b256dc7fe38a63e52b1b341c96a12649ace52f688922eaedc3a478913ecada03ebb8983309096f590c2b8d3f81

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v4221566.exe

    Filesize

    664KB

    MD5

    609d998516c5e61b81c84eb5ac9fc47f

    SHA1

    6c7d7321709e6868028270a74c5782d469a312ce

    SHA256

    aa354b633796b0f6f1e95e58a94ecc3e73ebd7d4854353263945ad7394474802

    SHA512

    24b1fb50ab3856ffd4157cd15ae1530b5b46d5b256dc7fe38a63e52b1b341c96a12649ace52f688922eaedc3a478913ecada03ebb8983309096f590c2b8d3f81

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v8510283.exe

    Filesize

    394KB

    MD5

    d482f1054107477f6c31b8082a4eb869

    SHA1

    90a29b8ca35ff1e0f3c2bb49399fd2f89af17c74

    SHA256

    99e8a9c5120b325aa7e97c9180e4610799a49b223fc41ebfb16d5444d0dbfedc

    SHA512

    66ee8bb38f030c3344eb841ce967e4187c690db120675a711eca1ac1e3ef3f47be70b5225ef87ee9aa7d0ddb97667dbfcb345733c121b1d83e7977165fa65079

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v8510283.exe

    Filesize

    394KB

    MD5

    d482f1054107477f6c31b8082a4eb869

    SHA1

    90a29b8ca35ff1e0f3c2bb49399fd2f89af17c74

    SHA256

    99e8a9c5120b325aa7e97c9180e4610799a49b223fc41ebfb16d5444d0dbfedc

    SHA512

    66ee8bb38f030c3344eb841ce967e4187c690db120675a711eca1ac1e3ef3f47be70b5225ef87ee9aa7d0ddb97667dbfcb345733c121b1d83e7977165fa65079

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a0441326.exe

    Filesize

    315KB

    MD5

    cbdc8d4a1501154a08bd6f1eba38ad3f

    SHA1

    0f0b2cdea468e032059e9f41434ca3d2c72dc99e

    SHA256

    fd4e13b15227771c2ad7380c5ab533882d187dd35cbaa42c7678dd2f769a752c

    SHA512

    6fd4cf59e7e29c4e7aaa5db7963f11ea2d1bb586c43e7decbce1fc5fef2115ff7516a07af3c8006ff27056e44863496c922df958811594d88d2d10ea94840f95

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a0441326.exe

    Filesize

    315KB

    MD5

    cbdc8d4a1501154a08bd6f1eba38ad3f

    SHA1

    0f0b2cdea468e032059e9f41434ca3d2c72dc99e

    SHA256

    fd4e13b15227771c2ad7380c5ab533882d187dd35cbaa42c7678dd2f769a752c

    SHA512

    6fd4cf59e7e29c4e7aaa5db7963f11ea2d1bb586c43e7decbce1fc5fef2115ff7516a07af3c8006ff27056e44863496c922df958811594d88d2d10ea94840f95

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a0441326.exe

    Filesize

    315KB

    MD5

    cbdc8d4a1501154a08bd6f1eba38ad3f

    SHA1

    0f0b2cdea468e032059e9f41434ca3d2c72dc99e

    SHA256

    fd4e13b15227771c2ad7380c5ab533882d187dd35cbaa42c7678dd2f769a752c

    SHA512

    6fd4cf59e7e29c4e7aaa5db7963f11ea2d1bb586c43e7decbce1fc5fef2115ff7516a07af3c8006ff27056e44863496c922df958811594d88d2d10ea94840f95

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b7669377.exe

    Filesize

    168KB

    MD5

    fd56235f8cda5c872f3564f70d4dbcca

    SHA1

    0a3e47ada5f00765c39e08b6e593ef05e7b0ddc4

    SHA256

    7f75425881ca14248394c4e29802f3441f47187dcebb027da70e099729de8a86

    SHA512

    bb2f54d17ebf63a42fed3923e03359d090b6fe67638ee193c233fbbab0f61b60be92e2b71e8950993371b78bcea69f53678f46020a4d7f752b96f8185fee50e6

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b7669377.exe

    Filesize

    168KB

    MD5

    fd56235f8cda5c872f3564f70d4dbcca

    SHA1

    0a3e47ada5f00765c39e08b6e593ef05e7b0ddc4

    SHA256

    7f75425881ca14248394c4e29802f3441f47187dcebb027da70e099729de8a86

    SHA512

    bb2f54d17ebf63a42fed3923e03359d090b6fe67638ee193c233fbbab0f61b60be92e2b71e8950993371b78bcea69f53678f46020a4d7f752b96f8185fee50e6

  • memory/824-112-0x0000000000BB0000-0x0000000000BC8000-memory.dmp

    Filesize

    96KB

  • memory/824-113-0x0000000000BB0000-0x0000000000BC2000-memory.dmp

    Filesize

    72KB

  • memory/824-114-0x0000000000BB0000-0x0000000000BC2000-memory.dmp

    Filesize

    72KB

  • memory/824-116-0x0000000000BB0000-0x0000000000BC2000-memory.dmp

    Filesize

    72KB

  • memory/824-118-0x0000000000BB0000-0x0000000000BC2000-memory.dmp

    Filesize

    72KB

  • memory/824-120-0x0000000000BB0000-0x0000000000BC2000-memory.dmp

    Filesize

    72KB

  • memory/824-122-0x0000000000BB0000-0x0000000000BC2000-memory.dmp

    Filesize

    72KB

  • memory/824-124-0x0000000000BB0000-0x0000000000BC2000-memory.dmp

    Filesize

    72KB

  • memory/824-126-0x0000000000BB0000-0x0000000000BC2000-memory.dmp

    Filesize

    72KB

  • memory/824-128-0x0000000000BB0000-0x0000000000BC2000-memory.dmp

    Filesize

    72KB

  • memory/824-130-0x0000000000BB0000-0x0000000000BC2000-memory.dmp

    Filesize

    72KB

  • memory/824-132-0x0000000000BB0000-0x0000000000BC2000-memory.dmp

    Filesize

    72KB

  • memory/824-134-0x0000000000BB0000-0x0000000000BC2000-memory.dmp

    Filesize

    72KB

  • memory/824-136-0x0000000000BB0000-0x0000000000BC2000-memory.dmp

    Filesize

    72KB

  • memory/824-138-0x0000000000BB0000-0x0000000000BC2000-memory.dmp

    Filesize

    72KB

  • memory/824-140-0x0000000000BB0000-0x0000000000BC2000-memory.dmp

    Filesize

    72KB

  • memory/824-141-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/824-142-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/824-111-0x0000000002470000-0x00000000024B0000-memory.dmp

    Filesize

    256KB

  • memory/824-110-0x0000000002470000-0x00000000024B0000-memory.dmp

    Filesize

    256KB

  • memory/824-109-0x00000000003D0000-0x00000000003FD000-memory.dmp

    Filesize

    180KB

  • memory/824-108-0x00000000006A0000-0x00000000006BA000-memory.dmp

    Filesize

    104KB

  • memory/944-149-0x0000000000FB0000-0x0000000000FE0000-memory.dmp

    Filesize

    192KB

  • memory/944-150-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/944-151-0x00000000004E0000-0x0000000000520000-memory.dmp

    Filesize

    256KB

  • memory/944-152-0x00000000004E0000-0x0000000000520000-memory.dmp

    Filesize

    256KB