Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06-05-2023 20:25

General

  • Target

    0b3728b165bc85de7b161cca29db3282bf40d3f06071d8a3518882efabf2b33c.exe

  • Size

    1.5MB

  • MD5

    1a8c9096cb0ff1b67105e2d2c34272d7

  • SHA1

    79fb115c1d3e9ef7587e9438755c1af4ff36ece6

  • SHA256

    0b3728b165bc85de7b161cca29db3282bf40d3f06071d8a3518882efabf2b33c

  • SHA512

    3c34740d9482eacaf54a6d042225a5f8f2fd61e2c954bcb1b6ca74a0c539f87179d041a57005b81e4956277cc4f432dec4d4030a29aebf548ca2357ab520f601

  • SSDEEP

    24576:Vy5kw/TcD1qanxSJmM050BA3X3SNqnJt2NhOpb32ghjr/jABk13ER9FPgRSbJ:wyMTc5AA50S3X34wt2NhOd3d93ETF4k

Malware Config

Extracted

Family

redline

Botnet

mazda

C2

217.196.96.56:4138

Attributes
  • auth_value

    3d2870537d84a4c6d7aeecd002871c51

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b3728b165bc85de7b161cca29db3282bf40d3f06071d8a3518882efabf2b33c.exe
    "C:\Users\Admin\AppData\Local\Temp\0b3728b165bc85de7b161cca29db3282bf40d3f06071d8a3518882efabf2b33c.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1520
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8747699.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8747699.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1412
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9059464.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9059464.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:972
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7300489.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7300489.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:968
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4882207.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4882207.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:640
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a6861484.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a6861484.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Loads dropped DLL
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1764
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b7023470.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b7023470.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:392

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8747699.exe

    Filesize

    1.4MB

    MD5

    5da9589b1de4cdbe8438206c412b2752

    SHA1

    f3874b42441a8b20bf8101c18a86c1d2c23c19c3

    SHA256

    cc986231817e2cb14a4938b43ff7307294258b048ed0eeea42f9a83b8d32be28

    SHA512

    d24ea16c7b383c046421e19c4de6a4ce0939b01b23fc2e791b657243e62dd57511ab59aa99f1ed691bb5d643a5e4cc4e6ffc7d7cafbc429de0250aa806963325

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8747699.exe

    Filesize

    1.4MB

    MD5

    5da9589b1de4cdbe8438206c412b2752

    SHA1

    f3874b42441a8b20bf8101c18a86c1d2c23c19c3

    SHA256

    cc986231817e2cb14a4938b43ff7307294258b048ed0eeea42f9a83b8d32be28

    SHA512

    d24ea16c7b383c046421e19c4de6a4ce0939b01b23fc2e791b657243e62dd57511ab59aa99f1ed691bb5d643a5e4cc4e6ffc7d7cafbc429de0250aa806963325

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9059464.exe

    Filesize

    915KB

    MD5

    ab8e023569e3e0928ed48fb1b036e31c

    SHA1

    e11264736c07d92b36495a0c12f8fe09f9bf1d10

    SHA256

    44c04b98b3a308cb196b31f0d79e00cabef135715619e85c66c1c552f4772045

    SHA512

    e7a1eebe450e3c5b62fc14b095a2d2082423c4d11bd3dcd76e7c487fbbb8ebe54c98a51ce48b5ecc626949da11636c61488651a9ff2424ca37ad0f001c198755

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9059464.exe

    Filesize

    915KB

    MD5

    ab8e023569e3e0928ed48fb1b036e31c

    SHA1

    e11264736c07d92b36495a0c12f8fe09f9bf1d10

    SHA256

    44c04b98b3a308cb196b31f0d79e00cabef135715619e85c66c1c552f4772045

    SHA512

    e7a1eebe450e3c5b62fc14b095a2d2082423c4d11bd3dcd76e7c487fbbb8ebe54c98a51ce48b5ecc626949da11636c61488651a9ff2424ca37ad0f001c198755

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7300489.exe

    Filesize

    711KB

    MD5

    d1bc248f67fee53e43f091075651f013

    SHA1

    b0237732dc57d47e9da9c2fd57d03111d0ec8943

    SHA256

    35fee7f3eb48cd395bd6c96782a20d68ddf09b8164cadd83d0435db3cc417670

    SHA512

    a6313f566e174a7bbff6e98740d68683de87724896594568f3c7513b52136c903a3431770e3c0e28ba996ea7a0e38e68b2bf8467ed664462fdc5a7de94074617

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7300489.exe

    Filesize

    711KB

    MD5

    d1bc248f67fee53e43f091075651f013

    SHA1

    b0237732dc57d47e9da9c2fd57d03111d0ec8943

    SHA256

    35fee7f3eb48cd395bd6c96782a20d68ddf09b8164cadd83d0435db3cc417670

    SHA512

    a6313f566e174a7bbff6e98740d68683de87724896594568f3c7513b52136c903a3431770e3c0e28ba996ea7a0e38e68b2bf8467ed664462fdc5a7de94074617

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4882207.exe

    Filesize

    416KB

    MD5

    513be3d230705d2b7523e7ee9707bbf2

    SHA1

    26ae3aeeef4393f7109e12bb171a4dfce36fc7c5

    SHA256

    63dc118867dd457739e43b3aa23ea9b1d0cf3f69b6da50e31af48b97a7230739

    SHA512

    cf21e48a03cd75a5f6024ff6c56c93e2cc2da5f02543bf9c835c1be4e98e01d7adb2cd982499405733d5c6dbd7de5c520913065b748cf2b90c0f13b9728f0ace

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4882207.exe

    Filesize

    416KB

    MD5

    513be3d230705d2b7523e7ee9707bbf2

    SHA1

    26ae3aeeef4393f7109e12bb171a4dfce36fc7c5

    SHA256

    63dc118867dd457739e43b3aa23ea9b1d0cf3f69b6da50e31af48b97a7230739

    SHA512

    cf21e48a03cd75a5f6024ff6c56c93e2cc2da5f02543bf9c835c1be4e98e01d7adb2cd982499405733d5c6dbd7de5c520913065b748cf2b90c0f13b9728f0ace

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a6861484.exe

    Filesize

    360KB

    MD5

    2f262dc6e947a49704e332b72e60ef25

    SHA1

    4855823b283720d79677fd60981b1ed479aeba32

    SHA256

    1d36ceedccc34491b5474dd09bdafa545e80f27df0887fd498144675a5011514

    SHA512

    662c05299ff413270b23c4b9cbf53194961b7d93ee57b37bd1d3ccbb6af0eb8cf2a0b724a798c765876ff3b7bd11da5a572cfb8c32b5df2f35e6e6e42819ece6

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a6861484.exe

    Filesize

    360KB

    MD5

    2f262dc6e947a49704e332b72e60ef25

    SHA1

    4855823b283720d79677fd60981b1ed479aeba32

    SHA256

    1d36ceedccc34491b5474dd09bdafa545e80f27df0887fd498144675a5011514

    SHA512

    662c05299ff413270b23c4b9cbf53194961b7d93ee57b37bd1d3ccbb6af0eb8cf2a0b724a798c765876ff3b7bd11da5a572cfb8c32b5df2f35e6e6e42819ece6

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a6861484.exe

    Filesize

    360KB

    MD5

    2f262dc6e947a49704e332b72e60ef25

    SHA1

    4855823b283720d79677fd60981b1ed479aeba32

    SHA256

    1d36ceedccc34491b5474dd09bdafa545e80f27df0887fd498144675a5011514

    SHA512

    662c05299ff413270b23c4b9cbf53194961b7d93ee57b37bd1d3ccbb6af0eb8cf2a0b724a798c765876ff3b7bd11da5a572cfb8c32b5df2f35e6e6e42819ece6

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b7023470.exe

    Filesize

    168KB

    MD5

    8d298ed4202948feb1903307b6cd2d37

    SHA1

    903b5aab2cd94f5fb458ce73d4834fe1f2691b85

    SHA256

    082b6b87d7409c970ddfff8fb07b89f3766640421fe38fc1156dd68d8bbfa84a

    SHA512

    484790ffc68ec4a9c5e71b74a3f7e0f92f67b5ff09a92a3121db01091b794faf13389e47964a5f05a335ac5f791ad18cbfaed13e65a8d504e736b4e79a41cda6

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b7023470.exe

    Filesize

    168KB

    MD5

    8d298ed4202948feb1903307b6cd2d37

    SHA1

    903b5aab2cd94f5fb458ce73d4834fe1f2691b85

    SHA256

    082b6b87d7409c970ddfff8fb07b89f3766640421fe38fc1156dd68d8bbfa84a

    SHA512

    484790ffc68ec4a9c5e71b74a3f7e0f92f67b5ff09a92a3121db01091b794faf13389e47964a5f05a335ac5f791ad18cbfaed13e65a8d504e736b4e79a41cda6

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v8747699.exe

    Filesize

    1.4MB

    MD5

    5da9589b1de4cdbe8438206c412b2752

    SHA1

    f3874b42441a8b20bf8101c18a86c1d2c23c19c3

    SHA256

    cc986231817e2cb14a4938b43ff7307294258b048ed0eeea42f9a83b8d32be28

    SHA512

    d24ea16c7b383c046421e19c4de6a4ce0939b01b23fc2e791b657243e62dd57511ab59aa99f1ed691bb5d643a5e4cc4e6ffc7d7cafbc429de0250aa806963325

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v8747699.exe

    Filesize

    1.4MB

    MD5

    5da9589b1de4cdbe8438206c412b2752

    SHA1

    f3874b42441a8b20bf8101c18a86c1d2c23c19c3

    SHA256

    cc986231817e2cb14a4938b43ff7307294258b048ed0eeea42f9a83b8d32be28

    SHA512

    d24ea16c7b383c046421e19c4de6a4ce0939b01b23fc2e791b657243e62dd57511ab59aa99f1ed691bb5d643a5e4cc4e6ffc7d7cafbc429de0250aa806963325

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v9059464.exe

    Filesize

    915KB

    MD5

    ab8e023569e3e0928ed48fb1b036e31c

    SHA1

    e11264736c07d92b36495a0c12f8fe09f9bf1d10

    SHA256

    44c04b98b3a308cb196b31f0d79e00cabef135715619e85c66c1c552f4772045

    SHA512

    e7a1eebe450e3c5b62fc14b095a2d2082423c4d11bd3dcd76e7c487fbbb8ebe54c98a51ce48b5ecc626949da11636c61488651a9ff2424ca37ad0f001c198755

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v9059464.exe

    Filesize

    915KB

    MD5

    ab8e023569e3e0928ed48fb1b036e31c

    SHA1

    e11264736c07d92b36495a0c12f8fe09f9bf1d10

    SHA256

    44c04b98b3a308cb196b31f0d79e00cabef135715619e85c66c1c552f4772045

    SHA512

    e7a1eebe450e3c5b62fc14b095a2d2082423c4d11bd3dcd76e7c487fbbb8ebe54c98a51ce48b5ecc626949da11636c61488651a9ff2424ca37ad0f001c198755

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v7300489.exe

    Filesize

    711KB

    MD5

    d1bc248f67fee53e43f091075651f013

    SHA1

    b0237732dc57d47e9da9c2fd57d03111d0ec8943

    SHA256

    35fee7f3eb48cd395bd6c96782a20d68ddf09b8164cadd83d0435db3cc417670

    SHA512

    a6313f566e174a7bbff6e98740d68683de87724896594568f3c7513b52136c903a3431770e3c0e28ba996ea7a0e38e68b2bf8467ed664462fdc5a7de94074617

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v7300489.exe

    Filesize

    711KB

    MD5

    d1bc248f67fee53e43f091075651f013

    SHA1

    b0237732dc57d47e9da9c2fd57d03111d0ec8943

    SHA256

    35fee7f3eb48cd395bd6c96782a20d68ddf09b8164cadd83d0435db3cc417670

    SHA512

    a6313f566e174a7bbff6e98740d68683de87724896594568f3c7513b52136c903a3431770e3c0e28ba996ea7a0e38e68b2bf8467ed664462fdc5a7de94074617

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v4882207.exe

    Filesize

    416KB

    MD5

    513be3d230705d2b7523e7ee9707bbf2

    SHA1

    26ae3aeeef4393f7109e12bb171a4dfce36fc7c5

    SHA256

    63dc118867dd457739e43b3aa23ea9b1d0cf3f69b6da50e31af48b97a7230739

    SHA512

    cf21e48a03cd75a5f6024ff6c56c93e2cc2da5f02543bf9c835c1be4e98e01d7adb2cd982499405733d5c6dbd7de5c520913065b748cf2b90c0f13b9728f0ace

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v4882207.exe

    Filesize

    416KB

    MD5

    513be3d230705d2b7523e7ee9707bbf2

    SHA1

    26ae3aeeef4393f7109e12bb171a4dfce36fc7c5

    SHA256

    63dc118867dd457739e43b3aa23ea9b1d0cf3f69b6da50e31af48b97a7230739

    SHA512

    cf21e48a03cd75a5f6024ff6c56c93e2cc2da5f02543bf9c835c1be4e98e01d7adb2cd982499405733d5c6dbd7de5c520913065b748cf2b90c0f13b9728f0ace

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a6861484.exe

    Filesize

    360KB

    MD5

    2f262dc6e947a49704e332b72e60ef25

    SHA1

    4855823b283720d79677fd60981b1ed479aeba32

    SHA256

    1d36ceedccc34491b5474dd09bdafa545e80f27df0887fd498144675a5011514

    SHA512

    662c05299ff413270b23c4b9cbf53194961b7d93ee57b37bd1d3ccbb6af0eb8cf2a0b724a798c765876ff3b7bd11da5a572cfb8c32b5df2f35e6e6e42819ece6

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a6861484.exe

    Filesize

    360KB

    MD5

    2f262dc6e947a49704e332b72e60ef25

    SHA1

    4855823b283720d79677fd60981b1ed479aeba32

    SHA256

    1d36ceedccc34491b5474dd09bdafa545e80f27df0887fd498144675a5011514

    SHA512

    662c05299ff413270b23c4b9cbf53194961b7d93ee57b37bd1d3ccbb6af0eb8cf2a0b724a798c765876ff3b7bd11da5a572cfb8c32b5df2f35e6e6e42819ece6

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a6861484.exe

    Filesize

    360KB

    MD5

    2f262dc6e947a49704e332b72e60ef25

    SHA1

    4855823b283720d79677fd60981b1ed479aeba32

    SHA256

    1d36ceedccc34491b5474dd09bdafa545e80f27df0887fd498144675a5011514

    SHA512

    662c05299ff413270b23c4b9cbf53194961b7d93ee57b37bd1d3ccbb6af0eb8cf2a0b724a798c765876ff3b7bd11da5a572cfb8c32b5df2f35e6e6e42819ece6

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b7023470.exe

    Filesize

    168KB

    MD5

    8d298ed4202948feb1903307b6cd2d37

    SHA1

    903b5aab2cd94f5fb458ce73d4834fe1f2691b85

    SHA256

    082b6b87d7409c970ddfff8fb07b89f3766640421fe38fc1156dd68d8bbfa84a

    SHA512

    484790ffc68ec4a9c5e71b74a3f7e0f92f67b5ff09a92a3121db01091b794faf13389e47964a5f05a335ac5f791ad18cbfaed13e65a8d504e736b4e79a41cda6

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b7023470.exe

    Filesize

    168KB

    MD5

    8d298ed4202948feb1903307b6cd2d37

    SHA1

    903b5aab2cd94f5fb458ce73d4834fe1f2691b85

    SHA256

    082b6b87d7409c970ddfff8fb07b89f3766640421fe38fc1156dd68d8bbfa84a

    SHA512

    484790ffc68ec4a9c5e71b74a3f7e0f92f67b5ff09a92a3121db01091b794faf13389e47964a5f05a335ac5f791ad18cbfaed13e65a8d504e736b4e79a41cda6

  • memory/392-155-0x0000000004C30000-0x0000000004C70000-memory.dmp

    Filesize

    256KB

  • memory/392-154-0x0000000004C30000-0x0000000004C70000-memory.dmp

    Filesize

    256KB

  • memory/392-153-0x0000000000270000-0x0000000000276000-memory.dmp

    Filesize

    24KB

  • memory/392-152-0x0000000000010000-0x0000000000040000-memory.dmp

    Filesize

    192KB

  • memory/1764-112-0x0000000004F50000-0x0000000004F90000-memory.dmp

    Filesize

    256KB

  • memory/1764-120-0x0000000000800000-0x0000000000812000-memory.dmp

    Filesize

    72KB

  • memory/1764-122-0x0000000000800000-0x0000000000812000-memory.dmp

    Filesize

    72KB

  • memory/1764-124-0x0000000000800000-0x0000000000812000-memory.dmp

    Filesize

    72KB

  • memory/1764-126-0x0000000000800000-0x0000000000812000-memory.dmp

    Filesize

    72KB

  • memory/1764-128-0x0000000000800000-0x0000000000812000-memory.dmp

    Filesize

    72KB

  • memory/1764-130-0x0000000000800000-0x0000000000812000-memory.dmp

    Filesize

    72KB

  • memory/1764-132-0x0000000000800000-0x0000000000812000-memory.dmp

    Filesize

    72KB

  • memory/1764-134-0x0000000000800000-0x0000000000812000-memory.dmp

    Filesize

    72KB

  • memory/1764-136-0x0000000000800000-0x0000000000812000-memory.dmp

    Filesize

    72KB

  • memory/1764-138-0x0000000000800000-0x0000000000812000-memory.dmp

    Filesize

    72KB

  • memory/1764-140-0x0000000000800000-0x0000000000812000-memory.dmp

    Filesize

    72KB

  • memory/1764-141-0x0000000000400000-0x00000000006F4000-memory.dmp

    Filesize

    3.0MB

  • memory/1764-142-0x0000000004F50000-0x0000000004F90000-memory.dmp

    Filesize

    256KB

  • memory/1764-145-0x0000000000400000-0x00000000006F4000-memory.dmp

    Filesize

    3.0MB

  • memory/1764-118-0x0000000000800000-0x0000000000812000-memory.dmp

    Filesize

    72KB

  • memory/1764-113-0x0000000000800000-0x0000000000812000-memory.dmp

    Filesize

    72KB

  • memory/1764-116-0x0000000000800000-0x0000000000812000-memory.dmp

    Filesize

    72KB

  • memory/1764-114-0x0000000000800000-0x0000000000812000-memory.dmp

    Filesize

    72KB

  • memory/1764-111-0x0000000004F50000-0x0000000004F90000-memory.dmp

    Filesize

    256KB

  • memory/1764-110-0x0000000000250000-0x000000000027D000-memory.dmp

    Filesize

    180KB

  • memory/1764-109-0x0000000000800000-0x0000000000818000-memory.dmp

    Filesize

    96KB

  • memory/1764-108-0x00000000003E0000-0x00000000003FA000-memory.dmp

    Filesize

    104KB