Analysis

  • max time kernel
    145s
  • max time network
    175s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 20:23

General

  • Target

    0a4baca16b2b78a380b0b8d2ffdef1d8bade7dc97234291fdf9375d13a456333.exe

  • Size

    1.5MB

  • MD5

    f0f8e192041e9304f8b7a300a46768d7

  • SHA1

    88610849c0bdfcde44927c359b59f87f902b99ab

  • SHA256

    0a4baca16b2b78a380b0b8d2ffdef1d8bade7dc97234291fdf9375d13a456333

  • SHA512

    2da331ff7311da0c88b4dd49c91baf542c7969ae969fe761b7a4102e34c1fdeabb02d9dd4b665938490766f1a54e120331b943d9ce4fa7534ffafe832c5e7648

  • SSDEEP

    49152:nr9Rq9sYvi2kMj8gw21AeoVWi4hUxqWqgQQ8Hlx5jP:5RqWh+IvO5KxZq3Q8H

Malware Config

Extracted

Family

redline

Botnet

maza

C2

185.161.248.73:4164

Attributes
  • auth_value

    474d54c1c2f5291290c53f8378acd684

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a4baca16b2b78a380b0b8d2ffdef1d8bade7dc97234291fdf9375d13a456333.exe
    "C:\Users\Admin\AppData\Local\Temp\0a4baca16b2b78a380b0b8d2ffdef1d8bade7dc97234291fdf9375d13a456333.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1752
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i83829663.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i83829663.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1552
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i08601835.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i08601835.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:704
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i52312525.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i52312525.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:756
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i01804528.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i01804528.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1768
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a92879505.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a92879505.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Loads dropped DLL
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1108
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b19312658.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b19312658.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1200

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i83829663.exe

    Filesize

    1.3MB

    MD5

    3d62127dbade7a6d741c493e18469360

    SHA1

    1c088c1cdf237da70e471d176e700679a331023b

    SHA256

    68c4cb7237feff4027c95e7484f6a3f7e55e0500820dd386ba43f3aaffa3b140

    SHA512

    9390a1ac314e12e0f046b92446734d910503005d9c8283ea3d17e7609926f1f5071f0b75a05b4c2ea8ac9da4e169c14be65f0c7b815e465c81b7c6284eb5eead

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i83829663.exe

    Filesize

    1.3MB

    MD5

    3d62127dbade7a6d741c493e18469360

    SHA1

    1c088c1cdf237da70e471d176e700679a331023b

    SHA256

    68c4cb7237feff4027c95e7484f6a3f7e55e0500820dd386ba43f3aaffa3b140

    SHA512

    9390a1ac314e12e0f046b92446734d910503005d9c8283ea3d17e7609926f1f5071f0b75a05b4c2ea8ac9da4e169c14be65f0c7b815e465c81b7c6284eb5eead

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i08601835.exe

    Filesize

    1.1MB

    MD5

    a015e8076fab2ef27d35dff6ffb4cbe6

    SHA1

    3cc18d3f268b9d947f7148f33da756dc82fd36ab

    SHA256

    5df1b8e480d03fff7e07ccddec8538c4343188a33561947ded8e5b5dfaa550dc

    SHA512

    19159d2ab8961fce76f4c749db5ec628e8ed00d76ff71789a166c2573ba39abb975382d11ac575e19f4740ef2ba0c611625e687b3725a63e96c0e1655ff95b80

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i08601835.exe

    Filesize

    1.1MB

    MD5

    a015e8076fab2ef27d35dff6ffb4cbe6

    SHA1

    3cc18d3f268b9d947f7148f33da756dc82fd36ab

    SHA256

    5df1b8e480d03fff7e07ccddec8538c4343188a33561947ded8e5b5dfaa550dc

    SHA512

    19159d2ab8961fce76f4c749db5ec628e8ed00d76ff71789a166c2573ba39abb975382d11ac575e19f4740ef2ba0c611625e687b3725a63e96c0e1655ff95b80

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i52312525.exe

    Filesize

    687KB

    MD5

    d8c204d3a63f08066c2d5fd72ba716cc

    SHA1

    49855a4fac7812299f1b767d94707ebcc4059a8a

    SHA256

    33515a062b6cf0a28eb90f3f801ba40e0bd06f8b3afd7c0adc0b7faa83a320f8

    SHA512

    bc28c84681d286f99d55222501d10a0acbd8a66f039f0a52da543da7d66a259e7ad9f725d3df116d4360884271cbd5a1e6b0344ca0052a492d9187888a3e0d2f

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i52312525.exe

    Filesize

    687KB

    MD5

    d8c204d3a63f08066c2d5fd72ba716cc

    SHA1

    49855a4fac7812299f1b767d94707ebcc4059a8a

    SHA256

    33515a062b6cf0a28eb90f3f801ba40e0bd06f8b3afd7c0adc0b7faa83a320f8

    SHA512

    bc28c84681d286f99d55222501d10a0acbd8a66f039f0a52da543da7d66a259e7ad9f725d3df116d4360884271cbd5a1e6b0344ca0052a492d9187888a3e0d2f

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i01804528.exe

    Filesize

    404KB

    MD5

    8b181a9411679f76cb2000c79f8aa528

    SHA1

    98c524494d6c37b22c0bbd2b40adf07c76280ad2

    SHA256

    7549bdde54cf99f6cae2c1b901a31f66844d6a6b0036a1be0f3cc2f7df13a427

    SHA512

    d87aa4fef9a256793513744c3b41c2b3e76dfa0524e6fd032eaadc684b152afbe112140c7feeacbb535f2f0f82416da215a9b024057168520d926acdac7d28d6

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i01804528.exe

    Filesize

    404KB

    MD5

    8b181a9411679f76cb2000c79f8aa528

    SHA1

    98c524494d6c37b22c0bbd2b40adf07c76280ad2

    SHA256

    7549bdde54cf99f6cae2c1b901a31f66844d6a6b0036a1be0f3cc2f7df13a427

    SHA512

    d87aa4fef9a256793513744c3b41c2b3e76dfa0524e6fd032eaadc684b152afbe112140c7feeacbb535f2f0f82416da215a9b024057168520d926acdac7d28d6

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a92879505.exe

    Filesize

    344KB

    MD5

    8398d00fe15a1dbdc12e3930c692b54f

    SHA1

    a04b64e48340d157d241342e21d6ab1b397c1fbf

    SHA256

    fd2cc17947ecf7ff17fa99c36c3ee9c134445075d93474552eebb97fd00b3c56

    SHA512

    dd4b27244095dba4a49c3139088fba92ab634c5afabc08bfd4515924edcef79efb56b1b6bd0b4742f6ae13fb4dbd0c20ec2edb63e7bb4af08688abcdca3ddddc

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a92879505.exe

    Filesize

    344KB

    MD5

    8398d00fe15a1dbdc12e3930c692b54f

    SHA1

    a04b64e48340d157d241342e21d6ab1b397c1fbf

    SHA256

    fd2cc17947ecf7ff17fa99c36c3ee9c134445075d93474552eebb97fd00b3c56

    SHA512

    dd4b27244095dba4a49c3139088fba92ab634c5afabc08bfd4515924edcef79efb56b1b6bd0b4742f6ae13fb4dbd0c20ec2edb63e7bb4af08688abcdca3ddddc

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a92879505.exe

    Filesize

    344KB

    MD5

    8398d00fe15a1dbdc12e3930c692b54f

    SHA1

    a04b64e48340d157d241342e21d6ab1b397c1fbf

    SHA256

    fd2cc17947ecf7ff17fa99c36c3ee9c134445075d93474552eebb97fd00b3c56

    SHA512

    dd4b27244095dba4a49c3139088fba92ab634c5afabc08bfd4515924edcef79efb56b1b6bd0b4742f6ae13fb4dbd0c20ec2edb63e7bb4af08688abcdca3ddddc

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b19312658.exe

    Filesize

    168KB

    MD5

    8aa3a25649110ad9d0bc324f194d04ae

    SHA1

    38b957d8b3fbfea35cbd90b59bfcf6d16e2f1b0a

    SHA256

    57cee6de2be17c6590f8ef62bf78503ad9ec27986d1921551cc5165bd4613d7c

    SHA512

    b33732598ca20e4e9b597f11d2bf855be7ff2113d2801980db3b7c348969b811959dc4de5329e26900558b8311c7f89226494293d99159187a3d7bf84981d935

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b19312658.exe

    Filesize

    168KB

    MD5

    8aa3a25649110ad9d0bc324f194d04ae

    SHA1

    38b957d8b3fbfea35cbd90b59bfcf6d16e2f1b0a

    SHA256

    57cee6de2be17c6590f8ef62bf78503ad9ec27986d1921551cc5165bd4613d7c

    SHA512

    b33732598ca20e4e9b597f11d2bf855be7ff2113d2801980db3b7c348969b811959dc4de5329e26900558b8311c7f89226494293d99159187a3d7bf84981d935

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\i83829663.exe

    Filesize

    1.3MB

    MD5

    3d62127dbade7a6d741c493e18469360

    SHA1

    1c088c1cdf237da70e471d176e700679a331023b

    SHA256

    68c4cb7237feff4027c95e7484f6a3f7e55e0500820dd386ba43f3aaffa3b140

    SHA512

    9390a1ac314e12e0f046b92446734d910503005d9c8283ea3d17e7609926f1f5071f0b75a05b4c2ea8ac9da4e169c14be65f0c7b815e465c81b7c6284eb5eead

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\i83829663.exe

    Filesize

    1.3MB

    MD5

    3d62127dbade7a6d741c493e18469360

    SHA1

    1c088c1cdf237da70e471d176e700679a331023b

    SHA256

    68c4cb7237feff4027c95e7484f6a3f7e55e0500820dd386ba43f3aaffa3b140

    SHA512

    9390a1ac314e12e0f046b92446734d910503005d9c8283ea3d17e7609926f1f5071f0b75a05b4c2ea8ac9da4e169c14be65f0c7b815e465c81b7c6284eb5eead

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\i08601835.exe

    Filesize

    1.1MB

    MD5

    a015e8076fab2ef27d35dff6ffb4cbe6

    SHA1

    3cc18d3f268b9d947f7148f33da756dc82fd36ab

    SHA256

    5df1b8e480d03fff7e07ccddec8538c4343188a33561947ded8e5b5dfaa550dc

    SHA512

    19159d2ab8961fce76f4c749db5ec628e8ed00d76ff71789a166c2573ba39abb975382d11ac575e19f4740ef2ba0c611625e687b3725a63e96c0e1655ff95b80

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\i08601835.exe

    Filesize

    1.1MB

    MD5

    a015e8076fab2ef27d35dff6ffb4cbe6

    SHA1

    3cc18d3f268b9d947f7148f33da756dc82fd36ab

    SHA256

    5df1b8e480d03fff7e07ccddec8538c4343188a33561947ded8e5b5dfaa550dc

    SHA512

    19159d2ab8961fce76f4c749db5ec628e8ed00d76ff71789a166c2573ba39abb975382d11ac575e19f4740ef2ba0c611625e687b3725a63e96c0e1655ff95b80

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\i52312525.exe

    Filesize

    687KB

    MD5

    d8c204d3a63f08066c2d5fd72ba716cc

    SHA1

    49855a4fac7812299f1b767d94707ebcc4059a8a

    SHA256

    33515a062b6cf0a28eb90f3f801ba40e0bd06f8b3afd7c0adc0b7faa83a320f8

    SHA512

    bc28c84681d286f99d55222501d10a0acbd8a66f039f0a52da543da7d66a259e7ad9f725d3df116d4360884271cbd5a1e6b0344ca0052a492d9187888a3e0d2f

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\i52312525.exe

    Filesize

    687KB

    MD5

    d8c204d3a63f08066c2d5fd72ba716cc

    SHA1

    49855a4fac7812299f1b767d94707ebcc4059a8a

    SHA256

    33515a062b6cf0a28eb90f3f801ba40e0bd06f8b3afd7c0adc0b7faa83a320f8

    SHA512

    bc28c84681d286f99d55222501d10a0acbd8a66f039f0a52da543da7d66a259e7ad9f725d3df116d4360884271cbd5a1e6b0344ca0052a492d9187888a3e0d2f

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\i01804528.exe

    Filesize

    404KB

    MD5

    8b181a9411679f76cb2000c79f8aa528

    SHA1

    98c524494d6c37b22c0bbd2b40adf07c76280ad2

    SHA256

    7549bdde54cf99f6cae2c1b901a31f66844d6a6b0036a1be0f3cc2f7df13a427

    SHA512

    d87aa4fef9a256793513744c3b41c2b3e76dfa0524e6fd032eaadc684b152afbe112140c7feeacbb535f2f0f82416da215a9b024057168520d926acdac7d28d6

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\i01804528.exe

    Filesize

    404KB

    MD5

    8b181a9411679f76cb2000c79f8aa528

    SHA1

    98c524494d6c37b22c0bbd2b40adf07c76280ad2

    SHA256

    7549bdde54cf99f6cae2c1b901a31f66844d6a6b0036a1be0f3cc2f7df13a427

    SHA512

    d87aa4fef9a256793513744c3b41c2b3e76dfa0524e6fd032eaadc684b152afbe112140c7feeacbb535f2f0f82416da215a9b024057168520d926acdac7d28d6

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a92879505.exe

    Filesize

    344KB

    MD5

    8398d00fe15a1dbdc12e3930c692b54f

    SHA1

    a04b64e48340d157d241342e21d6ab1b397c1fbf

    SHA256

    fd2cc17947ecf7ff17fa99c36c3ee9c134445075d93474552eebb97fd00b3c56

    SHA512

    dd4b27244095dba4a49c3139088fba92ab634c5afabc08bfd4515924edcef79efb56b1b6bd0b4742f6ae13fb4dbd0c20ec2edb63e7bb4af08688abcdca3ddddc

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a92879505.exe

    Filesize

    344KB

    MD5

    8398d00fe15a1dbdc12e3930c692b54f

    SHA1

    a04b64e48340d157d241342e21d6ab1b397c1fbf

    SHA256

    fd2cc17947ecf7ff17fa99c36c3ee9c134445075d93474552eebb97fd00b3c56

    SHA512

    dd4b27244095dba4a49c3139088fba92ab634c5afabc08bfd4515924edcef79efb56b1b6bd0b4742f6ae13fb4dbd0c20ec2edb63e7bb4af08688abcdca3ddddc

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a92879505.exe

    Filesize

    344KB

    MD5

    8398d00fe15a1dbdc12e3930c692b54f

    SHA1

    a04b64e48340d157d241342e21d6ab1b397c1fbf

    SHA256

    fd2cc17947ecf7ff17fa99c36c3ee9c134445075d93474552eebb97fd00b3c56

    SHA512

    dd4b27244095dba4a49c3139088fba92ab634c5afabc08bfd4515924edcef79efb56b1b6bd0b4742f6ae13fb4dbd0c20ec2edb63e7bb4af08688abcdca3ddddc

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b19312658.exe

    Filesize

    168KB

    MD5

    8aa3a25649110ad9d0bc324f194d04ae

    SHA1

    38b957d8b3fbfea35cbd90b59bfcf6d16e2f1b0a

    SHA256

    57cee6de2be17c6590f8ef62bf78503ad9ec27986d1921551cc5165bd4613d7c

    SHA512

    b33732598ca20e4e9b597f11d2bf855be7ff2113d2801980db3b7c348969b811959dc4de5329e26900558b8311c7f89226494293d99159187a3d7bf84981d935

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b19312658.exe

    Filesize

    168KB

    MD5

    8aa3a25649110ad9d0bc324f194d04ae

    SHA1

    38b957d8b3fbfea35cbd90b59bfcf6d16e2f1b0a

    SHA256

    57cee6de2be17c6590f8ef62bf78503ad9ec27986d1921551cc5165bd4613d7c

    SHA512

    b33732598ca20e4e9b597f11d2bf855be7ff2113d2801980db3b7c348969b811959dc4de5329e26900558b8311c7f89226494293d99159187a3d7bf84981d935

  • memory/1108-112-0x00000000028B0000-0x00000000028C2000-memory.dmp

    Filesize

    72KB

  • memory/1108-138-0x00000000028B0000-0x00000000028C2000-memory.dmp

    Filesize

    72KB

  • memory/1108-116-0x00000000028B0000-0x00000000028C2000-memory.dmp

    Filesize

    72KB

  • memory/1108-118-0x00000000028B0000-0x00000000028C2000-memory.dmp

    Filesize

    72KB

  • memory/1108-120-0x00000000028B0000-0x00000000028C2000-memory.dmp

    Filesize

    72KB

  • memory/1108-122-0x00000000028B0000-0x00000000028C2000-memory.dmp

    Filesize

    72KB

  • memory/1108-124-0x00000000028B0000-0x00000000028C2000-memory.dmp

    Filesize

    72KB

  • memory/1108-126-0x00000000028B0000-0x00000000028C2000-memory.dmp

    Filesize

    72KB

  • memory/1108-128-0x00000000028B0000-0x00000000028C2000-memory.dmp

    Filesize

    72KB

  • memory/1108-130-0x00000000028B0000-0x00000000028C2000-memory.dmp

    Filesize

    72KB

  • memory/1108-132-0x00000000028B0000-0x00000000028C2000-memory.dmp

    Filesize

    72KB

  • memory/1108-134-0x00000000028B0000-0x00000000028C2000-memory.dmp

    Filesize

    72KB

  • memory/1108-136-0x00000000028B0000-0x00000000028C2000-memory.dmp

    Filesize

    72KB

  • memory/1108-114-0x00000000028B0000-0x00000000028C2000-memory.dmp

    Filesize

    72KB

  • memory/1108-139-0x0000000004F20000-0x0000000004F60000-memory.dmp

    Filesize

    256KB

  • memory/1108-140-0x0000000004F20000-0x0000000004F60000-memory.dmp

    Filesize

    256KB

  • memory/1108-141-0x0000000000400000-0x0000000000A67000-memory.dmp

    Filesize

    6.4MB

  • memory/1108-143-0x0000000004F20000-0x0000000004F60000-memory.dmp

    Filesize

    256KB

  • memory/1108-144-0x0000000004F20000-0x0000000004F60000-memory.dmp

    Filesize

    256KB

  • memory/1108-145-0x0000000000400000-0x0000000000A67000-memory.dmp

    Filesize

    6.4MB

  • memory/1108-111-0x00000000028B0000-0x00000000028C2000-memory.dmp

    Filesize

    72KB

  • memory/1108-110-0x00000000028B0000-0x00000000028C8000-memory.dmp

    Filesize

    96KB

  • memory/1108-109-0x0000000000EB0000-0x0000000000ECA000-memory.dmp

    Filesize

    104KB

  • memory/1108-108-0x0000000000C00000-0x0000000000C2D000-memory.dmp

    Filesize

    180KB

  • memory/1200-152-0x0000000000ED0000-0x0000000000EFE000-memory.dmp

    Filesize

    184KB

  • memory/1200-153-0x00000000002F0000-0x00000000002F6000-memory.dmp

    Filesize

    24KB

  • memory/1200-154-0x0000000004B00000-0x0000000004B40000-memory.dmp

    Filesize

    256KB

  • memory/1200-155-0x0000000004B00000-0x0000000004B40000-memory.dmp

    Filesize

    256KB