Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06-05-2023 20:24

General

  • Target

    0ac0d148918b3cd9f2d43c3c9d78b980c81dd23b73906cb5ea78a75ffbb19700.exe

  • Size

    1.5MB

  • MD5

    00ebe38ee1733d76518f76305c6543ab

  • SHA1

    f54a19ea108809118e5cb73f7d30723388e8dd86

  • SHA256

    0ac0d148918b3cd9f2d43c3c9d78b980c81dd23b73906cb5ea78a75ffbb19700

  • SHA512

    0c026e5b928f4ac8a527f1eba2241eb239cd3b3cfc9f2b0125b32ef1ec83c2b34f0dd5c3d7193e83fe782c338036cf34a5e4e8d1d40accffdd51c9d7cc306e49

  • SSDEEP

    24576:2ysTDq+3UjlsfjPKVoY6DpZp01YAX0adOiiu0s5Zf+xNEMXrAZ66:FoDq+3nf26YIZp06AXIiysaLEOZ

Malware Config

Extracted

Family

redline

Botnet

max

C2

185.161.248.73:4164

Attributes
  • auth_value

    efb1499709a5d08ed1ddf71cff71211f

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 12 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ac0d148918b3cd9f2d43c3c9d78b980c81dd23b73906cb5ea78a75ffbb19700.exe
    "C:\Users\Admin\AppData\Local\Temp\0ac0d148918b3cd9f2d43c3c9d78b980c81dd23b73906cb5ea78a75ffbb19700.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i07930430.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i07930430.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1232
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i41481659.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i41481659.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1512
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i58734986.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i58734986.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:752
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i09453305.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i09453305.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:320
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a98532674.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a98532674.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Loads dropped DLL
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:532
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b04622328.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b04622328.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1352

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i07930430.exe

    Filesize

    1.2MB

    MD5

    7db1ac7c2f9d84fe7b11df33d9b65259

    SHA1

    ff41dfc211fbf4239dda95c705e6d479006cb402

    SHA256

    a81fdc3be528b464d464b74542d690ecd502ac503788c495c1c60f5526a192cd

    SHA512

    6b348156e4965a082e812ea952f5d68ddb1afb7be14c6b33facf580ece1a73a352a20a5f58f13456b748edee6a9c73ebb130ac9f704cf99374e2a72c00d2bd59

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i07930430.exe

    Filesize

    1.2MB

    MD5

    7db1ac7c2f9d84fe7b11df33d9b65259

    SHA1

    ff41dfc211fbf4239dda95c705e6d479006cb402

    SHA256

    a81fdc3be528b464d464b74542d690ecd502ac503788c495c1c60f5526a192cd

    SHA512

    6b348156e4965a082e812ea952f5d68ddb1afb7be14c6b33facf580ece1a73a352a20a5f58f13456b748edee6a9c73ebb130ac9f704cf99374e2a72c00d2bd59

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i41481659.exe

    Filesize

    1.1MB

    MD5

    b425b4a9f016d95cddc22b8e6543deb6

    SHA1

    a0b49db5b5e17a8add44d3b3eeb3fdab03659858

    SHA256

    6ffb2299ae539c576f6ba0cdbad6062151aa0745c720f3ff39ab123cf802c313

    SHA512

    302d06fab11fb6ad2a5ca233c782b3cffeba3c5ace9ceef68cb0d081ada79113ca88a21cdf1e4230c23164cbf67d88da2f40b2e5662e62d1ae31722ab8b88b21

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i41481659.exe

    Filesize

    1.1MB

    MD5

    b425b4a9f016d95cddc22b8e6543deb6

    SHA1

    a0b49db5b5e17a8add44d3b3eeb3fdab03659858

    SHA256

    6ffb2299ae539c576f6ba0cdbad6062151aa0745c720f3ff39ab123cf802c313

    SHA512

    302d06fab11fb6ad2a5ca233c782b3cffeba3c5ace9ceef68cb0d081ada79113ca88a21cdf1e4230c23164cbf67d88da2f40b2e5662e62d1ae31722ab8b88b21

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i58734986.exe

    Filesize

    590KB

    MD5

    fa5c4cc610eb9b882dd49d57c91e856f

    SHA1

    169442ac3feb1988ff88b9e5dfbbb1ff634f6ad3

    SHA256

    dfab72691cbfd39913f7694be89071b3dc98c1873b95855b42c1f1191fca1ccb

    SHA512

    4d84ad07e051c84305194f086c9358f21b1615f78cd5c6a64d4e3cb69cf7f27336d6cea7027eaad2ad96e9b96f78378a9038df62053099dfa6b97608c4a75513

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i58734986.exe

    Filesize

    590KB

    MD5

    fa5c4cc610eb9b882dd49d57c91e856f

    SHA1

    169442ac3feb1988ff88b9e5dfbbb1ff634f6ad3

    SHA256

    dfab72691cbfd39913f7694be89071b3dc98c1873b95855b42c1f1191fca1ccb

    SHA512

    4d84ad07e051c84305194f086c9358f21b1615f78cd5c6a64d4e3cb69cf7f27336d6cea7027eaad2ad96e9b96f78378a9038df62053099dfa6b97608c4a75513

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i09453305.exe

    Filesize

    310KB

    MD5

    cdfb76668c1a0de0e545275331661b73

    SHA1

    7b96af1982fd27323468a5f74345c2de046a734a

    SHA256

    0dea7ae46714df770e3674c6ae78f5f93abe886b0b45f0df02cfd694e356a415

    SHA512

    bb5cdeff4fe687f746b63203b0e15ed6ce97dc6c8731640458d4872dbd9271573c9f21de46511dd019b75373546acd989ab76c34d4fd2ba4d5059138097e01f6

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i09453305.exe

    Filesize

    310KB

    MD5

    cdfb76668c1a0de0e545275331661b73

    SHA1

    7b96af1982fd27323468a5f74345c2de046a734a

    SHA256

    0dea7ae46714df770e3674c6ae78f5f93abe886b0b45f0df02cfd694e356a415

    SHA512

    bb5cdeff4fe687f746b63203b0e15ed6ce97dc6c8731640458d4872dbd9271573c9f21de46511dd019b75373546acd989ab76c34d4fd2ba4d5059138097e01f6

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a98532674.exe

    Filesize

    177KB

    MD5

    0e70e336b50840a9ddc7817fc0caf63b

    SHA1

    1666ebb4448cecb7a21f32b340441878f1fb720e

    SHA256

    0b96476ad431e92c5e7121f2d6cfae50d05f5eef14ba878f0d9550567e15ad70

    SHA512

    0c7b5b78575005bf600f069eca4e570f8b2b00f24b8594ea1032c1c77b7a8c03c11acc5dbcd8d2fc39775db020363696de8033a9fccf020a9ac8d7f36dad376e

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a98532674.exe

    Filesize

    177KB

    MD5

    0e70e336b50840a9ddc7817fc0caf63b

    SHA1

    1666ebb4448cecb7a21f32b340441878f1fb720e

    SHA256

    0b96476ad431e92c5e7121f2d6cfae50d05f5eef14ba878f0d9550567e15ad70

    SHA512

    0c7b5b78575005bf600f069eca4e570f8b2b00f24b8594ea1032c1c77b7a8c03c11acc5dbcd8d2fc39775db020363696de8033a9fccf020a9ac8d7f36dad376e

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b04622328.exe

    Filesize

    168KB

    MD5

    fb50afd3a9e83d1ce7932914cf8e3534

    SHA1

    fd996173a34c311485b4a9671d6fde3392ae2843

    SHA256

    498842af0fbff25318307ae68f5e0afbd2dc067e37d871b8dd5834592a36c720

    SHA512

    f0efa77feb8bb33c556b61d20e3598ed1271366b587ff449de3455a544b9bd2673548a4ccc5e87164a7c47001b7ecd2ae353ec507ef10794fdb2bee26513f6ab

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b04622328.exe

    Filesize

    168KB

    MD5

    fb50afd3a9e83d1ce7932914cf8e3534

    SHA1

    fd996173a34c311485b4a9671d6fde3392ae2843

    SHA256

    498842af0fbff25318307ae68f5e0afbd2dc067e37d871b8dd5834592a36c720

    SHA512

    f0efa77feb8bb33c556b61d20e3598ed1271366b587ff449de3455a544b9bd2673548a4ccc5e87164a7c47001b7ecd2ae353ec507ef10794fdb2bee26513f6ab

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\i07930430.exe

    Filesize

    1.2MB

    MD5

    7db1ac7c2f9d84fe7b11df33d9b65259

    SHA1

    ff41dfc211fbf4239dda95c705e6d479006cb402

    SHA256

    a81fdc3be528b464d464b74542d690ecd502ac503788c495c1c60f5526a192cd

    SHA512

    6b348156e4965a082e812ea952f5d68ddb1afb7be14c6b33facf580ece1a73a352a20a5f58f13456b748edee6a9c73ebb130ac9f704cf99374e2a72c00d2bd59

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\i07930430.exe

    Filesize

    1.2MB

    MD5

    7db1ac7c2f9d84fe7b11df33d9b65259

    SHA1

    ff41dfc211fbf4239dda95c705e6d479006cb402

    SHA256

    a81fdc3be528b464d464b74542d690ecd502ac503788c495c1c60f5526a192cd

    SHA512

    6b348156e4965a082e812ea952f5d68ddb1afb7be14c6b33facf580ece1a73a352a20a5f58f13456b748edee6a9c73ebb130ac9f704cf99374e2a72c00d2bd59

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\i41481659.exe

    Filesize

    1.1MB

    MD5

    b425b4a9f016d95cddc22b8e6543deb6

    SHA1

    a0b49db5b5e17a8add44d3b3eeb3fdab03659858

    SHA256

    6ffb2299ae539c576f6ba0cdbad6062151aa0745c720f3ff39ab123cf802c313

    SHA512

    302d06fab11fb6ad2a5ca233c782b3cffeba3c5ace9ceef68cb0d081ada79113ca88a21cdf1e4230c23164cbf67d88da2f40b2e5662e62d1ae31722ab8b88b21

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\i41481659.exe

    Filesize

    1.1MB

    MD5

    b425b4a9f016d95cddc22b8e6543deb6

    SHA1

    a0b49db5b5e17a8add44d3b3eeb3fdab03659858

    SHA256

    6ffb2299ae539c576f6ba0cdbad6062151aa0745c720f3ff39ab123cf802c313

    SHA512

    302d06fab11fb6ad2a5ca233c782b3cffeba3c5ace9ceef68cb0d081ada79113ca88a21cdf1e4230c23164cbf67d88da2f40b2e5662e62d1ae31722ab8b88b21

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\i58734986.exe

    Filesize

    590KB

    MD5

    fa5c4cc610eb9b882dd49d57c91e856f

    SHA1

    169442ac3feb1988ff88b9e5dfbbb1ff634f6ad3

    SHA256

    dfab72691cbfd39913f7694be89071b3dc98c1873b95855b42c1f1191fca1ccb

    SHA512

    4d84ad07e051c84305194f086c9358f21b1615f78cd5c6a64d4e3cb69cf7f27336d6cea7027eaad2ad96e9b96f78378a9038df62053099dfa6b97608c4a75513

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\i58734986.exe

    Filesize

    590KB

    MD5

    fa5c4cc610eb9b882dd49d57c91e856f

    SHA1

    169442ac3feb1988ff88b9e5dfbbb1ff634f6ad3

    SHA256

    dfab72691cbfd39913f7694be89071b3dc98c1873b95855b42c1f1191fca1ccb

    SHA512

    4d84ad07e051c84305194f086c9358f21b1615f78cd5c6a64d4e3cb69cf7f27336d6cea7027eaad2ad96e9b96f78378a9038df62053099dfa6b97608c4a75513

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\i09453305.exe

    Filesize

    310KB

    MD5

    cdfb76668c1a0de0e545275331661b73

    SHA1

    7b96af1982fd27323468a5f74345c2de046a734a

    SHA256

    0dea7ae46714df770e3674c6ae78f5f93abe886b0b45f0df02cfd694e356a415

    SHA512

    bb5cdeff4fe687f746b63203b0e15ed6ce97dc6c8731640458d4872dbd9271573c9f21de46511dd019b75373546acd989ab76c34d4fd2ba4d5059138097e01f6

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\i09453305.exe

    Filesize

    310KB

    MD5

    cdfb76668c1a0de0e545275331661b73

    SHA1

    7b96af1982fd27323468a5f74345c2de046a734a

    SHA256

    0dea7ae46714df770e3674c6ae78f5f93abe886b0b45f0df02cfd694e356a415

    SHA512

    bb5cdeff4fe687f746b63203b0e15ed6ce97dc6c8731640458d4872dbd9271573c9f21de46511dd019b75373546acd989ab76c34d4fd2ba4d5059138097e01f6

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a98532674.exe

    Filesize

    177KB

    MD5

    0e70e336b50840a9ddc7817fc0caf63b

    SHA1

    1666ebb4448cecb7a21f32b340441878f1fb720e

    SHA256

    0b96476ad431e92c5e7121f2d6cfae50d05f5eef14ba878f0d9550567e15ad70

    SHA512

    0c7b5b78575005bf600f069eca4e570f8b2b00f24b8594ea1032c1c77b7a8c03c11acc5dbcd8d2fc39775db020363696de8033a9fccf020a9ac8d7f36dad376e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a98532674.exe

    Filesize

    177KB

    MD5

    0e70e336b50840a9ddc7817fc0caf63b

    SHA1

    1666ebb4448cecb7a21f32b340441878f1fb720e

    SHA256

    0b96476ad431e92c5e7121f2d6cfae50d05f5eef14ba878f0d9550567e15ad70

    SHA512

    0c7b5b78575005bf600f069eca4e570f8b2b00f24b8594ea1032c1c77b7a8c03c11acc5dbcd8d2fc39775db020363696de8033a9fccf020a9ac8d7f36dad376e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b04622328.exe

    Filesize

    168KB

    MD5

    fb50afd3a9e83d1ce7932914cf8e3534

    SHA1

    fd996173a34c311485b4a9671d6fde3392ae2843

    SHA256

    498842af0fbff25318307ae68f5e0afbd2dc067e37d871b8dd5834592a36c720

    SHA512

    f0efa77feb8bb33c556b61d20e3598ed1271366b587ff449de3455a544b9bd2673548a4ccc5e87164a7c47001b7ecd2ae353ec507ef10794fdb2bee26513f6ab

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b04622328.exe

    Filesize

    168KB

    MD5

    fb50afd3a9e83d1ce7932914cf8e3534

    SHA1

    fd996173a34c311485b4a9671d6fde3392ae2843

    SHA256

    498842af0fbff25318307ae68f5e0afbd2dc067e37d871b8dd5834592a36c720

    SHA512

    f0efa77feb8bb33c556b61d20e3598ed1271366b587ff449de3455a544b9bd2673548a4ccc5e87164a7c47001b7ecd2ae353ec507ef10794fdb2bee26513f6ab

  • memory/532-106-0x0000000000470000-0x0000000000483000-memory.dmp

    Filesize

    76KB

  • memory/532-117-0x0000000000470000-0x0000000000483000-memory.dmp

    Filesize

    76KB

  • memory/532-115-0x0000000000470000-0x0000000000483000-memory.dmp

    Filesize

    76KB

  • memory/532-113-0x0000000000470000-0x0000000000483000-memory.dmp

    Filesize

    76KB

  • memory/532-111-0x0000000000470000-0x0000000000483000-memory.dmp

    Filesize

    76KB

  • memory/532-119-0x0000000000470000-0x0000000000483000-memory.dmp

    Filesize

    76KB

  • memory/532-121-0x0000000000470000-0x0000000000483000-memory.dmp

    Filesize

    76KB

  • memory/532-123-0x0000000000470000-0x0000000000483000-memory.dmp

    Filesize

    76KB

  • memory/532-125-0x0000000000470000-0x0000000000483000-memory.dmp

    Filesize

    76KB

  • memory/532-127-0x0000000000470000-0x0000000000483000-memory.dmp

    Filesize

    76KB

  • memory/532-129-0x0000000000470000-0x0000000000483000-memory.dmp

    Filesize

    76KB

  • memory/532-131-0x0000000000470000-0x0000000000483000-memory.dmp

    Filesize

    76KB

  • memory/532-133-0x0000000000470000-0x0000000000483000-memory.dmp

    Filesize

    76KB

  • memory/532-134-0x0000000004CB0000-0x0000000004CF0000-memory.dmp

    Filesize

    256KB

  • memory/532-135-0x0000000004CB0000-0x0000000004CF0000-memory.dmp

    Filesize

    256KB

  • memory/532-136-0x0000000004CB0000-0x0000000004CF0000-memory.dmp

    Filesize

    256KB

  • memory/532-109-0x0000000000470000-0x0000000000483000-memory.dmp

    Filesize

    76KB

  • memory/532-107-0x0000000000470000-0x0000000000483000-memory.dmp

    Filesize

    76KB

  • memory/532-105-0x0000000000470000-0x0000000000488000-memory.dmp

    Filesize

    96KB

  • memory/532-104-0x0000000000300000-0x000000000031A000-memory.dmp

    Filesize

    104KB

  • memory/1352-143-0x0000000000030000-0x0000000000060000-memory.dmp

    Filesize

    192KB

  • memory/1352-144-0x00000000003D0000-0x00000000003D6000-memory.dmp

    Filesize

    24KB

  • memory/1352-145-0x0000000002670000-0x00000000026B0000-memory.dmp

    Filesize

    256KB