Analysis

  • max time kernel
    17s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06-05-2023 20:24

General

  • Target

    0ad26d3093034b50faa90c4e7f0f2f2c1bce0efde5bc07620895f69bb70e9c1c.exe

  • Size

    1.2MB

  • MD5

    2119a2204db38869a011c9cdd026f024

  • SHA1

    1fda8a77a79caa0e8d3e6510928f0deef54560f6

  • SHA256

    0ad26d3093034b50faa90c4e7f0f2f2c1bce0efde5bc07620895f69bb70e9c1c

  • SHA512

    46c4e1ae21b607d36a6ad25f5cd897e878b169c85f9858646434b872a027ef586a80e66f20ebd739076def2aea32cdc0c54c11f767e82c170eb0c85ff4e2149c

  • SSDEEP

    24576:iyJ9LQISUdMNRkSp+6Z7SjBGnbQEsfQzFinveTn+dX8DfE:JHLQdUYRqI0BobQViiveD+If

Malware Config

Extracted

Family

redline

Botnet

luna

C2

217.196.96.56:4138

Attributes
  • auth_value

    16dec8addb01db1c11c59667022ef7a2

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 16 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ad26d3093034b50faa90c4e7f0f2f2c1bce0efde5bc07620895f69bb70e9c1c.exe
    "C:\Users\Admin\AppData\Local\Temp\0ad26d3093034b50faa90c4e7f0f2f2c1bce0efde5bc07620895f69bb70e9c1c.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9651696.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9651696.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2040
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4584763.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4584763.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1236
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1338364.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1338364.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1124
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n5141302.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n5141302.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1448
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o7180680.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o7180680.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:1572
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 648
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1940

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9651696.exe

    Filesize

    1.0MB

    MD5

    61adb7a15e29c8ac6a3958df16a837f3

    SHA1

    52cfa7e63354cf3b208e7cc8c3f6211558ee5528

    SHA256

    afa23ec7abc3e6fd65d635448219d4de8939b94b5c5a3924ee200309f0e91652

    SHA512

    1c598dfad56dd4672ff328a4beb6923b333eb3761cca98ad634c6aa41ba1651cd36d1aea49fd1babc513a4b74527e55893ccc14c5a62b36b4588c5ca65bcf90c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9651696.exe

    Filesize

    1.0MB

    MD5

    61adb7a15e29c8ac6a3958df16a837f3

    SHA1

    52cfa7e63354cf3b208e7cc8c3f6211558ee5528

    SHA256

    afa23ec7abc3e6fd65d635448219d4de8939b94b5c5a3924ee200309f0e91652

    SHA512

    1c598dfad56dd4672ff328a4beb6923b333eb3761cca98ad634c6aa41ba1651cd36d1aea49fd1babc513a4b74527e55893ccc14c5a62b36b4588c5ca65bcf90c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4584763.exe

    Filesize

    589KB

    MD5

    955c282dfafd6d85e947f3e2bb749689

    SHA1

    2031e4e145c2aaeb70a06403ee694aa82abb6f01

    SHA256

    1721ea51547ed395cdbe7f3f8e52c7f309ba5caa672e41b3a15a2cbcdc90d0c6

    SHA512

    c4aae9c95e05b34861b2ebce93ddbb88408f2581f1659136ced4ba5e04f8d3ceb0ddd37f64d35b17b3a3ede37797d1d75292a51137ddfed6766669eff73680b9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4584763.exe

    Filesize

    589KB

    MD5

    955c282dfafd6d85e947f3e2bb749689

    SHA1

    2031e4e145c2aaeb70a06403ee694aa82abb6f01

    SHA256

    1721ea51547ed395cdbe7f3f8e52c7f309ba5caa672e41b3a15a2cbcdc90d0c6

    SHA512

    c4aae9c95e05b34861b2ebce93ddbb88408f2581f1659136ced4ba5e04f8d3ceb0ddd37f64d35b17b3a3ede37797d1d75292a51137ddfed6766669eff73680b9

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1338364.exe

    Filesize

    385KB

    MD5

    14b2b386d84772cac95a534f46de34cd

    SHA1

    354220e29fb11d662c1538b4ddefc00ffb99581a

    SHA256

    198fcb60992e6e588bab200e9ea50a5672e6787177dbcc46ff9b94310b8b832f

    SHA512

    12a4a891c3656e3a74bafaea3fd94b3b439b1d4a86b97ea2b5ca42e4b76326ffbe5947248a98721f6315fb5c9be03327b4684532a2189b8cdbebc2e4d37dd79a

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1338364.exe

    Filesize

    385KB

    MD5

    14b2b386d84772cac95a534f46de34cd

    SHA1

    354220e29fb11d662c1538b4ddefc00ffb99581a

    SHA256

    198fcb60992e6e588bab200e9ea50a5672e6787177dbcc46ff9b94310b8b832f

    SHA512

    12a4a891c3656e3a74bafaea3fd94b3b439b1d4a86b97ea2b5ca42e4b76326ffbe5947248a98721f6315fb5c9be03327b4684532a2189b8cdbebc2e4d37dd79a

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n5141302.exe

    Filesize

    292KB

    MD5

    393290864f968c4a4eaef2b8dbb50a2f

    SHA1

    18f151c950827637d79f577887a21e17c50ac992

    SHA256

    a1bf33dd7b1702542b025cd5525831133f633390bd95f1477d62a09f54672346

    SHA512

    91829b73aaae1942be79a7e6c2db0bb253659ca6364f8c1e03ac45adfdb426715705a4824a7097090dfed7fe43ecfa31ac30018858592c916872c2c66fd9deb3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n5141302.exe

    Filesize

    292KB

    MD5

    393290864f968c4a4eaef2b8dbb50a2f

    SHA1

    18f151c950827637d79f577887a21e17c50ac992

    SHA256

    a1bf33dd7b1702542b025cd5525831133f633390bd95f1477d62a09f54672346

    SHA512

    91829b73aaae1942be79a7e6c2db0bb253659ca6364f8c1e03ac45adfdb426715705a4824a7097090dfed7fe43ecfa31ac30018858592c916872c2c66fd9deb3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n5141302.exe

    Filesize

    292KB

    MD5

    393290864f968c4a4eaef2b8dbb50a2f

    SHA1

    18f151c950827637d79f577887a21e17c50ac992

    SHA256

    a1bf33dd7b1702542b025cd5525831133f633390bd95f1477d62a09f54672346

    SHA512

    91829b73aaae1942be79a7e6c2db0bb253659ca6364f8c1e03ac45adfdb426715705a4824a7097090dfed7fe43ecfa31ac30018858592c916872c2c66fd9deb3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o7180680.exe

    Filesize

    168KB

    MD5

    847b8c6bef5b9fd82b587cee1635ac5d

    SHA1

    397b785caf784da0cbc1f155256a64029620d47c

    SHA256

    b75563aafa62ab76fb68e5d6386af5ab59abd930ba0e06d3e585df204ab08876

    SHA512

    0fa96d3aa96145e0004916bc5ea1c8179db14ce0e930f8c620c15be41f3404dc560433be305da4a27e827b45a19c46335a674c7fe18c31d8da6bdd1ff6126135

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o7180680.exe

    Filesize

    168KB

    MD5

    847b8c6bef5b9fd82b587cee1635ac5d

    SHA1

    397b785caf784da0cbc1f155256a64029620d47c

    SHA256

    b75563aafa62ab76fb68e5d6386af5ab59abd930ba0e06d3e585df204ab08876

    SHA512

    0fa96d3aa96145e0004916bc5ea1c8179db14ce0e930f8c620c15be41f3404dc560433be305da4a27e827b45a19c46335a674c7fe18c31d8da6bdd1ff6126135

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z9651696.exe

    Filesize

    1.0MB

    MD5

    61adb7a15e29c8ac6a3958df16a837f3

    SHA1

    52cfa7e63354cf3b208e7cc8c3f6211558ee5528

    SHA256

    afa23ec7abc3e6fd65d635448219d4de8939b94b5c5a3924ee200309f0e91652

    SHA512

    1c598dfad56dd4672ff328a4beb6923b333eb3761cca98ad634c6aa41ba1651cd36d1aea49fd1babc513a4b74527e55893ccc14c5a62b36b4588c5ca65bcf90c

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z9651696.exe

    Filesize

    1.0MB

    MD5

    61adb7a15e29c8ac6a3958df16a837f3

    SHA1

    52cfa7e63354cf3b208e7cc8c3f6211558ee5528

    SHA256

    afa23ec7abc3e6fd65d635448219d4de8939b94b5c5a3924ee200309f0e91652

    SHA512

    1c598dfad56dd4672ff328a4beb6923b333eb3761cca98ad634c6aa41ba1651cd36d1aea49fd1babc513a4b74527e55893ccc14c5a62b36b4588c5ca65bcf90c

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z4584763.exe

    Filesize

    589KB

    MD5

    955c282dfafd6d85e947f3e2bb749689

    SHA1

    2031e4e145c2aaeb70a06403ee694aa82abb6f01

    SHA256

    1721ea51547ed395cdbe7f3f8e52c7f309ba5caa672e41b3a15a2cbcdc90d0c6

    SHA512

    c4aae9c95e05b34861b2ebce93ddbb88408f2581f1659136ced4ba5e04f8d3ceb0ddd37f64d35b17b3a3ede37797d1d75292a51137ddfed6766669eff73680b9

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z4584763.exe

    Filesize

    589KB

    MD5

    955c282dfafd6d85e947f3e2bb749689

    SHA1

    2031e4e145c2aaeb70a06403ee694aa82abb6f01

    SHA256

    1721ea51547ed395cdbe7f3f8e52c7f309ba5caa672e41b3a15a2cbcdc90d0c6

    SHA512

    c4aae9c95e05b34861b2ebce93ddbb88408f2581f1659136ced4ba5e04f8d3ceb0ddd37f64d35b17b3a3ede37797d1d75292a51137ddfed6766669eff73680b9

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z1338364.exe

    Filesize

    385KB

    MD5

    14b2b386d84772cac95a534f46de34cd

    SHA1

    354220e29fb11d662c1538b4ddefc00ffb99581a

    SHA256

    198fcb60992e6e588bab200e9ea50a5672e6787177dbcc46ff9b94310b8b832f

    SHA512

    12a4a891c3656e3a74bafaea3fd94b3b439b1d4a86b97ea2b5ca42e4b76326ffbe5947248a98721f6315fb5c9be03327b4684532a2189b8cdbebc2e4d37dd79a

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z1338364.exe

    Filesize

    385KB

    MD5

    14b2b386d84772cac95a534f46de34cd

    SHA1

    354220e29fb11d662c1538b4ddefc00ffb99581a

    SHA256

    198fcb60992e6e588bab200e9ea50a5672e6787177dbcc46ff9b94310b8b832f

    SHA512

    12a4a891c3656e3a74bafaea3fd94b3b439b1d4a86b97ea2b5ca42e4b76326ffbe5947248a98721f6315fb5c9be03327b4684532a2189b8cdbebc2e4d37dd79a

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\n5141302.exe

    Filesize

    292KB

    MD5

    393290864f968c4a4eaef2b8dbb50a2f

    SHA1

    18f151c950827637d79f577887a21e17c50ac992

    SHA256

    a1bf33dd7b1702542b025cd5525831133f633390bd95f1477d62a09f54672346

    SHA512

    91829b73aaae1942be79a7e6c2db0bb253659ca6364f8c1e03ac45adfdb426715705a4824a7097090dfed7fe43ecfa31ac30018858592c916872c2c66fd9deb3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\n5141302.exe

    Filesize

    292KB

    MD5

    393290864f968c4a4eaef2b8dbb50a2f

    SHA1

    18f151c950827637d79f577887a21e17c50ac992

    SHA256

    a1bf33dd7b1702542b025cd5525831133f633390bd95f1477d62a09f54672346

    SHA512

    91829b73aaae1942be79a7e6c2db0bb253659ca6364f8c1e03ac45adfdb426715705a4824a7097090dfed7fe43ecfa31ac30018858592c916872c2c66fd9deb3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\n5141302.exe

    Filesize

    292KB

    MD5

    393290864f968c4a4eaef2b8dbb50a2f

    SHA1

    18f151c950827637d79f577887a21e17c50ac992

    SHA256

    a1bf33dd7b1702542b025cd5525831133f633390bd95f1477d62a09f54672346

    SHA512

    91829b73aaae1942be79a7e6c2db0bb253659ca6364f8c1e03ac45adfdb426715705a4824a7097090dfed7fe43ecfa31ac30018858592c916872c2c66fd9deb3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\o7180680.exe

    Filesize

    168KB

    MD5

    847b8c6bef5b9fd82b587cee1635ac5d

    SHA1

    397b785caf784da0cbc1f155256a64029620d47c

    SHA256

    b75563aafa62ab76fb68e5d6386af5ab59abd930ba0e06d3e585df204ab08876

    SHA512

    0fa96d3aa96145e0004916bc5ea1c8179db14ce0e930f8c620c15be41f3404dc560433be305da4a27e827b45a19c46335a674c7fe18c31d8da6bdd1ff6126135

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\o7180680.exe

    Filesize

    168KB

    MD5

    847b8c6bef5b9fd82b587cee1635ac5d

    SHA1

    397b785caf784da0cbc1f155256a64029620d47c

    SHA256

    b75563aafa62ab76fb68e5d6386af5ab59abd930ba0e06d3e585df204ab08876

    SHA512

    0fa96d3aa96145e0004916bc5ea1c8179db14ce0e930f8c620c15be41f3404dc560433be305da4a27e827b45a19c46335a674c7fe18c31d8da6bdd1ff6126135

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\o7180680.exe

    Filesize

    168KB

    MD5

    847b8c6bef5b9fd82b587cee1635ac5d

    SHA1

    397b785caf784da0cbc1f155256a64029620d47c

    SHA256

    b75563aafa62ab76fb68e5d6386af5ab59abd930ba0e06d3e585df204ab08876

    SHA512

    0fa96d3aa96145e0004916bc5ea1c8179db14ce0e930f8c620c15be41f3404dc560433be305da4a27e827b45a19c46335a674c7fe18c31d8da6bdd1ff6126135

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\o7180680.exe

    Filesize

    168KB

    MD5

    847b8c6bef5b9fd82b587cee1635ac5d

    SHA1

    397b785caf784da0cbc1f155256a64029620d47c

    SHA256

    b75563aafa62ab76fb68e5d6386af5ab59abd930ba0e06d3e585df204ab08876

    SHA512

    0fa96d3aa96145e0004916bc5ea1c8179db14ce0e930f8c620c15be41f3404dc560433be305da4a27e827b45a19c46335a674c7fe18c31d8da6bdd1ff6126135

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\o7180680.exe

    Filesize

    168KB

    MD5

    847b8c6bef5b9fd82b587cee1635ac5d

    SHA1

    397b785caf784da0cbc1f155256a64029620d47c

    SHA256

    b75563aafa62ab76fb68e5d6386af5ab59abd930ba0e06d3e585df204ab08876

    SHA512

    0fa96d3aa96145e0004916bc5ea1c8179db14ce0e930f8c620c15be41f3404dc560433be305da4a27e827b45a19c46335a674c7fe18c31d8da6bdd1ff6126135

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\o7180680.exe

    Filesize

    168KB

    MD5

    847b8c6bef5b9fd82b587cee1635ac5d

    SHA1

    397b785caf784da0cbc1f155256a64029620d47c

    SHA256

    b75563aafa62ab76fb68e5d6386af5ab59abd930ba0e06d3e585df204ab08876

    SHA512

    0fa96d3aa96145e0004916bc5ea1c8179db14ce0e930f8c620c15be41f3404dc560433be305da4a27e827b45a19c46335a674c7fe18c31d8da6bdd1ff6126135

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\o7180680.exe

    Filesize

    168KB

    MD5

    847b8c6bef5b9fd82b587cee1635ac5d

    SHA1

    397b785caf784da0cbc1f155256a64029620d47c

    SHA256

    b75563aafa62ab76fb68e5d6386af5ab59abd930ba0e06d3e585df204ab08876

    SHA512

    0fa96d3aa96145e0004916bc5ea1c8179db14ce0e930f8c620c15be41f3404dc560433be305da4a27e827b45a19c46335a674c7fe18c31d8da6bdd1ff6126135

  • memory/1448-107-0x0000000001EC0000-0x0000000001ED2000-memory.dmp

    Filesize

    72KB

  • memory/1448-131-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1448-117-0x0000000001EC0000-0x0000000001ED2000-memory.dmp

    Filesize

    72KB

  • memory/1448-120-0x0000000001EC0000-0x0000000001ED2000-memory.dmp

    Filesize

    72KB

  • memory/1448-119-0x0000000000240000-0x000000000026D000-memory.dmp

    Filesize

    180KB

  • memory/1448-121-0x0000000004B90000-0x0000000004BD0000-memory.dmp

    Filesize

    256KB

  • memory/1448-127-0x0000000001EC0000-0x0000000001ED2000-memory.dmp

    Filesize

    72KB

  • memory/1448-129-0x0000000001EC0000-0x0000000001ED2000-memory.dmp

    Filesize

    72KB

  • memory/1448-125-0x0000000001EC0000-0x0000000001ED2000-memory.dmp

    Filesize

    72KB

  • memory/1448-123-0x0000000001EC0000-0x0000000001ED2000-memory.dmp

    Filesize

    72KB

  • memory/1448-130-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1448-115-0x0000000001EC0000-0x0000000001ED2000-memory.dmp

    Filesize

    72KB

  • memory/1448-113-0x0000000001EC0000-0x0000000001ED2000-memory.dmp

    Filesize

    72KB

  • memory/1448-111-0x0000000001EC0000-0x0000000001ED2000-memory.dmp

    Filesize

    72KB

  • memory/1448-109-0x0000000001EC0000-0x0000000001ED2000-memory.dmp

    Filesize

    72KB

  • memory/1448-105-0x0000000001EC0000-0x0000000001ED2000-memory.dmp

    Filesize

    72KB

  • memory/1448-98-0x0000000000610000-0x000000000062A000-memory.dmp

    Filesize

    104KB

  • memory/1448-103-0x0000000001EC0000-0x0000000001ED2000-memory.dmp

    Filesize

    72KB

  • memory/1448-101-0x0000000001EC0000-0x0000000001ED2000-memory.dmp

    Filesize

    72KB

  • memory/1448-100-0x0000000001EC0000-0x0000000001ED2000-memory.dmp

    Filesize

    72KB

  • memory/1448-99-0x0000000001EC0000-0x0000000001ED8000-memory.dmp

    Filesize

    96KB

  • memory/1572-138-0x0000000000290000-0x00000000002C0000-memory.dmp

    Filesize

    192KB