Analysis

  • max time kernel
    132s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 20:08

General

  • Target

    005e9df4f61f779fb2ab062a91060b825e882dfc36978649260565d1f8f66427.exe

  • Size

    1.4MB

  • MD5

    36afbedc4aea6e680097c7134f721b05

  • SHA1

    681c0686d82b3050adcb1cda99ad79a3d46e23be

  • SHA256

    005e9df4f61f779fb2ab062a91060b825e882dfc36978649260565d1f8f66427

  • SHA512

    9b9ab7a650db6dc5ea5912e1527a41b87e254b4ea5f24adf149d4a4781263a218ae40ed0a409305f48dd23d49786a6dce8cc743edc0c879676b946be2ad99323

  • SSDEEP

    24576:byhhBvapvYX4O5uQNj8RCEC1NmBl2AQMwtuSZ6eY+0b99bTEQcgOg9VjPI855Y2:O5voO4Qd8RvC1NuwArhSZ6egb99bTPtP

Malware Config

Extracted

Family

redline

Botnet

massa

C2

185.161.248.73:4164

Attributes
  • auth_value

    413bf908ab27d959c62bef532780f511

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\005e9df4f61f779fb2ab062a91060b825e882dfc36978649260565d1f8f66427.exe
    "C:\Users\Admin\AppData\Local\Temp\005e9df4f61f779fb2ab062a91060b825e882dfc36978649260565d1f8f66427.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i99561726.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i99561726.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1968
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i17007523.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i17007523.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:432
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i42833455.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i42833455.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1632
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i67360280.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i67360280.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:452
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a96940714.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a96940714.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Loads dropped DLL
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1636
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b39061956.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b39061956.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:888

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i99561726.exe

    Filesize

    1.2MB

    MD5

    50b95bca7dc289b0a5419523604706bd

    SHA1

    3cdd2e9f1e526664b26745b73c7d390e6d91af84

    SHA256

    1223dc0c25800776bc4bf16e443ceb39fa17bc46987f24720b9a44465bbb1f52

    SHA512

    74f7dc986961d3630ec0b6cbae7d6300a4b35b622270b7831d851bcd0cc1611e05ee2fa4014e6e8cd09c4322448146832ce84d15ba110729e8a0226929f2e7f7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i99561726.exe

    Filesize

    1.2MB

    MD5

    50b95bca7dc289b0a5419523604706bd

    SHA1

    3cdd2e9f1e526664b26745b73c7d390e6d91af84

    SHA256

    1223dc0c25800776bc4bf16e443ceb39fa17bc46987f24720b9a44465bbb1f52

    SHA512

    74f7dc986961d3630ec0b6cbae7d6300a4b35b622270b7831d851bcd0cc1611e05ee2fa4014e6e8cd09c4322448146832ce84d15ba110729e8a0226929f2e7f7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i17007523.exe

    Filesize

    1.1MB

    MD5

    a8e9bf1e2fe9ed013e133c3142df6971

    SHA1

    2201985d413dba0da7652a661fe2b66fa6e6f23f

    SHA256

    17fd101cb7647d0b979121bd51cdc69df7e6c1791c04c1511028a59e8d7006c3

    SHA512

    abd1de936c870903945d71a2bb433b3c4c6fe0d6adf6a49d0749f2f14110b405ae1aa37b942a137e963211ee2cbb44e15dbb72bdc869d3481c1f2a756bbe5d19

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i17007523.exe

    Filesize

    1.1MB

    MD5

    a8e9bf1e2fe9ed013e133c3142df6971

    SHA1

    2201985d413dba0da7652a661fe2b66fa6e6f23f

    SHA256

    17fd101cb7647d0b979121bd51cdc69df7e6c1791c04c1511028a59e8d7006c3

    SHA512

    abd1de936c870903945d71a2bb433b3c4c6fe0d6adf6a49d0749f2f14110b405ae1aa37b942a137e963211ee2cbb44e15dbb72bdc869d3481c1f2a756bbe5d19

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i42833455.exe

    Filesize

    643KB

    MD5

    db8a2d5ac8dc49a5351dd505c6a89c02

    SHA1

    30ed7c9b18603d995f7d066a6f72f416cc4b3a81

    SHA256

    9da92e9ba9ab911b53180bfd5544186400b8a6c99d8f8cf0cbdd665307951935

    SHA512

    e623d51e57c81d774b1b47bc36360f0aed8cf28483c8fd1ca761364f1a031f401a4646dc6b07d3200047db4e576ab1fe395ec79a4ad2ad50f32d257678ae8c08

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i42833455.exe

    Filesize

    643KB

    MD5

    db8a2d5ac8dc49a5351dd505c6a89c02

    SHA1

    30ed7c9b18603d995f7d066a6f72f416cc4b3a81

    SHA256

    9da92e9ba9ab911b53180bfd5544186400b8a6c99d8f8cf0cbdd665307951935

    SHA512

    e623d51e57c81d774b1b47bc36360f0aed8cf28483c8fd1ca761364f1a031f401a4646dc6b07d3200047db4e576ab1fe395ec79a4ad2ad50f32d257678ae8c08

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i67360280.exe

    Filesize

    385KB

    MD5

    8aa2accf20fda21d2f7c608b9911cb9f

    SHA1

    dcc3e74af88c98c2c67ec2843a7d5a6383327e33

    SHA256

    4aeb8009ee858cf27806e4c6d83509b6481f99e906389de59d0368207d464383

    SHA512

    f1b5bba545e1d008516d69c3cc67ff51769f9124bae5e1b6d0401473cd506af6a415c3ad2af045fd082a539faca09544a396629aa045e7d10c348be587f1d1b5

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i67360280.exe

    Filesize

    385KB

    MD5

    8aa2accf20fda21d2f7c608b9911cb9f

    SHA1

    dcc3e74af88c98c2c67ec2843a7d5a6383327e33

    SHA256

    4aeb8009ee858cf27806e4c6d83509b6481f99e906389de59d0368207d464383

    SHA512

    f1b5bba545e1d008516d69c3cc67ff51769f9124bae5e1b6d0401473cd506af6a415c3ad2af045fd082a539faca09544a396629aa045e7d10c348be587f1d1b5

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a96940714.exe

    Filesize

    291KB

    MD5

    a336d9278acff5a1d96483fc5146013e

    SHA1

    812d0cc90c3e9078fe1ba8096e57308eb263420b

    SHA256

    94e8f3df5595df96183bccfa9e6a3f5621438a1126f92d05ff35042f6293a44c

    SHA512

    1696f24893fbe247cb1d9cb0202a17a4f95b8fe4c37f6142201ae5e5306380adf4182936daba51853fe5f5b1f5b6fc22fa28e9a74c68ca926fb1382651c26a89

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a96940714.exe

    Filesize

    291KB

    MD5

    a336d9278acff5a1d96483fc5146013e

    SHA1

    812d0cc90c3e9078fe1ba8096e57308eb263420b

    SHA256

    94e8f3df5595df96183bccfa9e6a3f5621438a1126f92d05ff35042f6293a44c

    SHA512

    1696f24893fbe247cb1d9cb0202a17a4f95b8fe4c37f6142201ae5e5306380adf4182936daba51853fe5f5b1f5b6fc22fa28e9a74c68ca926fb1382651c26a89

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a96940714.exe

    Filesize

    291KB

    MD5

    a336d9278acff5a1d96483fc5146013e

    SHA1

    812d0cc90c3e9078fe1ba8096e57308eb263420b

    SHA256

    94e8f3df5595df96183bccfa9e6a3f5621438a1126f92d05ff35042f6293a44c

    SHA512

    1696f24893fbe247cb1d9cb0202a17a4f95b8fe4c37f6142201ae5e5306380adf4182936daba51853fe5f5b1f5b6fc22fa28e9a74c68ca926fb1382651c26a89

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b39061956.exe

    Filesize

    168KB

    MD5

    20c6a33503daa0a10c4856b41b4c6628

    SHA1

    e406bbaae8c9ecddf8ee54b477394024bdc3e1c1

    SHA256

    915531524f885f8f0f5179d09e0a2e4d93149a6932564e4b61d48d6c17681579

    SHA512

    681e7df321dc41f8d5cd3449ef9c48cc8ba019cdeec2844002f020b47ec9c53e1d2798bdcad4347a1db01d1c037d59bfd2553abac88cecdf139740448d9b56b7

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b39061956.exe

    Filesize

    168KB

    MD5

    20c6a33503daa0a10c4856b41b4c6628

    SHA1

    e406bbaae8c9ecddf8ee54b477394024bdc3e1c1

    SHA256

    915531524f885f8f0f5179d09e0a2e4d93149a6932564e4b61d48d6c17681579

    SHA512

    681e7df321dc41f8d5cd3449ef9c48cc8ba019cdeec2844002f020b47ec9c53e1d2798bdcad4347a1db01d1c037d59bfd2553abac88cecdf139740448d9b56b7

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\i99561726.exe

    Filesize

    1.2MB

    MD5

    50b95bca7dc289b0a5419523604706bd

    SHA1

    3cdd2e9f1e526664b26745b73c7d390e6d91af84

    SHA256

    1223dc0c25800776bc4bf16e443ceb39fa17bc46987f24720b9a44465bbb1f52

    SHA512

    74f7dc986961d3630ec0b6cbae7d6300a4b35b622270b7831d851bcd0cc1611e05ee2fa4014e6e8cd09c4322448146832ce84d15ba110729e8a0226929f2e7f7

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\i99561726.exe

    Filesize

    1.2MB

    MD5

    50b95bca7dc289b0a5419523604706bd

    SHA1

    3cdd2e9f1e526664b26745b73c7d390e6d91af84

    SHA256

    1223dc0c25800776bc4bf16e443ceb39fa17bc46987f24720b9a44465bbb1f52

    SHA512

    74f7dc986961d3630ec0b6cbae7d6300a4b35b622270b7831d851bcd0cc1611e05ee2fa4014e6e8cd09c4322448146832ce84d15ba110729e8a0226929f2e7f7

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\i17007523.exe

    Filesize

    1.1MB

    MD5

    a8e9bf1e2fe9ed013e133c3142df6971

    SHA1

    2201985d413dba0da7652a661fe2b66fa6e6f23f

    SHA256

    17fd101cb7647d0b979121bd51cdc69df7e6c1791c04c1511028a59e8d7006c3

    SHA512

    abd1de936c870903945d71a2bb433b3c4c6fe0d6adf6a49d0749f2f14110b405ae1aa37b942a137e963211ee2cbb44e15dbb72bdc869d3481c1f2a756bbe5d19

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\i17007523.exe

    Filesize

    1.1MB

    MD5

    a8e9bf1e2fe9ed013e133c3142df6971

    SHA1

    2201985d413dba0da7652a661fe2b66fa6e6f23f

    SHA256

    17fd101cb7647d0b979121bd51cdc69df7e6c1791c04c1511028a59e8d7006c3

    SHA512

    abd1de936c870903945d71a2bb433b3c4c6fe0d6adf6a49d0749f2f14110b405ae1aa37b942a137e963211ee2cbb44e15dbb72bdc869d3481c1f2a756bbe5d19

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\i42833455.exe

    Filesize

    643KB

    MD5

    db8a2d5ac8dc49a5351dd505c6a89c02

    SHA1

    30ed7c9b18603d995f7d066a6f72f416cc4b3a81

    SHA256

    9da92e9ba9ab911b53180bfd5544186400b8a6c99d8f8cf0cbdd665307951935

    SHA512

    e623d51e57c81d774b1b47bc36360f0aed8cf28483c8fd1ca761364f1a031f401a4646dc6b07d3200047db4e576ab1fe395ec79a4ad2ad50f32d257678ae8c08

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\i42833455.exe

    Filesize

    643KB

    MD5

    db8a2d5ac8dc49a5351dd505c6a89c02

    SHA1

    30ed7c9b18603d995f7d066a6f72f416cc4b3a81

    SHA256

    9da92e9ba9ab911b53180bfd5544186400b8a6c99d8f8cf0cbdd665307951935

    SHA512

    e623d51e57c81d774b1b47bc36360f0aed8cf28483c8fd1ca761364f1a031f401a4646dc6b07d3200047db4e576ab1fe395ec79a4ad2ad50f32d257678ae8c08

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\i67360280.exe

    Filesize

    385KB

    MD5

    8aa2accf20fda21d2f7c608b9911cb9f

    SHA1

    dcc3e74af88c98c2c67ec2843a7d5a6383327e33

    SHA256

    4aeb8009ee858cf27806e4c6d83509b6481f99e906389de59d0368207d464383

    SHA512

    f1b5bba545e1d008516d69c3cc67ff51769f9124bae5e1b6d0401473cd506af6a415c3ad2af045fd082a539faca09544a396629aa045e7d10c348be587f1d1b5

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\i67360280.exe

    Filesize

    385KB

    MD5

    8aa2accf20fda21d2f7c608b9911cb9f

    SHA1

    dcc3e74af88c98c2c67ec2843a7d5a6383327e33

    SHA256

    4aeb8009ee858cf27806e4c6d83509b6481f99e906389de59d0368207d464383

    SHA512

    f1b5bba545e1d008516d69c3cc67ff51769f9124bae5e1b6d0401473cd506af6a415c3ad2af045fd082a539faca09544a396629aa045e7d10c348be587f1d1b5

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a96940714.exe

    Filesize

    291KB

    MD5

    a336d9278acff5a1d96483fc5146013e

    SHA1

    812d0cc90c3e9078fe1ba8096e57308eb263420b

    SHA256

    94e8f3df5595df96183bccfa9e6a3f5621438a1126f92d05ff35042f6293a44c

    SHA512

    1696f24893fbe247cb1d9cb0202a17a4f95b8fe4c37f6142201ae5e5306380adf4182936daba51853fe5f5b1f5b6fc22fa28e9a74c68ca926fb1382651c26a89

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a96940714.exe

    Filesize

    291KB

    MD5

    a336d9278acff5a1d96483fc5146013e

    SHA1

    812d0cc90c3e9078fe1ba8096e57308eb263420b

    SHA256

    94e8f3df5595df96183bccfa9e6a3f5621438a1126f92d05ff35042f6293a44c

    SHA512

    1696f24893fbe247cb1d9cb0202a17a4f95b8fe4c37f6142201ae5e5306380adf4182936daba51853fe5f5b1f5b6fc22fa28e9a74c68ca926fb1382651c26a89

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a96940714.exe

    Filesize

    291KB

    MD5

    a336d9278acff5a1d96483fc5146013e

    SHA1

    812d0cc90c3e9078fe1ba8096e57308eb263420b

    SHA256

    94e8f3df5595df96183bccfa9e6a3f5621438a1126f92d05ff35042f6293a44c

    SHA512

    1696f24893fbe247cb1d9cb0202a17a4f95b8fe4c37f6142201ae5e5306380adf4182936daba51853fe5f5b1f5b6fc22fa28e9a74c68ca926fb1382651c26a89

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b39061956.exe

    Filesize

    168KB

    MD5

    20c6a33503daa0a10c4856b41b4c6628

    SHA1

    e406bbaae8c9ecddf8ee54b477394024bdc3e1c1

    SHA256

    915531524f885f8f0f5179d09e0a2e4d93149a6932564e4b61d48d6c17681579

    SHA512

    681e7df321dc41f8d5cd3449ef9c48cc8ba019cdeec2844002f020b47ec9c53e1d2798bdcad4347a1db01d1c037d59bfd2553abac88cecdf139740448d9b56b7

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b39061956.exe

    Filesize

    168KB

    MD5

    20c6a33503daa0a10c4856b41b4c6628

    SHA1

    e406bbaae8c9ecddf8ee54b477394024bdc3e1c1

    SHA256

    915531524f885f8f0f5179d09e0a2e4d93149a6932564e4b61d48d6c17681579

    SHA512

    681e7df321dc41f8d5cd3449ef9c48cc8ba019cdeec2844002f020b47ec9c53e1d2798bdcad4347a1db01d1c037d59bfd2553abac88cecdf139740448d9b56b7

  • memory/888-151-0x00000000004B0000-0x00000000004F0000-memory.dmp

    Filesize

    256KB

  • memory/888-150-0x00000000002F0000-0x00000000002F6000-memory.dmp

    Filesize

    24KB

  • memory/888-149-0x00000000001C0000-0x00000000001F0000-memory.dmp

    Filesize

    192KB

  • memory/888-152-0x00000000004B0000-0x00000000004F0000-memory.dmp

    Filesize

    256KB

  • memory/1636-112-0x0000000000DC0000-0x0000000000DD2000-memory.dmp

    Filesize

    72KB

  • memory/1636-122-0x0000000000DC0000-0x0000000000DD2000-memory.dmp

    Filesize

    72KB

  • memory/1636-124-0x0000000000DC0000-0x0000000000DD2000-memory.dmp

    Filesize

    72KB

  • memory/1636-126-0x0000000000DC0000-0x0000000000DD2000-memory.dmp

    Filesize

    72KB

  • memory/1636-128-0x0000000000DC0000-0x0000000000DD2000-memory.dmp

    Filesize

    72KB

  • memory/1636-130-0x0000000000DC0000-0x0000000000DD2000-memory.dmp

    Filesize

    72KB

  • memory/1636-132-0x0000000000DC0000-0x0000000000DD2000-memory.dmp

    Filesize

    72KB

  • memory/1636-134-0x0000000000DC0000-0x0000000000DD2000-memory.dmp

    Filesize

    72KB

  • memory/1636-136-0x0000000000DC0000-0x0000000000DD2000-memory.dmp

    Filesize

    72KB

  • memory/1636-138-0x0000000000DC0000-0x0000000000DD2000-memory.dmp

    Filesize

    72KB

  • memory/1636-139-0x0000000004DB0000-0x0000000004DF0000-memory.dmp

    Filesize

    256KB

  • memory/1636-140-0x0000000004DB0000-0x0000000004DF0000-memory.dmp

    Filesize

    256KB

  • memory/1636-141-0x0000000000400000-0x00000000006C9000-memory.dmp

    Filesize

    2.8MB

  • memory/1636-142-0x0000000000400000-0x00000000006C9000-memory.dmp

    Filesize

    2.8MB

  • memory/1636-120-0x0000000000DC0000-0x0000000000DD2000-memory.dmp

    Filesize

    72KB

  • memory/1636-118-0x0000000000DC0000-0x0000000000DD2000-memory.dmp

    Filesize

    72KB

  • memory/1636-116-0x0000000000DC0000-0x0000000000DD2000-memory.dmp

    Filesize

    72KB

  • memory/1636-114-0x0000000000DC0000-0x0000000000DD2000-memory.dmp

    Filesize

    72KB

  • memory/1636-111-0x0000000000DC0000-0x0000000000DD2000-memory.dmp

    Filesize

    72KB

  • memory/1636-110-0x0000000000DC0000-0x0000000000DD8000-memory.dmp

    Filesize

    96KB

  • memory/1636-109-0x00000000003D0000-0x00000000003EA000-memory.dmp

    Filesize

    104KB

  • memory/1636-108-0x0000000000240000-0x000000000026D000-memory.dmp

    Filesize

    180KB