Analysis

  • max time kernel
    148s
  • max time network
    185s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 21:14

General

  • Target

    31b7ca278cfa9e50e9a4bb48f1fa8c7d18e53c9946df8e96a72fe93c5c428bc6.exe

  • Size

    1.4MB

  • MD5

    5995faa34c6309dade9dcec6ff29dbfc

  • SHA1

    92996db4c1b791b53d82cc18a4531cafc7d8f898

  • SHA256

    31b7ca278cfa9e50e9a4bb48f1fa8c7d18e53c9946df8e96a72fe93c5c428bc6

  • SHA512

    dd65c8b5654a0186fe806ae2f9d7688fef959ac6d97b9e7b28c3a70c27bd6d4f416a5eae73bfa01457ab13234e7f2d4aedf70c16cf230ea5c4de9d1fce5169f1

  • SSDEEP

    24576:3yL+RNivMvbtPT8nNTMwxZdJEiL4ADAb174OY7V2eRTAB5QUakEGpFc9Owod7i/R:CLCbtL8nNTM6tLnD2174X45+k1o9O3dt

Malware Config

Extracted

Family

redline

Botnet

mask

C2

217.196.96.56:4138

Attributes
  • auth_value

    31aef25be0febb8e491794ef7f502c50

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\31b7ca278cfa9e50e9a4bb48f1fa8c7d18e53c9946df8e96a72fe93c5c428bc6.exe
    "C:\Users\Admin\AppData\Local\Temp\31b7ca278cfa9e50e9a4bb48f1fa8c7d18e53c9946df8e96a72fe93c5c428bc6.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1132
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6456754.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6456754.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1688
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9685693.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9685693.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:964
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9779158.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9779158.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:584
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2225737.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2225737.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:628
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a3054767.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a3054767.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Loads dropped DLL
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1860
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8454196.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8454196.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1548

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6456754.exe

    Filesize

    1.3MB

    MD5

    0b500f9e69f3842ebf19ef674caf2319

    SHA1

    84622757501ba9f195d9fd9a453624169826f8a7

    SHA256

    b28f82c1f4f8d29e2a4540d63c488d22c4296b315a23a9757bc0cf17a425c7b0

    SHA512

    26277ceb5174d690a2c94e643832d0aa953c7024cbcbd6b1d43c26a4ee32462cf26beb0b67cc69c78508cf35d246bf19b2d58621ca84efae8eea98843fe203c4

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6456754.exe

    Filesize

    1.3MB

    MD5

    0b500f9e69f3842ebf19ef674caf2319

    SHA1

    84622757501ba9f195d9fd9a453624169826f8a7

    SHA256

    b28f82c1f4f8d29e2a4540d63c488d22c4296b315a23a9757bc0cf17a425c7b0

    SHA512

    26277ceb5174d690a2c94e643832d0aa953c7024cbcbd6b1d43c26a4ee32462cf26beb0b67cc69c78508cf35d246bf19b2d58621ca84efae8eea98843fe203c4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9685693.exe

    Filesize

    845KB

    MD5

    eb7e83149e17f8c8a4e41c7e509ad180

    SHA1

    5e0be25a0235bda2ce5e7c59747ec218109b1f05

    SHA256

    d4213ca30ea1c42e628d36137cc726faa37f6a9b5b7e8ff9fb07fe345bf2d128

    SHA512

    2218f65933dba48a8f4ef1651bd5e771563d6e485c53acf258bafd71eb3ecf7e5eedc998487d56f802b3d4384ab4b04ed6dd27c1e73ac8187e5780ec1bbfcb9e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9685693.exe

    Filesize

    845KB

    MD5

    eb7e83149e17f8c8a4e41c7e509ad180

    SHA1

    5e0be25a0235bda2ce5e7c59747ec218109b1f05

    SHA256

    d4213ca30ea1c42e628d36137cc726faa37f6a9b5b7e8ff9fb07fe345bf2d128

    SHA512

    2218f65933dba48a8f4ef1651bd5e771563d6e485c53acf258bafd71eb3ecf7e5eedc998487d56f802b3d4384ab4b04ed6dd27c1e73ac8187e5780ec1bbfcb9e

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9779158.exe

    Filesize

    641KB

    MD5

    6bc7c6eae1dbedf98ebfda1f29c4bf19

    SHA1

    b10ce40bce33a2f1c7d8cff6bd1187661ce24acf

    SHA256

    515cc6264e9d6c3516544ce72f924c2de5e2662d9abb03aeef77df99d2209b9e

    SHA512

    26cb02c1332520b6c785fb071135939b0dc1f73b5446a9fa70080d706c9dc3095af1957f6ff2d253e50a1e159f818e1862cf708428204b812de19d9490af4743

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9779158.exe

    Filesize

    641KB

    MD5

    6bc7c6eae1dbedf98ebfda1f29c4bf19

    SHA1

    b10ce40bce33a2f1c7d8cff6bd1187661ce24acf

    SHA256

    515cc6264e9d6c3516544ce72f924c2de5e2662d9abb03aeef77df99d2209b9e

    SHA512

    26cb02c1332520b6c785fb071135939b0dc1f73b5446a9fa70080d706c9dc3095af1957f6ff2d253e50a1e159f818e1862cf708428204b812de19d9490af4743

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2225737.exe

    Filesize

    383KB

    MD5

    7cf2f92551d4734e0144c6fb87aebfe0

    SHA1

    5140bea336bf7e8f76e6184dbe521f782bc96bc5

    SHA256

    ff714d8a93010227c1204fb62e5b8d2fc582e2a671e9d75c39dd6de2d8467783

    SHA512

    284d81c92ed50ab33209260936bcda5359e612962df395bcc6964ae9a1f37c3f5441de22ce47ee477cae9da978b32a4e3921db34b41dfc02f6bee94b0e7dae3b

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2225737.exe

    Filesize

    383KB

    MD5

    7cf2f92551d4734e0144c6fb87aebfe0

    SHA1

    5140bea336bf7e8f76e6184dbe521f782bc96bc5

    SHA256

    ff714d8a93010227c1204fb62e5b8d2fc582e2a671e9d75c39dd6de2d8467783

    SHA512

    284d81c92ed50ab33209260936bcda5359e612962df395bcc6964ae9a1f37c3f5441de22ce47ee477cae9da978b32a4e3921db34b41dfc02f6bee94b0e7dae3b

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a3054767.exe

    Filesize

    289KB

    MD5

    84581088543df62fb1f075bf9fcc7cb7

    SHA1

    6c74fbe6731c933ca6eb9dd073f6a57ac4157201

    SHA256

    58fb568f2553776211836bcd24c0f2c38d2f2880da870f9c79cd0956069bc908

    SHA512

    c644e715d46bfe966cb7f3b733157aa7b63cb879c2765cdb86fd015547bb4fa98e6a66ca7011fea24750e72f3fc711cc3ba2867c20f59416765a7fbc15f0dcde

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a3054767.exe

    Filesize

    289KB

    MD5

    84581088543df62fb1f075bf9fcc7cb7

    SHA1

    6c74fbe6731c933ca6eb9dd073f6a57ac4157201

    SHA256

    58fb568f2553776211836bcd24c0f2c38d2f2880da870f9c79cd0956069bc908

    SHA512

    c644e715d46bfe966cb7f3b733157aa7b63cb879c2765cdb86fd015547bb4fa98e6a66ca7011fea24750e72f3fc711cc3ba2867c20f59416765a7fbc15f0dcde

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a3054767.exe

    Filesize

    289KB

    MD5

    84581088543df62fb1f075bf9fcc7cb7

    SHA1

    6c74fbe6731c933ca6eb9dd073f6a57ac4157201

    SHA256

    58fb568f2553776211836bcd24c0f2c38d2f2880da870f9c79cd0956069bc908

    SHA512

    c644e715d46bfe966cb7f3b733157aa7b63cb879c2765cdb86fd015547bb4fa98e6a66ca7011fea24750e72f3fc711cc3ba2867c20f59416765a7fbc15f0dcde

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8454196.exe

    Filesize

    168KB

    MD5

    8092ffe9a2eb5edaf76e9d68853bf040

    SHA1

    b0c00c5b049d1058d98a85b35341f474f86f2c3b

    SHA256

    2d38485467684cd23cd8690b91e9c233fd376553b6ed7c3d75af582491df1d81

    SHA512

    644e1dcab66e2e0d145667ef65d12603023e216669df2256308399fc3c98a4eec09b5958895dcf410bfda052b92e08e0495f81771a79a571c1c03559d6e4146a

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8454196.exe

    Filesize

    168KB

    MD5

    8092ffe9a2eb5edaf76e9d68853bf040

    SHA1

    b0c00c5b049d1058d98a85b35341f474f86f2c3b

    SHA256

    2d38485467684cd23cd8690b91e9c233fd376553b6ed7c3d75af582491df1d81

    SHA512

    644e1dcab66e2e0d145667ef65d12603023e216669df2256308399fc3c98a4eec09b5958895dcf410bfda052b92e08e0495f81771a79a571c1c03559d6e4146a

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v6456754.exe

    Filesize

    1.3MB

    MD5

    0b500f9e69f3842ebf19ef674caf2319

    SHA1

    84622757501ba9f195d9fd9a453624169826f8a7

    SHA256

    b28f82c1f4f8d29e2a4540d63c488d22c4296b315a23a9757bc0cf17a425c7b0

    SHA512

    26277ceb5174d690a2c94e643832d0aa953c7024cbcbd6b1d43c26a4ee32462cf26beb0b67cc69c78508cf35d246bf19b2d58621ca84efae8eea98843fe203c4

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v6456754.exe

    Filesize

    1.3MB

    MD5

    0b500f9e69f3842ebf19ef674caf2319

    SHA1

    84622757501ba9f195d9fd9a453624169826f8a7

    SHA256

    b28f82c1f4f8d29e2a4540d63c488d22c4296b315a23a9757bc0cf17a425c7b0

    SHA512

    26277ceb5174d690a2c94e643832d0aa953c7024cbcbd6b1d43c26a4ee32462cf26beb0b67cc69c78508cf35d246bf19b2d58621ca84efae8eea98843fe203c4

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v9685693.exe

    Filesize

    845KB

    MD5

    eb7e83149e17f8c8a4e41c7e509ad180

    SHA1

    5e0be25a0235bda2ce5e7c59747ec218109b1f05

    SHA256

    d4213ca30ea1c42e628d36137cc726faa37f6a9b5b7e8ff9fb07fe345bf2d128

    SHA512

    2218f65933dba48a8f4ef1651bd5e771563d6e485c53acf258bafd71eb3ecf7e5eedc998487d56f802b3d4384ab4b04ed6dd27c1e73ac8187e5780ec1bbfcb9e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v9685693.exe

    Filesize

    845KB

    MD5

    eb7e83149e17f8c8a4e41c7e509ad180

    SHA1

    5e0be25a0235bda2ce5e7c59747ec218109b1f05

    SHA256

    d4213ca30ea1c42e628d36137cc726faa37f6a9b5b7e8ff9fb07fe345bf2d128

    SHA512

    2218f65933dba48a8f4ef1651bd5e771563d6e485c53acf258bafd71eb3ecf7e5eedc998487d56f802b3d4384ab4b04ed6dd27c1e73ac8187e5780ec1bbfcb9e

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v9779158.exe

    Filesize

    641KB

    MD5

    6bc7c6eae1dbedf98ebfda1f29c4bf19

    SHA1

    b10ce40bce33a2f1c7d8cff6bd1187661ce24acf

    SHA256

    515cc6264e9d6c3516544ce72f924c2de5e2662d9abb03aeef77df99d2209b9e

    SHA512

    26cb02c1332520b6c785fb071135939b0dc1f73b5446a9fa70080d706c9dc3095af1957f6ff2d253e50a1e159f818e1862cf708428204b812de19d9490af4743

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v9779158.exe

    Filesize

    641KB

    MD5

    6bc7c6eae1dbedf98ebfda1f29c4bf19

    SHA1

    b10ce40bce33a2f1c7d8cff6bd1187661ce24acf

    SHA256

    515cc6264e9d6c3516544ce72f924c2de5e2662d9abb03aeef77df99d2209b9e

    SHA512

    26cb02c1332520b6c785fb071135939b0dc1f73b5446a9fa70080d706c9dc3095af1957f6ff2d253e50a1e159f818e1862cf708428204b812de19d9490af4743

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v2225737.exe

    Filesize

    383KB

    MD5

    7cf2f92551d4734e0144c6fb87aebfe0

    SHA1

    5140bea336bf7e8f76e6184dbe521f782bc96bc5

    SHA256

    ff714d8a93010227c1204fb62e5b8d2fc582e2a671e9d75c39dd6de2d8467783

    SHA512

    284d81c92ed50ab33209260936bcda5359e612962df395bcc6964ae9a1f37c3f5441de22ce47ee477cae9da978b32a4e3921db34b41dfc02f6bee94b0e7dae3b

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v2225737.exe

    Filesize

    383KB

    MD5

    7cf2f92551d4734e0144c6fb87aebfe0

    SHA1

    5140bea336bf7e8f76e6184dbe521f782bc96bc5

    SHA256

    ff714d8a93010227c1204fb62e5b8d2fc582e2a671e9d75c39dd6de2d8467783

    SHA512

    284d81c92ed50ab33209260936bcda5359e612962df395bcc6964ae9a1f37c3f5441de22ce47ee477cae9da978b32a4e3921db34b41dfc02f6bee94b0e7dae3b

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a3054767.exe

    Filesize

    289KB

    MD5

    84581088543df62fb1f075bf9fcc7cb7

    SHA1

    6c74fbe6731c933ca6eb9dd073f6a57ac4157201

    SHA256

    58fb568f2553776211836bcd24c0f2c38d2f2880da870f9c79cd0956069bc908

    SHA512

    c644e715d46bfe966cb7f3b733157aa7b63cb879c2765cdb86fd015547bb4fa98e6a66ca7011fea24750e72f3fc711cc3ba2867c20f59416765a7fbc15f0dcde

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a3054767.exe

    Filesize

    289KB

    MD5

    84581088543df62fb1f075bf9fcc7cb7

    SHA1

    6c74fbe6731c933ca6eb9dd073f6a57ac4157201

    SHA256

    58fb568f2553776211836bcd24c0f2c38d2f2880da870f9c79cd0956069bc908

    SHA512

    c644e715d46bfe966cb7f3b733157aa7b63cb879c2765cdb86fd015547bb4fa98e6a66ca7011fea24750e72f3fc711cc3ba2867c20f59416765a7fbc15f0dcde

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a3054767.exe

    Filesize

    289KB

    MD5

    84581088543df62fb1f075bf9fcc7cb7

    SHA1

    6c74fbe6731c933ca6eb9dd073f6a57ac4157201

    SHA256

    58fb568f2553776211836bcd24c0f2c38d2f2880da870f9c79cd0956069bc908

    SHA512

    c644e715d46bfe966cb7f3b733157aa7b63cb879c2765cdb86fd015547bb4fa98e6a66ca7011fea24750e72f3fc711cc3ba2867c20f59416765a7fbc15f0dcde

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b8454196.exe

    Filesize

    168KB

    MD5

    8092ffe9a2eb5edaf76e9d68853bf040

    SHA1

    b0c00c5b049d1058d98a85b35341f474f86f2c3b

    SHA256

    2d38485467684cd23cd8690b91e9c233fd376553b6ed7c3d75af582491df1d81

    SHA512

    644e1dcab66e2e0d145667ef65d12603023e216669df2256308399fc3c98a4eec09b5958895dcf410bfda052b92e08e0495f81771a79a571c1c03559d6e4146a

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b8454196.exe

    Filesize

    168KB

    MD5

    8092ffe9a2eb5edaf76e9d68853bf040

    SHA1

    b0c00c5b049d1058d98a85b35341f474f86f2c3b

    SHA256

    2d38485467684cd23cd8690b91e9c233fd376553b6ed7c3d75af582491df1d81

    SHA512

    644e1dcab66e2e0d145667ef65d12603023e216669df2256308399fc3c98a4eec09b5958895dcf410bfda052b92e08e0495f81771a79a571c1c03559d6e4146a

  • memory/1548-157-0x0000000002460000-0x00000000024A0000-memory.dmp

    Filesize

    256KB

  • memory/1548-156-0x0000000002460000-0x00000000024A0000-memory.dmp

    Filesize

    256KB

  • memory/1548-155-0x0000000000320000-0x0000000000326000-memory.dmp

    Filesize

    24KB

  • memory/1548-154-0x0000000000F00000-0x0000000000F30000-memory.dmp

    Filesize

    192KB

  • memory/1860-112-0x0000000000990000-0x00000000009A8000-memory.dmp

    Filesize

    96KB

  • memory/1860-120-0x0000000000990000-0x00000000009A2000-memory.dmp

    Filesize

    72KB

  • memory/1860-122-0x0000000000990000-0x00000000009A2000-memory.dmp

    Filesize

    72KB

  • memory/1860-124-0x0000000000990000-0x00000000009A2000-memory.dmp

    Filesize

    72KB

  • memory/1860-126-0x0000000000990000-0x00000000009A2000-memory.dmp

    Filesize

    72KB

  • memory/1860-130-0x0000000000990000-0x00000000009A2000-memory.dmp

    Filesize

    72KB

  • memory/1860-128-0x0000000000990000-0x00000000009A2000-memory.dmp

    Filesize

    72KB

  • memory/1860-134-0x0000000000990000-0x00000000009A2000-memory.dmp

    Filesize

    72KB

  • memory/1860-132-0x0000000000990000-0x00000000009A2000-memory.dmp

    Filesize

    72KB

  • memory/1860-136-0x0000000000990000-0x00000000009A2000-memory.dmp

    Filesize

    72KB

  • memory/1860-138-0x0000000000990000-0x00000000009A2000-memory.dmp

    Filesize

    72KB

  • memory/1860-140-0x0000000000990000-0x00000000009A2000-memory.dmp

    Filesize

    72KB

  • memory/1860-141-0x0000000004E10000-0x0000000004E50000-memory.dmp

    Filesize

    256KB

  • memory/1860-142-0x0000000000400000-0x00000000006C9000-memory.dmp

    Filesize

    2.8MB

  • memory/1860-143-0x0000000004E10000-0x0000000004E50000-memory.dmp

    Filesize

    256KB

  • memory/1860-147-0x0000000000400000-0x00000000006C9000-memory.dmp

    Filesize

    2.8MB

  • memory/1860-118-0x0000000000990000-0x00000000009A2000-memory.dmp

    Filesize

    72KB

  • memory/1860-116-0x0000000000990000-0x00000000009A2000-memory.dmp

    Filesize

    72KB

  • memory/1860-114-0x0000000000990000-0x00000000009A2000-memory.dmp

    Filesize

    72KB

  • memory/1860-113-0x0000000000990000-0x00000000009A2000-memory.dmp

    Filesize

    72KB

  • memory/1860-111-0x0000000004E10000-0x0000000004E50000-memory.dmp

    Filesize

    256KB

  • memory/1860-110-0x0000000004E10000-0x0000000004E50000-memory.dmp

    Filesize

    256KB

  • memory/1860-109-0x0000000000300000-0x000000000032D000-memory.dmp

    Filesize

    180KB

  • memory/1860-108-0x0000000000960000-0x000000000097A000-memory.dmp

    Filesize

    104KB