Analysis

  • max time kernel
    131s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 20:33

General

  • Target

    11ba8efbc77aebede73c60e1e11b0359fcf3d002f3381243bc833219ba6c2ab8.exe

  • Size

    1.5MB

  • MD5

    5ce7c2ee2700a7aba16277cba9c0fcc8

  • SHA1

    07194d7acdf54a8d6e69af080b165465635e0262

  • SHA256

    11ba8efbc77aebede73c60e1e11b0359fcf3d002f3381243bc833219ba6c2ab8

  • SHA512

    811048bf34fe6eb11afcb7cc7ba63db1b5c6bbcf2a8097836a071158931ff65515c10dba34bc961708ccf0186bad59d7f069674fd7527eb5cd46c67ea6a2151c

  • SSDEEP

    24576:MyKUSgRQvuL1sEXvI0RcvWtTdSOBU4KcQ36C3/WUnCtvRtdVWYi6ll:7KUZqWLb/7mKTdlBU9hCUnCt6Yn

Malware Config

Extracted

Family

redline

Botnet

max

C2

185.161.248.73:4164

Attributes
  • auth_value

    efb1499709a5d08ed1ddf71cff71211f

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 12 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\11ba8efbc77aebede73c60e1e11b0359fcf3d002f3381243bc833219ba6c2ab8.exe
    "C:\Users\Admin\AppData\Local\Temp\11ba8efbc77aebede73c60e1e11b0359fcf3d002f3381243bc833219ba6c2ab8.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1372
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i87276714.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i87276714.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2012
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i59484655.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i59484655.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:860
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i70553993.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i70553993.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1008
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i48189723.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i48189723.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1756
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a82504345.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a82504345.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Loads dropped DLL
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1296
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b51056142.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b51056142.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1144

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i87276714.exe

    Filesize

    1.2MB

    MD5

    b91753607d0d46fac02bce5e241f8b57

    SHA1

    b6f6967c9b9de565b4473f4f68a5fe6951be5109

    SHA256

    477cfbec9d4a40e6a0c1c84b0c1a397297a901c00f569a3360a1e0d1b51d9437

    SHA512

    fb425eacbee24224b87e65318c06433c84ca9553c07d970807337abd05c4efa30583752f274587a1423b4e1c56d3c0adc82917a1f6176cf4b77a4ce4109e8b79

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i87276714.exe

    Filesize

    1.2MB

    MD5

    b91753607d0d46fac02bce5e241f8b57

    SHA1

    b6f6967c9b9de565b4473f4f68a5fe6951be5109

    SHA256

    477cfbec9d4a40e6a0c1c84b0c1a397297a901c00f569a3360a1e0d1b51d9437

    SHA512

    fb425eacbee24224b87e65318c06433c84ca9553c07d970807337abd05c4efa30583752f274587a1423b4e1c56d3c0adc82917a1f6176cf4b77a4ce4109e8b79

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i59484655.exe

    Filesize

    1.0MB

    MD5

    5f8c5e8d4390ae2399ecf683b85e02ec

    SHA1

    d115d271a01658112e1c54b5e3184617aaea097f

    SHA256

    2d8a4800f9b2504ed0ff0c329eca65c3ca3903b852ec0a3e142dacfa25d53020

    SHA512

    bf63229433ee02c2d310e5d76b50b8d1226c0c2b03db1f96c062bc2e7f205dee517dafb7bceca54f382cbf4b69ae266c768a4f35453d8f5ac22400a379bcb534

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i59484655.exe

    Filesize

    1.0MB

    MD5

    5f8c5e8d4390ae2399ecf683b85e02ec

    SHA1

    d115d271a01658112e1c54b5e3184617aaea097f

    SHA256

    2d8a4800f9b2504ed0ff0c329eca65c3ca3903b852ec0a3e142dacfa25d53020

    SHA512

    bf63229433ee02c2d310e5d76b50b8d1226c0c2b03db1f96c062bc2e7f205dee517dafb7bceca54f382cbf4b69ae266c768a4f35453d8f5ac22400a379bcb534

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i70553993.exe

    Filesize

    589KB

    MD5

    8abe32d01cb867c30048ef380a2aee8d

    SHA1

    e7b03190d69afd51150026a5c6df252f91be915d

    SHA256

    b628e782988becce1f86b718b76f49f6968f4d479848dc8da1e306088abc3cea

    SHA512

    aac8b997fc9e48538fefbb1be94a95b23bba86194800dbcb361090125f85c6668b4bc89a064ca6115d8716ab912f140a0dafc49955d0622efc3ca3599b1a00e2

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i70553993.exe

    Filesize

    589KB

    MD5

    8abe32d01cb867c30048ef380a2aee8d

    SHA1

    e7b03190d69afd51150026a5c6df252f91be915d

    SHA256

    b628e782988becce1f86b718b76f49f6968f4d479848dc8da1e306088abc3cea

    SHA512

    aac8b997fc9e48538fefbb1be94a95b23bba86194800dbcb361090125f85c6668b4bc89a064ca6115d8716ab912f140a0dafc49955d0622efc3ca3599b1a00e2

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i48189723.exe

    Filesize

    310KB

    MD5

    248b653a91f7f4ffcb98fe55e26fe58f

    SHA1

    9907dceeff2e678c1a4b77535cfc45403e787c33

    SHA256

    ea0fe8848daa43f4d1c0bdfd5dcba6706b6b9d8bfbff0c850da6ff23f6ef981c

    SHA512

    0e5d8ab91e071f1349ac0d0c9e96cf4f564b6a8b218f79f8550655efd208bbb3aca72fda32a0a9fc8afcdc7c843c4981382c5111501a4ff902aa29b445db1593

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i48189723.exe

    Filesize

    310KB

    MD5

    248b653a91f7f4ffcb98fe55e26fe58f

    SHA1

    9907dceeff2e678c1a4b77535cfc45403e787c33

    SHA256

    ea0fe8848daa43f4d1c0bdfd5dcba6706b6b9d8bfbff0c850da6ff23f6ef981c

    SHA512

    0e5d8ab91e071f1349ac0d0c9e96cf4f564b6a8b218f79f8550655efd208bbb3aca72fda32a0a9fc8afcdc7c843c4981382c5111501a4ff902aa29b445db1593

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a82504345.exe

    Filesize

    177KB

    MD5

    f70f3afde3e9d30282f43804c8c28573

    SHA1

    28c4e374237088c3b692e2d0c10169f886c17934

    SHA256

    e3f67e97afa28aa88f4eb2b9f1f7be23f95e35e3048cc2e0b52f020c75caef25

    SHA512

    62a4b3f2cdf26d1fd7e88bd6a43087f7805ca517715bb7ba9a2d28591ce56f7ae65aafc47d0d5852782361cb23d3691b98922c94b9120b10a185818862fd7e5c

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a82504345.exe

    Filesize

    177KB

    MD5

    f70f3afde3e9d30282f43804c8c28573

    SHA1

    28c4e374237088c3b692e2d0c10169f886c17934

    SHA256

    e3f67e97afa28aa88f4eb2b9f1f7be23f95e35e3048cc2e0b52f020c75caef25

    SHA512

    62a4b3f2cdf26d1fd7e88bd6a43087f7805ca517715bb7ba9a2d28591ce56f7ae65aafc47d0d5852782361cb23d3691b98922c94b9120b10a185818862fd7e5c

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b51056142.exe

    Filesize

    168KB

    MD5

    d72a8b8c617d9683fe506417a64e855c

    SHA1

    9b81ed148a275fa3c38255630404ab31b9acc3d9

    SHA256

    9c99a1154f115bb709b478230eaf6d04ad71b59d286f4f2d7c95948bced7f7cb

    SHA512

    bb347ab5601afbd527cead0ded8f9ca94d5cd9ad22e67c10e289cad14ee8ac4e230282f1718f6fe56f4aff24d0253f27d50a2afa2872c371ddb7e56713b2997a

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b51056142.exe

    Filesize

    168KB

    MD5

    d72a8b8c617d9683fe506417a64e855c

    SHA1

    9b81ed148a275fa3c38255630404ab31b9acc3d9

    SHA256

    9c99a1154f115bb709b478230eaf6d04ad71b59d286f4f2d7c95948bced7f7cb

    SHA512

    bb347ab5601afbd527cead0ded8f9ca94d5cd9ad22e67c10e289cad14ee8ac4e230282f1718f6fe56f4aff24d0253f27d50a2afa2872c371ddb7e56713b2997a

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\i87276714.exe

    Filesize

    1.2MB

    MD5

    b91753607d0d46fac02bce5e241f8b57

    SHA1

    b6f6967c9b9de565b4473f4f68a5fe6951be5109

    SHA256

    477cfbec9d4a40e6a0c1c84b0c1a397297a901c00f569a3360a1e0d1b51d9437

    SHA512

    fb425eacbee24224b87e65318c06433c84ca9553c07d970807337abd05c4efa30583752f274587a1423b4e1c56d3c0adc82917a1f6176cf4b77a4ce4109e8b79

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\i87276714.exe

    Filesize

    1.2MB

    MD5

    b91753607d0d46fac02bce5e241f8b57

    SHA1

    b6f6967c9b9de565b4473f4f68a5fe6951be5109

    SHA256

    477cfbec9d4a40e6a0c1c84b0c1a397297a901c00f569a3360a1e0d1b51d9437

    SHA512

    fb425eacbee24224b87e65318c06433c84ca9553c07d970807337abd05c4efa30583752f274587a1423b4e1c56d3c0adc82917a1f6176cf4b77a4ce4109e8b79

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\i59484655.exe

    Filesize

    1.0MB

    MD5

    5f8c5e8d4390ae2399ecf683b85e02ec

    SHA1

    d115d271a01658112e1c54b5e3184617aaea097f

    SHA256

    2d8a4800f9b2504ed0ff0c329eca65c3ca3903b852ec0a3e142dacfa25d53020

    SHA512

    bf63229433ee02c2d310e5d76b50b8d1226c0c2b03db1f96c062bc2e7f205dee517dafb7bceca54f382cbf4b69ae266c768a4f35453d8f5ac22400a379bcb534

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\i59484655.exe

    Filesize

    1.0MB

    MD5

    5f8c5e8d4390ae2399ecf683b85e02ec

    SHA1

    d115d271a01658112e1c54b5e3184617aaea097f

    SHA256

    2d8a4800f9b2504ed0ff0c329eca65c3ca3903b852ec0a3e142dacfa25d53020

    SHA512

    bf63229433ee02c2d310e5d76b50b8d1226c0c2b03db1f96c062bc2e7f205dee517dafb7bceca54f382cbf4b69ae266c768a4f35453d8f5ac22400a379bcb534

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\i70553993.exe

    Filesize

    589KB

    MD5

    8abe32d01cb867c30048ef380a2aee8d

    SHA1

    e7b03190d69afd51150026a5c6df252f91be915d

    SHA256

    b628e782988becce1f86b718b76f49f6968f4d479848dc8da1e306088abc3cea

    SHA512

    aac8b997fc9e48538fefbb1be94a95b23bba86194800dbcb361090125f85c6668b4bc89a064ca6115d8716ab912f140a0dafc49955d0622efc3ca3599b1a00e2

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\i70553993.exe

    Filesize

    589KB

    MD5

    8abe32d01cb867c30048ef380a2aee8d

    SHA1

    e7b03190d69afd51150026a5c6df252f91be915d

    SHA256

    b628e782988becce1f86b718b76f49f6968f4d479848dc8da1e306088abc3cea

    SHA512

    aac8b997fc9e48538fefbb1be94a95b23bba86194800dbcb361090125f85c6668b4bc89a064ca6115d8716ab912f140a0dafc49955d0622efc3ca3599b1a00e2

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\i48189723.exe

    Filesize

    310KB

    MD5

    248b653a91f7f4ffcb98fe55e26fe58f

    SHA1

    9907dceeff2e678c1a4b77535cfc45403e787c33

    SHA256

    ea0fe8848daa43f4d1c0bdfd5dcba6706b6b9d8bfbff0c850da6ff23f6ef981c

    SHA512

    0e5d8ab91e071f1349ac0d0c9e96cf4f564b6a8b218f79f8550655efd208bbb3aca72fda32a0a9fc8afcdc7c843c4981382c5111501a4ff902aa29b445db1593

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\i48189723.exe

    Filesize

    310KB

    MD5

    248b653a91f7f4ffcb98fe55e26fe58f

    SHA1

    9907dceeff2e678c1a4b77535cfc45403e787c33

    SHA256

    ea0fe8848daa43f4d1c0bdfd5dcba6706b6b9d8bfbff0c850da6ff23f6ef981c

    SHA512

    0e5d8ab91e071f1349ac0d0c9e96cf4f564b6a8b218f79f8550655efd208bbb3aca72fda32a0a9fc8afcdc7c843c4981382c5111501a4ff902aa29b445db1593

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a82504345.exe

    Filesize

    177KB

    MD5

    f70f3afde3e9d30282f43804c8c28573

    SHA1

    28c4e374237088c3b692e2d0c10169f886c17934

    SHA256

    e3f67e97afa28aa88f4eb2b9f1f7be23f95e35e3048cc2e0b52f020c75caef25

    SHA512

    62a4b3f2cdf26d1fd7e88bd6a43087f7805ca517715bb7ba9a2d28591ce56f7ae65aafc47d0d5852782361cb23d3691b98922c94b9120b10a185818862fd7e5c

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a82504345.exe

    Filesize

    177KB

    MD5

    f70f3afde3e9d30282f43804c8c28573

    SHA1

    28c4e374237088c3b692e2d0c10169f886c17934

    SHA256

    e3f67e97afa28aa88f4eb2b9f1f7be23f95e35e3048cc2e0b52f020c75caef25

    SHA512

    62a4b3f2cdf26d1fd7e88bd6a43087f7805ca517715bb7ba9a2d28591ce56f7ae65aafc47d0d5852782361cb23d3691b98922c94b9120b10a185818862fd7e5c

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b51056142.exe

    Filesize

    168KB

    MD5

    d72a8b8c617d9683fe506417a64e855c

    SHA1

    9b81ed148a275fa3c38255630404ab31b9acc3d9

    SHA256

    9c99a1154f115bb709b478230eaf6d04ad71b59d286f4f2d7c95948bced7f7cb

    SHA512

    bb347ab5601afbd527cead0ded8f9ca94d5cd9ad22e67c10e289cad14ee8ac4e230282f1718f6fe56f4aff24d0253f27d50a2afa2872c371ddb7e56713b2997a

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b51056142.exe

    Filesize

    168KB

    MD5

    d72a8b8c617d9683fe506417a64e855c

    SHA1

    9b81ed148a275fa3c38255630404ab31b9acc3d9

    SHA256

    9c99a1154f115bb709b478230eaf6d04ad71b59d286f4f2d7c95948bced7f7cb

    SHA512

    bb347ab5601afbd527cead0ded8f9ca94d5cd9ad22e67c10e289cad14ee8ac4e230282f1718f6fe56f4aff24d0253f27d50a2afa2872c371ddb7e56713b2997a

  • memory/1144-145-0x0000000000550000-0x0000000000590000-memory.dmp

    Filesize

    256KB

  • memory/1144-144-0x0000000000550000-0x0000000000590000-memory.dmp

    Filesize

    256KB

  • memory/1144-143-0x00000000005D0000-0x00000000005D6000-memory.dmp

    Filesize

    24KB

  • memory/1144-142-0x0000000001090000-0x00000000010C0000-memory.dmp

    Filesize

    192KB

  • memory/1296-106-0x0000000004A70000-0x0000000004AB0000-memory.dmp

    Filesize

    256KB

  • memory/1296-117-0x0000000000AC0000-0x0000000000AD3000-memory.dmp

    Filesize

    76KB

  • memory/1296-119-0x0000000000AC0000-0x0000000000AD3000-memory.dmp

    Filesize

    76KB

  • memory/1296-121-0x0000000000AC0000-0x0000000000AD3000-memory.dmp

    Filesize

    76KB

  • memory/1296-123-0x0000000000AC0000-0x0000000000AD3000-memory.dmp

    Filesize

    76KB

  • memory/1296-125-0x0000000000AC0000-0x0000000000AD3000-memory.dmp

    Filesize

    76KB

  • memory/1296-127-0x0000000000AC0000-0x0000000000AD3000-memory.dmp

    Filesize

    76KB

  • memory/1296-129-0x0000000000AC0000-0x0000000000AD3000-memory.dmp

    Filesize

    76KB

  • memory/1296-131-0x0000000000AC0000-0x0000000000AD3000-memory.dmp

    Filesize

    76KB

  • memory/1296-133-0x0000000000AC0000-0x0000000000AD3000-memory.dmp

    Filesize

    76KB

  • memory/1296-135-0x0000000000AC0000-0x0000000000AD3000-memory.dmp

    Filesize

    76KB

  • memory/1296-115-0x0000000000AC0000-0x0000000000AD3000-memory.dmp

    Filesize

    76KB

  • memory/1296-113-0x0000000000AC0000-0x0000000000AD3000-memory.dmp

    Filesize

    76KB

  • memory/1296-111-0x0000000000AC0000-0x0000000000AD3000-memory.dmp

    Filesize

    76KB

  • memory/1296-109-0x0000000000AC0000-0x0000000000AD3000-memory.dmp

    Filesize

    76KB

  • memory/1296-108-0x0000000000AC0000-0x0000000000AD3000-memory.dmp

    Filesize

    76KB

  • memory/1296-107-0x0000000004A70000-0x0000000004AB0000-memory.dmp

    Filesize

    256KB

  • memory/1296-105-0x0000000000AC0000-0x0000000000AD8000-memory.dmp

    Filesize

    96KB

  • memory/1296-104-0x0000000000930000-0x000000000094A000-memory.dmp

    Filesize

    104KB