Analysis

  • max time kernel
    152s
  • max time network
    177s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06-05-2023 20:37

General

  • Target

    1537100c0399e845e2b2b2c42272a7b80e876c6d280918ae8ee1fb3bd7e7dcf0.exe

  • Size

    1.5MB

  • MD5

    a9a3d36f1944fd0338a084030f126b1c

  • SHA1

    aa2127dcd116cea561395beccac1679cff97b762

  • SHA256

    1537100c0399e845e2b2b2c42272a7b80e876c6d280918ae8ee1fb3bd7e7dcf0

  • SHA512

    00545d15999c6c5dab1616a1279ff5ce7d2481dfecc9a1884d008ee2299ac342ac5cac8a5d7e56d96ee18ddea366f9b96ca3db1d97931c7ada3b88520b87aa76

  • SSDEEP

    24576:eyM7bvKR3YqrusDsCJzFKHKv4DWWMMXnuUzgrVyD2NSw4Et/5tSgI8s4ZGKOL7R:tCbiR3fFzRgWWhuCgCYSot//SgHGKOL

Malware Config

Extracted

Family

redline

Botnet

mazda

C2

217.196.96.56:4138

Attributes
  • auth_value

    3d2870537d84a4c6d7aeecd002871c51

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1537100c0399e845e2b2b2c42272a7b80e876c6d280918ae8ee1fb3bd7e7dcf0.exe
    "C:\Users\Admin\AppData\Local\Temp\1537100c0399e845e2b2b2c42272a7b80e876c6d280918ae8ee1fb3bd7e7dcf0.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1224
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1296116.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1296116.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1348
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1707671.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1707671.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:864
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0279443.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0279443.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:332
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4217318.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4217318.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1500
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a2191162.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a2191162.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Loads dropped DLL
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1764
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b6088643.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b6088643.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:2028

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1296116.exe

    Filesize

    1.4MB

    MD5

    1c4c3e8549b893bcd059bb831ed37382

    SHA1

    f8a7e31fd186bdaa2097a770247927085ddadff4

    SHA256

    ca77d178b1d292156ff0c451dbc84525f29f53d301af1b72cc93d8a01cd5d38f

    SHA512

    8ebbc9ecbc2074ae7a508b988795fe3ede93bf9bee29429986ffc0ca5a019e082bb5801aa9a1af26e70284712c8d17b783cfec6784e3b0a69926a4485522240f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1296116.exe

    Filesize

    1.4MB

    MD5

    1c4c3e8549b893bcd059bb831ed37382

    SHA1

    f8a7e31fd186bdaa2097a770247927085ddadff4

    SHA256

    ca77d178b1d292156ff0c451dbc84525f29f53d301af1b72cc93d8a01cd5d38f

    SHA512

    8ebbc9ecbc2074ae7a508b988795fe3ede93bf9bee29429986ffc0ca5a019e082bb5801aa9a1af26e70284712c8d17b783cfec6784e3b0a69926a4485522240f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1707671.exe

    Filesize

    916KB

    MD5

    e30b32224037f41ad359719bdc98fdc9

    SHA1

    448661a8dace69a901beb50c8945c5a20f208170

    SHA256

    dcf0e0002ef0d68de08ceb56c09f575434482909da4ca33d48fb69faff19f13d

    SHA512

    4b75e9738550006cde08fd5ea2dfb5f4f29e6311c4e96f6a0a4c979c5893393c0cbc465b162b384d554cf63e53d40ed2b895cb1b4616062aff94f588416f7322

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1707671.exe

    Filesize

    916KB

    MD5

    e30b32224037f41ad359719bdc98fdc9

    SHA1

    448661a8dace69a901beb50c8945c5a20f208170

    SHA256

    dcf0e0002ef0d68de08ceb56c09f575434482909da4ca33d48fb69faff19f13d

    SHA512

    4b75e9738550006cde08fd5ea2dfb5f4f29e6311c4e96f6a0a4c979c5893393c0cbc465b162b384d554cf63e53d40ed2b895cb1b4616062aff94f588416f7322

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0279443.exe

    Filesize

    711KB

    MD5

    b47acdf37a719c3ffca5b15a02fd1c1a

    SHA1

    b0badef32052eaf2acd580bd31cb6d154c68d1b5

    SHA256

    7577e4e48d1938fdde13afb488f03a36b9b01b95d9cb648b094da2d4653b2bfd

    SHA512

    2a090bb1ab1720f8d44228410d57112ac304da46ace591b330bf266f73e6e4c638582ca62cc8050425c113d4980eb2a83c58c58bfb9c1c21da89a14748aa19d7

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0279443.exe

    Filesize

    711KB

    MD5

    b47acdf37a719c3ffca5b15a02fd1c1a

    SHA1

    b0badef32052eaf2acd580bd31cb6d154c68d1b5

    SHA256

    7577e4e48d1938fdde13afb488f03a36b9b01b95d9cb648b094da2d4653b2bfd

    SHA512

    2a090bb1ab1720f8d44228410d57112ac304da46ace591b330bf266f73e6e4c638582ca62cc8050425c113d4980eb2a83c58c58bfb9c1c21da89a14748aa19d7

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4217318.exe

    Filesize

    416KB

    MD5

    b4eb9c4489ea41fe844a42a0c17f857c

    SHA1

    ade15e1fea0c0d001fefb7fa523e6b26a70b02ba

    SHA256

    263965637013da5de444eede206022c8ab353cb0e0cae98bacac6e2d96386853

    SHA512

    ffe104be4c6a203de29987bc169e7c1ee02d6370f780be8e80ef4baa8fe54f8320614f9c72264b6518e9ada580c41a0bd18449fa282ccd699725863420a6ff5e

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4217318.exe

    Filesize

    416KB

    MD5

    b4eb9c4489ea41fe844a42a0c17f857c

    SHA1

    ade15e1fea0c0d001fefb7fa523e6b26a70b02ba

    SHA256

    263965637013da5de444eede206022c8ab353cb0e0cae98bacac6e2d96386853

    SHA512

    ffe104be4c6a203de29987bc169e7c1ee02d6370f780be8e80ef4baa8fe54f8320614f9c72264b6518e9ada580c41a0bd18449fa282ccd699725863420a6ff5e

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a2191162.exe

    Filesize

    360KB

    MD5

    003e7969e35bd587d02591ea55e8f552

    SHA1

    06f0d129506feb02366717b231202b26028f291c

    SHA256

    9d188a4f10160bfc611cc9495a4627a655ea87acebd322279cc5d1008ce08397

    SHA512

    55a67605e97e85a2336d62017094d4b0ae1a184844922129f00ae883e4a1c2862bd89ca479a3a126c98855ffea91a733105527a1f34d1875613382a4bc4c391c

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a2191162.exe

    Filesize

    360KB

    MD5

    003e7969e35bd587d02591ea55e8f552

    SHA1

    06f0d129506feb02366717b231202b26028f291c

    SHA256

    9d188a4f10160bfc611cc9495a4627a655ea87acebd322279cc5d1008ce08397

    SHA512

    55a67605e97e85a2336d62017094d4b0ae1a184844922129f00ae883e4a1c2862bd89ca479a3a126c98855ffea91a733105527a1f34d1875613382a4bc4c391c

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a2191162.exe

    Filesize

    360KB

    MD5

    003e7969e35bd587d02591ea55e8f552

    SHA1

    06f0d129506feb02366717b231202b26028f291c

    SHA256

    9d188a4f10160bfc611cc9495a4627a655ea87acebd322279cc5d1008ce08397

    SHA512

    55a67605e97e85a2336d62017094d4b0ae1a184844922129f00ae883e4a1c2862bd89ca479a3a126c98855ffea91a733105527a1f34d1875613382a4bc4c391c

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b6088643.exe

    Filesize

    168KB

    MD5

    ff0f79bac5a1b3d02dd224c5da59ee47

    SHA1

    768bcf57bb724c8c6e1cd6d4f1c83f5738312e69

    SHA256

    1ec1375b9e17535df1e1334d62490c9d4c141e75ff2c4a0a2697c46c35fd5c1e

    SHA512

    8bf3ce2ca3b42989281c946bb01926f60103aee3aa17fc708e706342994e97feb1b21f74e176516b1e6c41b5dd44f6ec69ce0278dc25172632b1449e3c7d8c1f

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b6088643.exe

    Filesize

    168KB

    MD5

    ff0f79bac5a1b3d02dd224c5da59ee47

    SHA1

    768bcf57bb724c8c6e1cd6d4f1c83f5738312e69

    SHA256

    1ec1375b9e17535df1e1334d62490c9d4c141e75ff2c4a0a2697c46c35fd5c1e

    SHA512

    8bf3ce2ca3b42989281c946bb01926f60103aee3aa17fc708e706342994e97feb1b21f74e176516b1e6c41b5dd44f6ec69ce0278dc25172632b1449e3c7d8c1f

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v1296116.exe

    Filesize

    1.4MB

    MD5

    1c4c3e8549b893bcd059bb831ed37382

    SHA1

    f8a7e31fd186bdaa2097a770247927085ddadff4

    SHA256

    ca77d178b1d292156ff0c451dbc84525f29f53d301af1b72cc93d8a01cd5d38f

    SHA512

    8ebbc9ecbc2074ae7a508b988795fe3ede93bf9bee29429986ffc0ca5a019e082bb5801aa9a1af26e70284712c8d17b783cfec6784e3b0a69926a4485522240f

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v1296116.exe

    Filesize

    1.4MB

    MD5

    1c4c3e8549b893bcd059bb831ed37382

    SHA1

    f8a7e31fd186bdaa2097a770247927085ddadff4

    SHA256

    ca77d178b1d292156ff0c451dbc84525f29f53d301af1b72cc93d8a01cd5d38f

    SHA512

    8ebbc9ecbc2074ae7a508b988795fe3ede93bf9bee29429986ffc0ca5a019e082bb5801aa9a1af26e70284712c8d17b783cfec6784e3b0a69926a4485522240f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v1707671.exe

    Filesize

    916KB

    MD5

    e30b32224037f41ad359719bdc98fdc9

    SHA1

    448661a8dace69a901beb50c8945c5a20f208170

    SHA256

    dcf0e0002ef0d68de08ceb56c09f575434482909da4ca33d48fb69faff19f13d

    SHA512

    4b75e9738550006cde08fd5ea2dfb5f4f29e6311c4e96f6a0a4c979c5893393c0cbc465b162b384d554cf63e53d40ed2b895cb1b4616062aff94f588416f7322

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v1707671.exe

    Filesize

    916KB

    MD5

    e30b32224037f41ad359719bdc98fdc9

    SHA1

    448661a8dace69a901beb50c8945c5a20f208170

    SHA256

    dcf0e0002ef0d68de08ceb56c09f575434482909da4ca33d48fb69faff19f13d

    SHA512

    4b75e9738550006cde08fd5ea2dfb5f4f29e6311c4e96f6a0a4c979c5893393c0cbc465b162b384d554cf63e53d40ed2b895cb1b4616062aff94f588416f7322

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v0279443.exe

    Filesize

    711KB

    MD5

    b47acdf37a719c3ffca5b15a02fd1c1a

    SHA1

    b0badef32052eaf2acd580bd31cb6d154c68d1b5

    SHA256

    7577e4e48d1938fdde13afb488f03a36b9b01b95d9cb648b094da2d4653b2bfd

    SHA512

    2a090bb1ab1720f8d44228410d57112ac304da46ace591b330bf266f73e6e4c638582ca62cc8050425c113d4980eb2a83c58c58bfb9c1c21da89a14748aa19d7

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v0279443.exe

    Filesize

    711KB

    MD5

    b47acdf37a719c3ffca5b15a02fd1c1a

    SHA1

    b0badef32052eaf2acd580bd31cb6d154c68d1b5

    SHA256

    7577e4e48d1938fdde13afb488f03a36b9b01b95d9cb648b094da2d4653b2bfd

    SHA512

    2a090bb1ab1720f8d44228410d57112ac304da46ace591b330bf266f73e6e4c638582ca62cc8050425c113d4980eb2a83c58c58bfb9c1c21da89a14748aa19d7

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v4217318.exe

    Filesize

    416KB

    MD5

    b4eb9c4489ea41fe844a42a0c17f857c

    SHA1

    ade15e1fea0c0d001fefb7fa523e6b26a70b02ba

    SHA256

    263965637013da5de444eede206022c8ab353cb0e0cae98bacac6e2d96386853

    SHA512

    ffe104be4c6a203de29987bc169e7c1ee02d6370f780be8e80ef4baa8fe54f8320614f9c72264b6518e9ada580c41a0bd18449fa282ccd699725863420a6ff5e

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v4217318.exe

    Filesize

    416KB

    MD5

    b4eb9c4489ea41fe844a42a0c17f857c

    SHA1

    ade15e1fea0c0d001fefb7fa523e6b26a70b02ba

    SHA256

    263965637013da5de444eede206022c8ab353cb0e0cae98bacac6e2d96386853

    SHA512

    ffe104be4c6a203de29987bc169e7c1ee02d6370f780be8e80ef4baa8fe54f8320614f9c72264b6518e9ada580c41a0bd18449fa282ccd699725863420a6ff5e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a2191162.exe

    Filesize

    360KB

    MD5

    003e7969e35bd587d02591ea55e8f552

    SHA1

    06f0d129506feb02366717b231202b26028f291c

    SHA256

    9d188a4f10160bfc611cc9495a4627a655ea87acebd322279cc5d1008ce08397

    SHA512

    55a67605e97e85a2336d62017094d4b0ae1a184844922129f00ae883e4a1c2862bd89ca479a3a126c98855ffea91a733105527a1f34d1875613382a4bc4c391c

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a2191162.exe

    Filesize

    360KB

    MD5

    003e7969e35bd587d02591ea55e8f552

    SHA1

    06f0d129506feb02366717b231202b26028f291c

    SHA256

    9d188a4f10160bfc611cc9495a4627a655ea87acebd322279cc5d1008ce08397

    SHA512

    55a67605e97e85a2336d62017094d4b0ae1a184844922129f00ae883e4a1c2862bd89ca479a3a126c98855ffea91a733105527a1f34d1875613382a4bc4c391c

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a2191162.exe

    Filesize

    360KB

    MD5

    003e7969e35bd587d02591ea55e8f552

    SHA1

    06f0d129506feb02366717b231202b26028f291c

    SHA256

    9d188a4f10160bfc611cc9495a4627a655ea87acebd322279cc5d1008ce08397

    SHA512

    55a67605e97e85a2336d62017094d4b0ae1a184844922129f00ae883e4a1c2862bd89ca479a3a126c98855ffea91a733105527a1f34d1875613382a4bc4c391c

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b6088643.exe

    Filesize

    168KB

    MD5

    ff0f79bac5a1b3d02dd224c5da59ee47

    SHA1

    768bcf57bb724c8c6e1cd6d4f1c83f5738312e69

    SHA256

    1ec1375b9e17535df1e1334d62490c9d4c141e75ff2c4a0a2697c46c35fd5c1e

    SHA512

    8bf3ce2ca3b42989281c946bb01926f60103aee3aa17fc708e706342994e97feb1b21f74e176516b1e6c41b5dd44f6ec69ce0278dc25172632b1449e3c7d8c1f

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b6088643.exe

    Filesize

    168KB

    MD5

    ff0f79bac5a1b3d02dd224c5da59ee47

    SHA1

    768bcf57bb724c8c6e1cd6d4f1c83f5738312e69

    SHA256

    1ec1375b9e17535df1e1334d62490c9d4c141e75ff2c4a0a2697c46c35fd5c1e

    SHA512

    8bf3ce2ca3b42989281c946bb01926f60103aee3aa17fc708e706342994e97feb1b21f74e176516b1e6c41b5dd44f6ec69ce0278dc25172632b1449e3c7d8c1f

  • memory/1764-112-0x0000000004F10000-0x0000000004F50000-memory.dmp

    Filesize

    256KB

  • memory/1764-113-0x0000000000880000-0x0000000000892000-memory.dmp

    Filesize

    72KB

  • memory/1764-114-0x0000000000880000-0x0000000000892000-memory.dmp

    Filesize

    72KB

  • memory/1764-116-0x0000000000880000-0x0000000000892000-memory.dmp

    Filesize

    72KB

  • memory/1764-118-0x0000000000880000-0x0000000000892000-memory.dmp

    Filesize

    72KB

  • memory/1764-126-0x0000000000880000-0x0000000000892000-memory.dmp

    Filesize

    72KB

  • memory/1764-128-0x0000000000880000-0x0000000000892000-memory.dmp

    Filesize

    72KB

  • memory/1764-124-0x0000000000880000-0x0000000000892000-memory.dmp

    Filesize

    72KB

  • memory/1764-122-0x0000000000880000-0x0000000000892000-memory.dmp

    Filesize

    72KB

  • memory/1764-120-0x0000000000880000-0x0000000000892000-memory.dmp

    Filesize

    72KB

  • memory/1764-130-0x0000000000880000-0x0000000000892000-memory.dmp

    Filesize

    72KB

  • memory/1764-132-0x0000000000880000-0x0000000000892000-memory.dmp

    Filesize

    72KB

  • memory/1764-134-0x0000000000880000-0x0000000000892000-memory.dmp

    Filesize

    72KB

  • memory/1764-136-0x0000000000880000-0x0000000000892000-memory.dmp

    Filesize

    72KB

  • memory/1764-138-0x0000000000880000-0x0000000000892000-memory.dmp

    Filesize

    72KB

  • memory/1764-140-0x0000000000880000-0x0000000000892000-memory.dmp

    Filesize

    72KB

  • memory/1764-141-0x0000000000400000-0x00000000006F4000-memory.dmp

    Filesize

    3.0MB

  • memory/1764-142-0x0000000000400000-0x00000000006F4000-memory.dmp

    Filesize

    3.0MB

  • memory/1764-111-0x0000000004F10000-0x0000000004F50000-memory.dmp

    Filesize

    256KB

  • memory/1764-110-0x0000000000270000-0x000000000029D000-memory.dmp

    Filesize

    180KB

  • memory/1764-109-0x0000000000880000-0x0000000000898000-memory.dmp

    Filesize

    96KB

  • memory/1764-108-0x0000000000840000-0x000000000085A000-memory.dmp

    Filesize

    104KB

  • memory/2028-149-0x0000000001360000-0x0000000001390000-memory.dmp

    Filesize

    192KB

  • memory/2028-150-0x0000000000360000-0x0000000000366000-memory.dmp

    Filesize

    24KB

  • memory/2028-151-0x0000000000BF0000-0x0000000000C30000-memory.dmp

    Filesize

    256KB

  • memory/2028-152-0x0000000000BF0000-0x0000000000C30000-memory.dmp

    Filesize

    256KB