Analysis

  • max time kernel
    254s
  • max time network
    359s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 20:38

General

  • Target

    154962abe08848cc48cbad311ef38d9e71c57fa4fece8d2dd98171a18b1d2203.exe

  • Size

    913KB

  • MD5

    25daf43e2336c7198fdc12e06b9ad188

  • SHA1

    58655b18a18aa6649c30544961a493bb91db610c

  • SHA256

    154962abe08848cc48cbad311ef38d9e71c57fa4fece8d2dd98171a18b1d2203

  • SHA512

    06ba028df9698cc42a87c1fac58e686f7c8fd58da7bde98bec48463d8f56a81547668a7eefe677be15300b299ce3c93d3d779a3ed4533e1c0aa7d2dffe7187a0

  • SSDEEP

    12288:vy90vqM2eTow2Z/428KHtNKoAFcjEQ2dj5FVBK1RvPXAQvOQixmCPDGocgRG228n:vyoqM2a2aQtQKEQIFK1RroQkGoc0aoH

Malware Config

Extracted

Family

redline

Botnet

dark

C2

185.161.248.73:4164

Attributes
  • auth_value

    ae85b01f66afe8770afeed560513fc2d

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 10 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\154962abe08848cc48cbad311ef38d9e71c57fa4fece8d2dd98171a18b1d2203.exe
    "C:\Users\Admin\AppData\Local\Temp\154962abe08848cc48cbad311ef38d9e71c57fa4fece8d2dd98171a18b1d2203.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1580
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st344482.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st344482.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:652
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\80754707.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\80754707.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1900
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:864
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp848729.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp848729.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1796
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr830211.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr830211.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1840

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr830211.exe

    Filesize

    168KB

    MD5

    16cf18c8ef1d4be89b36e27c8fb88e9d

    SHA1

    7811ba84f75a1adc6d995c2c1121ec996d1cc003

    SHA256

    116156cc3af0bf4d81d9b2fba83c569cf9f4c9055b9c9cd5731538de036417e8

    SHA512

    4cb9e29db63d28c802c7c1799fd53e00b5facdc0b63d08b76d619c7a9be6cc06f11c0d435ad035bf3f9c3c96687e03e5157ae2ce7494a621c0762bc8083d9fbd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr830211.exe

    Filesize

    168KB

    MD5

    16cf18c8ef1d4be89b36e27c8fb88e9d

    SHA1

    7811ba84f75a1adc6d995c2c1121ec996d1cc003

    SHA256

    116156cc3af0bf4d81d9b2fba83c569cf9f4c9055b9c9cd5731538de036417e8

    SHA512

    4cb9e29db63d28c802c7c1799fd53e00b5facdc0b63d08b76d619c7a9be6cc06f11c0d435ad035bf3f9c3c96687e03e5157ae2ce7494a621c0762bc8083d9fbd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st344482.exe

    Filesize

    759KB

    MD5

    58fc918d3ad3aa09b803e023814a67df

    SHA1

    72ec9b0946e8a3b571ff3393c47ad748beb8a59a

    SHA256

    f8060841e80fc96c0f164cacb84781a1a7b5df43f8b4c7949441a00c84a98aef

    SHA512

    c9524defa506a9194b723bc6f0caec9a6bd1afb93d91bf709c462a136a3cf42687daecd4f33ed027ba7946cdf0f54d726e5a6a0a64cae8e96ae0109ebc4e8092

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st344482.exe

    Filesize

    759KB

    MD5

    58fc918d3ad3aa09b803e023814a67df

    SHA1

    72ec9b0946e8a3b571ff3393c47ad748beb8a59a

    SHA256

    f8060841e80fc96c0f164cacb84781a1a7b5df43f8b4c7949441a00c84a98aef

    SHA512

    c9524defa506a9194b723bc6f0caec9a6bd1afb93d91bf709c462a136a3cf42687daecd4f33ed027ba7946cdf0f54d726e5a6a0a64cae8e96ae0109ebc4e8092

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\80754707.exe

    Filesize

    300KB

    MD5

    7b4a3bf86d2ecb08db739b835de75fc3

    SHA1

    f13d48c006a0f3c6b7bc560e48564efce3dbad8c

    SHA256

    c248c228ce266449a91206682e57af853f63fb14ad79c5901690c8a595b6a9fc

    SHA512

    cc0f978b9eef5167d2939845105a6a079b515c6ec605302f72ebfa723af8c7c34cc597e0eec213809bfa024e70762d149675d25fd4419eacda030453ce95625f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\80754707.exe

    Filesize

    300KB

    MD5

    7b4a3bf86d2ecb08db739b835de75fc3

    SHA1

    f13d48c006a0f3c6b7bc560e48564efce3dbad8c

    SHA256

    c248c228ce266449a91206682e57af853f63fb14ad79c5901690c8a595b6a9fc

    SHA512

    cc0f978b9eef5167d2939845105a6a079b515c6ec605302f72ebfa723af8c7c34cc597e0eec213809bfa024e70762d149675d25fd4419eacda030453ce95625f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp848729.exe

    Filesize

    538KB

    MD5

    9259ba9f582f5e6e9f731ad87550351b

    SHA1

    2a9bda03fa3115f2b0208177ee9eb6af0af79c78

    SHA256

    cf7b82cb5c02d068a3b6c6023bed6e5ccc7b8aecf48d785f3901c70d0c062a7f

    SHA512

    9bfc0c811a202983db72c3d8406c3ca1447331100a38b6f58b3eec292a67321821b6552b8858b6f5ea765910d85cb4b7a0d7883cb483aff8edabb8f4ba870107

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp848729.exe

    Filesize

    538KB

    MD5

    9259ba9f582f5e6e9f731ad87550351b

    SHA1

    2a9bda03fa3115f2b0208177ee9eb6af0af79c78

    SHA256

    cf7b82cb5c02d068a3b6c6023bed6e5ccc7b8aecf48d785f3901c70d0c062a7f

    SHA512

    9bfc0c811a202983db72c3d8406c3ca1447331100a38b6f58b3eec292a67321821b6552b8858b6f5ea765910d85cb4b7a0d7883cb483aff8edabb8f4ba870107

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp848729.exe

    Filesize

    538KB

    MD5

    9259ba9f582f5e6e9f731ad87550351b

    SHA1

    2a9bda03fa3115f2b0208177ee9eb6af0af79c78

    SHA256

    cf7b82cb5c02d068a3b6c6023bed6e5ccc7b8aecf48d785f3901c70d0c062a7f

    SHA512

    9bfc0c811a202983db72c3d8406c3ca1447331100a38b6f58b3eec292a67321821b6552b8858b6f5ea765910d85cb4b7a0d7883cb483aff8edabb8f4ba870107

  • C:\Windows\Temp\1.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Windows\Temp\1.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\lr830211.exe

    Filesize

    168KB

    MD5

    16cf18c8ef1d4be89b36e27c8fb88e9d

    SHA1

    7811ba84f75a1adc6d995c2c1121ec996d1cc003

    SHA256

    116156cc3af0bf4d81d9b2fba83c569cf9f4c9055b9c9cd5731538de036417e8

    SHA512

    4cb9e29db63d28c802c7c1799fd53e00b5facdc0b63d08b76d619c7a9be6cc06f11c0d435ad035bf3f9c3c96687e03e5157ae2ce7494a621c0762bc8083d9fbd

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\lr830211.exe

    Filesize

    168KB

    MD5

    16cf18c8ef1d4be89b36e27c8fb88e9d

    SHA1

    7811ba84f75a1adc6d995c2c1121ec996d1cc003

    SHA256

    116156cc3af0bf4d81d9b2fba83c569cf9f4c9055b9c9cd5731538de036417e8

    SHA512

    4cb9e29db63d28c802c7c1799fd53e00b5facdc0b63d08b76d619c7a9be6cc06f11c0d435ad035bf3f9c3c96687e03e5157ae2ce7494a621c0762bc8083d9fbd

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st344482.exe

    Filesize

    759KB

    MD5

    58fc918d3ad3aa09b803e023814a67df

    SHA1

    72ec9b0946e8a3b571ff3393c47ad748beb8a59a

    SHA256

    f8060841e80fc96c0f164cacb84781a1a7b5df43f8b4c7949441a00c84a98aef

    SHA512

    c9524defa506a9194b723bc6f0caec9a6bd1afb93d91bf709c462a136a3cf42687daecd4f33ed027ba7946cdf0f54d726e5a6a0a64cae8e96ae0109ebc4e8092

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st344482.exe

    Filesize

    759KB

    MD5

    58fc918d3ad3aa09b803e023814a67df

    SHA1

    72ec9b0946e8a3b571ff3393c47ad748beb8a59a

    SHA256

    f8060841e80fc96c0f164cacb84781a1a7b5df43f8b4c7949441a00c84a98aef

    SHA512

    c9524defa506a9194b723bc6f0caec9a6bd1afb93d91bf709c462a136a3cf42687daecd4f33ed027ba7946cdf0f54d726e5a6a0a64cae8e96ae0109ebc4e8092

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\80754707.exe

    Filesize

    300KB

    MD5

    7b4a3bf86d2ecb08db739b835de75fc3

    SHA1

    f13d48c006a0f3c6b7bc560e48564efce3dbad8c

    SHA256

    c248c228ce266449a91206682e57af853f63fb14ad79c5901690c8a595b6a9fc

    SHA512

    cc0f978b9eef5167d2939845105a6a079b515c6ec605302f72ebfa723af8c7c34cc597e0eec213809bfa024e70762d149675d25fd4419eacda030453ce95625f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\80754707.exe

    Filesize

    300KB

    MD5

    7b4a3bf86d2ecb08db739b835de75fc3

    SHA1

    f13d48c006a0f3c6b7bc560e48564efce3dbad8c

    SHA256

    c248c228ce266449a91206682e57af853f63fb14ad79c5901690c8a595b6a9fc

    SHA512

    cc0f978b9eef5167d2939845105a6a079b515c6ec605302f72ebfa723af8c7c34cc597e0eec213809bfa024e70762d149675d25fd4419eacda030453ce95625f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp848729.exe

    Filesize

    538KB

    MD5

    9259ba9f582f5e6e9f731ad87550351b

    SHA1

    2a9bda03fa3115f2b0208177ee9eb6af0af79c78

    SHA256

    cf7b82cb5c02d068a3b6c6023bed6e5ccc7b8aecf48d785f3901c70d0c062a7f

    SHA512

    9bfc0c811a202983db72c3d8406c3ca1447331100a38b6f58b3eec292a67321821b6552b8858b6f5ea765910d85cb4b7a0d7883cb483aff8edabb8f4ba870107

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp848729.exe

    Filesize

    538KB

    MD5

    9259ba9f582f5e6e9f731ad87550351b

    SHA1

    2a9bda03fa3115f2b0208177ee9eb6af0af79c78

    SHA256

    cf7b82cb5c02d068a3b6c6023bed6e5ccc7b8aecf48d785f3901c70d0c062a7f

    SHA512

    9bfc0c811a202983db72c3d8406c3ca1447331100a38b6f58b3eec292a67321821b6552b8858b6f5ea765910d85cb4b7a0d7883cb483aff8edabb8f4ba870107

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp848729.exe

    Filesize

    538KB

    MD5

    9259ba9f582f5e6e9f731ad87550351b

    SHA1

    2a9bda03fa3115f2b0208177ee9eb6af0af79c78

    SHA256

    cf7b82cb5c02d068a3b6c6023bed6e5ccc7b8aecf48d785f3901c70d0c062a7f

    SHA512

    9bfc0c811a202983db72c3d8406c3ca1447331100a38b6f58b3eec292a67321821b6552b8858b6f5ea765910d85cb4b7a0d7883cb483aff8edabb8f4ba870107

  • \Windows\Temp\1.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • memory/864-2227-0x0000000000D10000-0x0000000000D1A000-memory.dmp

    Filesize

    40KB

  • memory/1796-2229-0x0000000004E30000-0x0000000004E96000-memory.dmp

    Filesize

    408KB

  • memory/1796-2661-0x0000000000370000-0x00000000003CB000-memory.dmp

    Filesize

    364KB

  • memory/1796-2663-0x0000000004CF0000-0x0000000004D30000-memory.dmp

    Filesize

    256KB

  • memory/1796-2228-0x0000000002830000-0x0000000002898000-memory.dmp

    Filesize

    416KB

  • memory/1796-2665-0x0000000004CF0000-0x0000000004D30000-memory.dmp

    Filesize

    256KB

  • memory/1796-4379-0x0000000004CB0000-0x0000000004CE2000-memory.dmp

    Filesize

    200KB

  • memory/1796-4380-0x0000000004CF0000-0x0000000004D30000-memory.dmp

    Filesize

    256KB

  • memory/1796-4383-0x0000000004CF0000-0x0000000004D30000-memory.dmp

    Filesize

    256KB

  • memory/1796-4384-0x0000000004CF0000-0x0000000004D30000-memory.dmp

    Filesize

    256KB

  • memory/1840-4392-0x00000000011B0000-0x00000000011E0000-memory.dmp

    Filesize

    192KB

  • memory/1840-4393-0x0000000000440000-0x0000000000446000-memory.dmp

    Filesize

    24KB

  • memory/1840-4394-0x0000000000880000-0x00000000008C0000-memory.dmp

    Filesize

    256KB

  • memory/1840-4395-0x0000000000880000-0x00000000008C0000-memory.dmp

    Filesize

    256KB

  • memory/1900-91-0x00000000023D0000-0x0000000002421000-memory.dmp

    Filesize

    324KB

  • memory/1900-110-0x00000000023D0000-0x0000000002421000-memory.dmp

    Filesize

    324KB

  • memory/1900-130-0x00000000023D0000-0x0000000002421000-memory.dmp

    Filesize

    324KB

  • memory/1900-128-0x00000000023D0000-0x0000000002421000-memory.dmp

    Filesize

    324KB

  • memory/1900-126-0x00000000023D0000-0x0000000002421000-memory.dmp

    Filesize

    324KB

  • memory/1900-134-0x00000000023D0000-0x0000000002421000-memory.dmp

    Filesize

    324KB

  • memory/1900-132-0x00000000023D0000-0x0000000002421000-memory.dmp

    Filesize

    324KB

  • memory/1900-136-0x00000000023D0000-0x0000000002421000-memory.dmp

    Filesize

    324KB

  • memory/1900-138-0x00000000023D0000-0x0000000002421000-memory.dmp

    Filesize

    324KB

  • memory/1900-140-0x00000000023D0000-0x0000000002421000-memory.dmp

    Filesize

    324KB

  • memory/1900-142-0x00000000023D0000-0x0000000002421000-memory.dmp

    Filesize

    324KB

  • memory/1900-2207-0x0000000004A50000-0x0000000004A90000-memory.dmp

    Filesize

    256KB

  • memory/1900-2208-0x0000000004A50000-0x0000000004A90000-memory.dmp

    Filesize

    256KB

  • memory/1900-2209-0x0000000004A50000-0x0000000004A90000-memory.dmp

    Filesize

    256KB

  • memory/1900-2210-0x0000000002430000-0x000000000243A000-memory.dmp

    Filesize

    40KB

  • memory/1900-124-0x00000000023D0000-0x0000000002421000-memory.dmp

    Filesize

    324KB

  • memory/1900-120-0x00000000023D0000-0x0000000002421000-memory.dmp

    Filesize

    324KB

  • memory/1900-116-0x00000000023D0000-0x0000000002421000-memory.dmp

    Filesize

    324KB

  • memory/1900-118-0x00000000023D0000-0x0000000002421000-memory.dmp

    Filesize

    324KB

  • memory/1900-114-0x00000000023D0000-0x0000000002421000-memory.dmp

    Filesize

    324KB

  • memory/1900-112-0x00000000023D0000-0x0000000002421000-memory.dmp

    Filesize

    324KB

  • memory/1900-122-0x00000000023D0000-0x0000000002421000-memory.dmp

    Filesize

    324KB

  • memory/1900-108-0x00000000023D0000-0x0000000002421000-memory.dmp

    Filesize

    324KB

  • memory/1900-106-0x00000000023D0000-0x0000000002421000-memory.dmp

    Filesize

    324KB

  • memory/1900-101-0x00000000023D0000-0x0000000002421000-memory.dmp

    Filesize

    324KB

  • memory/1900-104-0x00000000023D0000-0x0000000002421000-memory.dmp

    Filesize

    324KB

  • memory/1900-102-0x0000000004A50000-0x0000000004A90000-memory.dmp

    Filesize

    256KB

  • memory/1900-97-0x00000000023D0000-0x0000000002421000-memory.dmp

    Filesize

    324KB

  • memory/1900-100-0x0000000004A50000-0x0000000004A90000-memory.dmp

    Filesize

    256KB

  • memory/1900-98-0x0000000004A50000-0x0000000004A90000-memory.dmp

    Filesize

    256KB

  • memory/1900-95-0x00000000023D0000-0x0000000002421000-memory.dmp

    Filesize

    324KB

  • memory/1900-93-0x00000000023D0000-0x0000000002421000-memory.dmp

    Filesize

    324KB

  • memory/1900-85-0x00000000023D0000-0x0000000002421000-memory.dmp

    Filesize

    324KB

  • memory/1900-89-0x00000000023D0000-0x0000000002421000-memory.dmp

    Filesize

    324KB

  • memory/1900-87-0x00000000023D0000-0x0000000002421000-memory.dmp

    Filesize

    324KB

  • memory/1900-81-0x00000000023D0000-0x0000000002421000-memory.dmp

    Filesize

    324KB

  • memory/1900-83-0x00000000023D0000-0x0000000002421000-memory.dmp

    Filesize

    324KB

  • memory/1900-79-0x00000000023D0000-0x0000000002421000-memory.dmp

    Filesize

    324KB

  • memory/1900-77-0x00000000023D0000-0x0000000002421000-memory.dmp

    Filesize

    324KB

  • memory/1900-76-0x00000000023D0000-0x0000000002421000-memory.dmp

    Filesize

    324KB

  • memory/1900-75-0x00000000023D0000-0x0000000002426000-memory.dmp

    Filesize

    344KB

  • memory/1900-74-0x0000000002370000-0x00000000023C8000-memory.dmp

    Filesize

    352KB