Analysis

  • max time kernel
    164s
  • max time network
    170s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 20:55

General

  • Target

    2059e756c92620c4c62749232768615a3e8dd716bd9c2f2ccbb703a10c2b1595.exe

  • Size

    1.5MB

  • MD5

    6cad24db08d7a5eea63aa3c81ca9a085

  • SHA1

    ce8f4c591b90d4ed01c6c8b9385eb683315b7333

  • SHA256

    2059e756c92620c4c62749232768615a3e8dd716bd9c2f2ccbb703a10c2b1595

  • SHA512

    117378b8a1690e4742a3f1a64cbe9d6ccb66b019c79e3e908f02ee83561f77809854909d42c726fc3e64286659fca0efb5de1d8415f8dc2215acee63ae627a28

  • SSDEEP

    49152:8zxc0yNSU/QQV9h+CzWq3YU8WssvmbL4F1:exfyN54QEMxYUTlvuL4

Malware Config

Extracted

Family

redline

Botnet

mazda

C2

217.196.96.56:4138

Attributes
  • auth_value

    3d2870537d84a4c6d7aeecd002871c51

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2059e756c92620c4c62749232768615a3e8dd716bd9c2f2ccbb703a10c2b1595.exe
    "C:\Users\Admin\AppData\Local\Temp\2059e756c92620c4c62749232768615a3e8dd716bd9c2f2ccbb703a10c2b1595.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5121286.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5121286.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:848
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4690880.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4690880.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:980
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6118966.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6118966.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:468
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3752856.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3752856.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1868
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9747897.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9747897.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Loads dropped DLL
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:552
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b7982910.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b7982910.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1572

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5121286.exe

          Filesize

          1.4MB

          MD5

          76d9b10d4444addd3fca582157e68420

          SHA1

          d81253b727033a15fab82cc2e0b0739d6b84ec4a

          SHA256

          c95a4f086c5afac351cd92517e134dcba1e065f599d62cc1a422914d38cc8594

          SHA512

          b5e7ec3291f56181e7f2d3f11e4bf4e584dfecdfe4193572ba9df991df4e49c32d3263627d475cf9d63fa0498f6398c4f6669e2712efefcb460e24bf7793527c

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5121286.exe

          Filesize

          1.4MB

          MD5

          76d9b10d4444addd3fca582157e68420

          SHA1

          d81253b727033a15fab82cc2e0b0739d6b84ec4a

          SHA256

          c95a4f086c5afac351cd92517e134dcba1e065f599d62cc1a422914d38cc8594

          SHA512

          b5e7ec3291f56181e7f2d3f11e4bf4e584dfecdfe4193572ba9df991df4e49c32d3263627d475cf9d63fa0498f6398c4f6669e2712efefcb460e24bf7793527c

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4690880.exe

          Filesize

          915KB

          MD5

          d4e92a05d6de605f28f16163a6bee039

          SHA1

          90956a2645fac0a2c25b71b83c937b39685e2630

          SHA256

          5aca491670c163b33854fd8ce67a997ece510a820c43e85a4c0971835aa0bb2b

          SHA512

          7adfa9ce5412d8736890329fbac4a2d1b9e3f0c9654bbcefaec559cfa5f97d4931d03dad412f9c80607d56c8847125e90bbfc91c75a3899c78770fa09e3356c9

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4690880.exe

          Filesize

          915KB

          MD5

          d4e92a05d6de605f28f16163a6bee039

          SHA1

          90956a2645fac0a2c25b71b83c937b39685e2630

          SHA256

          5aca491670c163b33854fd8ce67a997ece510a820c43e85a4c0971835aa0bb2b

          SHA512

          7adfa9ce5412d8736890329fbac4a2d1b9e3f0c9654bbcefaec559cfa5f97d4931d03dad412f9c80607d56c8847125e90bbfc91c75a3899c78770fa09e3356c9

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6118966.exe

          Filesize

          711KB

          MD5

          3979763efb022e32f014d938edcc0159

          SHA1

          6720c5a850589154b97c9d8066f4e18a91d8dafe

          SHA256

          2d8f47215418508010e1860add3ca356a17dace6449b3e8a90d06459b1c45787

          SHA512

          e026d76758f4cc66c812063761b33036f73b2b2a87742c2026d694784906fc082ecc0295032bef7c7823dc66cb1eac6f4ba22e6176d771db2ccfc4e4a0ed914f

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6118966.exe

          Filesize

          711KB

          MD5

          3979763efb022e32f014d938edcc0159

          SHA1

          6720c5a850589154b97c9d8066f4e18a91d8dafe

          SHA256

          2d8f47215418508010e1860add3ca356a17dace6449b3e8a90d06459b1c45787

          SHA512

          e026d76758f4cc66c812063761b33036f73b2b2a87742c2026d694784906fc082ecc0295032bef7c7823dc66cb1eac6f4ba22e6176d771db2ccfc4e4a0ed914f

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3752856.exe

          Filesize

          416KB

          MD5

          6ef09865852b1f0b2bb29a4459dd8f08

          SHA1

          0362c197198b45482aab0af2340fd19029a43fd2

          SHA256

          2be0d456ae86e7268f7cd0729ce373af607b1708cccc43df62a40f76a68fc10b

          SHA512

          920d8f033bb5213d5ade9e98afec76522e240c433538958aa59b1afc2a9f1ace0efe67a4e6e0f3044000f1b93c7c946be69338054b79da63494f65abbbe1f2d6

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3752856.exe

          Filesize

          416KB

          MD5

          6ef09865852b1f0b2bb29a4459dd8f08

          SHA1

          0362c197198b45482aab0af2340fd19029a43fd2

          SHA256

          2be0d456ae86e7268f7cd0729ce373af607b1708cccc43df62a40f76a68fc10b

          SHA512

          920d8f033bb5213d5ade9e98afec76522e240c433538958aa59b1afc2a9f1ace0efe67a4e6e0f3044000f1b93c7c946be69338054b79da63494f65abbbe1f2d6

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9747897.exe

          Filesize

          360KB

          MD5

          e4977060b1eeb182b4bdc1a24aad281a

          SHA1

          a7a7dc6ad6a98f3c0148376a29915d1249f8b061

          SHA256

          3714f5002557be8beae4e4e3a10fd34ceba995b4606ae28e22c0902bcab5a1c9

          SHA512

          2729bc344bb9c6ec28c6a999a7e29795e0baf959581b0de4b01ff6811f441961ab3219867ad6966ec7d2a0c8b33c99f3801fcd905b3a0018ab4d358fd4110aaf

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9747897.exe

          Filesize

          360KB

          MD5

          e4977060b1eeb182b4bdc1a24aad281a

          SHA1

          a7a7dc6ad6a98f3c0148376a29915d1249f8b061

          SHA256

          3714f5002557be8beae4e4e3a10fd34ceba995b4606ae28e22c0902bcab5a1c9

          SHA512

          2729bc344bb9c6ec28c6a999a7e29795e0baf959581b0de4b01ff6811f441961ab3219867ad6966ec7d2a0c8b33c99f3801fcd905b3a0018ab4d358fd4110aaf

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9747897.exe

          Filesize

          360KB

          MD5

          e4977060b1eeb182b4bdc1a24aad281a

          SHA1

          a7a7dc6ad6a98f3c0148376a29915d1249f8b061

          SHA256

          3714f5002557be8beae4e4e3a10fd34ceba995b4606ae28e22c0902bcab5a1c9

          SHA512

          2729bc344bb9c6ec28c6a999a7e29795e0baf959581b0de4b01ff6811f441961ab3219867ad6966ec7d2a0c8b33c99f3801fcd905b3a0018ab4d358fd4110aaf

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b7982910.exe

          Filesize

          168KB

          MD5

          85ea2a7a3ad1032d8e6a25ddc6d3c5c5

          SHA1

          3d5fbeee543f84588bc06a574e58e8af584e01ee

          SHA256

          a854d9139be74330cbd79796b22a29d4d8fbe115632a6fc10076c68350e04c93

          SHA512

          d84b8adc3917b3b085043ccde56877701043d842f4717b4cac01beddb78cc97ce0d4042c90d7b5afffb1496ab983330984713a8e3532429277a57d7bb8dcf3f2

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b7982910.exe

          Filesize

          168KB

          MD5

          85ea2a7a3ad1032d8e6a25ddc6d3c5c5

          SHA1

          3d5fbeee543f84588bc06a574e58e8af584e01ee

          SHA256

          a854d9139be74330cbd79796b22a29d4d8fbe115632a6fc10076c68350e04c93

          SHA512

          d84b8adc3917b3b085043ccde56877701043d842f4717b4cac01beddb78cc97ce0d4042c90d7b5afffb1496ab983330984713a8e3532429277a57d7bb8dcf3f2

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v5121286.exe

          Filesize

          1.4MB

          MD5

          76d9b10d4444addd3fca582157e68420

          SHA1

          d81253b727033a15fab82cc2e0b0739d6b84ec4a

          SHA256

          c95a4f086c5afac351cd92517e134dcba1e065f599d62cc1a422914d38cc8594

          SHA512

          b5e7ec3291f56181e7f2d3f11e4bf4e584dfecdfe4193572ba9df991df4e49c32d3263627d475cf9d63fa0498f6398c4f6669e2712efefcb460e24bf7793527c

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v5121286.exe

          Filesize

          1.4MB

          MD5

          76d9b10d4444addd3fca582157e68420

          SHA1

          d81253b727033a15fab82cc2e0b0739d6b84ec4a

          SHA256

          c95a4f086c5afac351cd92517e134dcba1e065f599d62cc1a422914d38cc8594

          SHA512

          b5e7ec3291f56181e7f2d3f11e4bf4e584dfecdfe4193572ba9df991df4e49c32d3263627d475cf9d63fa0498f6398c4f6669e2712efefcb460e24bf7793527c

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v4690880.exe

          Filesize

          915KB

          MD5

          d4e92a05d6de605f28f16163a6bee039

          SHA1

          90956a2645fac0a2c25b71b83c937b39685e2630

          SHA256

          5aca491670c163b33854fd8ce67a997ece510a820c43e85a4c0971835aa0bb2b

          SHA512

          7adfa9ce5412d8736890329fbac4a2d1b9e3f0c9654bbcefaec559cfa5f97d4931d03dad412f9c80607d56c8847125e90bbfc91c75a3899c78770fa09e3356c9

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v4690880.exe

          Filesize

          915KB

          MD5

          d4e92a05d6de605f28f16163a6bee039

          SHA1

          90956a2645fac0a2c25b71b83c937b39685e2630

          SHA256

          5aca491670c163b33854fd8ce67a997ece510a820c43e85a4c0971835aa0bb2b

          SHA512

          7adfa9ce5412d8736890329fbac4a2d1b9e3f0c9654bbcefaec559cfa5f97d4931d03dad412f9c80607d56c8847125e90bbfc91c75a3899c78770fa09e3356c9

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v6118966.exe

          Filesize

          711KB

          MD5

          3979763efb022e32f014d938edcc0159

          SHA1

          6720c5a850589154b97c9d8066f4e18a91d8dafe

          SHA256

          2d8f47215418508010e1860add3ca356a17dace6449b3e8a90d06459b1c45787

          SHA512

          e026d76758f4cc66c812063761b33036f73b2b2a87742c2026d694784906fc082ecc0295032bef7c7823dc66cb1eac6f4ba22e6176d771db2ccfc4e4a0ed914f

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v6118966.exe

          Filesize

          711KB

          MD5

          3979763efb022e32f014d938edcc0159

          SHA1

          6720c5a850589154b97c9d8066f4e18a91d8dafe

          SHA256

          2d8f47215418508010e1860add3ca356a17dace6449b3e8a90d06459b1c45787

          SHA512

          e026d76758f4cc66c812063761b33036f73b2b2a87742c2026d694784906fc082ecc0295032bef7c7823dc66cb1eac6f4ba22e6176d771db2ccfc4e4a0ed914f

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v3752856.exe

          Filesize

          416KB

          MD5

          6ef09865852b1f0b2bb29a4459dd8f08

          SHA1

          0362c197198b45482aab0af2340fd19029a43fd2

          SHA256

          2be0d456ae86e7268f7cd0729ce373af607b1708cccc43df62a40f76a68fc10b

          SHA512

          920d8f033bb5213d5ade9e98afec76522e240c433538958aa59b1afc2a9f1ace0efe67a4e6e0f3044000f1b93c7c946be69338054b79da63494f65abbbe1f2d6

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v3752856.exe

          Filesize

          416KB

          MD5

          6ef09865852b1f0b2bb29a4459dd8f08

          SHA1

          0362c197198b45482aab0af2340fd19029a43fd2

          SHA256

          2be0d456ae86e7268f7cd0729ce373af607b1708cccc43df62a40f76a68fc10b

          SHA512

          920d8f033bb5213d5ade9e98afec76522e240c433538958aa59b1afc2a9f1ace0efe67a4e6e0f3044000f1b93c7c946be69338054b79da63494f65abbbe1f2d6

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a9747897.exe

          Filesize

          360KB

          MD5

          e4977060b1eeb182b4bdc1a24aad281a

          SHA1

          a7a7dc6ad6a98f3c0148376a29915d1249f8b061

          SHA256

          3714f5002557be8beae4e4e3a10fd34ceba995b4606ae28e22c0902bcab5a1c9

          SHA512

          2729bc344bb9c6ec28c6a999a7e29795e0baf959581b0de4b01ff6811f441961ab3219867ad6966ec7d2a0c8b33c99f3801fcd905b3a0018ab4d358fd4110aaf

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a9747897.exe

          Filesize

          360KB

          MD5

          e4977060b1eeb182b4bdc1a24aad281a

          SHA1

          a7a7dc6ad6a98f3c0148376a29915d1249f8b061

          SHA256

          3714f5002557be8beae4e4e3a10fd34ceba995b4606ae28e22c0902bcab5a1c9

          SHA512

          2729bc344bb9c6ec28c6a999a7e29795e0baf959581b0de4b01ff6811f441961ab3219867ad6966ec7d2a0c8b33c99f3801fcd905b3a0018ab4d358fd4110aaf

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a9747897.exe

          Filesize

          360KB

          MD5

          e4977060b1eeb182b4bdc1a24aad281a

          SHA1

          a7a7dc6ad6a98f3c0148376a29915d1249f8b061

          SHA256

          3714f5002557be8beae4e4e3a10fd34ceba995b4606ae28e22c0902bcab5a1c9

          SHA512

          2729bc344bb9c6ec28c6a999a7e29795e0baf959581b0de4b01ff6811f441961ab3219867ad6966ec7d2a0c8b33c99f3801fcd905b3a0018ab4d358fd4110aaf

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b7982910.exe

          Filesize

          168KB

          MD5

          85ea2a7a3ad1032d8e6a25ddc6d3c5c5

          SHA1

          3d5fbeee543f84588bc06a574e58e8af584e01ee

          SHA256

          a854d9139be74330cbd79796b22a29d4d8fbe115632a6fc10076c68350e04c93

          SHA512

          d84b8adc3917b3b085043ccde56877701043d842f4717b4cac01beddb78cc97ce0d4042c90d7b5afffb1496ab983330984713a8e3532429277a57d7bb8dcf3f2

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b7982910.exe

          Filesize

          168KB

          MD5

          85ea2a7a3ad1032d8e6a25ddc6d3c5c5

          SHA1

          3d5fbeee543f84588bc06a574e58e8af584e01ee

          SHA256

          a854d9139be74330cbd79796b22a29d4d8fbe115632a6fc10076c68350e04c93

          SHA512

          d84b8adc3917b3b085043ccde56877701043d842f4717b4cac01beddb78cc97ce0d4042c90d7b5afffb1496ab983330984713a8e3532429277a57d7bb8dcf3f2

        • memory/552-112-0x00000000003E0000-0x00000000003F2000-memory.dmp

          Filesize

          72KB

        • memory/552-140-0x0000000004EB0000-0x0000000004EF0000-memory.dmp

          Filesize

          256KB

        • memory/552-117-0x00000000003E0000-0x00000000003F2000-memory.dmp

          Filesize

          72KB

        • memory/552-113-0x00000000003E0000-0x00000000003F2000-memory.dmp

          Filesize

          72KB

        • memory/552-123-0x00000000003E0000-0x00000000003F2000-memory.dmp

          Filesize

          72KB

        • memory/552-121-0x00000000003E0000-0x00000000003F2000-memory.dmp

          Filesize

          72KB

        • memory/552-139-0x00000000003E0000-0x00000000003F2000-memory.dmp

          Filesize

          72KB

        • memory/552-137-0x00000000003E0000-0x00000000003F2000-memory.dmp

          Filesize

          72KB

        • memory/552-135-0x00000000003E0000-0x00000000003F2000-memory.dmp

          Filesize

          72KB

        • memory/552-133-0x00000000003E0000-0x00000000003F2000-memory.dmp

          Filesize

          72KB

        • memory/552-131-0x00000000003E0000-0x00000000003F2000-memory.dmp

          Filesize

          72KB

        • memory/552-129-0x00000000003E0000-0x00000000003F2000-memory.dmp

          Filesize

          72KB

        • memory/552-127-0x00000000003E0000-0x00000000003F2000-memory.dmp

          Filesize

          72KB

        • memory/552-125-0x00000000003E0000-0x00000000003F2000-memory.dmp

          Filesize

          72KB

        • memory/552-119-0x00000000003E0000-0x00000000003F2000-memory.dmp

          Filesize

          72KB

        • memory/552-115-0x00000000003E0000-0x00000000003F2000-memory.dmp

          Filesize

          72KB

        • memory/552-141-0x0000000004EB0000-0x0000000004EF0000-memory.dmp

          Filesize

          256KB

        • memory/552-142-0x0000000004EB0000-0x0000000004EF0000-memory.dmp

          Filesize

          256KB

        • memory/552-144-0x0000000004EB0000-0x0000000004EF0000-memory.dmp

          Filesize

          256KB

        • memory/552-145-0x0000000004EB0000-0x0000000004EF0000-memory.dmp

          Filesize

          256KB

        • memory/552-146-0x0000000000400000-0x00000000006F4000-memory.dmp

          Filesize

          3.0MB

        • memory/552-111-0x00000000003E0000-0x00000000003F8000-memory.dmp

          Filesize

          96KB

        • memory/552-110-0x0000000000390000-0x00000000003AA000-memory.dmp

          Filesize

          104KB

        • memory/552-109-0x0000000000260000-0x000000000028D000-memory.dmp

          Filesize

          180KB

        • memory/552-108-0x0000000000400000-0x00000000006F4000-memory.dmp

          Filesize

          3.0MB

        • memory/1572-153-0x00000000002E0000-0x0000000000310000-memory.dmp

          Filesize

          192KB

        • memory/1572-154-0x0000000000260000-0x0000000000266000-memory.dmp

          Filesize

          24KB

        • memory/1572-155-0x0000000000770000-0x00000000007B0000-memory.dmp

          Filesize

          256KB

        • memory/1572-156-0x0000000000770000-0x00000000007B0000-memory.dmp

          Filesize

          256KB