Analysis

  • max time kernel
    125s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    07-05-2023 02:35

General

  • Target

    5f4655c423ddebca95b0a09d3304614ca4db5d1761a9b9af1bf8cca9362db353.exe

  • Size

    866KB

  • MD5

    e95b8935e10735bbd127f4039a94bf91

  • SHA1

    ea2863c1a307a6dee8aceb186a057c7e5e826ac8

  • SHA256

    5f4655c423ddebca95b0a09d3304614ca4db5d1761a9b9af1bf8cca9362db353

  • SHA512

    9181c070b504ec4b0f78a21b02e5c875bb58b4e76b12904963934168443584b3019748a2f610f09e70dd55f352f9b150fc9caa09c42d7ba4ab1cbba99c828772

  • SSDEEP

    12288:dy90NPSdeIy3rjKH6IsuDH6ZgEN5Z+dcXMA3uaHPTuInvMo/yruVpU:dyULKH6IsQH62E1Rea7io/yus

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dark

C2

185.161.248.73:4164

Attributes
  • auth_value

    ae85b01f66afe8770afeed560513fc2d

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f4655c423ddebca95b0a09d3304614ca4db5d1761a9b9af1bf8cca9362db353.exe
    "C:\Users\Admin\AppData\Local\Temp\5f4655c423ddebca95b0a09d3304614ca4db5d1761a9b9af1bf8cca9362db353.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1768
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y90207087.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y90207087.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:888
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p80665459.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p80665459.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1948
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:952
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r63066596.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r63066596.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1752

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y90207087.exe
    Filesize

    578KB

    MD5

    af7b28d4af94cd89debea7b3920a0257

    SHA1

    42dea5593656f685e9f7211845b6720d6734b002

    SHA256

    f8479c29a09c5171b635edde25dcbd05331bb4e42010d5723e767d27a00966db

    SHA512

    c7150eefa4fc38e93224b29df427a0f16d59623baf9c5af9e6df1eadd467af21f7769eede7d22576939e449fdd84bad95af83e1da9e1dcd6764f7ef7ccd0fcfe

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y90207087.exe
    Filesize

    578KB

    MD5

    af7b28d4af94cd89debea7b3920a0257

    SHA1

    42dea5593656f685e9f7211845b6720d6734b002

    SHA256

    f8479c29a09c5171b635edde25dcbd05331bb4e42010d5723e767d27a00966db

    SHA512

    c7150eefa4fc38e93224b29df427a0f16d59623baf9c5af9e6df1eadd467af21f7769eede7d22576939e449fdd84bad95af83e1da9e1dcd6764f7ef7ccd0fcfe

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p80665459.exe
    Filesize

    575KB

    MD5

    444ea496d80575b5845675470f8d6128

    SHA1

    494c4741140163e4e929dac52738edb01d5fc448

    SHA256

    e104e455dd8a7e35c6aedf1f56608df8a13055a3b566a57a42fa0f7f2cc6e5cd

    SHA512

    e0272b6202e898cde7ebc1ed556709a0230373984406819d76aac2aaef255d5cbdb426b1b8b069614dfade1173fc508bf62c9bf87fc33702274aa296483c062f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p80665459.exe
    Filesize

    575KB

    MD5

    444ea496d80575b5845675470f8d6128

    SHA1

    494c4741140163e4e929dac52738edb01d5fc448

    SHA256

    e104e455dd8a7e35c6aedf1f56608df8a13055a3b566a57a42fa0f7f2cc6e5cd

    SHA512

    e0272b6202e898cde7ebc1ed556709a0230373984406819d76aac2aaef255d5cbdb426b1b8b069614dfade1173fc508bf62c9bf87fc33702274aa296483c062f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p80665459.exe
    Filesize

    575KB

    MD5

    444ea496d80575b5845675470f8d6128

    SHA1

    494c4741140163e4e929dac52738edb01d5fc448

    SHA256

    e104e455dd8a7e35c6aedf1f56608df8a13055a3b566a57a42fa0f7f2cc6e5cd

    SHA512

    e0272b6202e898cde7ebc1ed556709a0230373984406819d76aac2aaef255d5cbdb426b1b8b069614dfade1173fc508bf62c9bf87fc33702274aa296483c062f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r63066596.exe
    Filesize

    172KB

    MD5

    8a8bf07bbd4320602a1c80f3d88f9c62

    SHA1

    d7533d703a41da477b1447d18d461bc74c585dbf

    SHA256

    9140baca7cd75f25f146051dc55b6980e6f1541c5a12eaa4bf71138c32599953

    SHA512

    d1b073309ae0be345d7a3486082a32099b8aa47c1b96e02c4b96a34a93c35fb49e14f5ea044cf1939b7c81f114f18d93c94e8ddf063f8423a28c17898381a723

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r63066596.exe
    Filesize

    172KB

    MD5

    8a8bf07bbd4320602a1c80f3d88f9c62

    SHA1

    d7533d703a41da477b1447d18d461bc74c585dbf

    SHA256

    9140baca7cd75f25f146051dc55b6980e6f1541c5a12eaa4bf71138c32599953

    SHA512

    d1b073309ae0be345d7a3486082a32099b8aa47c1b96e02c4b96a34a93c35fb49e14f5ea044cf1939b7c81f114f18d93c94e8ddf063f8423a28c17898381a723

  • C:\Windows\Temp\1.exe
    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • C:\Windows\Temp\1.exe
    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\y90207087.exe
    Filesize

    578KB

    MD5

    af7b28d4af94cd89debea7b3920a0257

    SHA1

    42dea5593656f685e9f7211845b6720d6734b002

    SHA256

    f8479c29a09c5171b635edde25dcbd05331bb4e42010d5723e767d27a00966db

    SHA512

    c7150eefa4fc38e93224b29df427a0f16d59623baf9c5af9e6df1eadd467af21f7769eede7d22576939e449fdd84bad95af83e1da9e1dcd6764f7ef7ccd0fcfe

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\y90207087.exe
    Filesize

    578KB

    MD5

    af7b28d4af94cd89debea7b3920a0257

    SHA1

    42dea5593656f685e9f7211845b6720d6734b002

    SHA256

    f8479c29a09c5171b635edde25dcbd05331bb4e42010d5723e767d27a00966db

    SHA512

    c7150eefa4fc38e93224b29df427a0f16d59623baf9c5af9e6df1eadd467af21f7769eede7d22576939e449fdd84bad95af83e1da9e1dcd6764f7ef7ccd0fcfe

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\p80665459.exe
    Filesize

    575KB

    MD5

    444ea496d80575b5845675470f8d6128

    SHA1

    494c4741140163e4e929dac52738edb01d5fc448

    SHA256

    e104e455dd8a7e35c6aedf1f56608df8a13055a3b566a57a42fa0f7f2cc6e5cd

    SHA512

    e0272b6202e898cde7ebc1ed556709a0230373984406819d76aac2aaef255d5cbdb426b1b8b069614dfade1173fc508bf62c9bf87fc33702274aa296483c062f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\p80665459.exe
    Filesize

    575KB

    MD5

    444ea496d80575b5845675470f8d6128

    SHA1

    494c4741140163e4e929dac52738edb01d5fc448

    SHA256

    e104e455dd8a7e35c6aedf1f56608df8a13055a3b566a57a42fa0f7f2cc6e5cd

    SHA512

    e0272b6202e898cde7ebc1ed556709a0230373984406819d76aac2aaef255d5cbdb426b1b8b069614dfade1173fc508bf62c9bf87fc33702274aa296483c062f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\p80665459.exe
    Filesize

    575KB

    MD5

    444ea496d80575b5845675470f8d6128

    SHA1

    494c4741140163e4e929dac52738edb01d5fc448

    SHA256

    e104e455dd8a7e35c6aedf1f56608df8a13055a3b566a57a42fa0f7f2cc6e5cd

    SHA512

    e0272b6202e898cde7ebc1ed556709a0230373984406819d76aac2aaef255d5cbdb426b1b8b069614dfade1173fc508bf62c9bf87fc33702274aa296483c062f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\r63066596.exe
    Filesize

    172KB

    MD5

    8a8bf07bbd4320602a1c80f3d88f9c62

    SHA1

    d7533d703a41da477b1447d18d461bc74c585dbf

    SHA256

    9140baca7cd75f25f146051dc55b6980e6f1541c5a12eaa4bf71138c32599953

    SHA512

    d1b073309ae0be345d7a3486082a32099b8aa47c1b96e02c4b96a34a93c35fb49e14f5ea044cf1939b7c81f114f18d93c94e8ddf063f8423a28c17898381a723

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\r63066596.exe
    Filesize

    172KB

    MD5

    8a8bf07bbd4320602a1c80f3d88f9c62

    SHA1

    d7533d703a41da477b1447d18d461bc74c585dbf

    SHA256

    9140baca7cd75f25f146051dc55b6980e6f1541c5a12eaa4bf71138c32599953

    SHA512

    d1b073309ae0be345d7a3486082a32099b8aa47c1b96e02c4b96a34a93c35fb49e14f5ea044cf1939b7c81f114f18d93c94e8ddf063f8423a28c17898381a723

  • \Windows\Temp\1.exe
    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • \Windows\Temp\1.exe
    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • memory/952-2252-0x0000000000760000-0x00000000007A0000-memory.dmp
    Filesize

    256KB

  • memory/952-2241-0x00000000004B0000-0x00000000004B6000-memory.dmp
    Filesize

    24KB

  • memory/952-2239-0x00000000010B0000-0x00000000010DE000-memory.dmp
    Filesize

    184KB

  • memory/952-2250-0x0000000000760000-0x00000000007A0000-memory.dmp
    Filesize

    256KB

  • memory/1752-2248-0x00000000008C0000-0x00000000008F0000-memory.dmp
    Filesize

    192KB

  • memory/1752-2249-0x0000000000220000-0x0000000000226000-memory.dmp
    Filesize

    24KB

  • memory/1752-2251-0x0000000000AB0000-0x0000000000AF0000-memory.dmp
    Filesize

    256KB

  • memory/1752-2253-0x0000000000AB0000-0x0000000000AF0000-memory.dmp
    Filesize

    256KB

  • memory/1948-136-0x0000000004DF0000-0x0000000004E50000-memory.dmp
    Filesize

    384KB

  • memory/1948-92-0x0000000004DF0000-0x0000000004E50000-memory.dmp
    Filesize

    384KB

  • memory/1948-122-0x0000000004DF0000-0x0000000004E50000-memory.dmp
    Filesize

    384KB

  • memory/1948-126-0x0000000004DF0000-0x0000000004E50000-memory.dmp
    Filesize

    384KB

  • memory/1948-130-0x0000000004DF0000-0x0000000004E50000-memory.dmp
    Filesize

    384KB

  • memory/1948-132-0x0000000004DF0000-0x0000000004E50000-memory.dmp
    Filesize

    384KB

  • memory/1948-116-0x0000000004DF0000-0x0000000004E50000-memory.dmp
    Filesize

    384KB

  • memory/1948-138-0x0000000004DF0000-0x0000000004E50000-memory.dmp
    Filesize

    384KB

  • memory/1948-142-0x0000000004DF0000-0x0000000004E50000-memory.dmp
    Filesize

    384KB

  • memory/1948-144-0x0000000004DF0000-0x0000000004E50000-memory.dmp
    Filesize

    384KB

  • memory/1948-140-0x0000000004DF0000-0x0000000004E50000-memory.dmp
    Filesize

    384KB

  • memory/1948-134-0x0000000004DF0000-0x0000000004E50000-memory.dmp
    Filesize

    384KB

  • memory/1948-128-0x0000000004DF0000-0x0000000004E50000-memory.dmp
    Filesize

    384KB

  • memory/1948-124-0x0000000004DF0000-0x0000000004E50000-memory.dmp
    Filesize

    384KB

  • memory/1948-118-0x0000000004DF0000-0x0000000004E50000-memory.dmp
    Filesize

    384KB

  • memory/1948-112-0x0000000004DF0000-0x0000000004E50000-memory.dmp
    Filesize

    384KB

  • memory/1948-108-0x0000000004DF0000-0x0000000004E50000-memory.dmp
    Filesize

    384KB

  • memory/1948-104-0x0000000004DF0000-0x0000000004E50000-memory.dmp
    Filesize

    384KB

  • memory/1948-100-0x0000000004DF0000-0x0000000004E50000-memory.dmp
    Filesize

    384KB

  • memory/1948-120-0x0000000004DF0000-0x0000000004E50000-memory.dmp
    Filesize

    384KB

  • memory/1948-290-0x0000000004C40000-0x0000000004C80000-memory.dmp
    Filesize

    256KB

  • memory/1948-289-0x0000000004C40000-0x0000000004C80000-memory.dmp
    Filesize

    256KB

  • memory/1948-2229-0x0000000005260000-0x0000000005292000-memory.dmp
    Filesize

    200KB

  • memory/1948-114-0x0000000004DF0000-0x0000000004E50000-memory.dmp
    Filesize

    384KB

  • memory/1948-110-0x0000000004DF0000-0x0000000004E50000-memory.dmp
    Filesize

    384KB

  • memory/1948-106-0x0000000004DF0000-0x0000000004E50000-memory.dmp
    Filesize

    384KB

  • memory/1948-102-0x0000000004DF0000-0x0000000004E50000-memory.dmp
    Filesize

    384KB

  • memory/1948-98-0x0000000004DF0000-0x0000000004E50000-memory.dmp
    Filesize

    384KB

  • memory/1948-2238-0x0000000004C40000-0x0000000004C80000-memory.dmp
    Filesize

    256KB

  • memory/1948-96-0x0000000004DF0000-0x0000000004E50000-memory.dmp
    Filesize

    384KB

  • memory/1948-94-0x0000000004DF0000-0x0000000004E50000-memory.dmp
    Filesize

    384KB

  • memory/1948-90-0x0000000004DF0000-0x0000000004E50000-memory.dmp
    Filesize

    384KB

  • memory/1948-88-0x0000000004DF0000-0x0000000004E50000-memory.dmp
    Filesize

    384KB

  • memory/1948-86-0x0000000004DF0000-0x0000000004E50000-memory.dmp
    Filesize

    384KB

  • memory/1948-84-0x0000000004DF0000-0x0000000004E50000-memory.dmp
    Filesize

    384KB

  • memory/1948-82-0x0000000004DF0000-0x0000000004E50000-memory.dmp
    Filesize

    384KB

  • memory/1948-81-0x0000000004DF0000-0x0000000004E50000-memory.dmp
    Filesize

    384KB

  • memory/1948-80-0x0000000004DF0000-0x0000000004E56000-memory.dmp
    Filesize

    408KB

  • memory/1948-79-0x0000000004D80000-0x0000000004DE8000-memory.dmp
    Filesize

    416KB

  • memory/1948-78-0x0000000000950000-0x00000000009AB000-memory.dmp
    Filesize

    364KB