Analysis

  • max time kernel
    128s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    07-05-2023 02:47

General

  • Target

    63cb4ffbd121d63439b6314602b531312951b333b9ec543330d17ab470d4a613.exe

  • Size

    867KB

  • MD5

    42d5d7d3d34c3f2fd8b048cbd2c6b943

  • SHA1

    5af25b61c901d2e0aff7edc5040d32f3bc0f7c7d

  • SHA256

    63cb4ffbd121d63439b6314602b531312951b333b9ec543330d17ab470d4a613

  • SHA512

    c7236d36931f2f6922842fed22055cd21931435466d5febcea2b2112846decd975addfc4618920c7492249e59c7e2a5eabde5379c60c2b86d96236e261bb9d9f

  • SSDEEP

    12288:sy909rrPxKdPKYSwcywFzyiDug8LmC/s5oIaClK+1Lih2fIFTGdz2QLFYm40oM:sygIdPOJzhKJLf/coIHgaLi2+G5QnM

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dark

C2

185.161.248.73:4164

Attributes
  • auth_value

    ae85b01f66afe8770afeed560513fc2d

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\63cb4ffbd121d63439b6314602b531312951b333b9ec543330d17ab470d4a613.exe
    "C:\Users\Admin\AppData\Local\Temp\63cb4ffbd121d63439b6314602b531312951b333b9ec543330d17ab470d4a613.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y64216743.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y64216743.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2004
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p43993831.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p43993831.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1100
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1680
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r19608747.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r19608747.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1436

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y64216743.exe
    Filesize

    577KB

    MD5

    dca3c2e208614028dea3289684fe6666

    SHA1

    2b0bb4631be46e25432b75e352417a2c077cedbb

    SHA256

    d49c6f0ea64b77f830166a56a884994dbb22a17a612f11d6b4a450148c3584ca

    SHA512

    ced5be588dd5027b21d14534db06b400d19f31bddb79ac08cb248b06baf2b58f4ca2a9b0b60d2ae70f4ec517a8ab9b925a64d53b2bc19070a3f0247453fcf18f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y64216743.exe
    Filesize

    577KB

    MD5

    dca3c2e208614028dea3289684fe6666

    SHA1

    2b0bb4631be46e25432b75e352417a2c077cedbb

    SHA256

    d49c6f0ea64b77f830166a56a884994dbb22a17a612f11d6b4a450148c3584ca

    SHA512

    ced5be588dd5027b21d14534db06b400d19f31bddb79ac08cb248b06baf2b58f4ca2a9b0b60d2ae70f4ec517a8ab9b925a64d53b2bc19070a3f0247453fcf18f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p43993831.exe
    Filesize

    574KB

    MD5

    7a33eaf6d0f3e66c21551804f97d9daf

    SHA1

    866fd97d25387331ded45b412ee208c25e5d2885

    SHA256

    ba165fce6659f6688cd968fe81ee896e6b93b1c6d575c0a5262b3c64e0ed3e5a

    SHA512

    719d80b7d7e41c042157eb80a931e35b7fa0d32bbb78c0343251848b8d9923e5b2b1399207f2817365addfab736a1268f7f0ba5ab2a090341302dbb14646020a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p43993831.exe
    Filesize

    574KB

    MD5

    7a33eaf6d0f3e66c21551804f97d9daf

    SHA1

    866fd97d25387331ded45b412ee208c25e5d2885

    SHA256

    ba165fce6659f6688cd968fe81ee896e6b93b1c6d575c0a5262b3c64e0ed3e5a

    SHA512

    719d80b7d7e41c042157eb80a931e35b7fa0d32bbb78c0343251848b8d9923e5b2b1399207f2817365addfab736a1268f7f0ba5ab2a090341302dbb14646020a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p43993831.exe
    Filesize

    574KB

    MD5

    7a33eaf6d0f3e66c21551804f97d9daf

    SHA1

    866fd97d25387331ded45b412ee208c25e5d2885

    SHA256

    ba165fce6659f6688cd968fe81ee896e6b93b1c6d575c0a5262b3c64e0ed3e5a

    SHA512

    719d80b7d7e41c042157eb80a931e35b7fa0d32bbb78c0343251848b8d9923e5b2b1399207f2817365addfab736a1268f7f0ba5ab2a090341302dbb14646020a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r19608747.exe
    Filesize

    170KB

    MD5

    d8eaa3606b6eecd7429e9b5044c4172e

    SHA1

    abb7ea02e89614b88617e296c648596c85b8460f

    SHA256

    d99373ef7a79a855a063b0c7a5e4f77028abc7f0944fc5fa2843bd56a152a861

    SHA512

    9dba133fc891471862791ba023694d062ff8d92fcae5fd70105d6c3fd5fc3be8105f053227cf11c33fbe33656f5b472706f8f903bfe4605bdd65e068fa7310af

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r19608747.exe
    Filesize

    170KB

    MD5

    d8eaa3606b6eecd7429e9b5044c4172e

    SHA1

    abb7ea02e89614b88617e296c648596c85b8460f

    SHA256

    d99373ef7a79a855a063b0c7a5e4f77028abc7f0944fc5fa2843bd56a152a861

    SHA512

    9dba133fc891471862791ba023694d062ff8d92fcae5fd70105d6c3fd5fc3be8105f053227cf11c33fbe33656f5b472706f8f903bfe4605bdd65e068fa7310af

  • C:\Windows\Temp\1.exe
    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • C:\Windows\Temp\1.exe
    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\y64216743.exe
    Filesize

    577KB

    MD5

    dca3c2e208614028dea3289684fe6666

    SHA1

    2b0bb4631be46e25432b75e352417a2c077cedbb

    SHA256

    d49c6f0ea64b77f830166a56a884994dbb22a17a612f11d6b4a450148c3584ca

    SHA512

    ced5be588dd5027b21d14534db06b400d19f31bddb79ac08cb248b06baf2b58f4ca2a9b0b60d2ae70f4ec517a8ab9b925a64d53b2bc19070a3f0247453fcf18f

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\y64216743.exe
    Filesize

    577KB

    MD5

    dca3c2e208614028dea3289684fe6666

    SHA1

    2b0bb4631be46e25432b75e352417a2c077cedbb

    SHA256

    d49c6f0ea64b77f830166a56a884994dbb22a17a612f11d6b4a450148c3584ca

    SHA512

    ced5be588dd5027b21d14534db06b400d19f31bddb79ac08cb248b06baf2b58f4ca2a9b0b60d2ae70f4ec517a8ab9b925a64d53b2bc19070a3f0247453fcf18f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\p43993831.exe
    Filesize

    574KB

    MD5

    7a33eaf6d0f3e66c21551804f97d9daf

    SHA1

    866fd97d25387331ded45b412ee208c25e5d2885

    SHA256

    ba165fce6659f6688cd968fe81ee896e6b93b1c6d575c0a5262b3c64e0ed3e5a

    SHA512

    719d80b7d7e41c042157eb80a931e35b7fa0d32bbb78c0343251848b8d9923e5b2b1399207f2817365addfab736a1268f7f0ba5ab2a090341302dbb14646020a

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\p43993831.exe
    Filesize

    574KB

    MD5

    7a33eaf6d0f3e66c21551804f97d9daf

    SHA1

    866fd97d25387331ded45b412ee208c25e5d2885

    SHA256

    ba165fce6659f6688cd968fe81ee896e6b93b1c6d575c0a5262b3c64e0ed3e5a

    SHA512

    719d80b7d7e41c042157eb80a931e35b7fa0d32bbb78c0343251848b8d9923e5b2b1399207f2817365addfab736a1268f7f0ba5ab2a090341302dbb14646020a

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\p43993831.exe
    Filesize

    574KB

    MD5

    7a33eaf6d0f3e66c21551804f97d9daf

    SHA1

    866fd97d25387331ded45b412ee208c25e5d2885

    SHA256

    ba165fce6659f6688cd968fe81ee896e6b93b1c6d575c0a5262b3c64e0ed3e5a

    SHA512

    719d80b7d7e41c042157eb80a931e35b7fa0d32bbb78c0343251848b8d9923e5b2b1399207f2817365addfab736a1268f7f0ba5ab2a090341302dbb14646020a

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\r19608747.exe
    Filesize

    170KB

    MD5

    d8eaa3606b6eecd7429e9b5044c4172e

    SHA1

    abb7ea02e89614b88617e296c648596c85b8460f

    SHA256

    d99373ef7a79a855a063b0c7a5e4f77028abc7f0944fc5fa2843bd56a152a861

    SHA512

    9dba133fc891471862791ba023694d062ff8d92fcae5fd70105d6c3fd5fc3be8105f053227cf11c33fbe33656f5b472706f8f903bfe4605bdd65e068fa7310af

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\r19608747.exe
    Filesize

    170KB

    MD5

    d8eaa3606b6eecd7429e9b5044c4172e

    SHA1

    abb7ea02e89614b88617e296c648596c85b8460f

    SHA256

    d99373ef7a79a855a063b0c7a5e4f77028abc7f0944fc5fa2843bd56a152a861

    SHA512

    9dba133fc891471862791ba023694d062ff8d92fcae5fd70105d6c3fd5fc3be8105f053227cf11c33fbe33656f5b472706f8f903bfe4605bdd65e068fa7310af

  • \Windows\Temp\1.exe
    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • \Windows\Temp\1.exe
    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • memory/1100-118-0x0000000004E00000-0x0000000004E60000-memory.dmp
    Filesize

    384KB

  • memory/1100-136-0x0000000004E00000-0x0000000004E60000-memory.dmp
    Filesize

    384KB

  • memory/1100-94-0x0000000004E00000-0x0000000004E60000-memory.dmp
    Filesize

    384KB

  • memory/1100-96-0x0000000004E00000-0x0000000004E60000-memory.dmp
    Filesize

    384KB

  • memory/1100-98-0x0000000004E00000-0x0000000004E60000-memory.dmp
    Filesize

    384KB

  • memory/1100-100-0x0000000004E00000-0x0000000004E60000-memory.dmp
    Filesize

    384KB

  • memory/1100-102-0x0000000004E00000-0x0000000004E60000-memory.dmp
    Filesize

    384KB

  • memory/1100-104-0x0000000004E00000-0x0000000004E60000-memory.dmp
    Filesize

    384KB

  • memory/1100-106-0x0000000004E00000-0x0000000004E60000-memory.dmp
    Filesize

    384KB

  • memory/1100-108-0x0000000004E00000-0x0000000004E60000-memory.dmp
    Filesize

    384KB

  • memory/1100-110-0x0000000004E00000-0x0000000004E60000-memory.dmp
    Filesize

    384KB

  • memory/1100-112-0x0000000004E00000-0x0000000004E60000-memory.dmp
    Filesize

    384KB

  • memory/1100-114-0x0000000004E00000-0x0000000004E60000-memory.dmp
    Filesize

    384KB

  • memory/1100-116-0x0000000004E00000-0x0000000004E60000-memory.dmp
    Filesize

    384KB

  • memory/1100-90-0x0000000004E00000-0x0000000004E60000-memory.dmp
    Filesize

    384KB

  • memory/1100-120-0x0000000004E00000-0x0000000004E60000-memory.dmp
    Filesize

    384KB

  • memory/1100-122-0x0000000004E00000-0x0000000004E60000-memory.dmp
    Filesize

    384KB

  • memory/1100-124-0x0000000004E00000-0x0000000004E60000-memory.dmp
    Filesize

    384KB

  • memory/1100-126-0x0000000004E00000-0x0000000004E60000-memory.dmp
    Filesize

    384KB

  • memory/1100-128-0x0000000004E00000-0x0000000004E60000-memory.dmp
    Filesize

    384KB

  • memory/1100-130-0x0000000004E00000-0x0000000004E60000-memory.dmp
    Filesize

    384KB

  • memory/1100-132-0x0000000004E00000-0x0000000004E60000-memory.dmp
    Filesize

    384KB

  • memory/1100-134-0x0000000004E00000-0x0000000004E60000-memory.dmp
    Filesize

    384KB

  • memory/1100-92-0x0000000004E00000-0x0000000004E60000-memory.dmp
    Filesize

    384KB

  • memory/1100-138-0x0000000004E00000-0x0000000004E60000-memory.dmp
    Filesize

    384KB

  • memory/1100-140-0x0000000004E00000-0x0000000004E60000-memory.dmp
    Filesize

    384KB

  • memory/1100-142-0x0000000004E00000-0x0000000004E60000-memory.dmp
    Filesize

    384KB

  • memory/1100-146-0x0000000004E00000-0x0000000004E60000-memory.dmp
    Filesize

    384KB

  • memory/1100-144-0x0000000004E00000-0x0000000004E60000-memory.dmp
    Filesize

    384KB

  • memory/1100-84-0x0000000004E00000-0x0000000004E60000-memory.dmp
    Filesize

    384KB

  • memory/1100-2230-0x0000000004CC0000-0x0000000004D00000-memory.dmp
    Filesize

    256KB

  • memory/1100-2231-0x0000000005270000-0x00000000052A2000-memory.dmp
    Filesize

    200KB

  • memory/1100-88-0x0000000004E00000-0x0000000004E60000-memory.dmp
    Filesize

    384KB

  • memory/1100-86-0x0000000004E00000-0x0000000004E60000-memory.dmp
    Filesize

    384KB

  • memory/1100-83-0x0000000004E00000-0x0000000004E60000-memory.dmp
    Filesize

    384KB

  • memory/1100-82-0x0000000004E00000-0x0000000004E66000-memory.dmp
    Filesize

    408KB

  • memory/1100-78-0x0000000004C40000-0x0000000004CA8000-memory.dmp
    Filesize

    416KB

  • memory/1100-79-0x00000000008B0000-0x000000000090B000-memory.dmp
    Filesize

    364KB

  • memory/1100-81-0x0000000004CC0000-0x0000000004D00000-memory.dmp
    Filesize

    256KB

  • memory/1100-80-0x0000000004CC0000-0x0000000004D00000-memory.dmp
    Filesize

    256KB

  • memory/1436-2251-0x00000000008F0000-0x0000000000920000-memory.dmp
    Filesize

    192KB

  • memory/1436-2252-0x00000000003A0000-0x00000000003A6000-memory.dmp
    Filesize

    24KB

  • memory/1436-2253-0x0000000000C50000-0x0000000000C90000-memory.dmp
    Filesize

    256KB

  • memory/1436-2255-0x0000000000C50000-0x0000000000C90000-memory.dmp
    Filesize

    256KB

  • memory/1680-2248-0x00000000002F0000-0x00000000002F6000-memory.dmp
    Filesize

    24KB

  • memory/1680-2243-0x0000000001040000-0x000000000106E000-memory.dmp
    Filesize

    184KB

  • memory/1680-2254-0x0000000000FC0000-0x0000000001000000-memory.dmp
    Filesize

    256KB

  • memory/1680-2256-0x0000000000FC0000-0x0000000001000000-memory.dmp
    Filesize

    256KB