Analysis

  • max time kernel
    128s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    07-05-2023 08:25

General

  • Target

    f10f6e2ba34753c7feabffc1f5517e2e44b40b50d23758cda92a4e86ff52c898.exe

  • Size

    794KB

  • MD5

    fe6bce573d48587d6140034cce8ae76b

  • SHA1

    6f5ef27a9b356833a79e3eaa65c0e8617abe2ac2

  • SHA256

    f10f6e2ba34753c7feabffc1f5517e2e44b40b50d23758cda92a4e86ff52c898

  • SHA512

    370c0aa4a933efd106f30d3f38290878b45bbd0ed287993e323223dd5e78529ade1058540b2316987e23ac904e54b519b8120d203f1a4c84d50352754d0ed38a

  • SSDEEP

    12288:Dy903nfTCsl6t/8+6nnQEL4R5mwrnPKIVneuuk7D6yuhqtOeUsPF:DycnfO2Y96n4RFrnSIs/euBSJF

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dante

C2

185.161.248.73:4164

Attributes
  • auth_value

    f4066af6b8a6f23125c8ee48288a3f90

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f10f6e2ba34753c7feabffc1f5517e2e44b40b50d23758cda92a4e86ff52c898.exe
    "C:\Users\Admin\AppData\Local\Temp\f10f6e2ba34753c7feabffc1f5517e2e44b40b50d23758cda92a4e86ff52c898.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x54111574.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x54111574.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1968
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m66957814.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m66957814.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:760
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1404
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n32582514.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n32582514.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1440

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x54111574.exe
    Filesize

    590KB

    MD5

    abec42d806ad931dd4db3aa4697ea0c6

    SHA1

    79e4467521ba105622c8542b20747e93ad1cb9e8

    SHA256

    f5301caacc0d3c3d938a1331fd4806e8ca3f54e64d1cbbdec39ae8d020ca1283

    SHA512

    b59e2a6fa5fbdfb883957d70adfd437a878c7d37a2025f6d7ec040c4790fa974b35c422db37706c4b803efe8a8bdfe204e3e296a1cde5457f8a3757d636c2bf8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x54111574.exe
    Filesize

    590KB

    MD5

    abec42d806ad931dd4db3aa4697ea0c6

    SHA1

    79e4467521ba105622c8542b20747e93ad1cb9e8

    SHA256

    f5301caacc0d3c3d938a1331fd4806e8ca3f54e64d1cbbdec39ae8d020ca1283

    SHA512

    b59e2a6fa5fbdfb883957d70adfd437a878c7d37a2025f6d7ec040c4790fa974b35c422db37706c4b803efe8a8bdfe204e3e296a1cde5457f8a3757d636c2bf8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m66957814.exe
    Filesize

    530KB

    MD5

    b0c9e0c6ea888ad509870f26c26af28a

    SHA1

    4bdb49d288f73ddce1d7a739aec7e2d7e6782aaf

    SHA256

    5efd553ba9e9a9bf825772d6ab9524c815e5018662146fbf3d61e892934c475a

    SHA512

    322506d8abce4e666c63e436bbc02c04967119ad855eba0f1adb7812e7432aa03e63c3681f7cf2372b8c9b14218caf2d88191d217a7d8c8c2e013ac0f5e244cd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m66957814.exe
    Filesize

    530KB

    MD5

    b0c9e0c6ea888ad509870f26c26af28a

    SHA1

    4bdb49d288f73ddce1d7a739aec7e2d7e6782aaf

    SHA256

    5efd553ba9e9a9bf825772d6ab9524c815e5018662146fbf3d61e892934c475a

    SHA512

    322506d8abce4e666c63e436bbc02c04967119ad855eba0f1adb7812e7432aa03e63c3681f7cf2372b8c9b14218caf2d88191d217a7d8c8c2e013ac0f5e244cd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m66957814.exe
    Filesize

    530KB

    MD5

    b0c9e0c6ea888ad509870f26c26af28a

    SHA1

    4bdb49d288f73ddce1d7a739aec7e2d7e6782aaf

    SHA256

    5efd553ba9e9a9bf825772d6ab9524c815e5018662146fbf3d61e892934c475a

    SHA512

    322506d8abce4e666c63e436bbc02c04967119ad855eba0f1adb7812e7432aa03e63c3681f7cf2372b8c9b14218caf2d88191d217a7d8c8c2e013ac0f5e244cd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n32582514.exe
    Filesize

    168KB

    MD5

    f42107f42290421fb6ef489a872f9bcb

    SHA1

    2c1d8a4d2983c2f55ab2a282ca34f0b6035cfbdd

    SHA256

    52f71fcc9493b4ab6bf3829a17bdfc05612fdfbd3283c16895c9a05c95e97e05

    SHA512

    bb363c8bfbcbc32d2923fa070438f14ee8220d98561cb83e5462be5d0bf40ac15302f0820465a91ef9a3dd09cc519a02c03a5449cba62543dd2a1f4827626418

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n32582514.exe
    Filesize

    168KB

    MD5

    f42107f42290421fb6ef489a872f9bcb

    SHA1

    2c1d8a4d2983c2f55ab2a282ca34f0b6035cfbdd

    SHA256

    52f71fcc9493b4ab6bf3829a17bdfc05612fdfbd3283c16895c9a05c95e97e05

    SHA512

    bb363c8bfbcbc32d2923fa070438f14ee8220d98561cb83e5462be5d0bf40ac15302f0820465a91ef9a3dd09cc519a02c03a5449cba62543dd2a1f4827626418

  • C:\Windows\Temp\1.exe
    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • C:\Windows\Temp\1.exe
    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x54111574.exe
    Filesize

    590KB

    MD5

    abec42d806ad931dd4db3aa4697ea0c6

    SHA1

    79e4467521ba105622c8542b20747e93ad1cb9e8

    SHA256

    f5301caacc0d3c3d938a1331fd4806e8ca3f54e64d1cbbdec39ae8d020ca1283

    SHA512

    b59e2a6fa5fbdfb883957d70adfd437a878c7d37a2025f6d7ec040c4790fa974b35c422db37706c4b803efe8a8bdfe204e3e296a1cde5457f8a3757d636c2bf8

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x54111574.exe
    Filesize

    590KB

    MD5

    abec42d806ad931dd4db3aa4697ea0c6

    SHA1

    79e4467521ba105622c8542b20747e93ad1cb9e8

    SHA256

    f5301caacc0d3c3d938a1331fd4806e8ca3f54e64d1cbbdec39ae8d020ca1283

    SHA512

    b59e2a6fa5fbdfb883957d70adfd437a878c7d37a2025f6d7ec040c4790fa974b35c422db37706c4b803efe8a8bdfe204e3e296a1cde5457f8a3757d636c2bf8

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\m66957814.exe
    Filesize

    530KB

    MD5

    b0c9e0c6ea888ad509870f26c26af28a

    SHA1

    4bdb49d288f73ddce1d7a739aec7e2d7e6782aaf

    SHA256

    5efd553ba9e9a9bf825772d6ab9524c815e5018662146fbf3d61e892934c475a

    SHA512

    322506d8abce4e666c63e436bbc02c04967119ad855eba0f1adb7812e7432aa03e63c3681f7cf2372b8c9b14218caf2d88191d217a7d8c8c2e013ac0f5e244cd

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\m66957814.exe
    Filesize

    530KB

    MD5

    b0c9e0c6ea888ad509870f26c26af28a

    SHA1

    4bdb49d288f73ddce1d7a739aec7e2d7e6782aaf

    SHA256

    5efd553ba9e9a9bf825772d6ab9524c815e5018662146fbf3d61e892934c475a

    SHA512

    322506d8abce4e666c63e436bbc02c04967119ad855eba0f1adb7812e7432aa03e63c3681f7cf2372b8c9b14218caf2d88191d217a7d8c8c2e013ac0f5e244cd

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\m66957814.exe
    Filesize

    530KB

    MD5

    b0c9e0c6ea888ad509870f26c26af28a

    SHA1

    4bdb49d288f73ddce1d7a739aec7e2d7e6782aaf

    SHA256

    5efd553ba9e9a9bf825772d6ab9524c815e5018662146fbf3d61e892934c475a

    SHA512

    322506d8abce4e666c63e436bbc02c04967119ad855eba0f1adb7812e7432aa03e63c3681f7cf2372b8c9b14218caf2d88191d217a7d8c8c2e013ac0f5e244cd

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\n32582514.exe
    Filesize

    168KB

    MD5

    f42107f42290421fb6ef489a872f9bcb

    SHA1

    2c1d8a4d2983c2f55ab2a282ca34f0b6035cfbdd

    SHA256

    52f71fcc9493b4ab6bf3829a17bdfc05612fdfbd3283c16895c9a05c95e97e05

    SHA512

    bb363c8bfbcbc32d2923fa070438f14ee8220d98561cb83e5462be5d0bf40ac15302f0820465a91ef9a3dd09cc519a02c03a5449cba62543dd2a1f4827626418

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\n32582514.exe
    Filesize

    168KB

    MD5

    f42107f42290421fb6ef489a872f9bcb

    SHA1

    2c1d8a4d2983c2f55ab2a282ca34f0b6035cfbdd

    SHA256

    52f71fcc9493b4ab6bf3829a17bdfc05612fdfbd3283c16895c9a05c95e97e05

    SHA512

    bb363c8bfbcbc32d2923fa070438f14ee8220d98561cb83e5462be5d0bf40ac15302f0820465a91ef9a3dd09cc519a02c03a5449cba62543dd2a1f4827626418

  • \Windows\Temp\1.exe
    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • \Windows\Temp\1.exe
    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • memory/760-125-0x0000000005120000-0x0000000005180000-memory.dmp
    Filesize

    384KB

  • memory/760-135-0x0000000005120000-0x0000000005180000-memory.dmp
    Filesize

    384KB

  • memory/760-91-0x0000000005120000-0x0000000005180000-memory.dmp
    Filesize

    384KB

  • memory/760-93-0x0000000005120000-0x0000000005180000-memory.dmp
    Filesize

    384KB

  • memory/760-95-0x0000000005120000-0x0000000005180000-memory.dmp
    Filesize

    384KB

  • memory/760-97-0x0000000005120000-0x0000000005180000-memory.dmp
    Filesize

    384KB

  • memory/760-99-0x0000000005120000-0x0000000005180000-memory.dmp
    Filesize

    384KB

  • memory/760-101-0x0000000005120000-0x0000000005180000-memory.dmp
    Filesize

    384KB

  • memory/760-109-0x0000000005120000-0x0000000005180000-memory.dmp
    Filesize

    384KB

  • memory/760-111-0x0000000005120000-0x0000000005180000-memory.dmp
    Filesize

    384KB

  • memory/760-107-0x0000000005120000-0x0000000005180000-memory.dmp
    Filesize

    384KB

  • memory/760-117-0x0000000005120000-0x0000000005180000-memory.dmp
    Filesize

    384KB

  • memory/760-123-0x0000000005120000-0x0000000005180000-memory.dmp
    Filesize

    384KB

  • memory/760-121-0x0000000005120000-0x0000000005180000-memory.dmp
    Filesize

    384KB

  • memory/760-87-0x0000000005120000-0x0000000005180000-memory.dmp
    Filesize

    384KB

  • memory/760-119-0x0000000005120000-0x0000000005180000-memory.dmp
    Filesize

    384KB

  • memory/760-127-0x0000000005120000-0x0000000005180000-memory.dmp
    Filesize

    384KB

  • memory/760-133-0x0000000005120000-0x0000000005180000-memory.dmp
    Filesize

    384KB

  • memory/760-137-0x0000000005120000-0x0000000005180000-memory.dmp
    Filesize

    384KB

  • memory/760-143-0x0000000005120000-0x0000000005180000-memory.dmp
    Filesize

    384KB

  • memory/760-145-0x0000000005120000-0x0000000005180000-memory.dmp
    Filesize

    384KB

  • memory/760-141-0x0000000005120000-0x0000000005180000-memory.dmp
    Filesize

    384KB

  • memory/760-139-0x0000000005120000-0x0000000005180000-memory.dmp
    Filesize

    384KB

  • memory/760-89-0x0000000005120000-0x0000000005180000-memory.dmp
    Filesize

    384KB

  • memory/760-131-0x0000000005120000-0x0000000005180000-memory.dmp
    Filesize

    384KB

  • memory/760-129-0x0000000005120000-0x0000000005180000-memory.dmp
    Filesize

    384KB

  • memory/760-115-0x0000000005120000-0x0000000005180000-memory.dmp
    Filesize

    384KB

  • memory/760-113-0x0000000005120000-0x0000000005180000-memory.dmp
    Filesize

    384KB

  • memory/760-105-0x0000000005120000-0x0000000005180000-memory.dmp
    Filesize

    384KB

  • memory/760-103-0x0000000005120000-0x0000000005180000-memory.dmp
    Filesize

    384KB

  • memory/760-2231-0x0000000004FE0000-0x0000000005020000-memory.dmp
    Filesize

    256KB

  • memory/760-2232-0x0000000002770000-0x00000000027A2000-memory.dmp
    Filesize

    200KB

  • memory/760-2234-0x0000000004FE0000-0x0000000005020000-memory.dmp
    Filesize

    256KB

  • memory/760-85-0x0000000005120000-0x0000000005180000-memory.dmp
    Filesize

    384KB

  • memory/760-84-0x0000000005120000-0x0000000005180000-memory.dmp
    Filesize

    384KB

  • memory/760-83-0x0000000005120000-0x0000000005186000-memory.dmp
    Filesize

    408KB

  • memory/760-82-0x0000000004FE0000-0x0000000005020000-memory.dmp
    Filesize

    256KB

  • memory/760-78-0x0000000002420000-0x000000000247B000-memory.dmp
    Filesize

    364KB

  • memory/760-81-0x0000000000400000-0x0000000000A95000-memory.dmp
    Filesize

    6.6MB

  • memory/760-80-0x0000000002860000-0x00000000028C8000-memory.dmp
    Filesize

    416KB

  • memory/760-79-0x0000000004FE0000-0x0000000005020000-memory.dmp
    Filesize

    256KB

  • memory/1404-2242-0x0000000000CD0000-0x0000000000CFE000-memory.dmp
    Filesize

    184KB

  • memory/1404-2250-0x0000000000710000-0x0000000000716000-memory.dmp
    Filesize

    24KB

  • memory/1404-2254-0x00000000009C0000-0x0000000000A00000-memory.dmp
    Filesize

    256KB

  • memory/1440-2251-0x0000000001220000-0x0000000001250000-memory.dmp
    Filesize

    192KB

  • memory/1440-2252-0x0000000000360000-0x0000000000366000-memory.dmp
    Filesize

    24KB

  • memory/1440-2253-0x00000000011E0000-0x0000000001220000-memory.dmp
    Filesize

    256KB

  • memory/1440-2255-0x00000000011E0000-0x0000000001220000-memory.dmp
    Filesize

    256KB