Analysis

  • max time kernel
    142s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    07-05-2023 09:01

General

  • Target

    ffb08f8996da357e03cd5f99a542a1002d310e4d140e229a0b501646a9079f87.exe

  • Size

    957KB

  • MD5

    1066367e51504598d01235568b1e3160

  • SHA1

    76fa608cea4e17fabfa913c6fa08ef4102f441fa

  • SHA256

    ffb08f8996da357e03cd5f99a542a1002d310e4d140e229a0b501646a9079f87

  • SHA512

    2dc94cd380f9ee167c840627ae2d7cd214f0c13bc4e29503c1af0d391151b04ed8ec6efe53488ebae94cf3881a93af2e15c2c35f1fc86c2956de7422f1a99f46

  • SSDEEP

    24576:ny46CVotleLUkEfzhq0KVzUaDjV2BgZwahwIsWkHaTMdd:ySoDEUkw90zUaDp2BgZwxfWAl

Malware Config

Extracted

Family

redline

Botnet

dark

C2

185.161.248.73:4164

Attributes
  • auth_value

    ae85b01f66afe8770afeed560513fc2d

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 11 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ffb08f8996da357e03cd5f99a542a1002d310e4d140e229a0b501646a9079f87.exe
    "C:\Users\Admin\AppData\Local\Temp\ffb08f8996da357e03cd5f99a542a1002d310e4d140e229a0b501646a9079f87.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:624
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un556759.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un556759.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:928
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\26086113.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\26086113.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1152
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1396
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk877764.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk877764.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1104
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si264981.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si264981.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:632

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si264981.exe
    Filesize

    168KB

    MD5

    49a7cd8816549617e1f3170f4211ecfe

    SHA1

    e0ddb22231e187a51d4bf9149318d9e589438b04

    SHA256

    53cbec41e7270321735124077961f416a3e9a7191d0a3598c2bca57d0967000e

    SHA512

    e70272c75b476a28d47bf79774ea7542ff451ad0a668875bda5617cc35c673182c69b3a06a4b4328c3a1a81f937b1cb90faac37410e511a0aa772339e4992de3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si264981.exe
    Filesize

    168KB

    MD5

    49a7cd8816549617e1f3170f4211ecfe

    SHA1

    e0ddb22231e187a51d4bf9149318d9e589438b04

    SHA256

    53cbec41e7270321735124077961f416a3e9a7191d0a3598c2bca57d0967000e

    SHA512

    e70272c75b476a28d47bf79774ea7542ff451ad0a668875bda5617cc35c673182c69b3a06a4b4328c3a1a81f937b1cb90faac37410e511a0aa772339e4992de3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un556759.exe
    Filesize

    803KB

    MD5

    32043255442fd325dcf3968fcebfd730

    SHA1

    e386f9ddc5f19a362ba3c33b7a8c3e1b9e2192e4

    SHA256

    1dd8fdc387c5938e4597cecd0304111d18d5a11985c5619abbd0a680393fed86

    SHA512

    57b64ae9fbdb1a819bcb74930d032b73bba666285c170d4b5ba313c1c583a1151cc2320e97a7496dca4d9cbf940dc64dec678d368d5552c9ddd3a8347ff5eda1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un556759.exe
    Filesize

    803KB

    MD5

    32043255442fd325dcf3968fcebfd730

    SHA1

    e386f9ddc5f19a362ba3c33b7a8c3e1b9e2192e4

    SHA256

    1dd8fdc387c5938e4597cecd0304111d18d5a11985c5619abbd0a680393fed86

    SHA512

    57b64ae9fbdb1a819bcb74930d032b73bba666285c170d4b5ba313c1c583a1151cc2320e97a7496dca4d9cbf940dc64dec678d368d5552c9ddd3a8347ff5eda1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\26086113.exe
    Filesize

    479KB

    MD5

    2dfd8ea770548c4db22810ca92d3fba2

    SHA1

    408d04f70ed0379ae77f26482bb56168e62a864a

    SHA256

    56d8d7b43b0e9f3c6b5db5ed5c0acc146b8d033680075c56f14879f60a0436a0

    SHA512

    d0d1c4ad74d47d7da6cf1231b76d1a29e4a1ea8f57d638e4bc84b7257756b01266b7576cdbc7d3c7b77c67c2d9f0c7e0c7e239b8f53e7a30285a57f60a6d37cd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\26086113.exe
    Filesize

    479KB

    MD5

    2dfd8ea770548c4db22810ca92d3fba2

    SHA1

    408d04f70ed0379ae77f26482bb56168e62a864a

    SHA256

    56d8d7b43b0e9f3c6b5db5ed5c0acc146b8d033680075c56f14879f60a0436a0

    SHA512

    d0d1c4ad74d47d7da6cf1231b76d1a29e4a1ea8f57d638e4bc84b7257756b01266b7576cdbc7d3c7b77c67c2d9f0c7e0c7e239b8f53e7a30285a57f60a6d37cd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\26086113.exe
    Filesize

    479KB

    MD5

    2dfd8ea770548c4db22810ca92d3fba2

    SHA1

    408d04f70ed0379ae77f26482bb56168e62a864a

    SHA256

    56d8d7b43b0e9f3c6b5db5ed5c0acc146b8d033680075c56f14879f60a0436a0

    SHA512

    d0d1c4ad74d47d7da6cf1231b76d1a29e4a1ea8f57d638e4bc84b7257756b01266b7576cdbc7d3c7b77c67c2d9f0c7e0c7e239b8f53e7a30285a57f60a6d37cd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk877764.exe
    Filesize

    539KB

    MD5

    ff7277c4bce50a0e64489a0006e6049f

    SHA1

    02f27c7cbe10c58cd1633aa41eb80708b941669d

    SHA256

    0ddc40d0489f54557d3c329ac047e7787dec381e614bd9b7e833af427c720391

    SHA512

    9d37c026288570f77846932ba5728fe2deaa13f9deaaee34ff008ee52b5b0b22a5aa0cadfa3654f5ff729e10cb43f6294ca7378dbc96add2c7c6eaf0000ae555

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk877764.exe
    Filesize

    539KB

    MD5

    ff7277c4bce50a0e64489a0006e6049f

    SHA1

    02f27c7cbe10c58cd1633aa41eb80708b941669d

    SHA256

    0ddc40d0489f54557d3c329ac047e7787dec381e614bd9b7e833af427c720391

    SHA512

    9d37c026288570f77846932ba5728fe2deaa13f9deaaee34ff008ee52b5b0b22a5aa0cadfa3654f5ff729e10cb43f6294ca7378dbc96add2c7c6eaf0000ae555

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk877764.exe
    Filesize

    539KB

    MD5

    ff7277c4bce50a0e64489a0006e6049f

    SHA1

    02f27c7cbe10c58cd1633aa41eb80708b941669d

    SHA256

    0ddc40d0489f54557d3c329ac047e7787dec381e614bd9b7e833af427c720391

    SHA512

    9d37c026288570f77846932ba5728fe2deaa13f9deaaee34ff008ee52b5b0b22a5aa0cadfa3654f5ff729e10cb43f6294ca7378dbc96add2c7c6eaf0000ae555

  • C:\Windows\Temp\1.exe
    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Windows\Temp\1.exe
    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\si264981.exe
    Filesize

    168KB

    MD5

    49a7cd8816549617e1f3170f4211ecfe

    SHA1

    e0ddb22231e187a51d4bf9149318d9e589438b04

    SHA256

    53cbec41e7270321735124077961f416a3e9a7191d0a3598c2bca57d0967000e

    SHA512

    e70272c75b476a28d47bf79774ea7542ff451ad0a668875bda5617cc35c673182c69b3a06a4b4328c3a1a81f937b1cb90faac37410e511a0aa772339e4992de3

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\si264981.exe
    Filesize

    168KB

    MD5

    49a7cd8816549617e1f3170f4211ecfe

    SHA1

    e0ddb22231e187a51d4bf9149318d9e589438b04

    SHA256

    53cbec41e7270321735124077961f416a3e9a7191d0a3598c2bca57d0967000e

    SHA512

    e70272c75b476a28d47bf79774ea7542ff451ad0a668875bda5617cc35c673182c69b3a06a4b4328c3a1a81f937b1cb90faac37410e511a0aa772339e4992de3

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un556759.exe
    Filesize

    803KB

    MD5

    32043255442fd325dcf3968fcebfd730

    SHA1

    e386f9ddc5f19a362ba3c33b7a8c3e1b9e2192e4

    SHA256

    1dd8fdc387c5938e4597cecd0304111d18d5a11985c5619abbd0a680393fed86

    SHA512

    57b64ae9fbdb1a819bcb74930d032b73bba666285c170d4b5ba313c1c583a1151cc2320e97a7496dca4d9cbf940dc64dec678d368d5552c9ddd3a8347ff5eda1

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un556759.exe
    Filesize

    803KB

    MD5

    32043255442fd325dcf3968fcebfd730

    SHA1

    e386f9ddc5f19a362ba3c33b7a8c3e1b9e2192e4

    SHA256

    1dd8fdc387c5938e4597cecd0304111d18d5a11985c5619abbd0a680393fed86

    SHA512

    57b64ae9fbdb1a819bcb74930d032b73bba666285c170d4b5ba313c1c583a1151cc2320e97a7496dca4d9cbf940dc64dec678d368d5552c9ddd3a8347ff5eda1

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\26086113.exe
    Filesize

    479KB

    MD5

    2dfd8ea770548c4db22810ca92d3fba2

    SHA1

    408d04f70ed0379ae77f26482bb56168e62a864a

    SHA256

    56d8d7b43b0e9f3c6b5db5ed5c0acc146b8d033680075c56f14879f60a0436a0

    SHA512

    d0d1c4ad74d47d7da6cf1231b76d1a29e4a1ea8f57d638e4bc84b7257756b01266b7576cdbc7d3c7b77c67c2d9f0c7e0c7e239b8f53e7a30285a57f60a6d37cd

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\26086113.exe
    Filesize

    479KB

    MD5

    2dfd8ea770548c4db22810ca92d3fba2

    SHA1

    408d04f70ed0379ae77f26482bb56168e62a864a

    SHA256

    56d8d7b43b0e9f3c6b5db5ed5c0acc146b8d033680075c56f14879f60a0436a0

    SHA512

    d0d1c4ad74d47d7da6cf1231b76d1a29e4a1ea8f57d638e4bc84b7257756b01266b7576cdbc7d3c7b77c67c2d9f0c7e0c7e239b8f53e7a30285a57f60a6d37cd

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\26086113.exe
    Filesize

    479KB

    MD5

    2dfd8ea770548c4db22810ca92d3fba2

    SHA1

    408d04f70ed0379ae77f26482bb56168e62a864a

    SHA256

    56d8d7b43b0e9f3c6b5db5ed5c0acc146b8d033680075c56f14879f60a0436a0

    SHA512

    d0d1c4ad74d47d7da6cf1231b76d1a29e4a1ea8f57d638e4bc84b7257756b01266b7576cdbc7d3c7b77c67c2d9f0c7e0c7e239b8f53e7a30285a57f60a6d37cd

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk877764.exe
    Filesize

    539KB

    MD5

    ff7277c4bce50a0e64489a0006e6049f

    SHA1

    02f27c7cbe10c58cd1633aa41eb80708b941669d

    SHA256

    0ddc40d0489f54557d3c329ac047e7787dec381e614bd9b7e833af427c720391

    SHA512

    9d37c026288570f77846932ba5728fe2deaa13f9deaaee34ff008ee52b5b0b22a5aa0cadfa3654f5ff729e10cb43f6294ca7378dbc96add2c7c6eaf0000ae555

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk877764.exe
    Filesize

    539KB

    MD5

    ff7277c4bce50a0e64489a0006e6049f

    SHA1

    02f27c7cbe10c58cd1633aa41eb80708b941669d

    SHA256

    0ddc40d0489f54557d3c329ac047e7787dec381e614bd9b7e833af427c720391

    SHA512

    9d37c026288570f77846932ba5728fe2deaa13f9deaaee34ff008ee52b5b0b22a5aa0cadfa3654f5ff729e10cb43f6294ca7378dbc96add2c7c6eaf0000ae555

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk877764.exe
    Filesize

    539KB

    MD5

    ff7277c4bce50a0e64489a0006e6049f

    SHA1

    02f27c7cbe10c58cd1633aa41eb80708b941669d

    SHA256

    0ddc40d0489f54557d3c329ac047e7787dec381e614bd9b7e833af427c720391

    SHA512

    9d37c026288570f77846932ba5728fe2deaa13f9deaaee34ff008ee52b5b0b22a5aa0cadfa3654f5ff729e10cb43f6294ca7378dbc96add2c7c6eaf0000ae555

  • \Windows\Temp\1.exe
    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • memory/632-4405-0x00000000003F0000-0x00000000003F6000-memory.dmp
    Filesize

    24KB

  • memory/632-4404-0x0000000000F60000-0x0000000000F90000-memory.dmp
    Filesize

    192KB

  • memory/632-4406-0x00000000024C0000-0x0000000002500000-memory.dmp
    Filesize

    256KB

  • memory/1104-2243-0x0000000002860000-0x00000000028C6000-memory.dmp
    Filesize

    408KB

  • memory/1104-2242-0x00000000027F0000-0x0000000002858000-memory.dmp
    Filesize

    416KB

  • memory/1104-2408-0x0000000004DC0000-0x0000000004E00000-memory.dmp
    Filesize

    256KB

  • memory/1104-2410-0x0000000004DC0000-0x0000000004E00000-memory.dmp
    Filesize

    256KB

  • memory/1104-4394-0x0000000005250000-0x0000000005282000-memory.dmp
    Filesize

    200KB

  • memory/1104-4395-0x0000000004DC0000-0x0000000004E00000-memory.dmp
    Filesize

    256KB

  • memory/1104-2404-0x0000000000320000-0x000000000037B000-memory.dmp
    Filesize

    364KB

  • memory/1104-2406-0x0000000004DC0000-0x0000000004E00000-memory.dmp
    Filesize

    256KB

  • memory/1152-93-0x0000000002640000-0x0000000002691000-memory.dmp
    Filesize

    324KB

  • memory/1152-111-0x00000000002D0000-0x000000000031C000-memory.dmp
    Filesize

    304KB

  • memory/1152-130-0x0000000002640000-0x0000000002691000-memory.dmp
    Filesize

    324KB

  • memory/1152-128-0x0000000002640000-0x0000000002691000-memory.dmp
    Filesize

    324KB

  • memory/1152-136-0x0000000002640000-0x0000000002691000-memory.dmp
    Filesize

    324KB

  • memory/1152-134-0x0000000002640000-0x0000000002691000-memory.dmp
    Filesize

    324KB

  • memory/1152-138-0x0000000002640000-0x0000000002691000-memory.dmp
    Filesize

    324KB

  • memory/1152-142-0x0000000002640000-0x0000000002691000-memory.dmp
    Filesize

    324KB

  • memory/1152-144-0x0000000002640000-0x0000000002691000-memory.dmp
    Filesize

    324KB

  • memory/1152-140-0x0000000002640000-0x0000000002691000-memory.dmp
    Filesize

    324KB

  • memory/1152-146-0x0000000002640000-0x0000000002691000-memory.dmp
    Filesize

    324KB

  • memory/1152-2222-0x00000000050C0000-0x0000000005100000-memory.dmp
    Filesize

    256KB

  • memory/1152-2223-0x00000000008D0000-0x00000000008DA000-memory.dmp
    Filesize

    40KB

  • memory/1152-126-0x0000000002640000-0x0000000002691000-memory.dmp
    Filesize

    324KB

  • memory/1152-124-0x0000000002640000-0x0000000002691000-memory.dmp
    Filesize

    324KB

  • memory/1152-115-0x00000000050C0000-0x0000000005100000-memory.dmp
    Filesize

    256KB

  • memory/1152-114-0x0000000000400000-0x000000000081C000-memory.dmp
    Filesize

    4.1MB

  • memory/1152-112-0x00000000050C0000-0x0000000005100000-memory.dmp
    Filesize

    256KB

  • memory/1152-113-0x00000000050C0000-0x0000000005100000-memory.dmp
    Filesize

    256KB

  • memory/1152-132-0x0000000002640000-0x0000000002691000-memory.dmp
    Filesize

    324KB

  • memory/1152-107-0x0000000002640000-0x0000000002691000-memory.dmp
    Filesize

    324KB

  • memory/1152-109-0x0000000002640000-0x0000000002691000-memory.dmp
    Filesize

    324KB

  • memory/1152-78-0x00000000025E0000-0x0000000002638000-memory.dmp
    Filesize

    352KB

  • memory/1152-103-0x0000000002640000-0x0000000002691000-memory.dmp
    Filesize

    324KB

  • memory/1152-105-0x0000000002640000-0x0000000002691000-memory.dmp
    Filesize

    324KB

  • memory/1152-101-0x0000000002640000-0x0000000002691000-memory.dmp
    Filesize

    324KB

  • memory/1152-99-0x0000000002640000-0x0000000002691000-memory.dmp
    Filesize

    324KB

  • memory/1152-95-0x0000000002640000-0x0000000002691000-memory.dmp
    Filesize

    324KB

  • memory/1152-97-0x0000000002640000-0x0000000002691000-memory.dmp
    Filesize

    324KB

  • memory/1152-91-0x0000000002640000-0x0000000002691000-memory.dmp
    Filesize

    324KB

  • memory/1152-89-0x0000000002640000-0x0000000002691000-memory.dmp
    Filesize

    324KB

  • memory/1152-87-0x0000000002640000-0x0000000002691000-memory.dmp
    Filesize

    324KB

  • memory/1152-83-0x0000000002640000-0x0000000002691000-memory.dmp
    Filesize

    324KB

  • memory/1152-85-0x0000000002640000-0x0000000002691000-memory.dmp
    Filesize

    324KB

  • memory/1152-81-0x0000000002640000-0x0000000002691000-memory.dmp
    Filesize

    324KB

  • memory/1152-80-0x0000000002640000-0x0000000002691000-memory.dmp
    Filesize

    324KB

  • memory/1152-79-0x0000000002640000-0x0000000002696000-memory.dmp
    Filesize

    344KB

  • memory/1396-2240-0x0000000000860000-0x000000000086A000-memory.dmp
    Filesize

    40KB