Analysis

  • max time kernel
    126s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    07-05-2023 09:01

General

  • Target

    ffb40f7a5f14718677e55c0c77fce7313fffb63d370a6f70fe35ec0c8c1ab5a9.exe

  • Size

    892KB

  • MD5

    dc895af741705903cb6e591c609c2e05

  • SHA1

    743d9551d43db8fd96e24faa782a8cc5265e3d6e

  • SHA256

    ffb40f7a5f14718677e55c0c77fce7313fffb63d370a6f70fe35ec0c8c1ab5a9

  • SHA512

    0ac696b1533c1b8bdc7f3a7ab1105b1ce52f6712c32f7e59ad8b615b2b6e1bb0ecdde424ed27c80b94b42e4fe64556a306580650adca3eb28fb11bf7659b6f31

  • SSDEEP

    24576:Qy4cvDqW1na5ZZECu7aAJ/3x8GM3S1P6:XVfs50Zdl3qGYS1P

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

danko

C2

185.161.248.73:4164

Attributes
  • auth_value

    784d42a6c1eb1a5060b8bcd3696f5f1e

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ffb40f7a5f14718677e55c0c77fce7313fffb63d370a6f70fe35ec0c8c1ab5a9.exe
    "C:\Users\Admin\AppData\Local\Temp\ffb40f7a5f14718677e55c0c77fce7313fffb63d370a6f70fe35ec0c8c1ab5a9.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:924
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y04392494.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y04392494.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1304
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p46258998.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p46258998.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1300
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1676
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r84925850.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r84925850.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1356

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y04392494.exe
    Filesize

    590KB

    MD5

    5d8f70ef850513749ec13d6a4058bafa

    SHA1

    5f02edb463e7caead4e123648401742c5444a155

    SHA256

    a00db8643e869bafdbcd3a91fb45066b85140a00787b47304afb4e556c857940

    SHA512

    623c3243cab31fc62d133012e1779f51a17d38f676f85f0b15628517a66b1d6933d4e7a0381e601fe79f53263393e524cd17609379cc05ac6a12103e65fd9dbb

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y04392494.exe
    Filesize

    590KB

    MD5

    5d8f70ef850513749ec13d6a4058bafa

    SHA1

    5f02edb463e7caead4e123648401742c5444a155

    SHA256

    a00db8643e869bafdbcd3a91fb45066b85140a00787b47304afb4e556c857940

    SHA512

    623c3243cab31fc62d133012e1779f51a17d38f676f85f0b15628517a66b1d6933d4e7a0381e601fe79f53263393e524cd17609379cc05ac6a12103e65fd9dbb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p46258998.exe
    Filesize

    531KB

    MD5

    f0dcd0418f0b1ab0620a4701769162ed

    SHA1

    09dbbb2616290c81075745370b568d3166c35de0

    SHA256

    c0a1e26fc6029c4107f3e4b598bd36aace5a5a7b66bb40656942743e8645f010

    SHA512

    a6835db38d640b217b4ae13f729907b381f4cbfa09544474e5243fb1ebfc6ae8e753c458037a2c613a49a8435e436ecdcc942be00babc10395692d87fe08652a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p46258998.exe
    Filesize

    531KB

    MD5

    f0dcd0418f0b1ab0620a4701769162ed

    SHA1

    09dbbb2616290c81075745370b568d3166c35de0

    SHA256

    c0a1e26fc6029c4107f3e4b598bd36aace5a5a7b66bb40656942743e8645f010

    SHA512

    a6835db38d640b217b4ae13f729907b381f4cbfa09544474e5243fb1ebfc6ae8e753c458037a2c613a49a8435e436ecdcc942be00babc10395692d87fe08652a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p46258998.exe
    Filesize

    531KB

    MD5

    f0dcd0418f0b1ab0620a4701769162ed

    SHA1

    09dbbb2616290c81075745370b568d3166c35de0

    SHA256

    c0a1e26fc6029c4107f3e4b598bd36aace5a5a7b66bb40656942743e8645f010

    SHA512

    a6835db38d640b217b4ae13f729907b381f4cbfa09544474e5243fb1ebfc6ae8e753c458037a2c613a49a8435e436ecdcc942be00babc10395692d87fe08652a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r84925850.exe
    Filesize

    169KB

    MD5

    a281c7639dec161470a9bb0da7ac37ed

    SHA1

    38a9618314f6a97e99f7518f6fe50fb5e1940337

    SHA256

    c8d28821989d26cf9b0435077facdb43720bdecb71543096beb18896bdbf23cf

    SHA512

    0242f54538b07bfd045169a71623121bc26557945f29ef4b60241de2c0869c5c6a2d6142b211c5d36f8f7390b452774381275a73f9e420cf69a66cc868a3c0b0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r84925850.exe
    Filesize

    169KB

    MD5

    a281c7639dec161470a9bb0da7ac37ed

    SHA1

    38a9618314f6a97e99f7518f6fe50fb5e1940337

    SHA256

    c8d28821989d26cf9b0435077facdb43720bdecb71543096beb18896bdbf23cf

    SHA512

    0242f54538b07bfd045169a71623121bc26557945f29ef4b60241de2c0869c5c6a2d6142b211c5d36f8f7390b452774381275a73f9e420cf69a66cc868a3c0b0

  • C:\Windows\Temp\1.exe
    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • C:\Windows\Temp\1.exe
    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\y04392494.exe
    Filesize

    590KB

    MD5

    5d8f70ef850513749ec13d6a4058bafa

    SHA1

    5f02edb463e7caead4e123648401742c5444a155

    SHA256

    a00db8643e869bafdbcd3a91fb45066b85140a00787b47304afb4e556c857940

    SHA512

    623c3243cab31fc62d133012e1779f51a17d38f676f85f0b15628517a66b1d6933d4e7a0381e601fe79f53263393e524cd17609379cc05ac6a12103e65fd9dbb

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\y04392494.exe
    Filesize

    590KB

    MD5

    5d8f70ef850513749ec13d6a4058bafa

    SHA1

    5f02edb463e7caead4e123648401742c5444a155

    SHA256

    a00db8643e869bafdbcd3a91fb45066b85140a00787b47304afb4e556c857940

    SHA512

    623c3243cab31fc62d133012e1779f51a17d38f676f85f0b15628517a66b1d6933d4e7a0381e601fe79f53263393e524cd17609379cc05ac6a12103e65fd9dbb

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\p46258998.exe
    Filesize

    531KB

    MD5

    f0dcd0418f0b1ab0620a4701769162ed

    SHA1

    09dbbb2616290c81075745370b568d3166c35de0

    SHA256

    c0a1e26fc6029c4107f3e4b598bd36aace5a5a7b66bb40656942743e8645f010

    SHA512

    a6835db38d640b217b4ae13f729907b381f4cbfa09544474e5243fb1ebfc6ae8e753c458037a2c613a49a8435e436ecdcc942be00babc10395692d87fe08652a

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\p46258998.exe
    Filesize

    531KB

    MD5

    f0dcd0418f0b1ab0620a4701769162ed

    SHA1

    09dbbb2616290c81075745370b568d3166c35de0

    SHA256

    c0a1e26fc6029c4107f3e4b598bd36aace5a5a7b66bb40656942743e8645f010

    SHA512

    a6835db38d640b217b4ae13f729907b381f4cbfa09544474e5243fb1ebfc6ae8e753c458037a2c613a49a8435e436ecdcc942be00babc10395692d87fe08652a

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\p46258998.exe
    Filesize

    531KB

    MD5

    f0dcd0418f0b1ab0620a4701769162ed

    SHA1

    09dbbb2616290c81075745370b568d3166c35de0

    SHA256

    c0a1e26fc6029c4107f3e4b598bd36aace5a5a7b66bb40656942743e8645f010

    SHA512

    a6835db38d640b217b4ae13f729907b381f4cbfa09544474e5243fb1ebfc6ae8e753c458037a2c613a49a8435e436ecdcc942be00babc10395692d87fe08652a

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\r84925850.exe
    Filesize

    169KB

    MD5

    a281c7639dec161470a9bb0da7ac37ed

    SHA1

    38a9618314f6a97e99f7518f6fe50fb5e1940337

    SHA256

    c8d28821989d26cf9b0435077facdb43720bdecb71543096beb18896bdbf23cf

    SHA512

    0242f54538b07bfd045169a71623121bc26557945f29ef4b60241de2c0869c5c6a2d6142b211c5d36f8f7390b452774381275a73f9e420cf69a66cc868a3c0b0

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\r84925850.exe
    Filesize

    169KB

    MD5

    a281c7639dec161470a9bb0da7ac37ed

    SHA1

    38a9618314f6a97e99f7518f6fe50fb5e1940337

    SHA256

    c8d28821989d26cf9b0435077facdb43720bdecb71543096beb18896bdbf23cf

    SHA512

    0242f54538b07bfd045169a71623121bc26557945f29ef4b60241de2c0869c5c6a2d6142b211c5d36f8f7390b452774381275a73f9e420cf69a66cc868a3c0b0

  • \Windows\Temp\1.exe
    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • \Windows\Temp\1.exe
    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • memory/1300-116-0x0000000002B30000-0x0000000002B90000-memory.dmp
    Filesize

    384KB

  • memory/1300-134-0x0000000002B30000-0x0000000002B90000-memory.dmp
    Filesize

    384KB

  • memory/1300-90-0x0000000002B30000-0x0000000002B90000-memory.dmp
    Filesize

    384KB

  • memory/1300-94-0x0000000002B30000-0x0000000002B90000-memory.dmp
    Filesize

    384KB

  • memory/1300-96-0x0000000002B30000-0x0000000002B90000-memory.dmp
    Filesize

    384KB

  • memory/1300-98-0x0000000002B30000-0x0000000002B90000-memory.dmp
    Filesize

    384KB

  • memory/1300-102-0x0000000002B30000-0x0000000002B90000-memory.dmp
    Filesize

    384KB

  • memory/1300-100-0x0000000002B30000-0x0000000002B90000-memory.dmp
    Filesize

    384KB

  • memory/1300-108-0x0000000002B30000-0x0000000002B90000-memory.dmp
    Filesize

    384KB

  • memory/1300-106-0x0000000002B30000-0x0000000002B90000-memory.dmp
    Filesize

    384KB

  • memory/1300-104-0x0000000002B30000-0x0000000002B90000-memory.dmp
    Filesize

    384KB

  • memory/1300-112-0x0000000002B30000-0x0000000002B90000-memory.dmp
    Filesize

    384KB

  • memory/1300-110-0x0000000002B30000-0x0000000002B90000-memory.dmp
    Filesize

    384KB

  • memory/1300-114-0x0000000002B30000-0x0000000002B90000-memory.dmp
    Filesize

    384KB

  • memory/1300-88-0x0000000002B30000-0x0000000002B90000-memory.dmp
    Filesize

    384KB

  • memory/1300-118-0x0000000002B30000-0x0000000002B90000-memory.dmp
    Filesize

    384KB

  • memory/1300-122-0x0000000002B30000-0x0000000002B90000-memory.dmp
    Filesize

    384KB

  • memory/1300-120-0x0000000002B30000-0x0000000002B90000-memory.dmp
    Filesize

    384KB

  • memory/1300-124-0x0000000002B30000-0x0000000002B90000-memory.dmp
    Filesize

    384KB

  • memory/1300-128-0x0000000002B30000-0x0000000002B90000-memory.dmp
    Filesize

    384KB

  • memory/1300-126-0x0000000002B30000-0x0000000002B90000-memory.dmp
    Filesize

    384KB

  • memory/1300-132-0x0000000002B30000-0x0000000002B90000-memory.dmp
    Filesize

    384KB

  • memory/1300-130-0x0000000002B30000-0x0000000002B90000-memory.dmp
    Filesize

    384KB

  • memory/1300-92-0x0000000002B30000-0x0000000002B90000-memory.dmp
    Filesize

    384KB

  • memory/1300-136-0x0000000002B30000-0x0000000002B90000-memory.dmp
    Filesize

    384KB

  • memory/1300-138-0x0000000002B30000-0x0000000002B90000-memory.dmp
    Filesize

    384KB

  • memory/1300-140-0x0000000002B30000-0x0000000002B90000-memory.dmp
    Filesize

    384KB

  • memory/1300-142-0x0000000002B30000-0x0000000002B90000-memory.dmp
    Filesize

    384KB

  • memory/1300-144-0x0000000002B30000-0x0000000002B90000-memory.dmp
    Filesize

    384KB

  • memory/1300-290-0x00000000012C0000-0x0000000001300000-memory.dmp
    Filesize

    256KB

  • memory/1300-292-0x00000000012C0000-0x0000000001300000-memory.dmp
    Filesize

    256KB

  • memory/1300-294-0x00000000012C0000-0x0000000001300000-memory.dmp
    Filesize

    256KB

  • memory/1300-86-0x0000000002B30000-0x0000000002B90000-memory.dmp
    Filesize

    384KB

  • memory/1300-84-0x0000000002B30000-0x0000000002B90000-memory.dmp
    Filesize

    384KB

  • memory/1300-82-0x0000000002B30000-0x0000000002B90000-memory.dmp
    Filesize

    384KB

  • memory/1300-2230-0x0000000001440000-0x0000000001472000-memory.dmp
    Filesize

    200KB

  • memory/1300-78-0x0000000000240000-0x000000000029B000-memory.dmp
    Filesize

    364KB

  • memory/1300-81-0x0000000002B30000-0x0000000002B90000-memory.dmp
    Filesize

    384KB

  • memory/1300-80-0x0000000002B30000-0x0000000002B96000-memory.dmp
    Filesize

    408KB

  • memory/1300-79-0x0000000005100000-0x0000000005168000-memory.dmp
    Filesize

    416KB

  • memory/1356-2247-0x0000000000BE0000-0x0000000000C10000-memory.dmp
    Filesize

    192KB

  • memory/1356-2249-0x0000000000320000-0x0000000000326000-memory.dmp
    Filesize

    24KB

  • memory/1356-2251-0x0000000002640000-0x0000000002680000-memory.dmp
    Filesize

    256KB

  • memory/1356-2253-0x0000000002640000-0x0000000002680000-memory.dmp
    Filesize

    256KB

  • memory/1676-2240-0x00000000012B0000-0x00000000012DE000-memory.dmp
    Filesize

    184KB

  • memory/1676-2248-0x00000000002C0000-0x00000000002C6000-memory.dmp
    Filesize

    24KB

  • memory/1676-2250-0x0000000000B90000-0x0000000000BD0000-memory.dmp
    Filesize

    256KB

  • memory/1676-2252-0x0000000000B90000-0x0000000000BD0000-memory.dmp
    Filesize

    256KB