Analysis

  • max time kernel
    27s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    14-05-2023 18:31

General

  • Target

    be61b0e11878b01cdf9161f2cd9a799afb2b78e19dcbd557b8138848df38be3b.exe

  • Size

    1.1MB

  • MD5

    47f93fc511264f2ce81bd39ebbcfd134

  • SHA1

    55bb471d491022e9f1a503a9c31782d39e2b8ad5

  • SHA256

    be61b0e11878b01cdf9161f2cd9a799afb2b78e19dcbd557b8138848df38be3b

  • SHA512

    acf5e9d642bb8e2cb84b6b653358c9428d99e7775328a29fe4e295d7223761cad62d0b145cf642a7bb9a61f91e7205b77f082e213d7e3e7517f75f77f14cafdd

  • SSDEEP

    24576:ryXrcJ6Sc+wUB8HQ0GWqEef/4NJaGOTS9cqxhc1HUx8s/w8T56:ebcJ6SEUCQHtf/IJaGOTNqx83s/w8T

Malware Config

Extracted

Family

redline

Botnet

luka

C2

185.161.248.75:4132

Attributes
  • auth_value

    44560bcd37d6bf076da309730fdb519a

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be61b0e11878b01cdf9161f2cd9a799afb2b78e19dcbd557b8138848df38be3b.exe
    "C:\Users\Admin\AppData\Local\Temp\be61b0e11878b01cdf9161f2cd9a799afb2b78e19dcbd557b8138848df38be3b.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5709279.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5709279.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1284
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2909516.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2909516.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:764
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o1667725.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o1667725.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:576
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p6347866.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p6347866.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1296
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1296 -s 648
            5⤵
            • Loads dropped DLL
            • Program crash
            PID:1132

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5709279.exe
    Filesize

    701KB

    MD5

    5147b665247277b8c784ebefc071a83d

    SHA1

    312bcbb58d257283db9db9cf4fadcd64292e21d1

    SHA256

    51bcaead677fb45ff69325db328775f52872fad1c486d8030179716d54fe375f

    SHA512

    d5f470692ef4793a4ef7037e5206e5743ce03b2f074b8776965327ccc59abc12a1a8e98a265a60dfcd6f6133b15dd0f076fe3b26150f85d480ef3d0dcf83e1d8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5709279.exe
    Filesize

    701KB

    MD5

    5147b665247277b8c784ebefc071a83d

    SHA1

    312bcbb58d257283db9db9cf4fadcd64292e21d1

    SHA256

    51bcaead677fb45ff69325db328775f52872fad1c486d8030179716d54fe375f

    SHA512

    d5f470692ef4793a4ef7037e5206e5743ce03b2f074b8776965327ccc59abc12a1a8e98a265a60dfcd6f6133b15dd0f076fe3b26150f85d480ef3d0dcf83e1d8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2909516.exe
    Filesize

    306KB

    MD5

    6b75c7c1fed4d69c49fb13c9620cdded

    SHA1

    f5dc0a0738b2fafcaee26302c7a193b2a0442aa9

    SHA256

    1f1b97b07a10c71b1f4a97c43b62740cf43374950ed53aebfa0942cbd9c1ed54

    SHA512

    f2c5a1b2fc71e6360a307c9aff8b4f2db1f43b0f9af590f87a3ca2ee6b7653dd049642f6fabf7602372c9c400e99b333198aab7829b00c05e2605ff544df858b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2909516.exe
    Filesize

    306KB

    MD5

    6b75c7c1fed4d69c49fb13c9620cdded

    SHA1

    f5dc0a0738b2fafcaee26302c7a193b2a0442aa9

    SHA256

    1f1b97b07a10c71b1f4a97c43b62740cf43374950ed53aebfa0942cbd9c1ed54

    SHA512

    f2c5a1b2fc71e6360a307c9aff8b4f2db1f43b0f9af590f87a3ca2ee6b7653dd049642f6fabf7602372c9c400e99b333198aab7829b00c05e2605ff544df858b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o1667725.exe
    Filesize

    185KB

    MD5

    e3094d8f708df4277d502eed71b32916

    SHA1

    f1ae269435cb41ef3d8fee3a85e53e86fd87b386

    SHA256

    2bac4f151a32f52ffd022ffb4758a7ff74f096c72960be1521097e1a18ffe05e

    SHA512

    a7e3de7729ad304d58286b999084b6ccc534dcfc03d37dcb7e90b11ad218888a98bfde66e2e4ce98a87e82c10400a03d42bd93207ff340caba30f6aed46548cd

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o1667725.exe
    Filesize

    185KB

    MD5

    e3094d8f708df4277d502eed71b32916

    SHA1

    f1ae269435cb41ef3d8fee3a85e53e86fd87b386

    SHA256

    2bac4f151a32f52ffd022ffb4758a7ff74f096c72960be1521097e1a18ffe05e

    SHA512

    a7e3de7729ad304d58286b999084b6ccc534dcfc03d37dcb7e90b11ad218888a98bfde66e2e4ce98a87e82c10400a03d42bd93207ff340caba30f6aed46548cd

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p6347866.exe
    Filesize

    145KB

    MD5

    37c6ec29e1b5f3ee59c65d4b701487df

    SHA1

    ca6d47fdb4ef45fcd63de086fbcbd91ee41849a4

    SHA256

    699f404cc908eff7edb9b01fd6e068f0021ec606509adb8e9ce547f1887c2b7e

    SHA512

    098df1c563e6196c898e44a67acfa77209a8ff79397551c550f8ce944d7037de82caf3ec183134ae241c94278f15b7aad57b206ccb7873e3cbd1e4ca4d905bcf

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p6347866.exe
    Filesize

    145KB

    MD5

    37c6ec29e1b5f3ee59c65d4b701487df

    SHA1

    ca6d47fdb4ef45fcd63de086fbcbd91ee41849a4

    SHA256

    699f404cc908eff7edb9b01fd6e068f0021ec606509adb8e9ce547f1887c2b7e

    SHA512

    098df1c563e6196c898e44a67acfa77209a8ff79397551c550f8ce944d7037de82caf3ec183134ae241c94278f15b7aad57b206ccb7873e3cbd1e4ca4d905bcf

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z5709279.exe
    Filesize

    701KB

    MD5

    5147b665247277b8c784ebefc071a83d

    SHA1

    312bcbb58d257283db9db9cf4fadcd64292e21d1

    SHA256

    51bcaead677fb45ff69325db328775f52872fad1c486d8030179716d54fe375f

    SHA512

    d5f470692ef4793a4ef7037e5206e5743ce03b2f074b8776965327ccc59abc12a1a8e98a265a60dfcd6f6133b15dd0f076fe3b26150f85d480ef3d0dcf83e1d8

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z5709279.exe
    Filesize

    701KB

    MD5

    5147b665247277b8c784ebefc071a83d

    SHA1

    312bcbb58d257283db9db9cf4fadcd64292e21d1

    SHA256

    51bcaead677fb45ff69325db328775f52872fad1c486d8030179716d54fe375f

    SHA512

    d5f470692ef4793a4ef7037e5206e5743ce03b2f074b8776965327ccc59abc12a1a8e98a265a60dfcd6f6133b15dd0f076fe3b26150f85d480ef3d0dcf83e1d8

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z2909516.exe
    Filesize

    306KB

    MD5

    6b75c7c1fed4d69c49fb13c9620cdded

    SHA1

    f5dc0a0738b2fafcaee26302c7a193b2a0442aa9

    SHA256

    1f1b97b07a10c71b1f4a97c43b62740cf43374950ed53aebfa0942cbd9c1ed54

    SHA512

    f2c5a1b2fc71e6360a307c9aff8b4f2db1f43b0f9af590f87a3ca2ee6b7653dd049642f6fabf7602372c9c400e99b333198aab7829b00c05e2605ff544df858b

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z2909516.exe
    Filesize

    306KB

    MD5

    6b75c7c1fed4d69c49fb13c9620cdded

    SHA1

    f5dc0a0738b2fafcaee26302c7a193b2a0442aa9

    SHA256

    1f1b97b07a10c71b1f4a97c43b62740cf43374950ed53aebfa0942cbd9c1ed54

    SHA512

    f2c5a1b2fc71e6360a307c9aff8b4f2db1f43b0f9af590f87a3ca2ee6b7653dd049642f6fabf7602372c9c400e99b333198aab7829b00c05e2605ff544df858b

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\o1667725.exe
    Filesize

    185KB

    MD5

    e3094d8f708df4277d502eed71b32916

    SHA1

    f1ae269435cb41ef3d8fee3a85e53e86fd87b386

    SHA256

    2bac4f151a32f52ffd022ffb4758a7ff74f096c72960be1521097e1a18ffe05e

    SHA512

    a7e3de7729ad304d58286b999084b6ccc534dcfc03d37dcb7e90b11ad218888a98bfde66e2e4ce98a87e82c10400a03d42bd93207ff340caba30f6aed46548cd

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\o1667725.exe
    Filesize

    185KB

    MD5

    e3094d8f708df4277d502eed71b32916

    SHA1

    f1ae269435cb41ef3d8fee3a85e53e86fd87b386

    SHA256

    2bac4f151a32f52ffd022ffb4758a7ff74f096c72960be1521097e1a18ffe05e

    SHA512

    a7e3de7729ad304d58286b999084b6ccc534dcfc03d37dcb7e90b11ad218888a98bfde66e2e4ce98a87e82c10400a03d42bd93207ff340caba30f6aed46548cd

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p6347866.exe
    Filesize

    145KB

    MD5

    37c6ec29e1b5f3ee59c65d4b701487df

    SHA1

    ca6d47fdb4ef45fcd63de086fbcbd91ee41849a4

    SHA256

    699f404cc908eff7edb9b01fd6e068f0021ec606509adb8e9ce547f1887c2b7e

    SHA512

    098df1c563e6196c898e44a67acfa77209a8ff79397551c550f8ce944d7037de82caf3ec183134ae241c94278f15b7aad57b206ccb7873e3cbd1e4ca4d905bcf

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p6347866.exe
    Filesize

    145KB

    MD5

    37c6ec29e1b5f3ee59c65d4b701487df

    SHA1

    ca6d47fdb4ef45fcd63de086fbcbd91ee41849a4

    SHA256

    699f404cc908eff7edb9b01fd6e068f0021ec606509adb8e9ce547f1887c2b7e

    SHA512

    098df1c563e6196c898e44a67acfa77209a8ff79397551c550f8ce944d7037de82caf3ec183134ae241c94278f15b7aad57b206ccb7873e3cbd1e4ca4d905bcf

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p6347866.exe
    Filesize

    145KB

    MD5

    37c6ec29e1b5f3ee59c65d4b701487df

    SHA1

    ca6d47fdb4ef45fcd63de086fbcbd91ee41849a4

    SHA256

    699f404cc908eff7edb9b01fd6e068f0021ec606509adb8e9ce547f1887c2b7e

    SHA512

    098df1c563e6196c898e44a67acfa77209a8ff79397551c550f8ce944d7037de82caf3ec183134ae241c94278f15b7aad57b206ccb7873e3cbd1e4ca4d905bcf

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p6347866.exe
    Filesize

    145KB

    MD5

    37c6ec29e1b5f3ee59c65d4b701487df

    SHA1

    ca6d47fdb4ef45fcd63de086fbcbd91ee41849a4

    SHA256

    699f404cc908eff7edb9b01fd6e068f0021ec606509adb8e9ce547f1887c2b7e

    SHA512

    098df1c563e6196c898e44a67acfa77209a8ff79397551c550f8ce944d7037de82caf3ec183134ae241c94278f15b7aad57b206ccb7873e3cbd1e4ca4d905bcf

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p6347866.exe
    Filesize

    145KB

    MD5

    37c6ec29e1b5f3ee59c65d4b701487df

    SHA1

    ca6d47fdb4ef45fcd63de086fbcbd91ee41849a4

    SHA256

    699f404cc908eff7edb9b01fd6e068f0021ec606509adb8e9ce547f1887c2b7e

    SHA512

    098df1c563e6196c898e44a67acfa77209a8ff79397551c550f8ce944d7037de82caf3ec183134ae241c94278f15b7aad57b206ccb7873e3cbd1e4ca4d905bcf

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p6347866.exe
    Filesize

    145KB

    MD5

    37c6ec29e1b5f3ee59c65d4b701487df

    SHA1

    ca6d47fdb4ef45fcd63de086fbcbd91ee41849a4

    SHA256

    699f404cc908eff7edb9b01fd6e068f0021ec606509adb8e9ce547f1887c2b7e

    SHA512

    098df1c563e6196c898e44a67acfa77209a8ff79397551c550f8ce944d7037de82caf3ec183134ae241c94278f15b7aad57b206ccb7873e3cbd1e4ca4d905bcf

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p6347866.exe
    Filesize

    145KB

    MD5

    37c6ec29e1b5f3ee59c65d4b701487df

    SHA1

    ca6d47fdb4ef45fcd63de086fbcbd91ee41849a4

    SHA256

    699f404cc908eff7edb9b01fd6e068f0021ec606509adb8e9ce547f1887c2b7e

    SHA512

    098df1c563e6196c898e44a67acfa77209a8ff79397551c550f8ce944d7037de82caf3ec183134ae241c94278f15b7aad57b206ccb7873e3cbd1e4ca4d905bcf

  • memory/576-97-0x00000000047A0000-0x00000000047B6000-memory.dmp
    Filesize

    88KB

  • memory/576-99-0x00000000047A0000-0x00000000047B6000-memory.dmp
    Filesize

    88KB

  • memory/576-103-0x00000000047A0000-0x00000000047B6000-memory.dmp
    Filesize

    88KB

  • memory/576-105-0x00000000047A0000-0x00000000047B6000-memory.dmp
    Filesize

    88KB

  • memory/576-107-0x00000000047A0000-0x00000000047B6000-memory.dmp
    Filesize

    88KB

  • memory/576-109-0x00000000047A0000-0x00000000047B6000-memory.dmp
    Filesize

    88KB

  • memory/576-111-0x00000000047A0000-0x00000000047B6000-memory.dmp
    Filesize

    88KB

  • memory/576-113-0x00000000047A0000-0x00000000047B6000-memory.dmp
    Filesize

    88KB

  • memory/576-114-0x0000000004820000-0x0000000004860000-memory.dmp
    Filesize

    256KB

  • memory/576-115-0x0000000004820000-0x0000000004860000-memory.dmp
    Filesize

    256KB

  • memory/576-116-0x0000000004820000-0x0000000004860000-memory.dmp
    Filesize

    256KB

  • memory/576-101-0x00000000047A0000-0x00000000047B6000-memory.dmp
    Filesize

    88KB

  • memory/576-95-0x00000000047A0000-0x00000000047B6000-memory.dmp
    Filesize

    88KB

  • memory/576-93-0x00000000047A0000-0x00000000047B6000-memory.dmp
    Filesize

    88KB

  • memory/576-91-0x00000000047A0000-0x00000000047B6000-memory.dmp
    Filesize

    88KB

  • memory/576-84-0x0000000000810000-0x000000000082E000-memory.dmp
    Filesize

    120KB

  • memory/576-89-0x00000000047A0000-0x00000000047B6000-memory.dmp
    Filesize

    88KB

  • memory/576-87-0x00000000047A0000-0x00000000047B6000-memory.dmp
    Filesize

    88KB

  • memory/576-86-0x00000000047A0000-0x00000000047B6000-memory.dmp
    Filesize

    88KB

  • memory/576-85-0x00000000047A0000-0x00000000047BC000-memory.dmp
    Filesize

    112KB

  • memory/1296-123-0x0000000000E00000-0x0000000000E2A000-memory.dmp
    Filesize

    168KB