Analysis

  • max time kernel
    46s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    14-05-2023 18:32

General

  • Target

    c46e12e7a08cfd17858543a034ae370ec8d3568c99e92d50913af07b365ca804.exe

  • Size

    1.1MB

  • MD5

    4b8a519411dc1ed17be7ba4f65f87412

  • SHA1

    492df258d68db191ff69786ca91456901f24a4e0

  • SHA256

    c46e12e7a08cfd17858543a034ae370ec8d3568c99e92d50913af07b365ca804

  • SHA512

    ef66783d35dd42024c93115fc6deecdfe5c93552de00305c711b4d9387834827ba06090de364ea121caed3e171aff64b7072fd351f908787b7f08b02d0901d27

  • SSDEEP

    24576:xyTKavwsxDN8rkNXw0c9FI5eg33Jxaf7snPYxyZRoFHTN6VvHA8:kTFvTD3NXRACrxlEyZRGh6Bg

Malware Config

Extracted

Family

redline

Botnet

luka

C2

185.161.248.75:4132

Attributes
  • auth_value

    44560bcd37d6bf076da309730fdb519a

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c46e12e7a08cfd17858543a034ae370ec8d3568c99e92d50913af07b365ca804.exe
    "C:\Users\Admin\AppData\Local\Temp\c46e12e7a08cfd17858543a034ae370ec8d3568c99e92d50913af07b365ca804.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1748
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9053206.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9053206.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:924
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5631244.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5631244.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:916
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o3259729.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o3259729.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1860
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p8704566.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p8704566.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1700
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1700 -s 644
            5⤵
            • Loads dropped DLL
            • Program crash
            PID:904

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9053206.exe
    Filesize

    703KB

    MD5

    d3d28146f4f5bac952bb61bf0ffcf449

    SHA1

    a78fb83fc2a3e6f8a0a8f8b21cedab360cefb9dc

    SHA256

    89a04d715e57f423d678d95cf7cb7a87dc5b4277cde36638a83b552f481ee2c0

    SHA512

    9e6420195a3fe3f5d831d2b00496558fadadacc3c76594590814b6e0f8cdf76462ceb20e26a011b3b0227a9161c04557a7f0995485149d19ef5bde327ffeff17

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9053206.exe
    Filesize

    703KB

    MD5

    d3d28146f4f5bac952bb61bf0ffcf449

    SHA1

    a78fb83fc2a3e6f8a0a8f8b21cedab360cefb9dc

    SHA256

    89a04d715e57f423d678d95cf7cb7a87dc5b4277cde36638a83b552f481ee2c0

    SHA512

    9e6420195a3fe3f5d831d2b00496558fadadacc3c76594590814b6e0f8cdf76462ceb20e26a011b3b0227a9161c04557a7f0995485149d19ef5bde327ffeff17

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5631244.exe
    Filesize

    306KB

    MD5

    70fbc0a3dc421cf6bc6727d9afe190d6

    SHA1

    f1bffbb2702247822684660cab2fe8ef201cdce2

    SHA256

    34861ff318feba68df3e0f0718e89e0ad6a0d51fc257b462cd5efcd3c8eb5a04

    SHA512

    6b32d0ea1b088340304516feb5e8cd80266d8c1b234010eade0e506120e2b0ca17dcb2f0d0432e56798b1dbb421c194542a9763f94d094dafc5d684beac6b446

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5631244.exe
    Filesize

    306KB

    MD5

    70fbc0a3dc421cf6bc6727d9afe190d6

    SHA1

    f1bffbb2702247822684660cab2fe8ef201cdce2

    SHA256

    34861ff318feba68df3e0f0718e89e0ad6a0d51fc257b462cd5efcd3c8eb5a04

    SHA512

    6b32d0ea1b088340304516feb5e8cd80266d8c1b234010eade0e506120e2b0ca17dcb2f0d0432e56798b1dbb421c194542a9763f94d094dafc5d684beac6b446

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o3259729.exe
    Filesize

    185KB

    MD5

    ab0ef5383fce0cd9ebc4f854367f7e4d

    SHA1

    ad8111f07a1e2578aec7ca4905eeef5fdbf629f7

    SHA256

    166b4ecf093b07f0363abb8262984e29edaa81662ea3c68188ea6b83418273e3

    SHA512

    be98ffc82490da6b0795b0fe10dcd412d41f46576a3e6931f8d03fdfeb1907662d1bc3a969f8fc2c359b21e99fbfd652daeb213a72711ce9b85a7ec3f1b4f6ee

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o3259729.exe
    Filesize

    185KB

    MD5

    ab0ef5383fce0cd9ebc4f854367f7e4d

    SHA1

    ad8111f07a1e2578aec7ca4905eeef5fdbf629f7

    SHA256

    166b4ecf093b07f0363abb8262984e29edaa81662ea3c68188ea6b83418273e3

    SHA512

    be98ffc82490da6b0795b0fe10dcd412d41f46576a3e6931f8d03fdfeb1907662d1bc3a969f8fc2c359b21e99fbfd652daeb213a72711ce9b85a7ec3f1b4f6ee

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p8704566.exe
    Filesize

    145KB

    MD5

    244802eeb5ff362b4c6050f0fb2769a6

    SHA1

    49e75cb66389dd06cab2e36e88260829e7957db7

    SHA256

    f001fd879859689b5c99ea63815f7ca6d02f881ca4976f4f007fe32f5a96b330

    SHA512

    a04f4b26ddd785aa909090f31a86e9917caa575ff1a1418636b4ecbcf4f069f1089902d9d85a9bc82af9907b3484651bb6e9bbc1f972d1f39a92ace167f73114

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p8704566.exe
    Filesize

    145KB

    MD5

    244802eeb5ff362b4c6050f0fb2769a6

    SHA1

    49e75cb66389dd06cab2e36e88260829e7957db7

    SHA256

    f001fd879859689b5c99ea63815f7ca6d02f881ca4976f4f007fe32f5a96b330

    SHA512

    a04f4b26ddd785aa909090f31a86e9917caa575ff1a1418636b4ecbcf4f069f1089902d9d85a9bc82af9907b3484651bb6e9bbc1f972d1f39a92ace167f73114

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z9053206.exe
    Filesize

    703KB

    MD5

    d3d28146f4f5bac952bb61bf0ffcf449

    SHA1

    a78fb83fc2a3e6f8a0a8f8b21cedab360cefb9dc

    SHA256

    89a04d715e57f423d678d95cf7cb7a87dc5b4277cde36638a83b552f481ee2c0

    SHA512

    9e6420195a3fe3f5d831d2b00496558fadadacc3c76594590814b6e0f8cdf76462ceb20e26a011b3b0227a9161c04557a7f0995485149d19ef5bde327ffeff17

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z9053206.exe
    Filesize

    703KB

    MD5

    d3d28146f4f5bac952bb61bf0ffcf449

    SHA1

    a78fb83fc2a3e6f8a0a8f8b21cedab360cefb9dc

    SHA256

    89a04d715e57f423d678d95cf7cb7a87dc5b4277cde36638a83b552f481ee2c0

    SHA512

    9e6420195a3fe3f5d831d2b00496558fadadacc3c76594590814b6e0f8cdf76462ceb20e26a011b3b0227a9161c04557a7f0995485149d19ef5bde327ffeff17

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z5631244.exe
    Filesize

    306KB

    MD5

    70fbc0a3dc421cf6bc6727d9afe190d6

    SHA1

    f1bffbb2702247822684660cab2fe8ef201cdce2

    SHA256

    34861ff318feba68df3e0f0718e89e0ad6a0d51fc257b462cd5efcd3c8eb5a04

    SHA512

    6b32d0ea1b088340304516feb5e8cd80266d8c1b234010eade0e506120e2b0ca17dcb2f0d0432e56798b1dbb421c194542a9763f94d094dafc5d684beac6b446

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z5631244.exe
    Filesize

    306KB

    MD5

    70fbc0a3dc421cf6bc6727d9afe190d6

    SHA1

    f1bffbb2702247822684660cab2fe8ef201cdce2

    SHA256

    34861ff318feba68df3e0f0718e89e0ad6a0d51fc257b462cd5efcd3c8eb5a04

    SHA512

    6b32d0ea1b088340304516feb5e8cd80266d8c1b234010eade0e506120e2b0ca17dcb2f0d0432e56798b1dbb421c194542a9763f94d094dafc5d684beac6b446

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\o3259729.exe
    Filesize

    185KB

    MD5

    ab0ef5383fce0cd9ebc4f854367f7e4d

    SHA1

    ad8111f07a1e2578aec7ca4905eeef5fdbf629f7

    SHA256

    166b4ecf093b07f0363abb8262984e29edaa81662ea3c68188ea6b83418273e3

    SHA512

    be98ffc82490da6b0795b0fe10dcd412d41f46576a3e6931f8d03fdfeb1907662d1bc3a969f8fc2c359b21e99fbfd652daeb213a72711ce9b85a7ec3f1b4f6ee

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\o3259729.exe
    Filesize

    185KB

    MD5

    ab0ef5383fce0cd9ebc4f854367f7e4d

    SHA1

    ad8111f07a1e2578aec7ca4905eeef5fdbf629f7

    SHA256

    166b4ecf093b07f0363abb8262984e29edaa81662ea3c68188ea6b83418273e3

    SHA512

    be98ffc82490da6b0795b0fe10dcd412d41f46576a3e6931f8d03fdfeb1907662d1bc3a969f8fc2c359b21e99fbfd652daeb213a72711ce9b85a7ec3f1b4f6ee

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p8704566.exe
    Filesize

    145KB

    MD5

    244802eeb5ff362b4c6050f0fb2769a6

    SHA1

    49e75cb66389dd06cab2e36e88260829e7957db7

    SHA256

    f001fd879859689b5c99ea63815f7ca6d02f881ca4976f4f007fe32f5a96b330

    SHA512

    a04f4b26ddd785aa909090f31a86e9917caa575ff1a1418636b4ecbcf4f069f1089902d9d85a9bc82af9907b3484651bb6e9bbc1f972d1f39a92ace167f73114

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p8704566.exe
    Filesize

    145KB

    MD5

    244802eeb5ff362b4c6050f0fb2769a6

    SHA1

    49e75cb66389dd06cab2e36e88260829e7957db7

    SHA256

    f001fd879859689b5c99ea63815f7ca6d02f881ca4976f4f007fe32f5a96b330

    SHA512

    a04f4b26ddd785aa909090f31a86e9917caa575ff1a1418636b4ecbcf4f069f1089902d9d85a9bc82af9907b3484651bb6e9bbc1f972d1f39a92ace167f73114

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p8704566.exe
    Filesize

    145KB

    MD5

    244802eeb5ff362b4c6050f0fb2769a6

    SHA1

    49e75cb66389dd06cab2e36e88260829e7957db7

    SHA256

    f001fd879859689b5c99ea63815f7ca6d02f881ca4976f4f007fe32f5a96b330

    SHA512

    a04f4b26ddd785aa909090f31a86e9917caa575ff1a1418636b4ecbcf4f069f1089902d9d85a9bc82af9907b3484651bb6e9bbc1f972d1f39a92ace167f73114

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p8704566.exe
    Filesize

    145KB

    MD5

    244802eeb5ff362b4c6050f0fb2769a6

    SHA1

    49e75cb66389dd06cab2e36e88260829e7957db7

    SHA256

    f001fd879859689b5c99ea63815f7ca6d02f881ca4976f4f007fe32f5a96b330

    SHA512

    a04f4b26ddd785aa909090f31a86e9917caa575ff1a1418636b4ecbcf4f069f1089902d9d85a9bc82af9907b3484651bb6e9bbc1f972d1f39a92ace167f73114

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p8704566.exe
    Filesize

    145KB

    MD5

    244802eeb5ff362b4c6050f0fb2769a6

    SHA1

    49e75cb66389dd06cab2e36e88260829e7957db7

    SHA256

    f001fd879859689b5c99ea63815f7ca6d02f881ca4976f4f007fe32f5a96b330

    SHA512

    a04f4b26ddd785aa909090f31a86e9917caa575ff1a1418636b4ecbcf4f069f1089902d9d85a9bc82af9907b3484651bb6e9bbc1f972d1f39a92ace167f73114

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p8704566.exe
    Filesize

    145KB

    MD5

    244802eeb5ff362b4c6050f0fb2769a6

    SHA1

    49e75cb66389dd06cab2e36e88260829e7957db7

    SHA256

    f001fd879859689b5c99ea63815f7ca6d02f881ca4976f4f007fe32f5a96b330

    SHA512

    a04f4b26ddd785aa909090f31a86e9917caa575ff1a1418636b4ecbcf4f069f1089902d9d85a9bc82af9907b3484651bb6e9bbc1f972d1f39a92ace167f73114

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p8704566.exe
    Filesize

    145KB

    MD5

    244802eeb5ff362b4c6050f0fb2769a6

    SHA1

    49e75cb66389dd06cab2e36e88260829e7957db7

    SHA256

    f001fd879859689b5c99ea63815f7ca6d02f881ca4976f4f007fe32f5a96b330

    SHA512

    a04f4b26ddd785aa909090f31a86e9917caa575ff1a1418636b4ecbcf4f069f1089902d9d85a9bc82af9907b3484651bb6e9bbc1f972d1f39a92ace167f73114

  • memory/1700-123-0x0000000000D00000-0x0000000000D2A000-memory.dmp
    Filesize

    168KB

  • memory/1860-95-0x0000000000550000-0x0000000000566000-memory.dmp
    Filesize

    88KB

  • memory/1860-101-0x0000000000550000-0x0000000000566000-memory.dmp
    Filesize

    88KB

  • memory/1860-103-0x0000000000550000-0x0000000000566000-memory.dmp
    Filesize

    88KB

  • memory/1860-105-0x0000000000550000-0x0000000000566000-memory.dmp
    Filesize

    88KB

  • memory/1860-107-0x0000000000550000-0x0000000000566000-memory.dmp
    Filesize

    88KB

  • memory/1860-109-0x0000000000550000-0x0000000000566000-memory.dmp
    Filesize

    88KB

  • memory/1860-111-0x0000000000550000-0x0000000000566000-memory.dmp
    Filesize

    88KB

  • memory/1860-113-0x0000000000550000-0x0000000000566000-memory.dmp
    Filesize

    88KB

  • memory/1860-115-0x0000000000550000-0x0000000000566000-memory.dmp
    Filesize

    88KB

  • memory/1860-116-0x0000000004940000-0x0000000004980000-memory.dmp
    Filesize

    256KB

  • memory/1860-99-0x0000000000550000-0x0000000000566000-memory.dmp
    Filesize

    88KB

  • memory/1860-97-0x0000000000550000-0x0000000000566000-memory.dmp
    Filesize

    88KB

  • memory/1860-93-0x0000000000550000-0x0000000000566000-memory.dmp
    Filesize

    88KB

  • memory/1860-91-0x0000000000550000-0x0000000000566000-memory.dmp
    Filesize

    88KB

  • memory/1860-88-0x0000000000550000-0x0000000000566000-memory.dmp
    Filesize

    88KB

  • memory/1860-89-0x0000000004940000-0x0000000004980000-memory.dmp
    Filesize

    256KB

  • memory/1860-86-0x0000000004940000-0x0000000004980000-memory.dmp
    Filesize

    256KB

  • memory/1860-87-0x0000000000550000-0x0000000000566000-memory.dmp
    Filesize

    88KB

  • memory/1860-85-0x0000000000550000-0x000000000056C000-memory.dmp
    Filesize

    112KB

  • memory/1860-84-0x0000000000480000-0x000000000049E000-memory.dmp
    Filesize

    120KB