Analysis

  • max time kernel
    27s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    14-05-2023 18:36

General

  • Target

    dd4f68077b2a4a74f21d8853cd68c222c6084e93ec059c07069bd1cd9bce3fc6.exe

  • Size

    1.1MB

  • MD5

    f0a5660b3e2f4415e541ec315e61ec86

  • SHA1

    be0d422e8ee50c6b9271a715a4069a523c27ec18

  • SHA256

    dd4f68077b2a4a74f21d8853cd68c222c6084e93ec059c07069bd1cd9bce3fc6

  • SHA512

    8945c673faa1f18fe18e0d811cfbb7c5a976073ea186bdf0d637f62853f846d2c46a9dafc919d4ccd911520513618130df9ddf9566a9ba669be47388b4d9eb3c

  • SSDEEP

    24576:Pyr6wNDxkVckkEuGsjT7Jc0BWcncv6ZUV67wRhTTvCK5taD9:aLGVOEudjW4WwypV67wRhT+KLaD

Malware Config

Extracted

Family

redline

Botnet

luka

C2

185.161.248.75:4132

Attributes
  • auth_value

    44560bcd37d6bf076da309730fdb519a

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dd4f68077b2a4a74f21d8853cd68c222c6084e93ec059c07069bd1cd9bce3fc6.exe
    "C:\Users\Admin\AppData\Local\Temp\dd4f68077b2a4a74f21d8853cd68c222c6084e93ec059c07069bd1cd9bce3fc6.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6032440.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6032440.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1380
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8141745.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8141745.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1032
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o8896352.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o8896352.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:460
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p8711113.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p8711113.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:520
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 520 -s 644
            5⤵
            • Loads dropped DLL
            • Program crash
            PID:1704

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6032440.exe
    Filesize

    702KB

    MD5

    856186fcef9aeefea6b4e30fd06db515

    SHA1

    1cead46523a070644508f6f9562918cdeba94600

    SHA256

    9df638516575de8a6b8517e90c3ba8d318ff5d73b5f92c35be7adda036922427

    SHA512

    9fb9c55fa11e3651609e30f394fbbe7a8eca30db99cc4eaba80e45eacb27a2e526beeeee64809ac424a4e4f5bd500ab9222a2485573d78f29a96ec580a49e65b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6032440.exe
    Filesize

    702KB

    MD5

    856186fcef9aeefea6b4e30fd06db515

    SHA1

    1cead46523a070644508f6f9562918cdeba94600

    SHA256

    9df638516575de8a6b8517e90c3ba8d318ff5d73b5f92c35be7adda036922427

    SHA512

    9fb9c55fa11e3651609e30f394fbbe7a8eca30db99cc4eaba80e45eacb27a2e526beeeee64809ac424a4e4f5bd500ab9222a2485573d78f29a96ec580a49e65b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8141745.exe
    Filesize

    306KB

    MD5

    12503abccf92b15c2b5c26c950bd1e67

    SHA1

    3b70f00069c658f64052c46b134bf72978ffba23

    SHA256

    a1915bc26cd720725bca9338c9a64da230eefc0d22ae56a563942406641b3a54

    SHA512

    6e9d6b7e77327a955d9b7a68219e268327e9165a93941d4d3c1aa94bc7c6e4c025522771aee30201337b7f7f94fb210fd927b4d15e820f9020dac1869992685c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8141745.exe
    Filesize

    306KB

    MD5

    12503abccf92b15c2b5c26c950bd1e67

    SHA1

    3b70f00069c658f64052c46b134bf72978ffba23

    SHA256

    a1915bc26cd720725bca9338c9a64da230eefc0d22ae56a563942406641b3a54

    SHA512

    6e9d6b7e77327a955d9b7a68219e268327e9165a93941d4d3c1aa94bc7c6e4c025522771aee30201337b7f7f94fb210fd927b4d15e820f9020dac1869992685c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o8896352.exe
    Filesize

    185KB

    MD5

    f5250f0a5a85d589a843b77f5850063c

    SHA1

    f815910cfe0cec2e10a05ef3a063f3b946b28ca2

    SHA256

    d3fc4addea294fb61dccdf49fc348dc9ff998da431f0e492a0f9cf5c3287fd74

    SHA512

    50b0514568c225912e09823a61b5277b4b3d6b8741d0d98f2cc438dc10bc694623f65659ad7b16bff3763982f0dd29cb7a9dee39fd8c171020106cfda822f4a0

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o8896352.exe
    Filesize

    185KB

    MD5

    f5250f0a5a85d589a843b77f5850063c

    SHA1

    f815910cfe0cec2e10a05ef3a063f3b946b28ca2

    SHA256

    d3fc4addea294fb61dccdf49fc348dc9ff998da431f0e492a0f9cf5c3287fd74

    SHA512

    50b0514568c225912e09823a61b5277b4b3d6b8741d0d98f2cc438dc10bc694623f65659ad7b16bff3763982f0dd29cb7a9dee39fd8c171020106cfda822f4a0

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p8711113.exe
    Filesize

    145KB

    MD5

    dc890cab3c239420428bde5678602e2d

    SHA1

    751d399f9cb259310ba7f9d4259d725d8e4a280d

    SHA256

    c98b7b4b7235e9f8271b9e93e3d24676b0d8ec22e3f1db7fd28e82f65a519995

    SHA512

    072020fd788155330da5e6c6080248d0e72770ecf331ec264d5ae147159711329f353c6a3457308912b7c71bc07249a9791b632c79fb0288b6f3b06bca4ffe1b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p8711113.exe
    Filesize

    145KB

    MD5

    dc890cab3c239420428bde5678602e2d

    SHA1

    751d399f9cb259310ba7f9d4259d725d8e4a280d

    SHA256

    c98b7b4b7235e9f8271b9e93e3d24676b0d8ec22e3f1db7fd28e82f65a519995

    SHA512

    072020fd788155330da5e6c6080248d0e72770ecf331ec264d5ae147159711329f353c6a3457308912b7c71bc07249a9791b632c79fb0288b6f3b06bca4ffe1b

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z6032440.exe
    Filesize

    702KB

    MD5

    856186fcef9aeefea6b4e30fd06db515

    SHA1

    1cead46523a070644508f6f9562918cdeba94600

    SHA256

    9df638516575de8a6b8517e90c3ba8d318ff5d73b5f92c35be7adda036922427

    SHA512

    9fb9c55fa11e3651609e30f394fbbe7a8eca30db99cc4eaba80e45eacb27a2e526beeeee64809ac424a4e4f5bd500ab9222a2485573d78f29a96ec580a49e65b

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z6032440.exe
    Filesize

    702KB

    MD5

    856186fcef9aeefea6b4e30fd06db515

    SHA1

    1cead46523a070644508f6f9562918cdeba94600

    SHA256

    9df638516575de8a6b8517e90c3ba8d318ff5d73b5f92c35be7adda036922427

    SHA512

    9fb9c55fa11e3651609e30f394fbbe7a8eca30db99cc4eaba80e45eacb27a2e526beeeee64809ac424a4e4f5bd500ab9222a2485573d78f29a96ec580a49e65b

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z8141745.exe
    Filesize

    306KB

    MD5

    12503abccf92b15c2b5c26c950bd1e67

    SHA1

    3b70f00069c658f64052c46b134bf72978ffba23

    SHA256

    a1915bc26cd720725bca9338c9a64da230eefc0d22ae56a563942406641b3a54

    SHA512

    6e9d6b7e77327a955d9b7a68219e268327e9165a93941d4d3c1aa94bc7c6e4c025522771aee30201337b7f7f94fb210fd927b4d15e820f9020dac1869992685c

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z8141745.exe
    Filesize

    306KB

    MD5

    12503abccf92b15c2b5c26c950bd1e67

    SHA1

    3b70f00069c658f64052c46b134bf72978ffba23

    SHA256

    a1915bc26cd720725bca9338c9a64da230eefc0d22ae56a563942406641b3a54

    SHA512

    6e9d6b7e77327a955d9b7a68219e268327e9165a93941d4d3c1aa94bc7c6e4c025522771aee30201337b7f7f94fb210fd927b4d15e820f9020dac1869992685c

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\o8896352.exe
    Filesize

    185KB

    MD5

    f5250f0a5a85d589a843b77f5850063c

    SHA1

    f815910cfe0cec2e10a05ef3a063f3b946b28ca2

    SHA256

    d3fc4addea294fb61dccdf49fc348dc9ff998da431f0e492a0f9cf5c3287fd74

    SHA512

    50b0514568c225912e09823a61b5277b4b3d6b8741d0d98f2cc438dc10bc694623f65659ad7b16bff3763982f0dd29cb7a9dee39fd8c171020106cfda822f4a0

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\o8896352.exe
    Filesize

    185KB

    MD5

    f5250f0a5a85d589a843b77f5850063c

    SHA1

    f815910cfe0cec2e10a05ef3a063f3b946b28ca2

    SHA256

    d3fc4addea294fb61dccdf49fc348dc9ff998da431f0e492a0f9cf5c3287fd74

    SHA512

    50b0514568c225912e09823a61b5277b4b3d6b8741d0d98f2cc438dc10bc694623f65659ad7b16bff3763982f0dd29cb7a9dee39fd8c171020106cfda822f4a0

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p8711113.exe
    Filesize

    145KB

    MD5

    dc890cab3c239420428bde5678602e2d

    SHA1

    751d399f9cb259310ba7f9d4259d725d8e4a280d

    SHA256

    c98b7b4b7235e9f8271b9e93e3d24676b0d8ec22e3f1db7fd28e82f65a519995

    SHA512

    072020fd788155330da5e6c6080248d0e72770ecf331ec264d5ae147159711329f353c6a3457308912b7c71bc07249a9791b632c79fb0288b6f3b06bca4ffe1b

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p8711113.exe
    Filesize

    145KB

    MD5

    dc890cab3c239420428bde5678602e2d

    SHA1

    751d399f9cb259310ba7f9d4259d725d8e4a280d

    SHA256

    c98b7b4b7235e9f8271b9e93e3d24676b0d8ec22e3f1db7fd28e82f65a519995

    SHA512

    072020fd788155330da5e6c6080248d0e72770ecf331ec264d5ae147159711329f353c6a3457308912b7c71bc07249a9791b632c79fb0288b6f3b06bca4ffe1b

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p8711113.exe
    Filesize

    145KB

    MD5

    dc890cab3c239420428bde5678602e2d

    SHA1

    751d399f9cb259310ba7f9d4259d725d8e4a280d

    SHA256

    c98b7b4b7235e9f8271b9e93e3d24676b0d8ec22e3f1db7fd28e82f65a519995

    SHA512

    072020fd788155330da5e6c6080248d0e72770ecf331ec264d5ae147159711329f353c6a3457308912b7c71bc07249a9791b632c79fb0288b6f3b06bca4ffe1b

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p8711113.exe
    Filesize

    145KB

    MD5

    dc890cab3c239420428bde5678602e2d

    SHA1

    751d399f9cb259310ba7f9d4259d725d8e4a280d

    SHA256

    c98b7b4b7235e9f8271b9e93e3d24676b0d8ec22e3f1db7fd28e82f65a519995

    SHA512

    072020fd788155330da5e6c6080248d0e72770ecf331ec264d5ae147159711329f353c6a3457308912b7c71bc07249a9791b632c79fb0288b6f3b06bca4ffe1b

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p8711113.exe
    Filesize

    145KB

    MD5

    dc890cab3c239420428bde5678602e2d

    SHA1

    751d399f9cb259310ba7f9d4259d725d8e4a280d

    SHA256

    c98b7b4b7235e9f8271b9e93e3d24676b0d8ec22e3f1db7fd28e82f65a519995

    SHA512

    072020fd788155330da5e6c6080248d0e72770ecf331ec264d5ae147159711329f353c6a3457308912b7c71bc07249a9791b632c79fb0288b6f3b06bca4ffe1b

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p8711113.exe
    Filesize

    145KB

    MD5

    dc890cab3c239420428bde5678602e2d

    SHA1

    751d399f9cb259310ba7f9d4259d725d8e4a280d

    SHA256

    c98b7b4b7235e9f8271b9e93e3d24676b0d8ec22e3f1db7fd28e82f65a519995

    SHA512

    072020fd788155330da5e6c6080248d0e72770ecf331ec264d5ae147159711329f353c6a3457308912b7c71bc07249a9791b632c79fb0288b6f3b06bca4ffe1b

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p8711113.exe
    Filesize

    145KB

    MD5

    dc890cab3c239420428bde5678602e2d

    SHA1

    751d399f9cb259310ba7f9d4259d725d8e4a280d

    SHA256

    c98b7b4b7235e9f8271b9e93e3d24676b0d8ec22e3f1db7fd28e82f65a519995

    SHA512

    072020fd788155330da5e6c6080248d0e72770ecf331ec264d5ae147159711329f353c6a3457308912b7c71bc07249a9791b632c79fb0288b6f3b06bca4ffe1b

  • memory/460-97-0x0000000001E90000-0x0000000001EA6000-memory.dmp
    Filesize

    88KB

  • memory/460-115-0x0000000004940000-0x0000000004980000-memory.dmp
    Filesize

    256KB

  • memory/460-103-0x0000000001E90000-0x0000000001EA6000-memory.dmp
    Filesize

    88KB

  • memory/460-105-0x0000000001E90000-0x0000000001EA6000-memory.dmp
    Filesize

    88KB

  • memory/460-107-0x0000000001E90000-0x0000000001EA6000-memory.dmp
    Filesize

    88KB

  • memory/460-109-0x0000000001E90000-0x0000000001EA6000-memory.dmp
    Filesize

    88KB

  • memory/460-111-0x0000000001E90000-0x0000000001EA6000-memory.dmp
    Filesize

    88KB

  • memory/460-113-0x0000000001E90000-0x0000000001EA6000-memory.dmp
    Filesize

    88KB

  • memory/460-114-0x0000000004940000-0x0000000004980000-memory.dmp
    Filesize

    256KB

  • memory/460-101-0x0000000001E90000-0x0000000001EA6000-memory.dmp
    Filesize

    88KB

  • memory/460-99-0x0000000001E90000-0x0000000001EA6000-memory.dmp
    Filesize

    88KB

  • memory/460-95-0x0000000001E90000-0x0000000001EA6000-memory.dmp
    Filesize

    88KB

  • memory/460-93-0x0000000001E90000-0x0000000001EA6000-memory.dmp
    Filesize

    88KB

  • memory/460-91-0x0000000001E90000-0x0000000001EA6000-memory.dmp
    Filesize

    88KB

  • memory/460-84-0x00000000004E0000-0x00000000004FE000-memory.dmp
    Filesize

    120KB

  • memory/460-89-0x0000000001E90000-0x0000000001EA6000-memory.dmp
    Filesize

    88KB

  • memory/460-87-0x0000000001E90000-0x0000000001EA6000-memory.dmp
    Filesize

    88KB

  • memory/460-86-0x0000000001E90000-0x0000000001EA6000-memory.dmp
    Filesize

    88KB

  • memory/460-85-0x0000000001E90000-0x0000000001EAC000-memory.dmp
    Filesize

    112KB

  • memory/520-122-0x0000000000CF0000-0x0000000000D1A000-memory.dmp
    Filesize

    168KB