Analysis

  • max time kernel
    117s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    14-05-2023 18:36

General

  • Target

    e196972679d31597c23fd5d24d6cf341abf8a8c5d3ad5c7b677d81db11f54377.exe

  • Size

    1.1MB

  • MD5

    b36774545a331c697d39ac4b3009caa3

  • SHA1

    d28618e3912abf0ecbec9493d09686e10c12b0f9

  • SHA256

    e196972679d31597c23fd5d24d6cf341abf8a8c5d3ad5c7b677d81db11f54377

  • SHA512

    5354b0d983d7c2fbf58a94808e7af4f99e2412b2596f575a4a9d35ee11fcb9af5327a77c91db0e477f081fa51cd5b7bb1132834544538b40a7a56bb5e1fb6b27

  • SSDEEP

    24576:7ylAYjqgEXyagUO8zpBL1HHZYz732lavJuzBN6giK0VwWmitTRG7a:u85XaU5pxR5YzbgSJudbiK+wU1w

Malware Config

Extracted

Family

redline

Botnet

luka

C2

185.161.248.75:4132

Attributes
  • auth_value

    44560bcd37d6bf076da309730fdb519a

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e196972679d31597c23fd5d24d6cf341abf8a8c5d3ad5c7b677d81db11f54377.exe
    "C:\Users\Admin\AppData\Local\Temp\e196972679d31597c23fd5d24d6cf341abf8a8c5d3ad5c7b677d81db11f54377.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:684
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1978255.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1978255.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1492
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0506033.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0506033.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:588
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6531864.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6531864.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:288
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9252775.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9252775.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1792
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1792 -s 644
            5⤵
            • Loads dropped DLL
            • Program crash
            PID:1388

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1978255.exe
    Filesize

    702KB

    MD5

    c83d3cb881477d38dfa78e7089355e60

    SHA1

    f92c5cc1a9497a0bc7df4d51b716e0a6da49977f

    SHA256

    849ece0aae8631364523f5fd8fa0044f226a97d4943395e7b07c1c3823b244e5

    SHA512

    f65ac4f6e40d4d62beef61252752444185b5f47373518da996a328d140dff3b3c4ba9a95adfa12fd7ff6d551d007d6c142dc5b305a8aa4ed93a3ad38b8c39d0f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1978255.exe
    Filesize

    702KB

    MD5

    c83d3cb881477d38dfa78e7089355e60

    SHA1

    f92c5cc1a9497a0bc7df4d51b716e0a6da49977f

    SHA256

    849ece0aae8631364523f5fd8fa0044f226a97d4943395e7b07c1c3823b244e5

    SHA512

    f65ac4f6e40d4d62beef61252752444185b5f47373518da996a328d140dff3b3c4ba9a95adfa12fd7ff6d551d007d6c142dc5b305a8aa4ed93a3ad38b8c39d0f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0506033.exe
    Filesize

    306KB

    MD5

    1ec48ec0f8c040d9fef20d22bd8e8811

    SHA1

    6417b9eab3af3b7efe5378bbfb2c02fda16aae47

    SHA256

    abac89672306ce61d85251b88324cd2aa8cbb572f53bb0612b2f24b788b0ee21

    SHA512

    66f50850a3181f8bcec9d677939046385b63f4a9612c50172bfbd49515db40a4e3f7cd0dd06b643ad0045b8a13bd4c38ceda990ad23deb2ff4d64ca9ea74893a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0506033.exe
    Filesize

    306KB

    MD5

    1ec48ec0f8c040d9fef20d22bd8e8811

    SHA1

    6417b9eab3af3b7efe5378bbfb2c02fda16aae47

    SHA256

    abac89672306ce61d85251b88324cd2aa8cbb572f53bb0612b2f24b788b0ee21

    SHA512

    66f50850a3181f8bcec9d677939046385b63f4a9612c50172bfbd49515db40a4e3f7cd0dd06b643ad0045b8a13bd4c38ceda990ad23deb2ff4d64ca9ea74893a

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6531864.exe
    Filesize

    185KB

    MD5

    ede7be3f26a1f46d85a8dc4437e74335

    SHA1

    1cbdbb5519c516fb4235873038c4467b44e33eb8

    SHA256

    423898b6a481f9a73e12eb46b46b667deb778c205e1515c4ef475c63e9e8fbbc

    SHA512

    261e42d4781f59910423ffd7778f64174613041bd202c13aa9fff5750e3be0ac8a84a1233550e54c0f5cc5cc45656f605087e266d4a0f0a36b0fae1357125a45

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6531864.exe
    Filesize

    185KB

    MD5

    ede7be3f26a1f46d85a8dc4437e74335

    SHA1

    1cbdbb5519c516fb4235873038c4467b44e33eb8

    SHA256

    423898b6a481f9a73e12eb46b46b667deb778c205e1515c4ef475c63e9e8fbbc

    SHA512

    261e42d4781f59910423ffd7778f64174613041bd202c13aa9fff5750e3be0ac8a84a1233550e54c0f5cc5cc45656f605087e266d4a0f0a36b0fae1357125a45

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9252775.exe
    Filesize

    145KB

    MD5

    246e4740e208c1c6d131fc5112f86b4c

    SHA1

    988c8aa61f61209e351794eee17d791e2da8a9e6

    SHA256

    ed2d081914a4c1216a9861e73fc98056d1262e78cf826d3cea71090af71ae0b3

    SHA512

    6dde7618b9ce4836c9f3ad580faba7e03aa5e34a95b9404f5ae79d31e25af25e1d2404027b13e9a9ad0c1bdc41fa2d7083b8ddbf039e686755705bd776d003c6

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9252775.exe
    Filesize

    145KB

    MD5

    246e4740e208c1c6d131fc5112f86b4c

    SHA1

    988c8aa61f61209e351794eee17d791e2da8a9e6

    SHA256

    ed2d081914a4c1216a9861e73fc98056d1262e78cf826d3cea71090af71ae0b3

    SHA512

    6dde7618b9ce4836c9f3ad580faba7e03aa5e34a95b9404f5ae79d31e25af25e1d2404027b13e9a9ad0c1bdc41fa2d7083b8ddbf039e686755705bd776d003c6

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z1978255.exe
    Filesize

    702KB

    MD5

    c83d3cb881477d38dfa78e7089355e60

    SHA1

    f92c5cc1a9497a0bc7df4d51b716e0a6da49977f

    SHA256

    849ece0aae8631364523f5fd8fa0044f226a97d4943395e7b07c1c3823b244e5

    SHA512

    f65ac4f6e40d4d62beef61252752444185b5f47373518da996a328d140dff3b3c4ba9a95adfa12fd7ff6d551d007d6c142dc5b305a8aa4ed93a3ad38b8c39d0f

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z1978255.exe
    Filesize

    702KB

    MD5

    c83d3cb881477d38dfa78e7089355e60

    SHA1

    f92c5cc1a9497a0bc7df4d51b716e0a6da49977f

    SHA256

    849ece0aae8631364523f5fd8fa0044f226a97d4943395e7b07c1c3823b244e5

    SHA512

    f65ac4f6e40d4d62beef61252752444185b5f47373518da996a328d140dff3b3c4ba9a95adfa12fd7ff6d551d007d6c142dc5b305a8aa4ed93a3ad38b8c39d0f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z0506033.exe
    Filesize

    306KB

    MD5

    1ec48ec0f8c040d9fef20d22bd8e8811

    SHA1

    6417b9eab3af3b7efe5378bbfb2c02fda16aae47

    SHA256

    abac89672306ce61d85251b88324cd2aa8cbb572f53bb0612b2f24b788b0ee21

    SHA512

    66f50850a3181f8bcec9d677939046385b63f4a9612c50172bfbd49515db40a4e3f7cd0dd06b643ad0045b8a13bd4c38ceda990ad23deb2ff4d64ca9ea74893a

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z0506033.exe
    Filesize

    306KB

    MD5

    1ec48ec0f8c040d9fef20d22bd8e8811

    SHA1

    6417b9eab3af3b7efe5378bbfb2c02fda16aae47

    SHA256

    abac89672306ce61d85251b88324cd2aa8cbb572f53bb0612b2f24b788b0ee21

    SHA512

    66f50850a3181f8bcec9d677939046385b63f4a9612c50172bfbd49515db40a4e3f7cd0dd06b643ad0045b8a13bd4c38ceda990ad23deb2ff4d64ca9ea74893a

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\o6531864.exe
    Filesize

    185KB

    MD5

    ede7be3f26a1f46d85a8dc4437e74335

    SHA1

    1cbdbb5519c516fb4235873038c4467b44e33eb8

    SHA256

    423898b6a481f9a73e12eb46b46b667deb778c205e1515c4ef475c63e9e8fbbc

    SHA512

    261e42d4781f59910423ffd7778f64174613041bd202c13aa9fff5750e3be0ac8a84a1233550e54c0f5cc5cc45656f605087e266d4a0f0a36b0fae1357125a45

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\o6531864.exe
    Filesize

    185KB

    MD5

    ede7be3f26a1f46d85a8dc4437e74335

    SHA1

    1cbdbb5519c516fb4235873038c4467b44e33eb8

    SHA256

    423898b6a481f9a73e12eb46b46b667deb778c205e1515c4ef475c63e9e8fbbc

    SHA512

    261e42d4781f59910423ffd7778f64174613041bd202c13aa9fff5750e3be0ac8a84a1233550e54c0f5cc5cc45656f605087e266d4a0f0a36b0fae1357125a45

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p9252775.exe
    Filesize

    145KB

    MD5

    246e4740e208c1c6d131fc5112f86b4c

    SHA1

    988c8aa61f61209e351794eee17d791e2da8a9e6

    SHA256

    ed2d081914a4c1216a9861e73fc98056d1262e78cf826d3cea71090af71ae0b3

    SHA512

    6dde7618b9ce4836c9f3ad580faba7e03aa5e34a95b9404f5ae79d31e25af25e1d2404027b13e9a9ad0c1bdc41fa2d7083b8ddbf039e686755705bd776d003c6

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p9252775.exe
    Filesize

    145KB

    MD5

    246e4740e208c1c6d131fc5112f86b4c

    SHA1

    988c8aa61f61209e351794eee17d791e2da8a9e6

    SHA256

    ed2d081914a4c1216a9861e73fc98056d1262e78cf826d3cea71090af71ae0b3

    SHA512

    6dde7618b9ce4836c9f3ad580faba7e03aa5e34a95b9404f5ae79d31e25af25e1d2404027b13e9a9ad0c1bdc41fa2d7083b8ddbf039e686755705bd776d003c6

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p9252775.exe
    Filesize

    145KB

    MD5

    246e4740e208c1c6d131fc5112f86b4c

    SHA1

    988c8aa61f61209e351794eee17d791e2da8a9e6

    SHA256

    ed2d081914a4c1216a9861e73fc98056d1262e78cf826d3cea71090af71ae0b3

    SHA512

    6dde7618b9ce4836c9f3ad580faba7e03aa5e34a95b9404f5ae79d31e25af25e1d2404027b13e9a9ad0c1bdc41fa2d7083b8ddbf039e686755705bd776d003c6

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p9252775.exe
    Filesize

    145KB

    MD5

    246e4740e208c1c6d131fc5112f86b4c

    SHA1

    988c8aa61f61209e351794eee17d791e2da8a9e6

    SHA256

    ed2d081914a4c1216a9861e73fc98056d1262e78cf826d3cea71090af71ae0b3

    SHA512

    6dde7618b9ce4836c9f3ad580faba7e03aa5e34a95b9404f5ae79d31e25af25e1d2404027b13e9a9ad0c1bdc41fa2d7083b8ddbf039e686755705bd776d003c6

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p9252775.exe
    Filesize

    145KB

    MD5

    246e4740e208c1c6d131fc5112f86b4c

    SHA1

    988c8aa61f61209e351794eee17d791e2da8a9e6

    SHA256

    ed2d081914a4c1216a9861e73fc98056d1262e78cf826d3cea71090af71ae0b3

    SHA512

    6dde7618b9ce4836c9f3ad580faba7e03aa5e34a95b9404f5ae79d31e25af25e1d2404027b13e9a9ad0c1bdc41fa2d7083b8ddbf039e686755705bd776d003c6

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p9252775.exe
    Filesize

    145KB

    MD5

    246e4740e208c1c6d131fc5112f86b4c

    SHA1

    988c8aa61f61209e351794eee17d791e2da8a9e6

    SHA256

    ed2d081914a4c1216a9861e73fc98056d1262e78cf826d3cea71090af71ae0b3

    SHA512

    6dde7618b9ce4836c9f3ad580faba7e03aa5e34a95b9404f5ae79d31e25af25e1d2404027b13e9a9ad0c1bdc41fa2d7083b8ddbf039e686755705bd776d003c6

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p9252775.exe
    Filesize

    145KB

    MD5

    246e4740e208c1c6d131fc5112f86b4c

    SHA1

    988c8aa61f61209e351794eee17d791e2da8a9e6

    SHA256

    ed2d081914a4c1216a9861e73fc98056d1262e78cf826d3cea71090af71ae0b3

    SHA512

    6dde7618b9ce4836c9f3ad580faba7e03aa5e34a95b9404f5ae79d31e25af25e1d2404027b13e9a9ad0c1bdc41fa2d7083b8ddbf039e686755705bd776d003c6

  • memory/288-101-0x0000000000B20000-0x0000000000B36000-memory.dmp
    Filesize

    88KB

  • memory/288-117-0x0000000004BE0000-0x0000000004C20000-memory.dmp
    Filesize

    256KB

  • memory/288-103-0x0000000000B20000-0x0000000000B36000-memory.dmp
    Filesize

    88KB

  • memory/288-105-0x0000000000B20000-0x0000000000B36000-memory.dmp
    Filesize

    88KB

  • memory/288-107-0x0000000000B20000-0x0000000000B36000-memory.dmp
    Filesize

    88KB

  • memory/288-109-0x0000000000B20000-0x0000000000B36000-memory.dmp
    Filesize

    88KB

  • memory/288-111-0x0000000000B20000-0x0000000000B36000-memory.dmp
    Filesize

    88KB

  • memory/288-113-0x0000000000B20000-0x0000000000B36000-memory.dmp
    Filesize

    88KB

  • memory/288-114-0x0000000004BE0000-0x0000000004C20000-memory.dmp
    Filesize

    256KB

  • memory/288-115-0x0000000004BE0000-0x0000000004C20000-memory.dmp
    Filesize

    256KB

  • memory/288-116-0x0000000004BE0000-0x0000000004C20000-memory.dmp
    Filesize

    256KB

  • memory/288-99-0x0000000000B20000-0x0000000000B36000-memory.dmp
    Filesize

    88KB

  • memory/288-118-0x0000000004BE0000-0x0000000004C20000-memory.dmp
    Filesize

    256KB

  • memory/288-119-0x0000000004BE0000-0x0000000004C20000-memory.dmp
    Filesize

    256KB

  • memory/288-97-0x0000000000B20000-0x0000000000B36000-memory.dmp
    Filesize

    88KB

  • memory/288-95-0x0000000000B20000-0x0000000000B36000-memory.dmp
    Filesize

    88KB

  • memory/288-93-0x0000000000B20000-0x0000000000B36000-memory.dmp
    Filesize

    88KB

  • memory/288-91-0x0000000000B20000-0x0000000000B36000-memory.dmp
    Filesize

    88KB

  • memory/288-84-0x00000000009F0000-0x0000000000A0E000-memory.dmp
    Filesize

    120KB

  • memory/288-89-0x0000000000B20000-0x0000000000B36000-memory.dmp
    Filesize

    88KB

  • memory/288-87-0x0000000000B20000-0x0000000000B36000-memory.dmp
    Filesize

    88KB

  • memory/288-86-0x0000000000B20000-0x0000000000B36000-memory.dmp
    Filesize

    88KB

  • memory/288-85-0x0000000000B20000-0x0000000000B3C000-memory.dmp
    Filesize

    112KB

  • memory/1792-126-0x0000000000E00000-0x0000000000E2A000-memory.dmp
    Filesize

    168KB