Analysis

  • max time kernel
    28s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    14-05-2023 18:37

General

  • Target

    e29a3d17ce56a890473462e4ba1babb97061fe6f2f41d14db3da72dfe5ddcb8a.exe

  • Size

    1.1MB

  • MD5

    7bcf45b31186e7132db3e9d8c6a21f8a

  • SHA1

    d20f52fd934bbfdd539a0e630ef87e9edc006120

  • SHA256

    e29a3d17ce56a890473462e4ba1babb97061fe6f2f41d14db3da72dfe5ddcb8a

  • SHA512

    0ce9c80f4b257c770c68ed739d8aac39f646fb2ba75b819733e9383a877fd67c061fcf696b8519ba9519bd4bc523d6d3fab10454442a55b71f4a9d895b0c250b

  • SSDEEP

    24576:JyFbGgbFDAs3qjBJe/7M02Vbo10FyGqznFaoOuy:88gtAs6NJeuxogR2R

Malware Config

Extracted

Family

redline

Botnet

luka

C2

185.161.248.75:4132

Attributes
  • auth_value

    44560bcd37d6bf076da309730fdb519a

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e29a3d17ce56a890473462e4ba1babb97061fe6f2f41d14db3da72dfe5ddcb8a.exe
    "C:\Users\Admin\AppData\Local\Temp\e29a3d17ce56a890473462e4ba1babb97061fe6f2f41d14db3da72dfe5ddcb8a.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:856
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7942013.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7942013.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2040
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0137434.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0137434.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:468
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6567434.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6567434.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1656
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1378086.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1378086.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1580
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 644
            5⤵
            • Loads dropped DLL
            • Program crash
            PID:1616

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7942013.exe
    Filesize

    702KB

    MD5

    d6602477b05e8a0e821054f29f12c928

    SHA1

    de077f8d86b286002f434097ac5aaaf95b497b5e

    SHA256

    7b01860a44ba8b3767820c361d1eeb6245fcae2358b369b45dd2cc5b987d403e

    SHA512

    ea2c1465b42eb09534a12dacf9cf99e3b404eaad9138c057a0f3c99237cc7d058dcb0ba260be76cbd2e0698b210b5c4854a8806653c94ec4b8f8e798b8bfeb2b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7942013.exe
    Filesize

    702KB

    MD5

    d6602477b05e8a0e821054f29f12c928

    SHA1

    de077f8d86b286002f434097ac5aaaf95b497b5e

    SHA256

    7b01860a44ba8b3767820c361d1eeb6245fcae2358b369b45dd2cc5b987d403e

    SHA512

    ea2c1465b42eb09534a12dacf9cf99e3b404eaad9138c057a0f3c99237cc7d058dcb0ba260be76cbd2e0698b210b5c4854a8806653c94ec4b8f8e798b8bfeb2b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0137434.exe
    Filesize

    306KB

    MD5

    10fae6fe9ded1549fb65050d63479c3e

    SHA1

    fa885492efa1d9e687a04b991933233b060d681e

    SHA256

    87a45cc16ae553130b9f1feaa593255fb145e2285c5c963078ee22093e4c8eff

    SHA512

    48402e0b768be66d976cbbb9fb94bd50e11788f18dd4b724e18b63ff34bc108dedff2c0434bf832d1b1459eef1fd4c48d0039f2f84e4b5f9d655fc9943ace20f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0137434.exe
    Filesize

    306KB

    MD5

    10fae6fe9ded1549fb65050d63479c3e

    SHA1

    fa885492efa1d9e687a04b991933233b060d681e

    SHA256

    87a45cc16ae553130b9f1feaa593255fb145e2285c5c963078ee22093e4c8eff

    SHA512

    48402e0b768be66d976cbbb9fb94bd50e11788f18dd4b724e18b63ff34bc108dedff2c0434bf832d1b1459eef1fd4c48d0039f2f84e4b5f9d655fc9943ace20f

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6567434.exe
    Filesize

    185KB

    MD5

    ba351d811f2bfd0748b25f5d04c414ee

    SHA1

    6afc2cb2f34079d4a3a1c0b8dac20683a0b9b2f3

    SHA256

    66ce9a27b8963130541be5e06458ea901f1b2379a69e361c3535deeb6ced2c84

    SHA512

    92add8466e47b9e49901024ebcaf5a27e700882fc17a6bd71a537e0251b5cad082f9abf73e72cd1c710acbd1f2a75dedd3785c8372d612b7afeb00e9fc451f66

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6567434.exe
    Filesize

    185KB

    MD5

    ba351d811f2bfd0748b25f5d04c414ee

    SHA1

    6afc2cb2f34079d4a3a1c0b8dac20683a0b9b2f3

    SHA256

    66ce9a27b8963130541be5e06458ea901f1b2379a69e361c3535deeb6ced2c84

    SHA512

    92add8466e47b9e49901024ebcaf5a27e700882fc17a6bd71a537e0251b5cad082f9abf73e72cd1c710acbd1f2a75dedd3785c8372d612b7afeb00e9fc451f66

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1378086.exe
    Filesize

    145KB

    MD5

    b05d5bb927f512590b1b645c222fab71

    SHA1

    bf1544e9aa35ee6ac00c8cd5f2a865a93d228ab7

    SHA256

    8c453b9a19fab3fcb536b9a056787b706ba961c0ca4c74cf7c50983e5a6f4a9d

    SHA512

    6143f2ac3c0cae09df35abe3aad703b2159e8eb4a2a48fe98a555d6e3fb0496f57ed2d05a0cbfec57a709e43f08f6178441f7ea9dc1bc49a6662845d31785e7e

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1378086.exe
    Filesize

    145KB

    MD5

    b05d5bb927f512590b1b645c222fab71

    SHA1

    bf1544e9aa35ee6ac00c8cd5f2a865a93d228ab7

    SHA256

    8c453b9a19fab3fcb536b9a056787b706ba961c0ca4c74cf7c50983e5a6f4a9d

    SHA512

    6143f2ac3c0cae09df35abe3aad703b2159e8eb4a2a48fe98a555d6e3fb0496f57ed2d05a0cbfec57a709e43f08f6178441f7ea9dc1bc49a6662845d31785e7e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z7942013.exe
    Filesize

    702KB

    MD5

    d6602477b05e8a0e821054f29f12c928

    SHA1

    de077f8d86b286002f434097ac5aaaf95b497b5e

    SHA256

    7b01860a44ba8b3767820c361d1eeb6245fcae2358b369b45dd2cc5b987d403e

    SHA512

    ea2c1465b42eb09534a12dacf9cf99e3b404eaad9138c057a0f3c99237cc7d058dcb0ba260be76cbd2e0698b210b5c4854a8806653c94ec4b8f8e798b8bfeb2b

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z7942013.exe
    Filesize

    702KB

    MD5

    d6602477b05e8a0e821054f29f12c928

    SHA1

    de077f8d86b286002f434097ac5aaaf95b497b5e

    SHA256

    7b01860a44ba8b3767820c361d1eeb6245fcae2358b369b45dd2cc5b987d403e

    SHA512

    ea2c1465b42eb09534a12dacf9cf99e3b404eaad9138c057a0f3c99237cc7d058dcb0ba260be76cbd2e0698b210b5c4854a8806653c94ec4b8f8e798b8bfeb2b

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z0137434.exe
    Filesize

    306KB

    MD5

    10fae6fe9ded1549fb65050d63479c3e

    SHA1

    fa885492efa1d9e687a04b991933233b060d681e

    SHA256

    87a45cc16ae553130b9f1feaa593255fb145e2285c5c963078ee22093e4c8eff

    SHA512

    48402e0b768be66d976cbbb9fb94bd50e11788f18dd4b724e18b63ff34bc108dedff2c0434bf832d1b1459eef1fd4c48d0039f2f84e4b5f9d655fc9943ace20f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z0137434.exe
    Filesize

    306KB

    MD5

    10fae6fe9ded1549fb65050d63479c3e

    SHA1

    fa885492efa1d9e687a04b991933233b060d681e

    SHA256

    87a45cc16ae553130b9f1feaa593255fb145e2285c5c963078ee22093e4c8eff

    SHA512

    48402e0b768be66d976cbbb9fb94bd50e11788f18dd4b724e18b63ff34bc108dedff2c0434bf832d1b1459eef1fd4c48d0039f2f84e4b5f9d655fc9943ace20f

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\o6567434.exe
    Filesize

    185KB

    MD5

    ba351d811f2bfd0748b25f5d04c414ee

    SHA1

    6afc2cb2f34079d4a3a1c0b8dac20683a0b9b2f3

    SHA256

    66ce9a27b8963130541be5e06458ea901f1b2379a69e361c3535deeb6ced2c84

    SHA512

    92add8466e47b9e49901024ebcaf5a27e700882fc17a6bd71a537e0251b5cad082f9abf73e72cd1c710acbd1f2a75dedd3785c8372d612b7afeb00e9fc451f66

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\o6567434.exe
    Filesize

    185KB

    MD5

    ba351d811f2bfd0748b25f5d04c414ee

    SHA1

    6afc2cb2f34079d4a3a1c0b8dac20683a0b9b2f3

    SHA256

    66ce9a27b8963130541be5e06458ea901f1b2379a69e361c3535deeb6ced2c84

    SHA512

    92add8466e47b9e49901024ebcaf5a27e700882fc17a6bd71a537e0251b5cad082f9abf73e72cd1c710acbd1f2a75dedd3785c8372d612b7afeb00e9fc451f66

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p1378086.exe
    Filesize

    145KB

    MD5

    b05d5bb927f512590b1b645c222fab71

    SHA1

    bf1544e9aa35ee6ac00c8cd5f2a865a93d228ab7

    SHA256

    8c453b9a19fab3fcb536b9a056787b706ba961c0ca4c74cf7c50983e5a6f4a9d

    SHA512

    6143f2ac3c0cae09df35abe3aad703b2159e8eb4a2a48fe98a555d6e3fb0496f57ed2d05a0cbfec57a709e43f08f6178441f7ea9dc1bc49a6662845d31785e7e

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p1378086.exe
    Filesize

    145KB

    MD5

    b05d5bb927f512590b1b645c222fab71

    SHA1

    bf1544e9aa35ee6ac00c8cd5f2a865a93d228ab7

    SHA256

    8c453b9a19fab3fcb536b9a056787b706ba961c0ca4c74cf7c50983e5a6f4a9d

    SHA512

    6143f2ac3c0cae09df35abe3aad703b2159e8eb4a2a48fe98a555d6e3fb0496f57ed2d05a0cbfec57a709e43f08f6178441f7ea9dc1bc49a6662845d31785e7e

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p1378086.exe
    Filesize

    145KB

    MD5

    b05d5bb927f512590b1b645c222fab71

    SHA1

    bf1544e9aa35ee6ac00c8cd5f2a865a93d228ab7

    SHA256

    8c453b9a19fab3fcb536b9a056787b706ba961c0ca4c74cf7c50983e5a6f4a9d

    SHA512

    6143f2ac3c0cae09df35abe3aad703b2159e8eb4a2a48fe98a555d6e3fb0496f57ed2d05a0cbfec57a709e43f08f6178441f7ea9dc1bc49a6662845d31785e7e

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p1378086.exe
    Filesize

    145KB

    MD5

    b05d5bb927f512590b1b645c222fab71

    SHA1

    bf1544e9aa35ee6ac00c8cd5f2a865a93d228ab7

    SHA256

    8c453b9a19fab3fcb536b9a056787b706ba961c0ca4c74cf7c50983e5a6f4a9d

    SHA512

    6143f2ac3c0cae09df35abe3aad703b2159e8eb4a2a48fe98a555d6e3fb0496f57ed2d05a0cbfec57a709e43f08f6178441f7ea9dc1bc49a6662845d31785e7e

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p1378086.exe
    Filesize

    145KB

    MD5

    b05d5bb927f512590b1b645c222fab71

    SHA1

    bf1544e9aa35ee6ac00c8cd5f2a865a93d228ab7

    SHA256

    8c453b9a19fab3fcb536b9a056787b706ba961c0ca4c74cf7c50983e5a6f4a9d

    SHA512

    6143f2ac3c0cae09df35abe3aad703b2159e8eb4a2a48fe98a555d6e3fb0496f57ed2d05a0cbfec57a709e43f08f6178441f7ea9dc1bc49a6662845d31785e7e

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p1378086.exe
    Filesize

    145KB

    MD5

    b05d5bb927f512590b1b645c222fab71

    SHA1

    bf1544e9aa35ee6ac00c8cd5f2a865a93d228ab7

    SHA256

    8c453b9a19fab3fcb536b9a056787b706ba961c0ca4c74cf7c50983e5a6f4a9d

    SHA512

    6143f2ac3c0cae09df35abe3aad703b2159e8eb4a2a48fe98a555d6e3fb0496f57ed2d05a0cbfec57a709e43f08f6178441f7ea9dc1bc49a6662845d31785e7e

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p1378086.exe
    Filesize

    145KB

    MD5

    b05d5bb927f512590b1b645c222fab71

    SHA1

    bf1544e9aa35ee6ac00c8cd5f2a865a93d228ab7

    SHA256

    8c453b9a19fab3fcb536b9a056787b706ba961c0ca4c74cf7c50983e5a6f4a9d

    SHA512

    6143f2ac3c0cae09df35abe3aad703b2159e8eb4a2a48fe98a555d6e3fb0496f57ed2d05a0cbfec57a709e43f08f6178441f7ea9dc1bc49a6662845d31785e7e

  • memory/1580-122-0x0000000000C10000-0x0000000000C3A000-memory.dmp
    Filesize

    168KB

  • memory/1656-95-0x0000000000560000-0x0000000000576000-memory.dmp
    Filesize

    88KB

  • memory/1656-101-0x0000000000560000-0x0000000000576000-memory.dmp
    Filesize

    88KB

  • memory/1656-103-0x0000000000560000-0x0000000000576000-memory.dmp
    Filesize

    88KB

  • memory/1656-105-0x0000000000560000-0x0000000000576000-memory.dmp
    Filesize

    88KB

  • memory/1656-107-0x0000000000560000-0x0000000000576000-memory.dmp
    Filesize

    88KB

  • memory/1656-109-0x0000000000560000-0x0000000000576000-memory.dmp
    Filesize

    88KB

  • memory/1656-111-0x0000000000560000-0x0000000000576000-memory.dmp
    Filesize

    88KB

  • memory/1656-113-0x0000000000560000-0x0000000000576000-memory.dmp
    Filesize

    88KB

  • memory/1656-115-0x0000000000560000-0x0000000000576000-memory.dmp
    Filesize

    88KB

  • memory/1656-99-0x0000000000560000-0x0000000000576000-memory.dmp
    Filesize

    88KB

  • memory/1656-97-0x0000000000560000-0x0000000000576000-memory.dmp
    Filesize

    88KB

  • memory/1656-93-0x0000000000560000-0x0000000000576000-memory.dmp
    Filesize

    88KB

  • memory/1656-91-0x0000000000560000-0x0000000000576000-memory.dmp
    Filesize

    88KB

  • memory/1656-89-0x0000000000560000-0x0000000000576000-memory.dmp
    Filesize

    88KB

  • memory/1656-88-0x0000000000560000-0x0000000000576000-memory.dmp
    Filesize

    88KB

  • memory/1656-87-0x0000000000560000-0x000000000057C000-memory.dmp
    Filesize

    112KB

  • memory/1656-86-0x0000000002090000-0x00000000020D0000-memory.dmp
    Filesize

    256KB

  • memory/1656-85-0x0000000002090000-0x00000000020D0000-memory.dmp
    Filesize

    256KB

  • memory/1656-84-0x00000000003D0000-0x00000000003EE000-memory.dmp
    Filesize

    120KB