Analysis

  • max time kernel
    30s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    14-05-2023 18:37

General

  • Target

    e2ced1a635687dbe9b4ba8643db8c072696b952bc51310dc1e33b776b5651233.exe

  • Size

    1.1MB

  • MD5

    1e0c9e5dd6a5c13d85209d4d4e98009c

  • SHA1

    6a36c21d9c9ab10bebafb95bbb36086a356bc933

  • SHA256

    e2ced1a635687dbe9b4ba8643db8c072696b952bc51310dc1e33b776b5651233

  • SHA512

    66e02590a2c31d345f46f9f203434493f58479faa5976f3375f254528a5bc6a31808d1f36394fcec460beaa80bddf9fc0c3f844a270c56db73d823f4fe4cc77d

  • SSDEEP

    24576:kySld+4OKwmL5LjugeaHJqbUXz5MIDa5Bp3HhYFOtA:zS6tK/vRe6j55apHmg

Malware Config

Extracted

Family

redline

Botnet

luka

C2

185.161.248.75:4132

Attributes
  • auth_value

    44560bcd37d6bf076da309730fdb519a

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e2ced1a635687dbe9b4ba8643db8c072696b952bc51310dc1e33b776b5651233.exe
    "C:\Users\Admin\AppData\Local\Temp\e2ced1a635687dbe9b4ba8643db8c072696b952bc51310dc1e33b776b5651233.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1316
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4897689.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4897689.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:924
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4997984.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4997984.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:592
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o7766849.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o7766849.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1036
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p6853758.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p6853758.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1652
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1652 -s 640
            5⤵
            • Loads dropped DLL
            • Program crash
            PID:1820

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4897689.exe
    Filesize

    703KB

    MD5

    dd818ae2ec2d7cde441beb815aed8a00

    SHA1

    0fff0aa6f8296a7fbcc8522075eec06192fb7566

    SHA256

    ef6e0afe9296203755ace46f84c63ae3ca97f72c6f48fd708f8a036a81b8a69b

    SHA512

    b6b1be77e045f9c506f0a65a9b74ac2c9b1334c358a57b7007b8424504acd2dd7a1a4f6559695527c8447e71cca0864764abe82dc5f74f173943f47034a13818

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4897689.exe
    Filesize

    703KB

    MD5

    dd818ae2ec2d7cde441beb815aed8a00

    SHA1

    0fff0aa6f8296a7fbcc8522075eec06192fb7566

    SHA256

    ef6e0afe9296203755ace46f84c63ae3ca97f72c6f48fd708f8a036a81b8a69b

    SHA512

    b6b1be77e045f9c506f0a65a9b74ac2c9b1334c358a57b7007b8424504acd2dd7a1a4f6559695527c8447e71cca0864764abe82dc5f74f173943f47034a13818

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4997984.exe
    Filesize

    306KB

    MD5

    ddd589896629e36605435dceac21a3fe

    SHA1

    e7cbd601cf1dacab44c753074aed5c46d71b53ef

    SHA256

    71974bdea8f01b5d82a0bd8540a267b0d993592fb9c71dcaff4f91d64e5cd5d3

    SHA512

    884c55452cbcdf10af4cca35a9514c4ded6edd944b75f06f83bc1a60527b814968a7eb1e376f2217b114ee8e20edc39d609a99925f4d660acf067f1930b7b428

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4997984.exe
    Filesize

    306KB

    MD5

    ddd589896629e36605435dceac21a3fe

    SHA1

    e7cbd601cf1dacab44c753074aed5c46d71b53ef

    SHA256

    71974bdea8f01b5d82a0bd8540a267b0d993592fb9c71dcaff4f91d64e5cd5d3

    SHA512

    884c55452cbcdf10af4cca35a9514c4ded6edd944b75f06f83bc1a60527b814968a7eb1e376f2217b114ee8e20edc39d609a99925f4d660acf067f1930b7b428

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o7766849.exe
    Filesize

    185KB

    MD5

    6ed68cce4dbebe52293330a5ad9af0ba

    SHA1

    bfb27e0840078dcb622d52975469ecdb7558e6fe

    SHA256

    d73db932dbbe908d9b25d86a026157f253982a375e5ab1dfba2074807e51fb48

    SHA512

    58bf44f3e6715ad6d3e266a318263acf3eb6fd49530263a597ad821b47a5e58ed6d67a823209bfe9a4cfbfe0069d0e9b51c410684ecef5adcf874bba34d02841

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o7766849.exe
    Filesize

    185KB

    MD5

    6ed68cce4dbebe52293330a5ad9af0ba

    SHA1

    bfb27e0840078dcb622d52975469ecdb7558e6fe

    SHA256

    d73db932dbbe908d9b25d86a026157f253982a375e5ab1dfba2074807e51fb48

    SHA512

    58bf44f3e6715ad6d3e266a318263acf3eb6fd49530263a597ad821b47a5e58ed6d67a823209bfe9a4cfbfe0069d0e9b51c410684ecef5adcf874bba34d02841

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p6853758.exe
    Filesize

    145KB

    MD5

    5c9c5ef8612608e256f965fa017d1635

    SHA1

    01a5951a3d4c7e2f4e1c24693327331d88e4eb65

    SHA256

    ff087905b4f5eb84ae1cb9713c4a1400f569c597b5c818194ab714266fb50cd8

    SHA512

    5357103a62c942cd54e37835e8294b601942bbadcaa63f34b8ee4faea80df1b7a52da0cd90e027b94ec8a55276fa37321c84ecd77a9d5cd9ed1e1f50daefd7aa

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p6853758.exe
    Filesize

    145KB

    MD5

    5c9c5ef8612608e256f965fa017d1635

    SHA1

    01a5951a3d4c7e2f4e1c24693327331d88e4eb65

    SHA256

    ff087905b4f5eb84ae1cb9713c4a1400f569c597b5c818194ab714266fb50cd8

    SHA512

    5357103a62c942cd54e37835e8294b601942bbadcaa63f34b8ee4faea80df1b7a52da0cd90e027b94ec8a55276fa37321c84ecd77a9d5cd9ed1e1f50daefd7aa

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z4897689.exe
    Filesize

    703KB

    MD5

    dd818ae2ec2d7cde441beb815aed8a00

    SHA1

    0fff0aa6f8296a7fbcc8522075eec06192fb7566

    SHA256

    ef6e0afe9296203755ace46f84c63ae3ca97f72c6f48fd708f8a036a81b8a69b

    SHA512

    b6b1be77e045f9c506f0a65a9b74ac2c9b1334c358a57b7007b8424504acd2dd7a1a4f6559695527c8447e71cca0864764abe82dc5f74f173943f47034a13818

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z4897689.exe
    Filesize

    703KB

    MD5

    dd818ae2ec2d7cde441beb815aed8a00

    SHA1

    0fff0aa6f8296a7fbcc8522075eec06192fb7566

    SHA256

    ef6e0afe9296203755ace46f84c63ae3ca97f72c6f48fd708f8a036a81b8a69b

    SHA512

    b6b1be77e045f9c506f0a65a9b74ac2c9b1334c358a57b7007b8424504acd2dd7a1a4f6559695527c8447e71cca0864764abe82dc5f74f173943f47034a13818

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z4997984.exe
    Filesize

    306KB

    MD5

    ddd589896629e36605435dceac21a3fe

    SHA1

    e7cbd601cf1dacab44c753074aed5c46d71b53ef

    SHA256

    71974bdea8f01b5d82a0bd8540a267b0d993592fb9c71dcaff4f91d64e5cd5d3

    SHA512

    884c55452cbcdf10af4cca35a9514c4ded6edd944b75f06f83bc1a60527b814968a7eb1e376f2217b114ee8e20edc39d609a99925f4d660acf067f1930b7b428

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z4997984.exe
    Filesize

    306KB

    MD5

    ddd589896629e36605435dceac21a3fe

    SHA1

    e7cbd601cf1dacab44c753074aed5c46d71b53ef

    SHA256

    71974bdea8f01b5d82a0bd8540a267b0d993592fb9c71dcaff4f91d64e5cd5d3

    SHA512

    884c55452cbcdf10af4cca35a9514c4ded6edd944b75f06f83bc1a60527b814968a7eb1e376f2217b114ee8e20edc39d609a99925f4d660acf067f1930b7b428

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\o7766849.exe
    Filesize

    185KB

    MD5

    6ed68cce4dbebe52293330a5ad9af0ba

    SHA1

    bfb27e0840078dcb622d52975469ecdb7558e6fe

    SHA256

    d73db932dbbe908d9b25d86a026157f253982a375e5ab1dfba2074807e51fb48

    SHA512

    58bf44f3e6715ad6d3e266a318263acf3eb6fd49530263a597ad821b47a5e58ed6d67a823209bfe9a4cfbfe0069d0e9b51c410684ecef5adcf874bba34d02841

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\o7766849.exe
    Filesize

    185KB

    MD5

    6ed68cce4dbebe52293330a5ad9af0ba

    SHA1

    bfb27e0840078dcb622d52975469ecdb7558e6fe

    SHA256

    d73db932dbbe908d9b25d86a026157f253982a375e5ab1dfba2074807e51fb48

    SHA512

    58bf44f3e6715ad6d3e266a318263acf3eb6fd49530263a597ad821b47a5e58ed6d67a823209bfe9a4cfbfe0069d0e9b51c410684ecef5adcf874bba34d02841

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p6853758.exe
    Filesize

    145KB

    MD5

    5c9c5ef8612608e256f965fa017d1635

    SHA1

    01a5951a3d4c7e2f4e1c24693327331d88e4eb65

    SHA256

    ff087905b4f5eb84ae1cb9713c4a1400f569c597b5c818194ab714266fb50cd8

    SHA512

    5357103a62c942cd54e37835e8294b601942bbadcaa63f34b8ee4faea80df1b7a52da0cd90e027b94ec8a55276fa37321c84ecd77a9d5cd9ed1e1f50daefd7aa

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p6853758.exe
    Filesize

    145KB

    MD5

    5c9c5ef8612608e256f965fa017d1635

    SHA1

    01a5951a3d4c7e2f4e1c24693327331d88e4eb65

    SHA256

    ff087905b4f5eb84ae1cb9713c4a1400f569c597b5c818194ab714266fb50cd8

    SHA512

    5357103a62c942cd54e37835e8294b601942bbadcaa63f34b8ee4faea80df1b7a52da0cd90e027b94ec8a55276fa37321c84ecd77a9d5cd9ed1e1f50daefd7aa

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p6853758.exe
    Filesize

    145KB

    MD5

    5c9c5ef8612608e256f965fa017d1635

    SHA1

    01a5951a3d4c7e2f4e1c24693327331d88e4eb65

    SHA256

    ff087905b4f5eb84ae1cb9713c4a1400f569c597b5c818194ab714266fb50cd8

    SHA512

    5357103a62c942cd54e37835e8294b601942bbadcaa63f34b8ee4faea80df1b7a52da0cd90e027b94ec8a55276fa37321c84ecd77a9d5cd9ed1e1f50daefd7aa

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p6853758.exe
    Filesize

    145KB

    MD5

    5c9c5ef8612608e256f965fa017d1635

    SHA1

    01a5951a3d4c7e2f4e1c24693327331d88e4eb65

    SHA256

    ff087905b4f5eb84ae1cb9713c4a1400f569c597b5c818194ab714266fb50cd8

    SHA512

    5357103a62c942cd54e37835e8294b601942bbadcaa63f34b8ee4faea80df1b7a52da0cd90e027b94ec8a55276fa37321c84ecd77a9d5cd9ed1e1f50daefd7aa

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p6853758.exe
    Filesize

    145KB

    MD5

    5c9c5ef8612608e256f965fa017d1635

    SHA1

    01a5951a3d4c7e2f4e1c24693327331d88e4eb65

    SHA256

    ff087905b4f5eb84ae1cb9713c4a1400f569c597b5c818194ab714266fb50cd8

    SHA512

    5357103a62c942cd54e37835e8294b601942bbadcaa63f34b8ee4faea80df1b7a52da0cd90e027b94ec8a55276fa37321c84ecd77a9d5cd9ed1e1f50daefd7aa

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p6853758.exe
    Filesize

    145KB

    MD5

    5c9c5ef8612608e256f965fa017d1635

    SHA1

    01a5951a3d4c7e2f4e1c24693327331d88e4eb65

    SHA256

    ff087905b4f5eb84ae1cb9713c4a1400f569c597b5c818194ab714266fb50cd8

    SHA512

    5357103a62c942cd54e37835e8294b601942bbadcaa63f34b8ee4faea80df1b7a52da0cd90e027b94ec8a55276fa37321c84ecd77a9d5cd9ed1e1f50daefd7aa

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p6853758.exe
    Filesize

    145KB

    MD5

    5c9c5ef8612608e256f965fa017d1635

    SHA1

    01a5951a3d4c7e2f4e1c24693327331d88e4eb65

    SHA256

    ff087905b4f5eb84ae1cb9713c4a1400f569c597b5c818194ab714266fb50cd8

    SHA512

    5357103a62c942cd54e37835e8294b601942bbadcaa63f34b8ee4faea80df1b7a52da0cd90e027b94ec8a55276fa37321c84ecd77a9d5cd9ed1e1f50daefd7aa

  • memory/1036-97-0x0000000002140000-0x0000000002156000-memory.dmp
    Filesize

    88KB

  • memory/1036-99-0x0000000002140000-0x0000000002156000-memory.dmp
    Filesize

    88KB

  • memory/1036-103-0x0000000002140000-0x0000000002156000-memory.dmp
    Filesize

    88KB

  • memory/1036-105-0x0000000002140000-0x0000000002156000-memory.dmp
    Filesize

    88KB

  • memory/1036-107-0x0000000002140000-0x0000000002156000-memory.dmp
    Filesize

    88KB

  • memory/1036-109-0x0000000002140000-0x0000000002156000-memory.dmp
    Filesize

    88KB

  • memory/1036-111-0x0000000002140000-0x0000000002156000-memory.dmp
    Filesize

    88KB

  • memory/1036-113-0x0000000002140000-0x0000000002156000-memory.dmp
    Filesize

    88KB

  • memory/1036-114-0x0000000004A50000-0x0000000004A90000-memory.dmp
    Filesize

    256KB

  • memory/1036-115-0x0000000004A50000-0x0000000004A90000-memory.dmp
    Filesize

    256KB

  • memory/1036-116-0x0000000004A50000-0x0000000004A90000-memory.dmp
    Filesize

    256KB

  • memory/1036-101-0x0000000002140000-0x0000000002156000-memory.dmp
    Filesize

    88KB

  • memory/1036-95-0x0000000002140000-0x0000000002156000-memory.dmp
    Filesize

    88KB

  • memory/1036-91-0x0000000002140000-0x0000000002156000-memory.dmp
    Filesize

    88KB

  • memory/1036-93-0x0000000002140000-0x0000000002156000-memory.dmp
    Filesize

    88KB

  • memory/1036-84-0x00000000008F0000-0x000000000090E000-memory.dmp
    Filesize

    120KB

  • memory/1036-89-0x0000000002140000-0x0000000002156000-memory.dmp
    Filesize

    88KB

  • memory/1036-87-0x0000000002140000-0x0000000002156000-memory.dmp
    Filesize

    88KB

  • memory/1036-86-0x0000000002140000-0x0000000002156000-memory.dmp
    Filesize

    88KB

  • memory/1036-85-0x0000000002140000-0x000000000215C000-memory.dmp
    Filesize

    112KB

  • memory/1652-123-0x00000000010C0000-0x00000000010EA000-memory.dmp
    Filesize

    168KB