Analysis

  • max time kernel
    29s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    14-05-2023 18:38

General

  • Target

    f00cd3aff66b1999ab706c5dc67a1f22d402be0a5447c147167cb087c67dd0e1.exe

  • Size

    1.1MB

  • MD5

    6b9aa9dd0245287bbd0998420529eeac

  • SHA1

    cb21c6c32a451c30ebf57fbec8e4e972b650dba9

  • SHA256

    f00cd3aff66b1999ab706c5dc67a1f22d402be0a5447c147167cb087c67dd0e1

  • SHA512

    4f4da5ce23ef3f90a10364bca151bc56fef2cc5d3d18b8d3d0b5081292f7901870df4753b971af31e648ca00806f2b39912476822a9ec2fc6d1b5db70308dd56

  • SSDEEP

    24576:QyBqndfjUBk6rw48xJySLOgSn1RhKDHpPb+oLFHnELSDd+z:XBqduEPXjL3S1HKdj++VniG

Malware Config

Extracted

Family

redline

Botnet

luka

C2

185.161.248.75:4132

Attributes
  • auth_value

    44560bcd37d6bf076da309730fdb519a

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f00cd3aff66b1999ab706c5dc67a1f22d402be0a5447c147167cb087c67dd0e1.exe
    "C:\Users\Admin\AppData\Local\Temp\f00cd3aff66b1999ab706c5dc67a1f22d402be0a5447c147167cb087c67dd0e1.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7389899.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7389899.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2012
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3763547.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3763547.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1832
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o3430406.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o3430406.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1028
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p0521808.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p0521808.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:976
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 976 -s 640
            5⤵
            • Loads dropped DLL
            • Program crash
            PID:1060

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7389899.exe
    Filesize

    702KB

    MD5

    44422133d89bedce6d34037190220e60

    SHA1

    c29dd791342d24f5f4ffe491b3161a3e9ca062c6

    SHA256

    29cecffa0c6e1f1ed80e2859a6e1f9c0216f1d5930e2588ad4b04db61a3319b1

    SHA512

    020d5d4f815ca30d4f984701abecda78dddf262a5cf51c65a6893ab5c0bece7825be1851bfeaac0e2e5219928d05634ce8248b2d331b375c974a33120de4c6a4

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7389899.exe
    Filesize

    702KB

    MD5

    44422133d89bedce6d34037190220e60

    SHA1

    c29dd791342d24f5f4ffe491b3161a3e9ca062c6

    SHA256

    29cecffa0c6e1f1ed80e2859a6e1f9c0216f1d5930e2588ad4b04db61a3319b1

    SHA512

    020d5d4f815ca30d4f984701abecda78dddf262a5cf51c65a6893ab5c0bece7825be1851bfeaac0e2e5219928d05634ce8248b2d331b375c974a33120de4c6a4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3763547.exe
    Filesize

    306KB

    MD5

    24654d993b29b1426053671c8d36985e

    SHA1

    c6345b1e4f7656d9d44701d998244e5f0e507c86

    SHA256

    069d14a2e6f9c47cea1fe621fe76c9364ddb5ae11b7033c79cded031a1ef6942

    SHA512

    73dd5cb7fa3e58cd185d5ae2eb0174d47788e98f67b676bb70b922f6e1e429b09c7009a9765923ec8b470a355b77a5aba517817b0e2f0f4a31f1261fb410d2d3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3763547.exe
    Filesize

    306KB

    MD5

    24654d993b29b1426053671c8d36985e

    SHA1

    c6345b1e4f7656d9d44701d998244e5f0e507c86

    SHA256

    069d14a2e6f9c47cea1fe621fe76c9364ddb5ae11b7033c79cded031a1ef6942

    SHA512

    73dd5cb7fa3e58cd185d5ae2eb0174d47788e98f67b676bb70b922f6e1e429b09c7009a9765923ec8b470a355b77a5aba517817b0e2f0f4a31f1261fb410d2d3

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o3430406.exe
    Filesize

    185KB

    MD5

    68708af6e7664100caaada0b197fa18c

    SHA1

    a0a472738d34ba210440492595fc9e693a996b62

    SHA256

    ecbf0938c65bc6bb53d2e8274c5ed2b735606c1f72adbfb2e2c5ac52042ae27d

    SHA512

    a8a44d50c5d10306837462bae25b8db6231f48ad8894bb386036c56fdb3de5e8122a65914c918804d5af93b8042f652de5eeb9b6d1bb855a4f0736e6d0009e11

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o3430406.exe
    Filesize

    185KB

    MD5

    68708af6e7664100caaada0b197fa18c

    SHA1

    a0a472738d34ba210440492595fc9e693a996b62

    SHA256

    ecbf0938c65bc6bb53d2e8274c5ed2b735606c1f72adbfb2e2c5ac52042ae27d

    SHA512

    a8a44d50c5d10306837462bae25b8db6231f48ad8894bb386036c56fdb3de5e8122a65914c918804d5af93b8042f652de5eeb9b6d1bb855a4f0736e6d0009e11

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p0521808.exe
    Filesize

    145KB

    MD5

    ab5c7940ebe1d2abd9f652d21c7f5441

    SHA1

    2af701d8f362152bcbed848af3ad5c7333e22e57

    SHA256

    6ec2eea95050e99353000ff69b8b587fe87d4e93b948144843f05d729f700aa9

    SHA512

    1da416cdf91f61fd8f74ab6daababfb0f02381460196e4975c08c96a701923b333a66fc10d56ed18ba44628551e31ec96bf5711686f2a0509550b7039c74dc7a

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p0521808.exe
    Filesize

    145KB

    MD5

    ab5c7940ebe1d2abd9f652d21c7f5441

    SHA1

    2af701d8f362152bcbed848af3ad5c7333e22e57

    SHA256

    6ec2eea95050e99353000ff69b8b587fe87d4e93b948144843f05d729f700aa9

    SHA512

    1da416cdf91f61fd8f74ab6daababfb0f02381460196e4975c08c96a701923b333a66fc10d56ed18ba44628551e31ec96bf5711686f2a0509550b7039c74dc7a

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z7389899.exe
    Filesize

    702KB

    MD5

    44422133d89bedce6d34037190220e60

    SHA1

    c29dd791342d24f5f4ffe491b3161a3e9ca062c6

    SHA256

    29cecffa0c6e1f1ed80e2859a6e1f9c0216f1d5930e2588ad4b04db61a3319b1

    SHA512

    020d5d4f815ca30d4f984701abecda78dddf262a5cf51c65a6893ab5c0bece7825be1851bfeaac0e2e5219928d05634ce8248b2d331b375c974a33120de4c6a4

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z7389899.exe
    Filesize

    702KB

    MD5

    44422133d89bedce6d34037190220e60

    SHA1

    c29dd791342d24f5f4ffe491b3161a3e9ca062c6

    SHA256

    29cecffa0c6e1f1ed80e2859a6e1f9c0216f1d5930e2588ad4b04db61a3319b1

    SHA512

    020d5d4f815ca30d4f984701abecda78dddf262a5cf51c65a6893ab5c0bece7825be1851bfeaac0e2e5219928d05634ce8248b2d331b375c974a33120de4c6a4

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z3763547.exe
    Filesize

    306KB

    MD5

    24654d993b29b1426053671c8d36985e

    SHA1

    c6345b1e4f7656d9d44701d998244e5f0e507c86

    SHA256

    069d14a2e6f9c47cea1fe621fe76c9364ddb5ae11b7033c79cded031a1ef6942

    SHA512

    73dd5cb7fa3e58cd185d5ae2eb0174d47788e98f67b676bb70b922f6e1e429b09c7009a9765923ec8b470a355b77a5aba517817b0e2f0f4a31f1261fb410d2d3

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z3763547.exe
    Filesize

    306KB

    MD5

    24654d993b29b1426053671c8d36985e

    SHA1

    c6345b1e4f7656d9d44701d998244e5f0e507c86

    SHA256

    069d14a2e6f9c47cea1fe621fe76c9364ddb5ae11b7033c79cded031a1ef6942

    SHA512

    73dd5cb7fa3e58cd185d5ae2eb0174d47788e98f67b676bb70b922f6e1e429b09c7009a9765923ec8b470a355b77a5aba517817b0e2f0f4a31f1261fb410d2d3

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\o3430406.exe
    Filesize

    185KB

    MD5

    68708af6e7664100caaada0b197fa18c

    SHA1

    a0a472738d34ba210440492595fc9e693a996b62

    SHA256

    ecbf0938c65bc6bb53d2e8274c5ed2b735606c1f72adbfb2e2c5ac52042ae27d

    SHA512

    a8a44d50c5d10306837462bae25b8db6231f48ad8894bb386036c56fdb3de5e8122a65914c918804d5af93b8042f652de5eeb9b6d1bb855a4f0736e6d0009e11

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\o3430406.exe
    Filesize

    185KB

    MD5

    68708af6e7664100caaada0b197fa18c

    SHA1

    a0a472738d34ba210440492595fc9e693a996b62

    SHA256

    ecbf0938c65bc6bb53d2e8274c5ed2b735606c1f72adbfb2e2c5ac52042ae27d

    SHA512

    a8a44d50c5d10306837462bae25b8db6231f48ad8894bb386036c56fdb3de5e8122a65914c918804d5af93b8042f652de5eeb9b6d1bb855a4f0736e6d0009e11

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p0521808.exe
    Filesize

    145KB

    MD5

    ab5c7940ebe1d2abd9f652d21c7f5441

    SHA1

    2af701d8f362152bcbed848af3ad5c7333e22e57

    SHA256

    6ec2eea95050e99353000ff69b8b587fe87d4e93b948144843f05d729f700aa9

    SHA512

    1da416cdf91f61fd8f74ab6daababfb0f02381460196e4975c08c96a701923b333a66fc10d56ed18ba44628551e31ec96bf5711686f2a0509550b7039c74dc7a

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p0521808.exe
    Filesize

    145KB

    MD5

    ab5c7940ebe1d2abd9f652d21c7f5441

    SHA1

    2af701d8f362152bcbed848af3ad5c7333e22e57

    SHA256

    6ec2eea95050e99353000ff69b8b587fe87d4e93b948144843f05d729f700aa9

    SHA512

    1da416cdf91f61fd8f74ab6daababfb0f02381460196e4975c08c96a701923b333a66fc10d56ed18ba44628551e31ec96bf5711686f2a0509550b7039c74dc7a

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p0521808.exe
    Filesize

    145KB

    MD5

    ab5c7940ebe1d2abd9f652d21c7f5441

    SHA1

    2af701d8f362152bcbed848af3ad5c7333e22e57

    SHA256

    6ec2eea95050e99353000ff69b8b587fe87d4e93b948144843f05d729f700aa9

    SHA512

    1da416cdf91f61fd8f74ab6daababfb0f02381460196e4975c08c96a701923b333a66fc10d56ed18ba44628551e31ec96bf5711686f2a0509550b7039c74dc7a

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p0521808.exe
    Filesize

    145KB

    MD5

    ab5c7940ebe1d2abd9f652d21c7f5441

    SHA1

    2af701d8f362152bcbed848af3ad5c7333e22e57

    SHA256

    6ec2eea95050e99353000ff69b8b587fe87d4e93b948144843f05d729f700aa9

    SHA512

    1da416cdf91f61fd8f74ab6daababfb0f02381460196e4975c08c96a701923b333a66fc10d56ed18ba44628551e31ec96bf5711686f2a0509550b7039c74dc7a

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p0521808.exe
    Filesize

    145KB

    MD5

    ab5c7940ebe1d2abd9f652d21c7f5441

    SHA1

    2af701d8f362152bcbed848af3ad5c7333e22e57

    SHA256

    6ec2eea95050e99353000ff69b8b587fe87d4e93b948144843f05d729f700aa9

    SHA512

    1da416cdf91f61fd8f74ab6daababfb0f02381460196e4975c08c96a701923b333a66fc10d56ed18ba44628551e31ec96bf5711686f2a0509550b7039c74dc7a

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p0521808.exe
    Filesize

    145KB

    MD5

    ab5c7940ebe1d2abd9f652d21c7f5441

    SHA1

    2af701d8f362152bcbed848af3ad5c7333e22e57

    SHA256

    6ec2eea95050e99353000ff69b8b587fe87d4e93b948144843f05d729f700aa9

    SHA512

    1da416cdf91f61fd8f74ab6daababfb0f02381460196e4975c08c96a701923b333a66fc10d56ed18ba44628551e31ec96bf5711686f2a0509550b7039c74dc7a

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p0521808.exe
    Filesize

    145KB

    MD5

    ab5c7940ebe1d2abd9f652d21c7f5441

    SHA1

    2af701d8f362152bcbed848af3ad5c7333e22e57

    SHA256

    6ec2eea95050e99353000ff69b8b587fe87d4e93b948144843f05d729f700aa9

    SHA512

    1da416cdf91f61fd8f74ab6daababfb0f02381460196e4975c08c96a701923b333a66fc10d56ed18ba44628551e31ec96bf5711686f2a0509550b7039c74dc7a

  • memory/976-122-0x00000000003B0000-0x00000000003DA000-memory.dmp
    Filesize

    168KB

  • memory/1028-97-0x00000000004E0000-0x00000000004F6000-memory.dmp
    Filesize

    88KB

  • memory/1028-103-0x00000000004E0000-0x00000000004F6000-memory.dmp
    Filesize

    88KB

  • memory/1028-105-0x00000000004E0000-0x00000000004F6000-memory.dmp
    Filesize

    88KB

  • memory/1028-107-0x00000000004E0000-0x00000000004F6000-memory.dmp
    Filesize

    88KB

  • memory/1028-109-0x00000000004E0000-0x00000000004F6000-memory.dmp
    Filesize

    88KB

  • memory/1028-111-0x00000000004E0000-0x00000000004F6000-memory.dmp
    Filesize

    88KB

  • memory/1028-113-0x00000000004E0000-0x00000000004F6000-memory.dmp
    Filesize

    88KB

  • memory/1028-114-0x00000000049A0000-0x00000000049E0000-memory.dmp
    Filesize

    256KB

  • memory/1028-115-0x00000000049A0000-0x00000000049E0000-memory.dmp
    Filesize

    256KB

  • memory/1028-101-0x00000000004E0000-0x00000000004F6000-memory.dmp
    Filesize

    88KB

  • memory/1028-99-0x00000000004E0000-0x00000000004F6000-memory.dmp
    Filesize

    88KB

  • memory/1028-95-0x00000000004E0000-0x00000000004F6000-memory.dmp
    Filesize

    88KB

  • memory/1028-93-0x00000000004E0000-0x00000000004F6000-memory.dmp
    Filesize

    88KB

  • memory/1028-91-0x00000000004E0000-0x00000000004F6000-memory.dmp
    Filesize

    88KB

  • memory/1028-89-0x00000000004E0000-0x00000000004F6000-memory.dmp
    Filesize

    88KB

  • memory/1028-87-0x00000000004E0000-0x00000000004F6000-memory.dmp
    Filesize

    88KB

  • memory/1028-86-0x00000000004E0000-0x00000000004F6000-memory.dmp
    Filesize

    88KB

  • memory/1028-85-0x00000000004E0000-0x00000000004FC000-memory.dmp
    Filesize

    112KB

  • memory/1028-84-0x00000000003E0000-0x00000000003FE000-memory.dmp
    Filesize

    120KB