Analysis

  • max time kernel
    131s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    22/05/2023, 10:47

General

  • Target

    editor307.exe

  • Size

    1.0MB

  • MD5

    174ca1152c5569b07f50fcc4a7013ef3

  • SHA1

    cb7a78d66be98157b4ef311ef5ec9117d6fb7c5f

  • SHA256

    0132c101423fa2b115a816d8af7885526f7113321b27c78088990da08e9a634b

  • SHA512

    024d25e91cb164b8d920c5658542b489fc936cf74b096e44ea86046e0e726201802b8931a48c9dcb5a13171834567786b347ed2f8bbe04458d75013731dd4f8e

  • SSDEEP

    24576:qydvg+omjTkScyaGq9mw7Uy6cOklrDafpyD1:xdvhomjTpcyJq9mw7U8LIG

Malware Config

Extracted

Family

redline

Botnet

mixa

C2

185.161.248.37:4138

Attributes
  • auth_value

    9d14534b25ac495ab25b59800acf3bb2

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\editor307.exe
    "C:\Users\Admin\AppData\Local\Temp\editor307.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1676
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7397416.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7397416.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1716
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6581417.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6581417.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:468
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1482469.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1482469.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1376
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b6263688.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b6263688.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:284

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7397416.exe

    Filesize

    750KB

    MD5

    dd3d0ba4b930479d955943f6cf0e066d

    SHA1

    2c7955d9d78fc7b8d8f3c732a44021c788b22a6e

    SHA256

    ffc147a4e1c208fc44a897db7a8704c54d386e0e32bd79afa4c1d99459f61c54

    SHA512

    6922294425e6dffe4628ef360b3edb21c6c450fd6ba365c6a97bdebf6b5ad4940e9397566c7bdfc47593aa02f24f5b3daa083c288547ee01e6903f948d9fdb3f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7397416.exe

    Filesize

    750KB

    MD5

    dd3d0ba4b930479d955943f6cf0e066d

    SHA1

    2c7955d9d78fc7b8d8f3c732a44021c788b22a6e

    SHA256

    ffc147a4e1c208fc44a897db7a8704c54d386e0e32bd79afa4c1d99459f61c54

    SHA512

    6922294425e6dffe4628ef360b3edb21c6c450fd6ba365c6a97bdebf6b5ad4940e9397566c7bdfc47593aa02f24f5b3daa083c288547ee01e6903f948d9fdb3f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6581417.exe

    Filesize

    306KB

    MD5

    dc60892e69496c81b27ac5e487f4b894

    SHA1

    b62fa79020b9656d8a6130f52e021d6401f2c928

    SHA256

    7dab6f54f1771b91c65f996bb5128bb9cea7edacd2f333fd9b0f925050609b43

    SHA512

    dfa58814f38185ba486cd394255eb2626915f3d50b8976d47c654547a40d4fd478806d6e2b5106d27fd474f7dfa7dda29ba609a88f3be254bca9fcae7f654e9e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6581417.exe

    Filesize

    306KB

    MD5

    dc60892e69496c81b27ac5e487f4b894

    SHA1

    b62fa79020b9656d8a6130f52e021d6401f2c928

    SHA256

    7dab6f54f1771b91c65f996bb5128bb9cea7edacd2f333fd9b0f925050609b43

    SHA512

    dfa58814f38185ba486cd394255eb2626915f3d50b8976d47c654547a40d4fd478806d6e2b5106d27fd474f7dfa7dda29ba609a88f3be254bca9fcae7f654e9e

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1482469.exe

    Filesize

    186KB

    MD5

    47b3215fc38e513c01039d103576f1d7

    SHA1

    0768d1d696748fb930ef8183095bbbf33735c706

    SHA256

    40a8c3ebe4198364633a5c5dd69641cb6b72d5425e3b0bdda7a876b5cd7e9a98

    SHA512

    c21d16b2988f80ecd45047b53e7119ea089632485652483316a430f83c0578de6cbb6f1ab3a8d448abfcf9b20ca112f583ed3cd83a4e3b882dc2fb0c87983c10

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1482469.exe

    Filesize

    186KB

    MD5

    47b3215fc38e513c01039d103576f1d7

    SHA1

    0768d1d696748fb930ef8183095bbbf33735c706

    SHA256

    40a8c3ebe4198364633a5c5dd69641cb6b72d5425e3b0bdda7a876b5cd7e9a98

    SHA512

    c21d16b2988f80ecd45047b53e7119ea089632485652483316a430f83c0578de6cbb6f1ab3a8d448abfcf9b20ca112f583ed3cd83a4e3b882dc2fb0c87983c10

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b6263688.exe

    Filesize

    145KB

    MD5

    2415512e441f390fd969422145f5b5c1

    SHA1

    c45aa0725c4d667aeb06d95a85ce15f03693d762

    SHA256

    90c86f81638e8bbccbaa44afc991aef119af40154afe276cc7195882d107500d

    SHA512

    42baf58c563d3c2d2297651cc3614f73359a6e7d81a25fff5c718901563deabae37ef848c2a123f7897c59fb5e6c4fd5f3af188b4137614afeb14f70bf4a8671

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b6263688.exe

    Filesize

    145KB

    MD5

    2415512e441f390fd969422145f5b5c1

    SHA1

    c45aa0725c4d667aeb06d95a85ce15f03693d762

    SHA256

    90c86f81638e8bbccbaa44afc991aef119af40154afe276cc7195882d107500d

    SHA512

    42baf58c563d3c2d2297651cc3614f73359a6e7d81a25fff5c718901563deabae37ef848c2a123f7897c59fb5e6c4fd5f3af188b4137614afeb14f70bf4a8671

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v7397416.exe

    Filesize

    750KB

    MD5

    dd3d0ba4b930479d955943f6cf0e066d

    SHA1

    2c7955d9d78fc7b8d8f3c732a44021c788b22a6e

    SHA256

    ffc147a4e1c208fc44a897db7a8704c54d386e0e32bd79afa4c1d99459f61c54

    SHA512

    6922294425e6dffe4628ef360b3edb21c6c450fd6ba365c6a97bdebf6b5ad4940e9397566c7bdfc47593aa02f24f5b3daa083c288547ee01e6903f948d9fdb3f

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v7397416.exe

    Filesize

    750KB

    MD5

    dd3d0ba4b930479d955943f6cf0e066d

    SHA1

    2c7955d9d78fc7b8d8f3c732a44021c788b22a6e

    SHA256

    ffc147a4e1c208fc44a897db7a8704c54d386e0e32bd79afa4c1d99459f61c54

    SHA512

    6922294425e6dffe4628ef360b3edb21c6c450fd6ba365c6a97bdebf6b5ad4940e9397566c7bdfc47593aa02f24f5b3daa083c288547ee01e6903f948d9fdb3f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v6581417.exe

    Filesize

    306KB

    MD5

    dc60892e69496c81b27ac5e487f4b894

    SHA1

    b62fa79020b9656d8a6130f52e021d6401f2c928

    SHA256

    7dab6f54f1771b91c65f996bb5128bb9cea7edacd2f333fd9b0f925050609b43

    SHA512

    dfa58814f38185ba486cd394255eb2626915f3d50b8976d47c654547a40d4fd478806d6e2b5106d27fd474f7dfa7dda29ba609a88f3be254bca9fcae7f654e9e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v6581417.exe

    Filesize

    306KB

    MD5

    dc60892e69496c81b27ac5e487f4b894

    SHA1

    b62fa79020b9656d8a6130f52e021d6401f2c928

    SHA256

    7dab6f54f1771b91c65f996bb5128bb9cea7edacd2f333fd9b0f925050609b43

    SHA512

    dfa58814f38185ba486cd394255eb2626915f3d50b8976d47c654547a40d4fd478806d6e2b5106d27fd474f7dfa7dda29ba609a88f3be254bca9fcae7f654e9e

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\a1482469.exe

    Filesize

    186KB

    MD5

    47b3215fc38e513c01039d103576f1d7

    SHA1

    0768d1d696748fb930ef8183095bbbf33735c706

    SHA256

    40a8c3ebe4198364633a5c5dd69641cb6b72d5425e3b0bdda7a876b5cd7e9a98

    SHA512

    c21d16b2988f80ecd45047b53e7119ea089632485652483316a430f83c0578de6cbb6f1ab3a8d448abfcf9b20ca112f583ed3cd83a4e3b882dc2fb0c87983c10

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\a1482469.exe

    Filesize

    186KB

    MD5

    47b3215fc38e513c01039d103576f1d7

    SHA1

    0768d1d696748fb930ef8183095bbbf33735c706

    SHA256

    40a8c3ebe4198364633a5c5dd69641cb6b72d5425e3b0bdda7a876b5cd7e9a98

    SHA512

    c21d16b2988f80ecd45047b53e7119ea089632485652483316a430f83c0578de6cbb6f1ab3a8d448abfcf9b20ca112f583ed3cd83a4e3b882dc2fb0c87983c10

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\b6263688.exe

    Filesize

    145KB

    MD5

    2415512e441f390fd969422145f5b5c1

    SHA1

    c45aa0725c4d667aeb06d95a85ce15f03693d762

    SHA256

    90c86f81638e8bbccbaa44afc991aef119af40154afe276cc7195882d107500d

    SHA512

    42baf58c563d3c2d2297651cc3614f73359a6e7d81a25fff5c718901563deabae37ef848c2a123f7897c59fb5e6c4fd5f3af188b4137614afeb14f70bf4a8671

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\b6263688.exe

    Filesize

    145KB

    MD5

    2415512e441f390fd969422145f5b5c1

    SHA1

    c45aa0725c4d667aeb06d95a85ce15f03693d762

    SHA256

    90c86f81638e8bbccbaa44afc991aef119af40154afe276cc7195882d107500d

    SHA512

    42baf58c563d3c2d2297651cc3614f73359a6e7d81a25fff5c718901563deabae37ef848c2a123f7897c59fb5e6c4fd5f3af188b4137614afeb14f70bf4a8671

  • memory/284-123-0x00000000050E0000-0x0000000005120000-memory.dmp

    Filesize

    256KB

  • memory/284-122-0x0000000000CB0000-0x0000000000CDA000-memory.dmp

    Filesize

    168KB

  • memory/284-124-0x00000000050E0000-0x0000000005120000-memory.dmp

    Filesize

    256KB

  • memory/1376-93-0x0000000001EF0000-0x0000000001F06000-memory.dmp

    Filesize

    88KB

  • memory/1376-95-0x0000000001EF0000-0x0000000001F06000-memory.dmp

    Filesize

    88KB

  • memory/1376-97-0x0000000002060000-0x00000000020A0000-memory.dmp

    Filesize

    256KB

  • memory/1376-99-0x0000000001EF0000-0x0000000001F06000-memory.dmp

    Filesize

    88KB

  • memory/1376-101-0x0000000001EF0000-0x0000000001F06000-memory.dmp

    Filesize

    88KB

  • memory/1376-103-0x0000000001EF0000-0x0000000001F06000-memory.dmp

    Filesize

    88KB

  • memory/1376-105-0x0000000001EF0000-0x0000000001F06000-memory.dmp

    Filesize

    88KB

  • memory/1376-107-0x0000000001EF0000-0x0000000001F06000-memory.dmp

    Filesize

    88KB

  • memory/1376-109-0x0000000001EF0000-0x0000000001F06000-memory.dmp

    Filesize

    88KB

  • memory/1376-111-0x0000000001EF0000-0x0000000001F06000-memory.dmp

    Filesize

    88KB

  • memory/1376-113-0x0000000001EF0000-0x0000000001F06000-memory.dmp

    Filesize

    88KB

  • memory/1376-115-0x0000000001EF0000-0x0000000001F06000-memory.dmp

    Filesize

    88KB

  • memory/1376-96-0x0000000002060000-0x00000000020A0000-memory.dmp

    Filesize

    256KB

  • memory/1376-91-0x0000000001EF0000-0x0000000001F06000-memory.dmp

    Filesize

    88KB

  • memory/1376-89-0x0000000001EF0000-0x0000000001F06000-memory.dmp

    Filesize

    88KB

  • memory/1376-87-0x0000000001EF0000-0x0000000001F06000-memory.dmp

    Filesize

    88KB

  • memory/1376-86-0x0000000001EF0000-0x0000000001F06000-memory.dmp

    Filesize

    88KB

  • memory/1376-85-0x0000000001EF0000-0x0000000001F0C000-memory.dmp

    Filesize

    112KB

  • memory/1376-84-0x0000000000840000-0x000000000085E000-memory.dmp

    Filesize

    120KB