Analysis

  • max time kernel
    130s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    22/05/2023, 10:47

General

  • Target

    file429.exe

  • Size

    1.0MB

  • MD5

    497a45950203e618980f2e4545f9838c

  • SHA1

    d7109011a2a588da37eb89e6f3a2cfab4de7e4db

  • SHA256

    bd48e85f2607991dc27704ad7c4367be0cf6e46aa08de8342ab4d8909c0f2c10

  • SHA512

    2778e35c61a44d2112123f468e31cd796acd4ae88b1c58e24f09b740bf27508bb4e27cf0ba1234ca639f26af250e1de931d25f4e50b1061d67a4bebf660dc838

  • SSDEEP

    24576:Wyww5Y4Yphy72eLSqLpFpI8gUkcm9yjVSfMJgQQ2PJKnVo:lwbI72eLSq7pmcmUSfegQQ2O

Malware Config

Extracted

Family

redline

Botnet

diza

C2

185.161.248.37:4138

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file429.exe
    "C:\Users\Admin\AppData\Local\Temp\file429.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1580
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3682812.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3682812.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1744
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7265859.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7265859.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:432
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k0789123.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k0789123.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:468
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l7862873.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l7862873.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2016

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3682812.exe

          Filesize

          751KB

          MD5

          185a51d07776fe373d7cc99d77716291

          SHA1

          8528c88ea0116b7262675d540c2cd33e50961355

          SHA256

          3a9a76b46275a66269568c99812d9e7dc09ea943b84f6ddcb76a20b45de4e6bd

          SHA512

          3d019369af433ca612dd44ebf9a97e6391339e5ac20d11ccdac5d1dc5ceaea46d8803d969e2b4cd48a49f4ff07c38d61a54d49e07459e0ecc6382e6de26464b3

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3682812.exe

          Filesize

          751KB

          MD5

          185a51d07776fe373d7cc99d77716291

          SHA1

          8528c88ea0116b7262675d540c2cd33e50961355

          SHA256

          3a9a76b46275a66269568c99812d9e7dc09ea943b84f6ddcb76a20b45de4e6bd

          SHA512

          3d019369af433ca612dd44ebf9a97e6391339e5ac20d11ccdac5d1dc5ceaea46d8803d969e2b4cd48a49f4ff07c38d61a54d49e07459e0ecc6382e6de26464b3

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7265859.exe

          Filesize

          305KB

          MD5

          189327a17f0263ed6ed5d5a093357f55

          SHA1

          6bd1680125d068c085ffb808d963609db224dd68

          SHA256

          bacc9b8f03f77aec2700a57608406a9d3c4db286016ae130570906fa81834569

          SHA512

          eb6544513ab59d5c27a1b42e40aab032eaa1867ba1e6611730c0651ebb7f28f677fa5badc7757a96f1be7d7923851dc4df3b145a4ae51e487567d6cabe786390

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7265859.exe

          Filesize

          305KB

          MD5

          189327a17f0263ed6ed5d5a093357f55

          SHA1

          6bd1680125d068c085ffb808d963609db224dd68

          SHA256

          bacc9b8f03f77aec2700a57608406a9d3c4db286016ae130570906fa81834569

          SHA512

          eb6544513ab59d5c27a1b42e40aab032eaa1867ba1e6611730c0651ebb7f28f677fa5badc7757a96f1be7d7923851dc4df3b145a4ae51e487567d6cabe786390

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k0789123.exe

          Filesize

          186KB

          MD5

          8945615a7d96ab076ec9e5d25d8d2a53

          SHA1

          4c4fd6732d02b4c45caecb3791f25a94a13543c8

          SHA256

          d67fc414808101b89c7ee4fb28656aeea1b0681de2008ee9489d9b79b9f438b2

          SHA512

          0302150c7f96e874095463f858e3d4cac24c2062c758ace3f8c9791aa189c9d3eecd66482968ec938dba100f817cfedacdb0d7005dd9b46559a89d4997cc2bd4

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k0789123.exe

          Filesize

          186KB

          MD5

          8945615a7d96ab076ec9e5d25d8d2a53

          SHA1

          4c4fd6732d02b4c45caecb3791f25a94a13543c8

          SHA256

          d67fc414808101b89c7ee4fb28656aeea1b0681de2008ee9489d9b79b9f438b2

          SHA512

          0302150c7f96e874095463f858e3d4cac24c2062c758ace3f8c9791aa189c9d3eecd66482968ec938dba100f817cfedacdb0d7005dd9b46559a89d4997cc2bd4

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l7862873.exe

          Filesize

          145KB

          MD5

          d32af8a5b31345590774df3949fcd3a3

          SHA1

          650267a29f677337bb8cb1747922057eeda253b0

          SHA256

          c987d271113be7613c939efa2f470630c5b49f730bef7881c32922cb847d60b4

          SHA512

          de81eb4d2f9e8caaec01de505933d0e9703e359aa0cf106c478393a586fb7df9b1d785c7cb243f6aa6c54f3ceb3d448a39f87fbeb2ea4ca5d6623b8b19a0f95f

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l7862873.exe

          Filesize

          145KB

          MD5

          d32af8a5b31345590774df3949fcd3a3

          SHA1

          650267a29f677337bb8cb1747922057eeda253b0

          SHA256

          c987d271113be7613c939efa2f470630c5b49f730bef7881c32922cb847d60b4

          SHA512

          de81eb4d2f9e8caaec01de505933d0e9703e359aa0cf106c478393a586fb7df9b1d785c7cb243f6aa6c54f3ceb3d448a39f87fbeb2ea4ca5d6623b8b19a0f95f

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\y3682812.exe

          Filesize

          751KB

          MD5

          185a51d07776fe373d7cc99d77716291

          SHA1

          8528c88ea0116b7262675d540c2cd33e50961355

          SHA256

          3a9a76b46275a66269568c99812d9e7dc09ea943b84f6ddcb76a20b45de4e6bd

          SHA512

          3d019369af433ca612dd44ebf9a97e6391339e5ac20d11ccdac5d1dc5ceaea46d8803d969e2b4cd48a49f4ff07c38d61a54d49e07459e0ecc6382e6de26464b3

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\y3682812.exe

          Filesize

          751KB

          MD5

          185a51d07776fe373d7cc99d77716291

          SHA1

          8528c88ea0116b7262675d540c2cd33e50961355

          SHA256

          3a9a76b46275a66269568c99812d9e7dc09ea943b84f6ddcb76a20b45de4e6bd

          SHA512

          3d019369af433ca612dd44ebf9a97e6391339e5ac20d11ccdac5d1dc5ceaea46d8803d969e2b4cd48a49f4ff07c38d61a54d49e07459e0ecc6382e6de26464b3

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\y7265859.exe

          Filesize

          305KB

          MD5

          189327a17f0263ed6ed5d5a093357f55

          SHA1

          6bd1680125d068c085ffb808d963609db224dd68

          SHA256

          bacc9b8f03f77aec2700a57608406a9d3c4db286016ae130570906fa81834569

          SHA512

          eb6544513ab59d5c27a1b42e40aab032eaa1867ba1e6611730c0651ebb7f28f677fa5badc7757a96f1be7d7923851dc4df3b145a4ae51e487567d6cabe786390

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\y7265859.exe

          Filesize

          305KB

          MD5

          189327a17f0263ed6ed5d5a093357f55

          SHA1

          6bd1680125d068c085ffb808d963609db224dd68

          SHA256

          bacc9b8f03f77aec2700a57608406a9d3c4db286016ae130570906fa81834569

          SHA512

          eb6544513ab59d5c27a1b42e40aab032eaa1867ba1e6611730c0651ebb7f28f677fa5badc7757a96f1be7d7923851dc4df3b145a4ae51e487567d6cabe786390

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\k0789123.exe

          Filesize

          186KB

          MD5

          8945615a7d96ab076ec9e5d25d8d2a53

          SHA1

          4c4fd6732d02b4c45caecb3791f25a94a13543c8

          SHA256

          d67fc414808101b89c7ee4fb28656aeea1b0681de2008ee9489d9b79b9f438b2

          SHA512

          0302150c7f96e874095463f858e3d4cac24c2062c758ace3f8c9791aa189c9d3eecd66482968ec938dba100f817cfedacdb0d7005dd9b46559a89d4997cc2bd4

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\k0789123.exe

          Filesize

          186KB

          MD5

          8945615a7d96ab076ec9e5d25d8d2a53

          SHA1

          4c4fd6732d02b4c45caecb3791f25a94a13543c8

          SHA256

          d67fc414808101b89c7ee4fb28656aeea1b0681de2008ee9489d9b79b9f438b2

          SHA512

          0302150c7f96e874095463f858e3d4cac24c2062c758ace3f8c9791aa189c9d3eecd66482968ec938dba100f817cfedacdb0d7005dd9b46559a89d4997cc2bd4

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\l7862873.exe

          Filesize

          145KB

          MD5

          d32af8a5b31345590774df3949fcd3a3

          SHA1

          650267a29f677337bb8cb1747922057eeda253b0

          SHA256

          c987d271113be7613c939efa2f470630c5b49f730bef7881c32922cb847d60b4

          SHA512

          de81eb4d2f9e8caaec01de505933d0e9703e359aa0cf106c478393a586fb7df9b1d785c7cb243f6aa6c54f3ceb3d448a39f87fbeb2ea4ca5d6623b8b19a0f95f

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\l7862873.exe

          Filesize

          145KB

          MD5

          d32af8a5b31345590774df3949fcd3a3

          SHA1

          650267a29f677337bb8cb1747922057eeda253b0

          SHA256

          c987d271113be7613c939efa2f470630c5b49f730bef7881c32922cb847d60b4

          SHA512

          de81eb4d2f9e8caaec01de505933d0e9703e359aa0cf106c478393a586fb7df9b1d785c7cb243f6aa6c54f3ceb3d448a39f87fbeb2ea4ca5d6623b8b19a0f95f

        • memory/468-93-0x0000000000540000-0x0000000000556000-memory.dmp

          Filesize

          88KB

        • memory/468-111-0x0000000000540000-0x0000000000556000-memory.dmp

          Filesize

          88KB

        • memory/468-89-0x0000000000540000-0x0000000000556000-memory.dmp

          Filesize

          88KB

        • memory/468-95-0x0000000000540000-0x0000000000556000-memory.dmp

          Filesize

          88KB

        • memory/468-97-0x0000000000540000-0x0000000000556000-memory.dmp

          Filesize

          88KB

        • memory/468-99-0x0000000000540000-0x0000000000556000-memory.dmp

          Filesize

          88KB

        • memory/468-101-0x0000000000540000-0x0000000000556000-memory.dmp

          Filesize

          88KB

        • memory/468-103-0x0000000000540000-0x0000000000556000-memory.dmp

          Filesize

          88KB

        • memory/468-105-0x0000000000540000-0x0000000000556000-memory.dmp

          Filesize

          88KB

        • memory/468-107-0x0000000000540000-0x0000000000556000-memory.dmp

          Filesize

          88KB

        • memory/468-109-0x0000000000540000-0x0000000000556000-memory.dmp

          Filesize

          88KB

        • memory/468-91-0x0000000000540000-0x0000000000556000-memory.dmp

          Filesize

          88KB

        • memory/468-113-0x0000000000540000-0x0000000000556000-memory.dmp

          Filesize

          88KB

        • memory/468-114-0x0000000004B10000-0x0000000004B50000-memory.dmp

          Filesize

          256KB

        • memory/468-115-0x0000000004B10000-0x0000000004B50000-memory.dmp

          Filesize

          256KB

        • memory/468-87-0x0000000000540000-0x0000000000556000-memory.dmp

          Filesize

          88KB

        • memory/468-86-0x0000000000540000-0x0000000000556000-memory.dmp

          Filesize

          88KB

        • memory/468-85-0x0000000000540000-0x000000000055C000-memory.dmp

          Filesize

          112KB

        • memory/468-84-0x0000000000390000-0x00000000003AE000-memory.dmp

          Filesize

          120KB

        • memory/2016-122-0x0000000001080000-0x00000000010AA000-memory.dmp

          Filesize

          168KB

        • memory/2016-123-0x00000000005F0000-0x0000000000630000-memory.dmp

          Filesize

          256KB

        • memory/2016-124-0x00000000005F0000-0x0000000000630000-memory.dmp

          Filesize

          256KB