Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06-06-2023 09:51

General

  • Target

    ee9871d7de78ab88febed13644ff9d45.exe

  • Size

    738KB

  • MD5

    ee9871d7de78ab88febed13644ff9d45

  • SHA1

    d237436f82b8212d086ea831f1a93c5213b2a621

  • SHA256

    ef32fdb91bb66e640ae6a50917f1f8154b39e998ead71423324cdd3e52cb99e2

  • SHA512

    c4e470340eeb4622c6a7565e8e7dfd95c74493f82997e9f2a5a3792f9279a38f55057793cf9c69d66373a83040483036a5907fbf032eacc19fc343de84c7eaf5

  • SSDEEP

    12288:hMryy90wiJqEs2QCJETgQPTpJUreokh2HsoOzh63LbEr9tM3uY2x8/OHrxv7SxZo:7yZihs2EEYpquIOzh67bEJt6uRK/aU4

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19048

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee9871d7de78ab88febed13644ff9d45.exe
    "C:\Users\Admin\AppData\Local\Temp\ee9871d7de78ab88febed13644ff9d45.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1052
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8585001.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8585001.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1664
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5475920.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5475920.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1840
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8380406.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8380406.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:912
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a2563315.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a2563315.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1752
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2882766.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2882766.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:848
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:932
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c7567107.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c7567107.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:652

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8585001.exe
    Filesize

    532KB

    MD5

    c3c0ebb70ee20b3438cd1a73d4780965

    SHA1

    2f7ce1bf4e4bdfa11bc975981dae272e3720115d

    SHA256

    5de5b67691cf53619e73cd4ef9c29548b9a19551895d96d7d23ba4247d0b075c

    SHA512

    e9d2c87ba5f7ec80643ce94b2dff9490ac662ac924833c5484ab669b5d936b23b9e3465f7a53657a7154c3298a6e2fc0838c14f45f173a16e7122663822fdda1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8585001.exe
    Filesize

    532KB

    MD5

    c3c0ebb70ee20b3438cd1a73d4780965

    SHA1

    2f7ce1bf4e4bdfa11bc975981dae272e3720115d

    SHA256

    5de5b67691cf53619e73cd4ef9c29548b9a19551895d96d7d23ba4247d0b075c

    SHA512

    e9d2c87ba5f7ec80643ce94b2dff9490ac662ac924833c5484ab669b5d936b23b9e3465f7a53657a7154c3298a6e2fc0838c14f45f173a16e7122663822fdda1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5475920.exe
    Filesize

    359KB

    MD5

    25a4c371a874c208a6ab8629703de242

    SHA1

    50a3a4b5eeb4946f8f7f3c034674fd32aabd4426

    SHA256

    51c716aa7db867dabc88c5f242044d774f96a317736c7f9ee9e7014b11e94b78

    SHA512

    0ff91a98793d1702513ced925df4a5d1209e772db60c2d7b66bb6880e03c6c32e4011f4ed9da6dd841b322cc839d575705ffd968e156be005acb3a48d557001e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5475920.exe
    Filesize

    359KB

    MD5

    25a4c371a874c208a6ab8629703de242

    SHA1

    50a3a4b5eeb4946f8f7f3c034674fd32aabd4426

    SHA256

    51c716aa7db867dabc88c5f242044d774f96a317736c7f9ee9e7014b11e94b78

    SHA512

    0ff91a98793d1702513ced925df4a5d1209e772db60c2d7b66bb6880e03c6c32e4011f4ed9da6dd841b322cc839d575705ffd968e156be005acb3a48d557001e

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c7567107.exe
    Filesize

    172KB

    MD5

    571671cf890e153e1f0b0b568530bce3

    SHA1

    d4c936841eb3bfb8fb81a2f59f0d0650605aa643

    SHA256

    16ac8981175feef5c310175f874bd7bc25b6b71b1ae9d6f4e0e141118e2cd998

    SHA512

    84b064199f11d431159218c71bcbfcfc7d9a31718f3034d1cd06ff62c5be7046743ce0dcbcc961a1cde0b59c096afd18e8b7b026897fb06adbd9fcb6d0ed400d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c7567107.exe
    Filesize

    172KB

    MD5

    571671cf890e153e1f0b0b568530bce3

    SHA1

    d4c936841eb3bfb8fb81a2f59f0d0650605aa643

    SHA256

    16ac8981175feef5c310175f874bd7bc25b6b71b1ae9d6f4e0e141118e2cd998

    SHA512

    84b064199f11d431159218c71bcbfcfc7d9a31718f3034d1cd06ff62c5be7046743ce0dcbcc961a1cde0b59c096afd18e8b7b026897fb06adbd9fcb6d0ed400d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8380406.exe
    Filesize

    204KB

    MD5

    9b6ce9e51bb2b9af4c316d2cf3f92c0c

    SHA1

    42dff32812f6f494c3175fc250f7742a74148b44

    SHA256

    92fe36ff015cce09e9f60ad1b548889130d5089c244e9adb38f939f2264071db

    SHA512

    64e66bcc336421b5962e2553449f3950a1717ca41f0f002131864e72a45c204e49be870580a3021bec05eff740137d8399856c3a1a84877f86ed76a43e3084e3

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8380406.exe
    Filesize

    204KB

    MD5

    9b6ce9e51bb2b9af4c316d2cf3f92c0c

    SHA1

    42dff32812f6f494c3175fc250f7742a74148b44

    SHA256

    92fe36ff015cce09e9f60ad1b548889130d5089c244e9adb38f939f2264071db

    SHA512

    64e66bcc336421b5962e2553449f3950a1717ca41f0f002131864e72a45c204e49be870580a3021bec05eff740137d8399856c3a1a84877f86ed76a43e3084e3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a2563315.exe
    Filesize

    13KB

    MD5

    c9999b62d0ab17f00d173e9d70ffbe0b

    SHA1

    4cb7d0d4b2915adbdbac2bee31e80403848e9507

    SHA256

    5a1b787054f93033e62c996cfcb9b84e318a482bcf4b79a95787f517ab21f2e5

    SHA512

    3639ff4eea7bb4d629ec2a42dd9b32d0dd68244d96982191c6de41d885d75bb59930ba4d4ccaddfab033abc332f700dc8398363393ba26a0faa0789d3c93bb97

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a2563315.exe
    Filesize

    13KB

    MD5

    c9999b62d0ab17f00d173e9d70ffbe0b

    SHA1

    4cb7d0d4b2915adbdbac2bee31e80403848e9507

    SHA256

    5a1b787054f93033e62c996cfcb9b84e318a482bcf4b79a95787f517ab21f2e5

    SHA512

    3639ff4eea7bb4d629ec2a42dd9b32d0dd68244d96982191c6de41d885d75bb59930ba4d4ccaddfab033abc332f700dc8398363393ba26a0faa0789d3c93bb97

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2882766.exe
    Filesize

    120KB

    MD5

    141b4787fa7374eccdf19bfb914f9adf

    SHA1

    1c2b0f0cac6364d7f633be095593410a452a6b25

    SHA256

    0265ff74b88a94c797d3a517c1857b30b47c7224c4aef46ecb86025104d0560a

    SHA512

    e480628f05b43e2354f35b244f08c4d4ef9d0a04b4f246be6d1ef115c0ce0c5c25030d99ea7940c96c0cda040af3ad726fe0c3c4dc99adf31993486842721cba

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2882766.exe
    Filesize

    120KB

    MD5

    141b4787fa7374eccdf19bfb914f9adf

    SHA1

    1c2b0f0cac6364d7f633be095593410a452a6b25

    SHA256

    0265ff74b88a94c797d3a517c1857b30b47c7224c4aef46ecb86025104d0560a

    SHA512

    e480628f05b43e2354f35b244f08c4d4ef9d0a04b4f246be6d1ef115c0ce0c5c25030d99ea7940c96c0cda040af3ad726fe0c3c4dc99adf31993486842721cba

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v8585001.exe
    Filesize

    532KB

    MD5

    c3c0ebb70ee20b3438cd1a73d4780965

    SHA1

    2f7ce1bf4e4bdfa11bc975981dae272e3720115d

    SHA256

    5de5b67691cf53619e73cd4ef9c29548b9a19551895d96d7d23ba4247d0b075c

    SHA512

    e9d2c87ba5f7ec80643ce94b2dff9490ac662ac924833c5484ab669b5d936b23b9e3465f7a53657a7154c3298a6e2fc0838c14f45f173a16e7122663822fdda1

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v8585001.exe
    Filesize

    532KB

    MD5

    c3c0ebb70ee20b3438cd1a73d4780965

    SHA1

    2f7ce1bf4e4bdfa11bc975981dae272e3720115d

    SHA256

    5de5b67691cf53619e73cd4ef9c29548b9a19551895d96d7d23ba4247d0b075c

    SHA512

    e9d2c87ba5f7ec80643ce94b2dff9490ac662ac924833c5484ab669b5d936b23b9e3465f7a53657a7154c3298a6e2fc0838c14f45f173a16e7122663822fdda1

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v5475920.exe
    Filesize

    359KB

    MD5

    25a4c371a874c208a6ab8629703de242

    SHA1

    50a3a4b5eeb4946f8f7f3c034674fd32aabd4426

    SHA256

    51c716aa7db867dabc88c5f242044d774f96a317736c7f9ee9e7014b11e94b78

    SHA512

    0ff91a98793d1702513ced925df4a5d1209e772db60c2d7b66bb6880e03c6c32e4011f4ed9da6dd841b322cc839d575705ffd968e156be005acb3a48d557001e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v5475920.exe
    Filesize

    359KB

    MD5

    25a4c371a874c208a6ab8629703de242

    SHA1

    50a3a4b5eeb4946f8f7f3c034674fd32aabd4426

    SHA256

    51c716aa7db867dabc88c5f242044d774f96a317736c7f9ee9e7014b11e94b78

    SHA512

    0ff91a98793d1702513ced925df4a5d1209e772db60c2d7b66bb6880e03c6c32e4011f4ed9da6dd841b322cc839d575705ffd968e156be005acb3a48d557001e

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c7567107.exe
    Filesize

    172KB

    MD5

    571671cf890e153e1f0b0b568530bce3

    SHA1

    d4c936841eb3bfb8fb81a2f59f0d0650605aa643

    SHA256

    16ac8981175feef5c310175f874bd7bc25b6b71b1ae9d6f4e0e141118e2cd998

    SHA512

    84b064199f11d431159218c71bcbfcfc7d9a31718f3034d1cd06ff62c5be7046743ce0dcbcc961a1cde0b59c096afd18e8b7b026897fb06adbd9fcb6d0ed400d

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c7567107.exe
    Filesize

    172KB

    MD5

    571671cf890e153e1f0b0b568530bce3

    SHA1

    d4c936841eb3bfb8fb81a2f59f0d0650605aa643

    SHA256

    16ac8981175feef5c310175f874bd7bc25b6b71b1ae9d6f4e0e141118e2cd998

    SHA512

    84b064199f11d431159218c71bcbfcfc7d9a31718f3034d1cd06ff62c5be7046743ce0dcbcc961a1cde0b59c096afd18e8b7b026897fb06adbd9fcb6d0ed400d

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v8380406.exe
    Filesize

    204KB

    MD5

    9b6ce9e51bb2b9af4c316d2cf3f92c0c

    SHA1

    42dff32812f6f494c3175fc250f7742a74148b44

    SHA256

    92fe36ff015cce09e9f60ad1b548889130d5089c244e9adb38f939f2264071db

    SHA512

    64e66bcc336421b5962e2553449f3950a1717ca41f0f002131864e72a45c204e49be870580a3021bec05eff740137d8399856c3a1a84877f86ed76a43e3084e3

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v8380406.exe
    Filesize

    204KB

    MD5

    9b6ce9e51bb2b9af4c316d2cf3f92c0c

    SHA1

    42dff32812f6f494c3175fc250f7742a74148b44

    SHA256

    92fe36ff015cce09e9f60ad1b548889130d5089c244e9adb38f939f2264071db

    SHA512

    64e66bcc336421b5962e2553449f3950a1717ca41f0f002131864e72a45c204e49be870580a3021bec05eff740137d8399856c3a1a84877f86ed76a43e3084e3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a2563315.exe
    Filesize

    13KB

    MD5

    c9999b62d0ab17f00d173e9d70ffbe0b

    SHA1

    4cb7d0d4b2915adbdbac2bee31e80403848e9507

    SHA256

    5a1b787054f93033e62c996cfcb9b84e318a482bcf4b79a95787f517ab21f2e5

    SHA512

    3639ff4eea7bb4d629ec2a42dd9b32d0dd68244d96982191c6de41d885d75bb59930ba4d4ccaddfab033abc332f700dc8398363393ba26a0faa0789d3c93bb97

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b2882766.exe
    Filesize

    120KB

    MD5

    141b4787fa7374eccdf19bfb914f9adf

    SHA1

    1c2b0f0cac6364d7f633be095593410a452a6b25

    SHA256

    0265ff74b88a94c797d3a517c1857b30b47c7224c4aef46ecb86025104d0560a

    SHA512

    e480628f05b43e2354f35b244f08c4d4ef9d0a04b4f246be6d1ef115c0ce0c5c25030d99ea7940c96c0cda040af3ad726fe0c3c4dc99adf31993486842721cba

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b2882766.exe
    Filesize

    120KB

    MD5

    141b4787fa7374eccdf19bfb914f9adf

    SHA1

    1c2b0f0cac6364d7f633be095593410a452a6b25

    SHA256

    0265ff74b88a94c797d3a517c1857b30b47c7224c4aef46ecb86025104d0560a

    SHA512

    e480628f05b43e2354f35b244f08c4d4ef9d0a04b4f246be6d1ef115c0ce0c5c25030d99ea7940c96c0cda040af3ad726fe0c3c4dc99adf31993486842721cba

  • memory/652-115-0x0000000000A20000-0x0000000000A50000-memory.dmp
    Filesize

    192KB

  • memory/652-116-0x0000000000310000-0x0000000000316000-memory.dmp
    Filesize

    24KB

  • memory/652-117-0x00000000026A0000-0x00000000026E0000-memory.dmp
    Filesize

    256KB

  • memory/652-118-0x00000000026A0000-0x00000000026E0000-memory.dmp
    Filesize

    256KB

  • memory/932-105-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
    Filesize

    4KB

  • memory/932-107-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/932-108-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/932-101-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/932-100-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/1752-92-0x0000000000BD0000-0x0000000000BDA000-memory.dmp
    Filesize

    40KB