Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06-06-2023 11:32

General

  • Target

    02722599.exe

  • Size

    737KB

  • MD5

    6095c88b3936c406a8045c6f4dfaad2a

  • SHA1

    73a8f5eafa7ac6ab8c5a37fad223f0ebafc07460

  • SHA256

    e0077fc1e1b3dd703bdb1876f2afa8e2e2bb8a1601d59bb37a04cb8d33c82859

  • SHA512

    fcc9a6f846e78c601e12ae9244b773060cc18617df5b7974a8c2f289c87a310802a75625c3ba00591836b98d793a4ff1aceb3df0950fc40274db6cfde09fc217

  • SSDEEP

    12288:VMrvy90nwpto++zBM5AfTq06XUCxlQoRPGG4J176Y+uq14ENCcYkt:eyLpto+mC5x0QUCxVP6JYmK4DcY0

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19048

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\02722599.exe
    "C:\Users\Admin\AppData\Local\Temp\02722599.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1152
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6066941.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6066941.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:268
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1814385.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1814385.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1484
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5237814.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5237814.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1556
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a6340837.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a6340837.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:428
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5336328.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5336328.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:392
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1864
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c4192028.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c4192028.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:916

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6066941.exe
    Filesize

    530KB

    MD5

    db90645deb6fdc42e33dd60860d88bc1

    SHA1

    cfffc58d7dba9e8f1afe1941ccea38df66c4d047

    SHA256

    d71a21ee6aac4edd1a3350e864d14c91bf4e46686ddf2a2b93b275e4d6dd2a6b

    SHA512

    1f74cb76afcbe9efa57e791fe35bf47c0783e7506493a35f612572b2c0731a86d7c52e50a6a0bf8773732f427550afb9b7862391bdcb6f30e64753c79738b3d1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6066941.exe
    Filesize

    530KB

    MD5

    db90645deb6fdc42e33dd60860d88bc1

    SHA1

    cfffc58d7dba9e8f1afe1941ccea38df66c4d047

    SHA256

    d71a21ee6aac4edd1a3350e864d14c91bf4e46686ddf2a2b93b275e4d6dd2a6b

    SHA512

    1f74cb76afcbe9efa57e791fe35bf47c0783e7506493a35f612572b2c0731a86d7c52e50a6a0bf8773732f427550afb9b7862391bdcb6f30e64753c79738b3d1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1814385.exe
    Filesize

    358KB

    MD5

    84e7e89f88d687f00d0673e7187ab36e

    SHA1

    c9c7bd91d0abfcea6605fd60de63c1cfe929a31f

    SHA256

    823db8a6523f564e1ecfeca47469acc7f5477a5b1c97ef665331d65b36dcf9a6

    SHA512

    5c3d07545ea91883498d28f4daaea1736a01db52731ff1307802326bd9d2081c5a32fe91f59da9a3a5fb9def3ea43bf7f3b7b1c96ec6059b05047e5abec509d7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1814385.exe
    Filesize

    358KB

    MD5

    84e7e89f88d687f00d0673e7187ab36e

    SHA1

    c9c7bd91d0abfcea6605fd60de63c1cfe929a31f

    SHA256

    823db8a6523f564e1ecfeca47469acc7f5477a5b1c97ef665331d65b36dcf9a6

    SHA512

    5c3d07545ea91883498d28f4daaea1736a01db52731ff1307802326bd9d2081c5a32fe91f59da9a3a5fb9def3ea43bf7f3b7b1c96ec6059b05047e5abec509d7

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c4192028.exe
    Filesize

    172KB

    MD5

    776237f4ce10fc76aa8f03fd044553e7

    SHA1

    e0321cc99f9771881b9dc7cd8c6b3915946625f1

    SHA256

    d7a735c1b62c49fbdc991ed579c205a2309e34ba8e70eb08683ce44db634d114

    SHA512

    f6540479a512ccb55315c3a8629497ea41e194351429984789aa063805b2f01ac50a06ae0804b580f21d1c924155e0c325bc71761f6eda361e18111917f9ff65

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c4192028.exe
    Filesize

    172KB

    MD5

    776237f4ce10fc76aa8f03fd044553e7

    SHA1

    e0321cc99f9771881b9dc7cd8c6b3915946625f1

    SHA256

    d7a735c1b62c49fbdc991ed579c205a2309e34ba8e70eb08683ce44db634d114

    SHA512

    f6540479a512ccb55315c3a8629497ea41e194351429984789aa063805b2f01ac50a06ae0804b580f21d1c924155e0c325bc71761f6eda361e18111917f9ff65

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5237814.exe
    Filesize

    203KB

    MD5

    fd3bdf37bc13b92ce63937fd0a035af4

    SHA1

    f057fb6229e009d5b44654473a4f818249d1c7cd

    SHA256

    0f522df93e9f1a292dab9d00c5b056b54e82d62433e61688b4de143c7a453d8a

    SHA512

    56952d34198b902b607b9462bec0df614ca519f99fd80fd8cacb52ea6bc38707410f58d93e2985642b334f5723742a4b39b19e6b1782f4b5db16f3d0fa23aa50

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5237814.exe
    Filesize

    203KB

    MD5

    fd3bdf37bc13b92ce63937fd0a035af4

    SHA1

    f057fb6229e009d5b44654473a4f818249d1c7cd

    SHA256

    0f522df93e9f1a292dab9d00c5b056b54e82d62433e61688b4de143c7a453d8a

    SHA512

    56952d34198b902b607b9462bec0df614ca519f99fd80fd8cacb52ea6bc38707410f58d93e2985642b334f5723742a4b39b19e6b1782f4b5db16f3d0fa23aa50

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a6340837.exe
    Filesize

    13KB

    MD5

    599f0c2ae88109722b116af78f77f42d

    SHA1

    887c827e17c5b428f4f61d618a183d66b88f8dfd

    SHA256

    0cc6ba9de0bedaa73c34123da7b7a16ecb1abcf43b0dc2b247bd35150177722e

    SHA512

    d60d04803d700c0fecf62e0428fdd49623e15b3fdaea1dc2e012423afc39be77083511927621378ffbc0cf064ee0ee0e8a8a2da238ed4573204b428f0b9e4485

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a6340837.exe
    Filesize

    13KB

    MD5

    599f0c2ae88109722b116af78f77f42d

    SHA1

    887c827e17c5b428f4f61d618a183d66b88f8dfd

    SHA256

    0cc6ba9de0bedaa73c34123da7b7a16ecb1abcf43b0dc2b247bd35150177722e

    SHA512

    d60d04803d700c0fecf62e0428fdd49623e15b3fdaea1dc2e012423afc39be77083511927621378ffbc0cf064ee0ee0e8a8a2da238ed4573204b428f0b9e4485

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5336328.exe
    Filesize

    120KB

    MD5

    b9c6bcf644ef1ac91f5ac49893741c3c

    SHA1

    baa494e9ea8e68321b6dfe2268f337e14a8272f7

    SHA256

    8021ae91ca0b442de2dc99b524ed28f0dc05a8c653d21b206120907d7121bdf6

    SHA512

    3b4b61ce21b73e816b532c95c300094d235a4e2c27a86a42bebeda39b8a223ce91fe828c8cc7251c4416c23f528989a05ca92a034c3cbd376238306f0fbe91a6

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5336328.exe
    Filesize

    120KB

    MD5

    b9c6bcf644ef1ac91f5ac49893741c3c

    SHA1

    baa494e9ea8e68321b6dfe2268f337e14a8272f7

    SHA256

    8021ae91ca0b442de2dc99b524ed28f0dc05a8c653d21b206120907d7121bdf6

    SHA512

    3b4b61ce21b73e816b532c95c300094d235a4e2c27a86a42bebeda39b8a223ce91fe828c8cc7251c4416c23f528989a05ca92a034c3cbd376238306f0fbe91a6

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v6066941.exe
    Filesize

    530KB

    MD5

    db90645deb6fdc42e33dd60860d88bc1

    SHA1

    cfffc58d7dba9e8f1afe1941ccea38df66c4d047

    SHA256

    d71a21ee6aac4edd1a3350e864d14c91bf4e46686ddf2a2b93b275e4d6dd2a6b

    SHA512

    1f74cb76afcbe9efa57e791fe35bf47c0783e7506493a35f612572b2c0731a86d7c52e50a6a0bf8773732f427550afb9b7862391bdcb6f30e64753c79738b3d1

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v6066941.exe
    Filesize

    530KB

    MD5

    db90645deb6fdc42e33dd60860d88bc1

    SHA1

    cfffc58d7dba9e8f1afe1941ccea38df66c4d047

    SHA256

    d71a21ee6aac4edd1a3350e864d14c91bf4e46686ddf2a2b93b275e4d6dd2a6b

    SHA512

    1f74cb76afcbe9efa57e791fe35bf47c0783e7506493a35f612572b2c0731a86d7c52e50a6a0bf8773732f427550afb9b7862391bdcb6f30e64753c79738b3d1

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v1814385.exe
    Filesize

    358KB

    MD5

    84e7e89f88d687f00d0673e7187ab36e

    SHA1

    c9c7bd91d0abfcea6605fd60de63c1cfe929a31f

    SHA256

    823db8a6523f564e1ecfeca47469acc7f5477a5b1c97ef665331d65b36dcf9a6

    SHA512

    5c3d07545ea91883498d28f4daaea1736a01db52731ff1307802326bd9d2081c5a32fe91f59da9a3a5fb9def3ea43bf7f3b7b1c96ec6059b05047e5abec509d7

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v1814385.exe
    Filesize

    358KB

    MD5

    84e7e89f88d687f00d0673e7187ab36e

    SHA1

    c9c7bd91d0abfcea6605fd60de63c1cfe929a31f

    SHA256

    823db8a6523f564e1ecfeca47469acc7f5477a5b1c97ef665331d65b36dcf9a6

    SHA512

    5c3d07545ea91883498d28f4daaea1736a01db52731ff1307802326bd9d2081c5a32fe91f59da9a3a5fb9def3ea43bf7f3b7b1c96ec6059b05047e5abec509d7

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c4192028.exe
    Filesize

    172KB

    MD5

    776237f4ce10fc76aa8f03fd044553e7

    SHA1

    e0321cc99f9771881b9dc7cd8c6b3915946625f1

    SHA256

    d7a735c1b62c49fbdc991ed579c205a2309e34ba8e70eb08683ce44db634d114

    SHA512

    f6540479a512ccb55315c3a8629497ea41e194351429984789aa063805b2f01ac50a06ae0804b580f21d1c924155e0c325bc71761f6eda361e18111917f9ff65

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\c4192028.exe
    Filesize

    172KB

    MD5

    776237f4ce10fc76aa8f03fd044553e7

    SHA1

    e0321cc99f9771881b9dc7cd8c6b3915946625f1

    SHA256

    d7a735c1b62c49fbdc991ed579c205a2309e34ba8e70eb08683ce44db634d114

    SHA512

    f6540479a512ccb55315c3a8629497ea41e194351429984789aa063805b2f01ac50a06ae0804b580f21d1c924155e0c325bc71761f6eda361e18111917f9ff65

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v5237814.exe
    Filesize

    203KB

    MD5

    fd3bdf37bc13b92ce63937fd0a035af4

    SHA1

    f057fb6229e009d5b44654473a4f818249d1c7cd

    SHA256

    0f522df93e9f1a292dab9d00c5b056b54e82d62433e61688b4de143c7a453d8a

    SHA512

    56952d34198b902b607b9462bec0df614ca519f99fd80fd8cacb52ea6bc38707410f58d93e2985642b334f5723742a4b39b19e6b1782f4b5db16f3d0fa23aa50

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v5237814.exe
    Filesize

    203KB

    MD5

    fd3bdf37bc13b92ce63937fd0a035af4

    SHA1

    f057fb6229e009d5b44654473a4f818249d1c7cd

    SHA256

    0f522df93e9f1a292dab9d00c5b056b54e82d62433e61688b4de143c7a453d8a

    SHA512

    56952d34198b902b607b9462bec0df614ca519f99fd80fd8cacb52ea6bc38707410f58d93e2985642b334f5723742a4b39b19e6b1782f4b5db16f3d0fa23aa50

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a6340837.exe
    Filesize

    13KB

    MD5

    599f0c2ae88109722b116af78f77f42d

    SHA1

    887c827e17c5b428f4f61d618a183d66b88f8dfd

    SHA256

    0cc6ba9de0bedaa73c34123da7b7a16ecb1abcf43b0dc2b247bd35150177722e

    SHA512

    d60d04803d700c0fecf62e0428fdd49623e15b3fdaea1dc2e012423afc39be77083511927621378ffbc0cf064ee0ee0e8a8a2da238ed4573204b428f0b9e4485

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b5336328.exe
    Filesize

    120KB

    MD5

    b9c6bcf644ef1ac91f5ac49893741c3c

    SHA1

    baa494e9ea8e68321b6dfe2268f337e14a8272f7

    SHA256

    8021ae91ca0b442de2dc99b524ed28f0dc05a8c653d21b206120907d7121bdf6

    SHA512

    3b4b61ce21b73e816b532c95c300094d235a4e2c27a86a42bebeda39b8a223ce91fe828c8cc7251c4416c23f528989a05ca92a034c3cbd376238306f0fbe91a6

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b5336328.exe
    Filesize

    120KB

    MD5

    b9c6bcf644ef1ac91f5ac49893741c3c

    SHA1

    baa494e9ea8e68321b6dfe2268f337e14a8272f7

    SHA256

    8021ae91ca0b442de2dc99b524ed28f0dc05a8c653d21b206120907d7121bdf6

    SHA512

    3b4b61ce21b73e816b532c95c300094d235a4e2c27a86a42bebeda39b8a223ce91fe828c8cc7251c4416c23f528989a05ca92a034c3cbd376238306f0fbe91a6

  • memory/428-92-0x0000000000260000-0x000000000026A000-memory.dmp
    Filesize

    40KB

  • memory/916-115-0x0000000000F50000-0x0000000000F80000-memory.dmp
    Filesize

    192KB

  • memory/916-116-0x0000000000490000-0x0000000000496000-memory.dmp
    Filesize

    24KB

  • memory/916-117-0x00000000008C0000-0x0000000000900000-memory.dmp
    Filesize

    256KB

  • memory/916-118-0x00000000008C0000-0x0000000000900000-memory.dmp
    Filesize

    256KB

  • memory/1864-105-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
    Filesize

    4KB

  • memory/1864-107-0x0000000000090000-0x000000000009A000-memory.dmp
    Filesize

    40KB

  • memory/1864-108-0x0000000000090000-0x000000000009A000-memory.dmp
    Filesize

    40KB

  • memory/1864-101-0x0000000000090000-0x000000000009A000-memory.dmp
    Filesize

    40KB

  • memory/1864-100-0x0000000000090000-0x000000000009A000-memory.dmp
    Filesize

    40KB