Analysis

  • max time kernel
    136s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/06/2023, 11:34

General

  • Target

    04140999.exe

  • Size

    585KB

  • MD5

    83e1b1d4b051f68421b948e376147a80

  • SHA1

    160a9ffefb4b937a9be4f5fdc76c3092c07d1f23

  • SHA256

    a3023fd31ad761747b24e6472f1c1d62e5f4ecda61a94606145f1b8e3dee43a0

  • SHA512

    8672588d3954c948eb8180248e4cdab80dd819fbcb2fb386c313ce77e888747379722d52e8ca6d108c5c586236adf7c5c0757beb742160c921aed8550254d38f

  • SSDEEP

    12288:mMr+y90mfyHg7Ubji4Yj/gtecRyZNh+I1RM:UysHg7fURIbM

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19048

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04140999.exe
    "C:\Users\Admin\AppData\Local\Temp\04140999.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:920
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4914211.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4914211.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1768
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6032575.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6032575.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1108
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k4296425.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k4296425.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1516
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l8999147.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l8999147.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:304

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4914211.exe

    Filesize

    377KB

    MD5

    8eed98323578f46f839f5f6c64338dfc

    SHA1

    4dc77f40c882fdfe042901c9fb68aa135af479d5

    SHA256

    d712ad3d82844421f04e1bf98a132095ba7f82be0fa97318cbfe04df82f78eaa

    SHA512

    fcf9cf522cac5a410d5fdddf419781d9c258513c49a0ce5769dac3f986a03dc4d7760dc1eb7091e4d2849a3534d54d3a1be0274868c1faac1208470a192efbc7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4914211.exe

    Filesize

    377KB

    MD5

    8eed98323578f46f839f5f6c64338dfc

    SHA1

    4dc77f40c882fdfe042901c9fb68aa135af479d5

    SHA256

    d712ad3d82844421f04e1bf98a132095ba7f82be0fa97318cbfe04df82f78eaa

    SHA512

    fcf9cf522cac5a410d5fdddf419781d9c258513c49a0ce5769dac3f986a03dc4d7760dc1eb7091e4d2849a3534d54d3a1be0274868c1faac1208470a192efbc7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6032575.exe

    Filesize

    206KB

    MD5

    79185704d68a7ef140e654d57f1c33ed

    SHA1

    a719b91b5c194370740dce31ea1bb87df9f21013

    SHA256

    946aa3032db6ad8b1b9c4a7dfafd8de9c5b37675242a8420a454a509f54595eb

    SHA512

    0616421dfa11659ed76318fe11383d14bd78d1488af9a86a112753e912e728a31b9e5adb2414011c95d8c1851895f199350d85c1268baee1078fafb6ff19f553

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6032575.exe

    Filesize

    206KB

    MD5

    79185704d68a7ef140e654d57f1c33ed

    SHA1

    a719b91b5c194370740dce31ea1bb87df9f21013

    SHA256

    946aa3032db6ad8b1b9c4a7dfafd8de9c5b37675242a8420a454a509f54595eb

    SHA512

    0616421dfa11659ed76318fe11383d14bd78d1488af9a86a112753e912e728a31b9e5adb2414011c95d8c1851895f199350d85c1268baee1078fafb6ff19f553

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k4296425.exe

    Filesize

    13KB

    MD5

    a2de3437fd394e851c67f6dc784bc824

    SHA1

    95a75d842945c6d63311834142f4d4d9137cde2c

    SHA256

    8781273cf757bca88ea113b36d68f6d41b15731e28a6e6b543db46213959b77b

    SHA512

    b7189d95121584fccfb3255bd58b42cceafdc900f831dd373e8d79cf412f16a64e14c2b3271af844d7ab7845df0eb3b87df5202fcc7578d12d6641a084202b82

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k4296425.exe

    Filesize

    13KB

    MD5

    a2de3437fd394e851c67f6dc784bc824

    SHA1

    95a75d842945c6d63311834142f4d4d9137cde2c

    SHA256

    8781273cf757bca88ea113b36d68f6d41b15731e28a6e6b543db46213959b77b

    SHA512

    b7189d95121584fccfb3255bd58b42cceafdc900f831dd373e8d79cf412f16a64e14c2b3271af844d7ab7845df0eb3b87df5202fcc7578d12d6641a084202b82

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l8999147.exe

    Filesize

    172KB

    MD5

    9e85716659a76beb7375ef8dc976e218

    SHA1

    63d6a65f9691565997db57282f5f34d650433c20

    SHA256

    52ac8970fc5ebc37c8d2ba0c1593a4f27e28f87e5d07f2555d59bb0b4c420de9

    SHA512

    625efffee846230ae4d493b0d213813ff275a636662acb7f4bf498c1f692e9758aa6163fd10e70ff69b5c388eae26f46a505fad4654e05f85893bc748bdac1a7

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l8999147.exe

    Filesize

    172KB

    MD5

    9e85716659a76beb7375ef8dc976e218

    SHA1

    63d6a65f9691565997db57282f5f34d650433c20

    SHA256

    52ac8970fc5ebc37c8d2ba0c1593a4f27e28f87e5d07f2555d59bb0b4c420de9

    SHA512

    625efffee846230ae4d493b0d213813ff275a636662acb7f4bf498c1f692e9758aa6163fd10e70ff69b5c388eae26f46a505fad4654e05f85893bc748bdac1a7

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\y4914211.exe

    Filesize

    377KB

    MD5

    8eed98323578f46f839f5f6c64338dfc

    SHA1

    4dc77f40c882fdfe042901c9fb68aa135af479d5

    SHA256

    d712ad3d82844421f04e1bf98a132095ba7f82be0fa97318cbfe04df82f78eaa

    SHA512

    fcf9cf522cac5a410d5fdddf419781d9c258513c49a0ce5769dac3f986a03dc4d7760dc1eb7091e4d2849a3534d54d3a1be0274868c1faac1208470a192efbc7

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\y4914211.exe

    Filesize

    377KB

    MD5

    8eed98323578f46f839f5f6c64338dfc

    SHA1

    4dc77f40c882fdfe042901c9fb68aa135af479d5

    SHA256

    d712ad3d82844421f04e1bf98a132095ba7f82be0fa97318cbfe04df82f78eaa

    SHA512

    fcf9cf522cac5a410d5fdddf419781d9c258513c49a0ce5769dac3f986a03dc4d7760dc1eb7091e4d2849a3534d54d3a1be0274868c1faac1208470a192efbc7

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\y6032575.exe

    Filesize

    206KB

    MD5

    79185704d68a7ef140e654d57f1c33ed

    SHA1

    a719b91b5c194370740dce31ea1bb87df9f21013

    SHA256

    946aa3032db6ad8b1b9c4a7dfafd8de9c5b37675242a8420a454a509f54595eb

    SHA512

    0616421dfa11659ed76318fe11383d14bd78d1488af9a86a112753e912e728a31b9e5adb2414011c95d8c1851895f199350d85c1268baee1078fafb6ff19f553

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\y6032575.exe

    Filesize

    206KB

    MD5

    79185704d68a7ef140e654d57f1c33ed

    SHA1

    a719b91b5c194370740dce31ea1bb87df9f21013

    SHA256

    946aa3032db6ad8b1b9c4a7dfafd8de9c5b37675242a8420a454a509f54595eb

    SHA512

    0616421dfa11659ed76318fe11383d14bd78d1488af9a86a112753e912e728a31b9e5adb2414011c95d8c1851895f199350d85c1268baee1078fafb6ff19f553

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\k4296425.exe

    Filesize

    13KB

    MD5

    a2de3437fd394e851c67f6dc784bc824

    SHA1

    95a75d842945c6d63311834142f4d4d9137cde2c

    SHA256

    8781273cf757bca88ea113b36d68f6d41b15731e28a6e6b543db46213959b77b

    SHA512

    b7189d95121584fccfb3255bd58b42cceafdc900f831dd373e8d79cf412f16a64e14c2b3271af844d7ab7845df0eb3b87df5202fcc7578d12d6641a084202b82

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\l8999147.exe

    Filesize

    172KB

    MD5

    9e85716659a76beb7375ef8dc976e218

    SHA1

    63d6a65f9691565997db57282f5f34d650433c20

    SHA256

    52ac8970fc5ebc37c8d2ba0c1593a4f27e28f87e5d07f2555d59bb0b4c420de9

    SHA512

    625efffee846230ae4d493b0d213813ff275a636662acb7f4bf498c1f692e9758aa6163fd10e70ff69b5c388eae26f46a505fad4654e05f85893bc748bdac1a7

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\l8999147.exe

    Filesize

    172KB

    MD5

    9e85716659a76beb7375ef8dc976e218

    SHA1

    63d6a65f9691565997db57282f5f34d650433c20

    SHA256

    52ac8970fc5ebc37c8d2ba0c1593a4f27e28f87e5d07f2555d59bb0b4c420de9

    SHA512

    625efffee846230ae4d493b0d213813ff275a636662acb7f4bf498c1f692e9758aa6163fd10e70ff69b5c388eae26f46a505fad4654e05f85893bc748bdac1a7

  • memory/304-89-0x00000000008D0000-0x0000000000900000-memory.dmp

    Filesize

    192KB

  • memory/304-90-0x0000000000320000-0x0000000000326000-memory.dmp

    Filesize

    24KB

  • memory/304-91-0x0000000004A90000-0x0000000004AD0000-memory.dmp

    Filesize

    256KB

  • memory/304-92-0x0000000004A90000-0x0000000004AD0000-memory.dmp

    Filesize

    256KB

  • memory/1516-82-0x00000000009B0000-0x00000000009BA000-memory.dmp

    Filesize

    40KB