Analysis

  • max time kernel
    125s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    07/06/2023, 13:47

General

  • Target

    7c0bb648d1a1a0a280e31513517db887f8ff710b1404e.exe

  • Size

    723KB

  • MD5

    7dcf315a91c893c71dfa8a8ee61a29e4

  • SHA1

    e13bf5ac51dd94558dfeffa6c19c932785b83dc4

  • SHA256

    7c0bb648d1a1a0a280e31513517db887f8ff710b1404ed471637f44fe5a561af

  • SHA512

    daf2e174430667906097fac683c23a4fedc0e7c82b70d78f88eee76581b92f6ddb575060d04e0ff3137f6403a163a686798ce6524f9149f956335358ff9638d4

  • SSDEEP

    12288:jMrzy902nDatmn9Bnk5pWRE67881DMTNoJiEkfcqnPiLSAuYB:kyHnD4knNL7881WNoJE0qnPiLnB

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.129:19068

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 11 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c0bb648d1a1a0a280e31513517db887f8ff710b1404e.exe
    "C:\Users\Admin\AppData\Local\Temp\7c0bb648d1a1a0a280e31513517db887f8ff710b1404e.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1424
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8936203.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8936203.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1688
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y9041562.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y9041562.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2032
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y7545597.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y7545597.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:472
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\j3235707.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\j3235707.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1628
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1956
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\k3161599.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\k3161599.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1868
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l7792505.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l7792505.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1736

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8936203.exe

          Filesize

          523KB

          MD5

          e0e05650e616aa309b6d7b2d10d429ad

          SHA1

          049d4f798ff207b95003d4e1632df86e4525f031

          SHA256

          74a5462f7f6692d5fef460f79d0f3c4553a025f71fcfdd6e1e48199aa2999a07

          SHA512

          eaf034b1a6b18207ca0d8364feb72af8a29d5b536c3ef0aadca4c9b444a085d7d8bc1d9dbddf45bb6c7bb9b3a12a79ced9d4c374100bf0508bde7007ccda4e88

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8936203.exe

          Filesize

          523KB

          MD5

          e0e05650e616aa309b6d7b2d10d429ad

          SHA1

          049d4f798ff207b95003d4e1632df86e4525f031

          SHA256

          74a5462f7f6692d5fef460f79d0f3c4553a025f71fcfdd6e1e48199aa2999a07

          SHA512

          eaf034b1a6b18207ca0d8364feb72af8a29d5b536c3ef0aadca4c9b444a085d7d8bc1d9dbddf45bb6c7bb9b3a12a79ced9d4c374100bf0508bde7007ccda4e88

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y9041562.exe

          Filesize

          351KB

          MD5

          1011e574100c0adc49f327ea9e4ed4c3

          SHA1

          a30f7876c433e3820fe4be3a61313fffac281559

          SHA256

          d5b8f0cbae99c43708bded397552e5c78f96e52284779542ac315f823f60bd43

          SHA512

          554baca9443afa24dd0402d94e3e487405f724dfbc52627150764a37e21dc5a421a7171da1242279db02688eaca379c4a9eff2fee7c9c69a6aed43007b2bde6a

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y9041562.exe

          Filesize

          351KB

          MD5

          1011e574100c0adc49f327ea9e4ed4c3

          SHA1

          a30f7876c433e3820fe4be3a61313fffac281559

          SHA256

          d5b8f0cbae99c43708bded397552e5c78f96e52284779542ac315f823f60bd43

          SHA512

          554baca9443afa24dd0402d94e3e487405f724dfbc52627150764a37e21dc5a421a7171da1242279db02688eaca379c4a9eff2fee7c9c69a6aed43007b2bde6a

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l7792505.exe

          Filesize

          172KB

          MD5

          3559584530a52bc9d25b1cd761d8fdbb

          SHA1

          bf5a3e913a3c6f2e886ca54ee54d88fe4d81d310

          SHA256

          1b4286a80247621d935dbf2f66b0e8f2ac46aa35384dae62441005799e4a004b

          SHA512

          fed4c8e6a5e8dc31feb4e0d47c8dafd14d2bb7d660c172bf00c09d530ac77c5e5b409572f2d7ab9060032a936fb6834be91ca7879cf42316b70f7473f1eb1852

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l7792505.exe

          Filesize

          172KB

          MD5

          3559584530a52bc9d25b1cd761d8fdbb

          SHA1

          bf5a3e913a3c6f2e886ca54ee54d88fe4d81d310

          SHA256

          1b4286a80247621d935dbf2f66b0e8f2ac46aa35384dae62441005799e4a004b

          SHA512

          fed4c8e6a5e8dc31feb4e0d47c8dafd14d2bb7d660c172bf00c09d530ac77c5e5b409572f2d7ab9060032a936fb6834be91ca7879cf42316b70f7473f1eb1852

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y7545597.exe

          Filesize

          196KB

          MD5

          7788e4e93ddc3f4c25fa801fb0d76ce0

          SHA1

          733123f631192c758891f3219156c289c28174f0

          SHA256

          a1ce623dbf29eab0135d25a67b9d3f54deecd73986666d135abe765ce12ea94f

          SHA512

          07bdffc633fbba1ddd9e1bee355b5c12b1572120f797913a1cdde4d0d59d2f759fade1f084de2e5d7f9debeca0736e35669fdda7a9024325b3f69f632aed1872

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y7545597.exe

          Filesize

          196KB

          MD5

          7788e4e93ddc3f4c25fa801fb0d76ce0

          SHA1

          733123f631192c758891f3219156c289c28174f0

          SHA256

          a1ce623dbf29eab0135d25a67b9d3f54deecd73986666d135abe765ce12ea94f

          SHA512

          07bdffc633fbba1ddd9e1bee355b5c12b1572120f797913a1cdde4d0d59d2f759fade1f084de2e5d7f9debeca0736e35669fdda7a9024325b3f69f632aed1872

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\j3235707.exe

          Filesize

          102KB

          MD5

          98f6c590aca1b759d52f16cd26827e3b

          SHA1

          e996880a2e3cae960e1a378a1ccff60db5606713

          SHA256

          f8ab58a61a2b1a45828c2a13ca0371c0a2bf8899b3c6828c1de9e4c2b4eab5df

          SHA512

          188234b376153fa02a2e7d2988d1af2bc31d3da2b27f0d7735bee9946302434b677c69092f353f8af7ff29924ecaa184ac6455b156766ba8cdfd981eeb930075

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\j3235707.exe

          Filesize

          102KB

          MD5

          98f6c590aca1b759d52f16cd26827e3b

          SHA1

          e996880a2e3cae960e1a378a1ccff60db5606713

          SHA256

          f8ab58a61a2b1a45828c2a13ca0371c0a2bf8899b3c6828c1de9e4c2b4eab5df

          SHA512

          188234b376153fa02a2e7d2988d1af2bc31d3da2b27f0d7735bee9946302434b677c69092f353f8af7ff29924ecaa184ac6455b156766ba8cdfd981eeb930075

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\k3161599.exe

          Filesize

          13KB

          MD5

          129f59b99d62988203f00a4b76a956a9

          SHA1

          a894bd69049ba5491230cd0f12f982d588cb0dc0

          SHA256

          5ce808727c7f55dc0bfc5f3817fd011aaaebc8f0749e42440e79b0892c3447d3

          SHA512

          a9b5741b0a1fa3763603bfadadcfba0688ee78a70ba958b250191b3f6fff304c8ecedaf9013e28f95d3c107d22ae5cebf6f52bbea7081303502e4dcc349c54c6

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\k3161599.exe

          Filesize

          13KB

          MD5

          129f59b99d62988203f00a4b76a956a9

          SHA1

          a894bd69049ba5491230cd0f12f982d588cb0dc0

          SHA256

          5ce808727c7f55dc0bfc5f3817fd011aaaebc8f0749e42440e79b0892c3447d3

          SHA512

          a9b5741b0a1fa3763603bfadadcfba0688ee78a70ba958b250191b3f6fff304c8ecedaf9013e28f95d3c107d22ae5cebf6f52bbea7081303502e4dcc349c54c6

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\y8936203.exe

          Filesize

          523KB

          MD5

          e0e05650e616aa309b6d7b2d10d429ad

          SHA1

          049d4f798ff207b95003d4e1632df86e4525f031

          SHA256

          74a5462f7f6692d5fef460f79d0f3c4553a025f71fcfdd6e1e48199aa2999a07

          SHA512

          eaf034b1a6b18207ca0d8364feb72af8a29d5b536c3ef0aadca4c9b444a085d7d8bc1d9dbddf45bb6c7bb9b3a12a79ced9d4c374100bf0508bde7007ccda4e88

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\y8936203.exe

          Filesize

          523KB

          MD5

          e0e05650e616aa309b6d7b2d10d429ad

          SHA1

          049d4f798ff207b95003d4e1632df86e4525f031

          SHA256

          74a5462f7f6692d5fef460f79d0f3c4553a025f71fcfdd6e1e48199aa2999a07

          SHA512

          eaf034b1a6b18207ca0d8364feb72af8a29d5b536c3ef0aadca4c9b444a085d7d8bc1d9dbddf45bb6c7bb9b3a12a79ced9d4c374100bf0508bde7007ccda4e88

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\y9041562.exe

          Filesize

          351KB

          MD5

          1011e574100c0adc49f327ea9e4ed4c3

          SHA1

          a30f7876c433e3820fe4be3a61313fffac281559

          SHA256

          d5b8f0cbae99c43708bded397552e5c78f96e52284779542ac315f823f60bd43

          SHA512

          554baca9443afa24dd0402d94e3e487405f724dfbc52627150764a37e21dc5a421a7171da1242279db02688eaca379c4a9eff2fee7c9c69a6aed43007b2bde6a

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\y9041562.exe

          Filesize

          351KB

          MD5

          1011e574100c0adc49f327ea9e4ed4c3

          SHA1

          a30f7876c433e3820fe4be3a61313fffac281559

          SHA256

          d5b8f0cbae99c43708bded397552e5c78f96e52284779542ac315f823f60bd43

          SHA512

          554baca9443afa24dd0402d94e3e487405f724dfbc52627150764a37e21dc5a421a7171da1242279db02688eaca379c4a9eff2fee7c9c69a6aed43007b2bde6a

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\l7792505.exe

          Filesize

          172KB

          MD5

          3559584530a52bc9d25b1cd761d8fdbb

          SHA1

          bf5a3e913a3c6f2e886ca54ee54d88fe4d81d310

          SHA256

          1b4286a80247621d935dbf2f66b0e8f2ac46aa35384dae62441005799e4a004b

          SHA512

          fed4c8e6a5e8dc31feb4e0d47c8dafd14d2bb7d660c172bf00c09d530ac77c5e5b409572f2d7ab9060032a936fb6834be91ca7879cf42316b70f7473f1eb1852

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\l7792505.exe

          Filesize

          172KB

          MD5

          3559584530a52bc9d25b1cd761d8fdbb

          SHA1

          bf5a3e913a3c6f2e886ca54ee54d88fe4d81d310

          SHA256

          1b4286a80247621d935dbf2f66b0e8f2ac46aa35384dae62441005799e4a004b

          SHA512

          fed4c8e6a5e8dc31feb4e0d47c8dafd14d2bb7d660c172bf00c09d530ac77c5e5b409572f2d7ab9060032a936fb6834be91ca7879cf42316b70f7473f1eb1852

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\y7545597.exe

          Filesize

          196KB

          MD5

          7788e4e93ddc3f4c25fa801fb0d76ce0

          SHA1

          733123f631192c758891f3219156c289c28174f0

          SHA256

          a1ce623dbf29eab0135d25a67b9d3f54deecd73986666d135abe765ce12ea94f

          SHA512

          07bdffc633fbba1ddd9e1bee355b5c12b1572120f797913a1cdde4d0d59d2f759fade1f084de2e5d7f9debeca0736e35669fdda7a9024325b3f69f632aed1872

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\y7545597.exe

          Filesize

          196KB

          MD5

          7788e4e93ddc3f4c25fa801fb0d76ce0

          SHA1

          733123f631192c758891f3219156c289c28174f0

          SHA256

          a1ce623dbf29eab0135d25a67b9d3f54deecd73986666d135abe765ce12ea94f

          SHA512

          07bdffc633fbba1ddd9e1bee355b5c12b1572120f797913a1cdde4d0d59d2f759fade1f084de2e5d7f9debeca0736e35669fdda7a9024325b3f69f632aed1872

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\j3235707.exe

          Filesize

          102KB

          MD5

          98f6c590aca1b759d52f16cd26827e3b

          SHA1

          e996880a2e3cae960e1a378a1ccff60db5606713

          SHA256

          f8ab58a61a2b1a45828c2a13ca0371c0a2bf8899b3c6828c1de9e4c2b4eab5df

          SHA512

          188234b376153fa02a2e7d2988d1af2bc31d3da2b27f0d7735bee9946302434b677c69092f353f8af7ff29924ecaa184ac6455b156766ba8cdfd981eeb930075

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\j3235707.exe

          Filesize

          102KB

          MD5

          98f6c590aca1b759d52f16cd26827e3b

          SHA1

          e996880a2e3cae960e1a378a1ccff60db5606713

          SHA256

          f8ab58a61a2b1a45828c2a13ca0371c0a2bf8899b3c6828c1de9e4c2b4eab5df

          SHA512

          188234b376153fa02a2e7d2988d1af2bc31d3da2b27f0d7735bee9946302434b677c69092f353f8af7ff29924ecaa184ac6455b156766ba8cdfd981eeb930075

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\k3161599.exe

          Filesize

          13KB

          MD5

          129f59b99d62988203f00a4b76a956a9

          SHA1

          a894bd69049ba5491230cd0f12f982d588cb0dc0

          SHA256

          5ce808727c7f55dc0bfc5f3817fd011aaaebc8f0749e42440e79b0892c3447d3

          SHA512

          a9b5741b0a1fa3763603bfadadcfba0688ee78a70ba958b250191b3f6fff304c8ecedaf9013e28f95d3c107d22ae5cebf6f52bbea7081303502e4dcc349c54c6

        • memory/1736-115-0x0000000001230000-0x0000000001260000-memory.dmp

          Filesize

          192KB

        • memory/1736-116-0x0000000000220000-0x0000000000226000-memory.dmp

          Filesize

          24KB

        • memory/1736-117-0x0000000004CE0000-0x0000000004D20000-memory.dmp

          Filesize

          256KB

        • memory/1736-118-0x0000000004CE0000-0x0000000004D20000-memory.dmp

          Filesize

          256KB

        • memory/1868-108-0x0000000000E80000-0x0000000000E8A000-memory.dmp

          Filesize

          40KB

        • memory/1956-103-0x0000000000090000-0x000000000009A000-memory.dmp

          Filesize

          40KB

        • memory/1956-102-0x0000000000090000-0x000000000009A000-memory.dmp

          Filesize

          40KB

        • memory/1956-100-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

          Filesize

          4KB

        • memory/1956-95-0x0000000000090000-0x000000000009A000-memory.dmp

          Filesize

          40KB

        • memory/1956-96-0x0000000000090000-0x000000000009A000-memory.dmp

          Filesize

          40KB