Analysis

  • max time kernel
    137s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2023, 05:18

General

  • Target

    b634c051b3b9ecaaad577370b1cdaf93.exe

  • Size

    956KB

  • MD5

    b634c051b3b9ecaaad577370b1cdaf93

  • SHA1

    e723ecc59dc9fd480cc107018a723a0b8f7bd770

  • SHA256

    6d62e33f50b6b4e4d8ca4b549a5a71075e907ebed10bef5849b5c3427e331c7a

  • SHA512

    3975706a7149ac042b04d7318e41e4960539f1b9d17778974912b6c244fead85cbf58fbba1aae989873e35f4b36ab7a15778e0e5b78bf3867d9143bcc1cbbe93

  • SSDEEP

    12288:UMrpy90dytiPYTBX9uZ54cQiCgc8lvNHzvj0FTC7Ht1nFySIftSPRBZh4fxnbA9c:Fy0wTBXco6xZ6FTgt1ISI6tE42ai1

Malware Config

Extracted

Family

redline

Botnet

dugin

C2

77.91.124.73:19071

Attributes
  • auth_value

    7c3e46e091100fd26a6076996d374c28

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b634c051b3b9ecaaad577370b1cdaf93.exe
    "C:\Users\Admin\AppData\Local\Temp\b634c051b3b9ecaaad577370b1cdaf93.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1569448.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1569448.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2064
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1192274.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1192274.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2216
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0792882.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0792882.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2976
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0398685.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0398685.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2184
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a1019067.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a1019067.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:2320
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9007000.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9007000.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:2968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1569448.exe

    Filesize

    723KB

    MD5

    c0ebbcb2fd528e0e095fc7e86bcff68d

    SHA1

    835948d4715e64ab760edcb5bba78243286edfa3

    SHA256

    7294bbe6b8d4a04a5394d7d12169dfc19b406a0960be0dfddb11307bdcc6f204

    SHA512

    2a36ad4b165eeb355b980670c15b685259e64ba477de3802484847c87926fabac4451e320b04fc027e3c00401aaceabe418445d4b96d10141ba0172a76128b1f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1569448.exe

    Filesize

    723KB

    MD5

    c0ebbcb2fd528e0e095fc7e86bcff68d

    SHA1

    835948d4715e64ab760edcb5bba78243286edfa3

    SHA256

    7294bbe6b8d4a04a5394d7d12169dfc19b406a0960be0dfddb11307bdcc6f204

    SHA512

    2a36ad4b165eeb355b980670c15b685259e64ba477de3802484847c87926fabac4451e320b04fc027e3c00401aaceabe418445d4b96d10141ba0172a76128b1f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1192274.exe

    Filesize

    598KB

    MD5

    34c3799271f592523c6d68f08da5f4c7

    SHA1

    41957d6027ed4cdc9b63c0d50d96bfbd6d77fa6d

    SHA256

    46ad02fca5f6bece859dc0fff93a7542bc22921145950bb8966779a099e0e0c1

    SHA512

    d7dc3ba86573a3fbd8387ffd9dc48b60846fb538b84adf14e1e8c0c87f238017227edeed17df02e7b548086400e6d3ab9a023bf2345fd60d8812e080fd3c0564

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1192274.exe

    Filesize

    598KB

    MD5

    34c3799271f592523c6d68f08da5f4c7

    SHA1

    41957d6027ed4cdc9b63c0d50d96bfbd6d77fa6d

    SHA256

    46ad02fca5f6bece859dc0fff93a7542bc22921145950bb8966779a099e0e0c1

    SHA512

    d7dc3ba86573a3fbd8387ffd9dc48b60846fb538b84adf14e1e8c0c87f238017227edeed17df02e7b548086400e6d3ab9a023bf2345fd60d8812e080fd3c0564

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0792882.exe

    Filesize

    372KB

    MD5

    1f894e3227953c58ded70a5436d7b710

    SHA1

    9d62979db62d42aaf73dc88548d638703b8ca903

    SHA256

    28a190dbec14ea187fcafc61bdc34e3de204835199cd23c43578c2d1db2160b7

    SHA512

    d65f47ab90f7416bd956135b087d2460c63c16d3bf2d65193a4d13145fa8a2847b030a57ec509f50448e03221108f19a3a27255595e0c1965057e8fd778bc7e9

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0792882.exe

    Filesize

    372KB

    MD5

    1f894e3227953c58ded70a5436d7b710

    SHA1

    9d62979db62d42aaf73dc88548d638703b8ca903

    SHA256

    28a190dbec14ea187fcafc61bdc34e3de204835199cd23c43578c2d1db2160b7

    SHA512

    d65f47ab90f7416bd956135b087d2460c63c16d3bf2d65193a4d13145fa8a2847b030a57ec509f50448e03221108f19a3a27255595e0c1965057e8fd778bc7e9

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0398685.exe

    Filesize

    271KB

    MD5

    a9388dc912e3b6bb642356f1992ffb19

    SHA1

    49efbf8d162b62130f0e093979bcee3b774f2057

    SHA256

    5d7b7580a3d853dba6c82d1793c89d1ef6a8361eb05c5b7fdcd62fb2d8476739

    SHA512

    95075fbb7aa1e4b75e84548e2b4aa1c96cd0601a437624b061a8a09337bd4145a906c5aa77481d16f49dcafd7ec4d2f8faf986802a4363a27638047bd4f99a1d

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0398685.exe

    Filesize

    271KB

    MD5

    a9388dc912e3b6bb642356f1992ffb19

    SHA1

    49efbf8d162b62130f0e093979bcee3b774f2057

    SHA256

    5d7b7580a3d853dba6c82d1793c89d1ef6a8361eb05c5b7fdcd62fb2d8476739

    SHA512

    95075fbb7aa1e4b75e84548e2b4aa1c96cd0601a437624b061a8a09337bd4145a906c5aa77481d16f49dcafd7ec4d2f8faf986802a4363a27638047bd4f99a1d

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a1019067.exe

    Filesize

    140KB

    MD5

    77a93a6afb1d7fa81c674cbecbee8531

    SHA1

    fbd5275cea45278e48c3306c5e069619cdf038b3

    SHA256

    0fcb9c3965ee7f2c36d232a624e0769542916f207ab4118a1e6d56fabffb3675

    SHA512

    dc09b69e4ba62ccbb61310d39d185ad06e3e74759cfeb193a0d626ee36f35f27dd51f22425985884dd88143c5c24cbbb1da74e105c0adcc33a3a53e9b898d40e

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a1019067.exe

    Filesize

    140KB

    MD5

    77a93a6afb1d7fa81c674cbecbee8531

    SHA1

    fbd5275cea45278e48c3306c5e069619cdf038b3

    SHA256

    0fcb9c3965ee7f2c36d232a624e0769542916f207ab4118a1e6d56fabffb3675

    SHA512

    dc09b69e4ba62ccbb61310d39d185ad06e3e74759cfeb193a0d626ee36f35f27dd51f22425985884dd88143c5c24cbbb1da74e105c0adcc33a3a53e9b898d40e

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9007000.exe

    Filesize

    173KB

    MD5

    d5f3785f09b0b4ddb516cb1bba85a36d

    SHA1

    978b0c33233c9ab63a596cbb282473f1e99b07d4

    SHA256

    64b6558c24af070e047262ad247dc64b968f8d919a5c9bb2b5c279931ef38db0

    SHA512

    40f87989963ef21438f1378eb4b8f4d736bf7de67d2a12670faa6f94ab221dfb475eed8cec99208539e0a06e61ef987f8a7a5cb759442fc79583200b393611fb

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9007000.exe

    Filesize

    173KB

    MD5

    d5f3785f09b0b4ddb516cb1bba85a36d

    SHA1

    978b0c33233c9ab63a596cbb282473f1e99b07d4

    SHA256

    64b6558c24af070e047262ad247dc64b968f8d919a5c9bb2b5c279931ef38db0

    SHA512

    40f87989963ef21438f1378eb4b8f4d736bf7de67d2a12670faa6f94ab221dfb475eed8cec99208539e0a06e61ef987f8a7a5cb759442fc79583200b393611fb

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v1569448.exe

    Filesize

    723KB

    MD5

    c0ebbcb2fd528e0e095fc7e86bcff68d

    SHA1

    835948d4715e64ab760edcb5bba78243286edfa3

    SHA256

    7294bbe6b8d4a04a5394d7d12169dfc19b406a0960be0dfddb11307bdcc6f204

    SHA512

    2a36ad4b165eeb355b980670c15b685259e64ba477de3802484847c87926fabac4451e320b04fc027e3c00401aaceabe418445d4b96d10141ba0172a76128b1f

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v1569448.exe

    Filesize

    723KB

    MD5

    c0ebbcb2fd528e0e095fc7e86bcff68d

    SHA1

    835948d4715e64ab760edcb5bba78243286edfa3

    SHA256

    7294bbe6b8d4a04a5394d7d12169dfc19b406a0960be0dfddb11307bdcc6f204

    SHA512

    2a36ad4b165eeb355b980670c15b685259e64ba477de3802484847c87926fabac4451e320b04fc027e3c00401aaceabe418445d4b96d10141ba0172a76128b1f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v1192274.exe

    Filesize

    598KB

    MD5

    34c3799271f592523c6d68f08da5f4c7

    SHA1

    41957d6027ed4cdc9b63c0d50d96bfbd6d77fa6d

    SHA256

    46ad02fca5f6bece859dc0fff93a7542bc22921145950bb8966779a099e0e0c1

    SHA512

    d7dc3ba86573a3fbd8387ffd9dc48b60846fb538b84adf14e1e8c0c87f238017227edeed17df02e7b548086400e6d3ab9a023bf2345fd60d8812e080fd3c0564

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v1192274.exe

    Filesize

    598KB

    MD5

    34c3799271f592523c6d68f08da5f4c7

    SHA1

    41957d6027ed4cdc9b63c0d50d96bfbd6d77fa6d

    SHA256

    46ad02fca5f6bece859dc0fff93a7542bc22921145950bb8966779a099e0e0c1

    SHA512

    d7dc3ba86573a3fbd8387ffd9dc48b60846fb538b84adf14e1e8c0c87f238017227edeed17df02e7b548086400e6d3ab9a023bf2345fd60d8812e080fd3c0564

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v0792882.exe

    Filesize

    372KB

    MD5

    1f894e3227953c58ded70a5436d7b710

    SHA1

    9d62979db62d42aaf73dc88548d638703b8ca903

    SHA256

    28a190dbec14ea187fcafc61bdc34e3de204835199cd23c43578c2d1db2160b7

    SHA512

    d65f47ab90f7416bd956135b087d2460c63c16d3bf2d65193a4d13145fa8a2847b030a57ec509f50448e03221108f19a3a27255595e0c1965057e8fd778bc7e9

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v0792882.exe

    Filesize

    372KB

    MD5

    1f894e3227953c58ded70a5436d7b710

    SHA1

    9d62979db62d42aaf73dc88548d638703b8ca903

    SHA256

    28a190dbec14ea187fcafc61bdc34e3de204835199cd23c43578c2d1db2160b7

    SHA512

    d65f47ab90f7416bd956135b087d2460c63c16d3bf2d65193a4d13145fa8a2847b030a57ec509f50448e03221108f19a3a27255595e0c1965057e8fd778bc7e9

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v0398685.exe

    Filesize

    271KB

    MD5

    a9388dc912e3b6bb642356f1992ffb19

    SHA1

    49efbf8d162b62130f0e093979bcee3b774f2057

    SHA256

    5d7b7580a3d853dba6c82d1793c89d1ef6a8361eb05c5b7fdcd62fb2d8476739

    SHA512

    95075fbb7aa1e4b75e84548e2b4aa1c96cd0601a437624b061a8a09337bd4145a906c5aa77481d16f49dcafd7ec4d2f8faf986802a4363a27638047bd4f99a1d

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v0398685.exe

    Filesize

    271KB

    MD5

    a9388dc912e3b6bb642356f1992ffb19

    SHA1

    49efbf8d162b62130f0e093979bcee3b774f2057

    SHA256

    5d7b7580a3d853dba6c82d1793c89d1ef6a8361eb05c5b7fdcd62fb2d8476739

    SHA512

    95075fbb7aa1e4b75e84548e2b4aa1c96cd0601a437624b061a8a09337bd4145a906c5aa77481d16f49dcafd7ec4d2f8faf986802a4363a27638047bd4f99a1d

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a1019067.exe

    Filesize

    140KB

    MD5

    77a93a6afb1d7fa81c674cbecbee8531

    SHA1

    fbd5275cea45278e48c3306c5e069619cdf038b3

    SHA256

    0fcb9c3965ee7f2c36d232a624e0769542916f207ab4118a1e6d56fabffb3675

    SHA512

    dc09b69e4ba62ccbb61310d39d185ad06e3e74759cfeb193a0d626ee36f35f27dd51f22425985884dd88143c5c24cbbb1da74e105c0adcc33a3a53e9b898d40e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a1019067.exe

    Filesize

    140KB

    MD5

    77a93a6afb1d7fa81c674cbecbee8531

    SHA1

    fbd5275cea45278e48c3306c5e069619cdf038b3

    SHA256

    0fcb9c3965ee7f2c36d232a624e0769542916f207ab4118a1e6d56fabffb3675

    SHA512

    dc09b69e4ba62ccbb61310d39d185ad06e3e74759cfeb193a0d626ee36f35f27dd51f22425985884dd88143c5c24cbbb1da74e105c0adcc33a3a53e9b898d40e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b9007000.exe

    Filesize

    173KB

    MD5

    d5f3785f09b0b4ddb516cb1bba85a36d

    SHA1

    978b0c33233c9ab63a596cbb282473f1e99b07d4

    SHA256

    64b6558c24af070e047262ad247dc64b968f8d919a5c9bb2b5c279931ef38db0

    SHA512

    40f87989963ef21438f1378eb4b8f4d736bf7de67d2a12670faa6f94ab221dfb475eed8cec99208539e0a06e61ef987f8a7a5cb759442fc79583200b393611fb

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b9007000.exe

    Filesize

    173KB

    MD5

    d5f3785f09b0b4ddb516cb1bba85a36d

    SHA1

    978b0c33233c9ab63a596cbb282473f1e99b07d4

    SHA256

    64b6558c24af070e047262ad247dc64b968f8d919a5c9bb2b5c279931ef38db0

    SHA512

    40f87989963ef21438f1378eb4b8f4d736bf7de67d2a12670faa6f94ab221dfb475eed8cec99208539e0a06e61ef987f8a7a5cb759442fc79583200b393611fb

  • memory/2968-110-0x0000000000240000-0x0000000000270000-memory.dmp

    Filesize

    192KB

  • memory/2968-111-0x0000000000320000-0x0000000000326000-memory.dmp

    Filesize

    24KB