Analysis

  • max time kernel
    146s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    02-09-2023 20:47

General

  • Target

    file.exe

  • Size

    937KB

  • MD5

    05098633e1315f95fafe0a91c06729eb

  • SHA1

    631b8c09e9006162057cfb189968de423e077168

  • SHA256

    c84178cc9e21c9f0068e1bad56350eff5bb0a48b4ab918b564413b3e792c3725

  • SHA512

    fda6ef9f7a67c52b7835e8c3c209b92d4f39d59e885a0728970c5caafc54d904b631c5ebbb9019ad39b171bcbe044b2010c08c5bf1f2440713c565a08e18dc27

  • SSDEEP

    24576:gylkKH/K3pllMW3bvNWm9A8zpBtDTLV6:n2KH/K55DNWm99zbJ

Malware Config

Extracted

Family

redline

Botnet

narik

C2

77.91.124.82:19071

Attributes
  • auth_value

    07924f5ef90576eb64faea857b8ba3e5

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 14 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1300
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9346535.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9346535.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1756
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8541974.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8541974.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2332
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1947590.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1947590.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2720
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3534289.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3534289.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2448
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5544476.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5544476.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Loads dropped DLL
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2876
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b5689491.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b5689491.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:2488
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c5538816.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c5538816.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9346535.exe

    Filesize

    832KB

    MD5

    bfd35f0a3344a3cc61b8e8868627e495

    SHA1

    6881b7add97dab539ff2983ad9f75c0d2cd27a61

    SHA256

    cedd4fd4559b9ff97bf7f5a27932cdc435c7ebf307c9a05438a477cd984b0a9c

    SHA512

    95f287973de7daa548710eb2f3069ab9aa38c25776e9f4d1c37dd9ef9d24d1a6c0a0197304f02ff4964127bcb7fcdeb13b52566781c2567c0b423c375a5664de

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9346535.exe

    Filesize

    832KB

    MD5

    bfd35f0a3344a3cc61b8e8868627e495

    SHA1

    6881b7add97dab539ff2983ad9f75c0d2cd27a61

    SHA256

    cedd4fd4559b9ff97bf7f5a27932cdc435c7ebf307c9a05438a477cd984b0a9c

    SHA512

    95f287973de7daa548710eb2f3069ab9aa38c25776e9f4d1c37dd9ef9d24d1a6c0a0197304f02ff4964127bcb7fcdeb13b52566781c2567c0b423c375a5664de

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8541974.exe

    Filesize

    605KB

    MD5

    99f86e09641e91d539aaef9c1c6d575d

    SHA1

    f1f4a8e340434d14dd0c3453d878874c30cc2a0c

    SHA256

    b7dad78eb07b12f7715116ed0159e10f697ca8ff626d4824d92aede83cc8f902

    SHA512

    31919617567a4fa0fb199df59bbe3d0269f06e2d8e4a0ada672257a4b4a0de4e49e0e6543d79702880cd1ab2a7c95fe57535a3c61e96d8f6434c1a550a81cd9b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8541974.exe

    Filesize

    605KB

    MD5

    99f86e09641e91d539aaef9c1c6d575d

    SHA1

    f1f4a8e340434d14dd0c3453d878874c30cc2a0c

    SHA256

    b7dad78eb07b12f7715116ed0159e10f697ca8ff626d4824d92aede83cc8f902

    SHA512

    31919617567a4fa0fb199df59bbe3d0269f06e2d8e4a0ada672257a4b4a0de4e49e0e6543d79702880cd1ab2a7c95fe57535a3c61e96d8f6434c1a550a81cd9b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1947590.exe

    Filesize

    481KB

    MD5

    94c20da7cbb049cbfc032e3c4b8807a1

    SHA1

    ed688a2297378af3ce52b3446dbf259a1701a447

    SHA256

    20fa4d15169064a5763046bed5a2b18797bd6e1af16bcbd8d9a335485da1f1ff

    SHA512

    1804c45661ffc759d93b62d9fa041d771b0cd41405f72109acf0160e6fdd430881b93529f0c2d6f2c572f0f1fb4d5f05192ca5f0dda5f562191ca4d73d0e53f1

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1947590.exe

    Filesize

    481KB

    MD5

    94c20da7cbb049cbfc032e3c4b8807a1

    SHA1

    ed688a2297378af3ce52b3446dbf259a1701a447

    SHA256

    20fa4d15169064a5763046bed5a2b18797bd6e1af16bcbd8d9a335485da1f1ff

    SHA512

    1804c45661ffc759d93b62d9fa041d771b0cd41405f72109acf0160e6fdd430881b93529f0c2d6f2c572f0f1fb4d5f05192ca5f0dda5f562191ca4d73d0e53f1

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c5538816.exe

    Filesize

    174KB

    MD5

    7eb06264203f79eee838b496155533e1

    SHA1

    eb7050f0b491dc1693ca0cb1e44c43dd7e5895ca

    SHA256

    05f8f50924fc0782c11fb9ac678d288a1a9291f55bff26fc32128f969b4fc568

    SHA512

    64536ad9903d36763f1d1bd11d512f3d7568f0b66ee13b3a39e8981f993efdb7a3e0ea35b42532c8f2b5736076e9ff3e135286997b3fa74d14eca71977860f41

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c5538816.exe

    Filesize

    174KB

    MD5

    7eb06264203f79eee838b496155533e1

    SHA1

    eb7050f0b491dc1693ca0cb1e44c43dd7e5895ca

    SHA256

    05f8f50924fc0782c11fb9ac678d288a1a9291f55bff26fc32128f969b4fc568

    SHA512

    64536ad9903d36763f1d1bd11d512f3d7568f0b66ee13b3a39e8981f993efdb7a3e0ea35b42532c8f2b5736076e9ff3e135286997b3fa74d14eca71977860f41

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3534289.exe

    Filesize

    325KB

    MD5

    29d69ac8a4206c78e69971480efc7896

    SHA1

    f636ba6510e6d4d0bdcc5a8733d433976f09e997

    SHA256

    d96e2d00b59da026608c597096363c2897310f78c31cc76ddbbba5b453768f9d

    SHA512

    bee1e8d0cb0a4678992d8f7cfd7f3f763e3d0365d980094ce9e330a9b28bd55ab6c56d2dc83b91c193d14fea90bbdbb25ee1aa033b333e2d289f776dac528bcc

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3534289.exe

    Filesize

    325KB

    MD5

    29d69ac8a4206c78e69971480efc7896

    SHA1

    f636ba6510e6d4d0bdcc5a8733d433976f09e997

    SHA256

    d96e2d00b59da026608c597096363c2897310f78c31cc76ddbbba5b453768f9d

    SHA512

    bee1e8d0cb0a4678992d8f7cfd7f3f763e3d0365d980094ce9e330a9b28bd55ab6c56d2dc83b91c193d14fea90bbdbb25ee1aa033b333e2d289f776dac528bcc

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5544476.exe

    Filesize

    184KB

    MD5

    fe7d57d58b5125ff4608c0ba6561cde8

    SHA1

    edeb7372c8ee9c3c4d767f3ae0e9f1a7631529ae

    SHA256

    e62bcf43eb9979cf2b2d6e19dbf80216e29965e12a6b9a72fe8f8d1c9440f826

    SHA512

    7dce05b7b745135c8e4ffebaa0220230b26d04551185e138707720876d6bd306684de22b52d637d80f8cc7146be61f1c42ef72e1967837cdfab9f5688d716d47

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5544476.exe

    Filesize

    184KB

    MD5

    fe7d57d58b5125ff4608c0ba6561cde8

    SHA1

    edeb7372c8ee9c3c4d767f3ae0e9f1a7631529ae

    SHA256

    e62bcf43eb9979cf2b2d6e19dbf80216e29965e12a6b9a72fe8f8d1c9440f826

    SHA512

    7dce05b7b745135c8e4ffebaa0220230b26d04551185e138707720876d6bd306684de22b52d637d80f8cc7146be61f1c42ef72e1967837cdfab9f5688d716d47

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b5689491.exe

    Filesize

    140KB

    MD5

    760ee1a70c107b9705eef396195fac30

    SHA1

    96da6ee7697359979087a3768e8c20c88376f50f

    SHA256

    18d60d681989f6ba4283ca059a2adb2798ab8948bba41ba247dde9e08af364e2

    SHA512

    dd13306d5895607c9d9532b6182217951cfb63cc3bf7ec426cedc0ccf30502c30108bc02375dd80cb90031348d804d6f8f8887b5844c5600467b4dbfa6aac0b1

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b5689491.exe

    Filesize

    140KB

    MD5

    760ee1a70c107b9705eef396195fac30

    SHA1

    96da6ee7697359979087a3768e8c20c88376f50f

    SHA256

    18d60d681989f6ba4283ca059a2adb2798ab8948bba41ba247dde9e08af364e2

    SHA512

    dd13306d5895607c9d9532b6182217951cfb63cc3bf7ec426cedc0ccf30502c30108bc02375dd80cb90031348d804d6f8f8887b5844c5600467b4dbfa6aac0b1

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v9346535.exe

    Filesize

    832KB

    MD5

    bfd35f0a3344a3cc61b8e8868627e495

    SHA1

    6881b7add97dab539ff2983ad9f75c0d2cd27a61

    SHA256

    cedd4fd4559b9ff97bf7f5a27932cdc435c7ebf307c9a05438a477cd984b0a9c

    SHA512

    95f287973de7daa548710eb2f3069ab9aa38c25776e9f4d1c37dd9ef9d24d1a6c0a0197304f02ff4964127bcb7fcdeb13b52566781c2567c0b423c375a5664de

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v9346535.exe

    Filesize

    832KB

    MD5

    bfd35f0a3344a3cc61b8e8868627e495

    SHA1

    6881b7add97dab539ff2983ad9f75c0d2cd27a61

    SHA256

    cedd4fd4559b9ff97bf7f5a27932cdc435c7ebf307c9a05438a477cd984b0a9c

    SHA512

    95f287973de7daa548710eb2f3069ab9aa38c25776e9f4d1c37dd9ef9d24d1a6c0a0197304f02ff4964127bcb7fcdeb13b52566781c2567c0b423c375a5664de

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v8541974.exe

    Filesize

    605KB

    MD5

    99f86e09641e91d539aaef9c1c6d575d

    SHA1

    f1f4a8e340434d14dd0c3453d878874c30cc2a0c

    SHA256

    b7dad78eb07b12f7715116ed0159e10f697ca8ff626d4824d92aede83cc8f902

    SHA512

    31919617567a4fa0fb199df59bbe3d0269f06e2d8e4a0ada672257a4b4a0de4e49e0e6543d79702880cd1ab2a7c95fe57535a3c61e96d8f6434c1a550a81cd9b

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v8541974.exe

    Filesize

    605KB

    MD5

    99f86e09641e91d539aaef9c1c6d575d

    SHA1

    f1f4a8e340434d14dd0c3453d878874c30cc2a0c

    SHA256

    b7dad78eb07b12f7715116ed0159e10f697ca8ff626d4824d92aede83cc8f902

    SHA512

    31919617567a4fa0fb199df59bbe3d0269f06e2d8e4a0ada672257a4b4a0de4e49e0e6543d79702880cd1ab2a7c95fe57535a3c61e96d8f6434c1a550a81cd9b

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v1947590.exe

    Filesize

    481KB

    MD5

    94c20da7cbb049cbfc032e3c4b8807a1

    SHA1

    ed688a2297378af3ce52b3446dbf259a1701a447

    SHA256

    20fa4d15169064a5763046bed5a2b18797bd6e1af16bcbd8d9a335485da1f1ff

    SHA512

    1804c45661ffc759d93b62d9fa041d771b0cd41405f72109acf0160e6fdd430881b93529f0c2d6f2c572f0f1fb4d5f05192ca5f0dda5f562191ca4d73d0e53f1

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v1947590.exe

    Filesize

    481KB

    MD5

    94c20da7cbb049cbfc032e3c4b8807a1

    SHA1

    ed688a2297378af3ce52b3446dbf259a1701a447

    SHA256

    20fa4d15169064a5763046bed5a2b18797bd6e1af16bcbd8d9a335485da1f1ff

    SHA512

    1804c45661ffc759d93b62d9fa041d771b0cd41405f72109acf0160e6fdd430881b93529f0c2d6f2c572f0f1fb4d5f05192ca5f0dda5f562191ca4d73d0e53f1

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\c5538816.exe

    Filesize

    174KB

    MD5

    7eb06264203f79eee838b496155533e1

    SHA1

    eb7050f0b491dc1693ca0cb1e44c43dd7e5895ca

    SHA256

    05f8f50924fc0782c11fb9ac678d288a1a9291f55bff26fc32128f969b4fc568

    SHA512

    64536ad9903d36763f1d1bd11d512f3d7568f0b66ee13b3a39e8981f993efdb7a3e0ea35b42532c8f2b5736076e9ff3e135286997b3fa74d14eca71977860f41

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\c5538816.exe

    Filesize

    174KB

    MD5

    7eb06264203f79eee838b496155533e1

    SHA1

    eb7050f0b491dc1693ca0cb1e44c43dd7e5895ca

    SHA256

    05f8f50924fc0782c11fb9ac678d288a1a9291f55bff26fc32128f969b4fc568

    SHA512

    64536ad9903d36763f1d1bd11d512f3d7568f0b66ee13b3a39e8981f993efdb7a3e0ea35b42532c8f2b5736076e9ff3e135286997b3fa74d14eca71977860f41

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v3534289.exe

    Filesize

    325KB

    MD5

    29d69ac8a4206c78e69971480efc7896

    SHA1

    f636ba6510e6d4d0bdcc5a8733d433976f09e997

    SHA256

    d96e2d00b59da026608c597096363c2897310f78c31cc76ddbbba5b453768f9d

    SHA512

    bee1e8d0cb0a4678992d8f7cfd7f3f763e3d0365d980094ce9e330a9b28bd55ab6c56d2dc83b91c193d14fea90bbdbb25ee1aa033b333e2d289f776dac528bcc

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v3534289.exe

    Filesize

    325KB

    MD5

    29d69ac8a4206c78e69971480efc7896

    SHA1

    f636ba6510e6d4d0bdcc5a8733d433976f09e997

    SHA256

    d96e2d00b59da026608c597096363c2897310f78c31cc76ddbbba5b453768f9d

    SHA512

    bee1e8d0cb0a4678992d8f7cfd7f3f763e3d0365d980094ce9e330a9b28bd55ab6c56d2dc83b91c193d14fea90bbdbb25ee1aa033b333e2d289f776dac528bcc

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a5544476.exe

    Filesize

    184KB

    MD5

    fe7d57d58b5125ff4608c0ba6561cde8

    SHA1

    edeb7372c8ee9c3c4d767f3ae0e9f1a7631529ae

    SHA256

    e62bcf43eb9979cf2b2d6e19dbf80216e29965e12a6b9a72fe8f8d1c9440f826

    SHA512

    7dce05b7b745135c8e4ffebaa0220230b26d04551185e138707720876d6bd306684de22b52d637d80f8cc7146be61f1c42ef72e1967837cdfab9f5688d716d47

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a5544476.exe

    Filesize

    184KB

    MD5

    fe7d57d58b5125ff4608c0ba6561cde8

    SHA1

    edeb7372c8ee9c3c4d767f3ae0e9f1a7631529ae

    SHA256

    e62bcf43eb9979cf2b2d6e19dbf80216e29965e12a6b9a72fe8f8d1c9440f826

    SHA512

    7dce05b7b745135c8e4ffebaa0220230b26d04551185e138707720876d6bd306684de22b52d637d80f8cc7146be61f1c42ef72e1967837cdfab9f5688d716d47

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b5689491.exe

    Filesize

    140KB

    MD5

    760ee1a70c107b9705eef396195fac30

    SHA1

    96da6ee7697359979087a3768e8c20c88376f50f

    SHA256

    18d60d681989f6ba4283ca059a2adb2798ab8948bba41ba247dde9e08af364e2

    SHA512

    dd13306d5895607c9d9532b6182217951cfb63cc3bf7ec426cedc0ccf30502c30108bc02375dd80cb90031348d804d6f8f8887b5844c5600467b4dbfa6aac0b1

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b5689491.exe

    Filesize

    140KB

    MD5

    760ee1a70c107b9705eef396195fac30

    SHA1

    96da6ee7697359979087a3768e8c20c88376f50f

    SHA256

    18d60d681989f6ba4283ca059a2adb2798ab8948bba41ba247dde9e08af364e2

    SHA512

    dd13306d5895607c9d9532b6182217951cfb63cc3bf7ec426cedc0ccf30502c30108bc02375dd80cb90031348d804d6f8f8887b5844c5600467b4dbfa6aac0b1

  • memory/1752-92-0x0000000001000000-0x0000000001030000-memory.dmp

    Filesize

    192KB

  • memory/1752-93-0x0000000000370000-0x0000000000376000-memory.dmp

    Filesize

    24KB

  • memory/2876-52-0x00000000004C0000-0x00000000004D6000-memory.dmp

    Filesize

    88KB

  • memory/2876-69-0x00000000004C0000-0x00000000004D6000-memory.dmp

    Filesize

    88KB

  • memory/2876-71-0x00000000004C0000-0x00000000004D6000-memory.dmp

    Filesize

    88KB

  • memory/2876-73-0x00000000004C0000-0x00000000004D6000-memory.dmp

    Filesize

    88KB

  • memory/2876-75-0x00000000004C0000-0x00000000004D6000-memory.dmp

    Filesize

    88KB

  • memory/2876-77-0x00000000004C0000-0x00000000004D6000-memory.dmp

    Filesize

    88KB

  • memory/2876-79-0x00000000004C0000-0x00000000004D6000-memory.dmp

    Filesize

    88KB

  • memory/2876-67-0x00000000004C0000-0x00000000004D6000-memory.dmp

    Filesize

    88KB

  • memory/2876-65-0x00000000004C0000-0x00000000004D6000-memory.dmp

    Filesize

    88KB

  • memory/2876-63-0x00000000004C0000-0x00000000004D6000-memory.dmp

    Filesize

    88KB

  • memory/2876-61-0x00000000004C0000-0x00000000004D6000-memory.dmp

    Filesize

    88KB

  • memory/2876-59-0x00000000004C0000-0x00000000004D6000-memory.dmp

    Filesize

    88KB

  • memory/2876-57-0x00000000004C0000-0x00000000004D6000-memory.dmp

    Filesize

    88KB

  • memory/2876-55-0x00000000004C0000-0x00000000004D6000-memory.dmp

    Filesize

    88KB

  • memory/2876-53-0x00000000004C0000-0x00000000004D6000-memory.dmp

    Filesize

    88KB

  • memory/2876-51-0x00000000004C0000-0x00000000004DC000-memory.dmp

    Filesize

    112KB

  • memory/2876-50-0x00000000002F0000-0x000000000030E000-memory.dmp

    Filesize

    120KB