Analysis

  • max time kernel
    138s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2023 10:23

General

  • Target

    1e9630d15774b1e594401062017e5495f8a8627d0b2ad2a0dfcc44d6221c852c.exe

  • Size

    1.4MB

  • MD5

    a8c0f5885a2a12db876fedb3c75e65f6

  • SHA1

    ca0a3bae5d45fc9e2ae282a45fdb393137d9ad0a

  • SHA256

    1e9630d15774b1e594401062017e5495f8a8627d0b2ad2a0dfcc44d6221c852c

  • SHA512

    685d72ad0ea6e275cffad22184460214bfd748f28bba8ed6491c5dcb590cf7ab9853196613ee9d9f9fa22ba1db6d876000c24aee4d8a3aec4a61a4b5a6d8ee80

  • SSDEEP

    24576:uycidrQajlYfMWFxhu90wJweh74ceghNj3HG0lf8E7PcH6hifO:9jozhTEhhrT7j3m0B8E7PthA

Malware Config

Extracted

Family

redline

Botnet

trush

C2

77.91.124.82:19071

Attributes
  • auth_value

    c13814867cde8193679cd0cad2d774be

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e9630d15774b1e594401062017e5495f8a8627d0b2ad2a0dfcc44d6221c852c.exe
    "C:\Users\Admin\AppData\Local\Temp\1e9630d15774b1e594401062017e5495f8a8627d0b2ad2a0dfcc44d6221c852c.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1952
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4920476.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4920476.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1748
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7986923.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7986923.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2364
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7740968.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7740968.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2736
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5525114.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5525114.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2908
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5407972.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5407972.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:3064
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:2656
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 3064 -s 268
                  7⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2548

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4920476.exe

      Filesize

      1.3MB

      MD5

      706cada4d2456795f9f84fc840101a13

      SHA1

      ecbbfcda553d78819a645619d959b3c162c6ef4f

      SHA256

      21b70592e96784495c180b94ca1c10c17d46ff965e5c62ea1b1cc4f3c440dfc6

      SHA512

      0522a0820b7465a574460c1184b04767237e5a1af14d6248fba336220ab9d1bccf12be31c7ee9c56844df528bf2abdafd597fd136c5136900d86acc2d4b38808

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4920476.exe

      Filesize

      1.3MB

      MD5

      706cada4d2456795f9f84fc840101a13

      SHA1

      ecbbfcda553d78819a645619d959b3c162c6ef4f

      SHA256

      21b70592e96784495c180b94ca1c10c17d46ff965e5c62ea1b1cc4f3c440dfc6

      SHA512

      0522a0820b7465a574460c1184b04767237e5a1af14d6248fba336220ab9d1bccf12be31c7ee9c56844df528bf2abdafd597fd136c5136900d86acc2d4b38808

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7986923.exe

      Filesize

      945KB

      MD5

      acbd42878397f0c5d1d978600b375273

      SHA1

      75d0662e973d1bee4e7cac0cbfd258711152b9a9

      SHA256

      4eccafea7dde5883763fa5f2299334334b90a63d4c3e7e3a6f9669ba733b981c

      SHA512

      18eadd5bea824a556c97d216d927070b47f9a4e3471c862959cfffc89a1addb01d6b20a6b48d62d0d962386f861015b34d7dfc3de01d0eee7c625e6dc007bd14

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7986923.exe

      Filesize

      945KB

      MD5

      acbd42878397f0c5d1d978600b375273

      SHA1

      75d0662e973d1bee4e7cac0cbfd258711152b9a9

      SHA256

      4eccafea7dde5883763fa5f2299334334b90a63d4c3e7e3a6f9669ba733b981c

      SHA512

      18eadd5bea824a556c97d216d927070b47f9a4e3471c862959cfffc89a1addb01d6b20a6b48d62d0d962386f861015b34d7dfc3de01d0eee7c625e6dc007bd14

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7740968.exe

      Filesize

      762KB

      MD5

      8d73a5085cfb3c9c8dd4849dbdfde09f

      SHA1

      9d5976d9ba786ad719f1de16b0212d77f26bdae1

      SHA256

      2d0696b81df4841d81307434d7bcfad36c33f23cbdd4f78680d797950f59b041

      SHA512

      54eba148cb7cbd2db867813ef1cb2fbe939f931509def2c5f1e9d46687b86ef15ba8f08465412068fa6ce7bb6a8a92eeb8e3c166b56fb53d8d5a47eb4da1f426

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7740968.exe

      Filesize

      762KB

      MD5

      8d73a5085cfb3c9c8dd4849dbdfde09f

      SHA1

      9d5976d9ba786ad719f1de16b0212d77f26bdae1

      SHA256

      2d0696b81df4841d81307434d7bcfad36c33f23cbdd4f78680d797950f59b041

      SHA512

      54eba148cb7cbd2db867813ef1cb2fbe939f931509def2c5f1e9d46687b86ef15ba8f08465412068fa6ce7bb6a8a92eeb8e3c166b56fb53d8d5a47eb4da1f426

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5525114.exe

      Filesize

      580KB

      MD5

      24c3e2a170d8891762472709ea514d69

      SHA1

      d9cadb3a40c384de65f653abe8639a6803c0c34a

      SHA256

      5754923bbd79a8a909e74f82cb8e1ca1811039f3f983ece060923a3ebee9aa2c

      SHA512

      41a886189f89728948e723c1bbc94d896ea7115e466d8cafbb00cbb3e6ef95263583935068d80990c56bcf480fa8705713b13fe4dcbeff3245a7f9cc7b948ee0

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5525114.exe

      Filesize

      580KB

      MD5

      24c3e2a170d8891762472709ea514d69

      SHA1

      d9cadb3a40c384de65f653abe8639a6803c0c34a

      SHA256

      5754923bbd79a8a909e74f82cb8e1ca1811039f3f983ece060923a3ebee9aa2c

      SHA512

      41a886189f89728948e723c1bbc94d896ea7115e466d8cafbb00cbb3e6ef95263583935068d80990c56bcf480fa8705713b13fe4dcbeff3245a7f9cc7b948ee0

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5407972.exe

      Filesize

      1.1MB

      MD5

      1f3d5f4268ae5e0defe79f5079702fc6

      SHA1

      cb25e72fb66afafcac6a97618b822a6d2ae113a3

      SHA256

      ddd892989b9b55134c05950c0dcdd20fb45a8ae88cd9966e4b60d48aa230fbb8

      SHA512

      b33150915ddb0afa5696144b453721e1a2dc02e3d8864f780ab27bed8b875064b4697c3ff565ac798cbf4e958a4dc6766c19ab905dbfd1b8d0fd455d79f3a229

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5407972.exe

      Filesize

      1.1MB

      MD5

      1f3d5f4268ae5e0defe79f5079702fc6

      SHA1

      cb25e72fb66afafcac6a97618b822a6d2ae113a3

      SHA256

      ddd892989b9b55134c05950c0dcdd20fb45a8ae88cd9966e4b60d48aa230fbb8

      SHA512

      b33150915ddb0afa5696144b453721e1a2dc02e3d8864f780ab27bed8b875064b4697c3ff565ac798cbf4e958a4dc6766c19ab905dbfd1b8d0fd455d79f3a229

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5407972.exe

      Filesize

      1.1MB

      MD5

      1f3d5f4268ae5e0defe79f5079702fc6

      SHA1

      cb25e72fb66afafcac6a97618b822a6d2ae113a3

      SHA256

      ddd892989b9b55134c05950c0dcdd20fb45a8ae88cd9966e4b60d48aa230fbb8

      SHA512

      b33150915ddb0afa5696144b453721e1a2dc02e3d8864f780ab27bed8b875064b4697c3ff565ac798cbf4e958a4dc6766c19ab905dbfd1b8d0fd455d79f3a229

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z4920476.exe

      Filesize

      1.3MB

      MD5

      706cada4d2456795f9f84fc840101a13

      SHA1

      ecbbfcda553d78819a645619d959b3c162c6ef4f

      SHA256

      21b70592e96784495c180b94ca1c10c17d46ff965e5c62ea1b1cc4f3c440dfc6

      SHA512

      0522a0820b7465a574460c1184b04767237e5a1af14d6248fba336220ab9d1bccf12be31c7ee9c56844df528bf2abdafd597fd136c5136900d86acc2d4b38808

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z4920476.exe

      Filesize

      1.3MB

      MD5

      706cada4d2456795f9f84fc840101a13

      SHA1

      ecbbfcda553d78819a645619d959b3c162c6ef4f

      SHA256

      21b70592e96784495c180b94ca1c10c17d46ff965e5c62ea1b1cc4f3c440dfc6

      SHA512

      0522a0820b7465a574460c1184b04767237e5a1af14d6248fba336220ab9d1bccf12be31c7ee9c56844df528bf2abdafd597fd136c5136900d86acc2d4b38808

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z7986923.exe

      Filesize

      945KB

      MD5

      acbd42878397f0c5d1d978600b375273

      SHA1

      75d0662e973d1bee4e7cac0cbfd258711152b9a9

      SHA256

      4eccafea7dde5883763fa5f2299334334b90a63d4c3e7e3a6f9669ba733b981c

      SHA512

      18eadd5bea824a556c97d216d927070b47f9a4e3471c862959cfffc89a1addb01d6b20a6b48d62d0d962386f861015b34d7dfc3de01d0eee7c625e6dc007bd14

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z7986923.exe

      Filesize

      945KB

      MD5

      acbd42878397f0c5d1d978600b375273

      SHA1

      75d0662e973d1bee4e7cac0cbfd258711152b9a9

      SHA256

      4eccafea7dde5883763fa5f2299334334b90a63d4c3e7e3a6f9669ba733b981c

      SHA512

      18eadd5bea824a556c97d216d927070b47f9a4e3471c862959cfffc89a1addb01d6b20a6b48d62d0d962386f861015b34d7dfc3de01d0eee7c625e6dc007bd14

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z7740968.exe

      Filesize

      762KB

      MD5

      8d73a5085cfb3c9c8dd4849dbdfde09f

      SHA1

      9d5976d9ba786ad719f1de16b0212d77f26bdae1

      SHA256

      2d0696b81df4841d81307434d7bcfad36c33f23cbdd4f78680d797950f59b041

      SHA512

      54eba148cb7cbd2db867813ef1cb2fbe939f931509def2c5f1e9d46687b86ef15ba8f08465412068fa6ce7bb6a8a92eeb8e3c166b56fb53d8d5a47eb4da1f426

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z7740968.exe

      Filesize

      762KB

      MD5

      8d73a5085cfb3c9c8dd4849dbdfde09f

      SHA1

      9d5976d9ba786ad719f1de16b0212d77f26bdae1

      SHA256

      2d0696b81df4841d81307434d7bcfad36c33f23cbdd4f78680d797950f59b041

      SHA512

      54eba148cb7cbd2db867813ef1cb2fbe939f931509def2c5f1e9d46687b86ef15ba8f08465412068fa6ce7bb6a8a92eeb8e3c166b56fb53d8d5a47eb4da1f426

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z5525114.exe

      Filesize

      580KB

      MD5

      24c3e2a170d8891762472709ea514d69

      SHA1

      d9cadb3a40c384de65f653abe8639a6803c0c34a

      SHA256

      5754923bbd79a8a909e74f82cb8e1ca1811039f3f983ece060923a3ebee9aa2c

      SHA512

      41a886189f89728948e723c1bbc94d896ea7115e466d8cafbb00cbb3e6ef95263583935068d80990c56bcf480fa8705713b13fe4dcbeff3245a7f9cc7b948ee0

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z5525114.exe

      Filesize

      580KB

      MD5

      24c3e2a170d8891762472709ea514d69

      SHA1

      d9cadb3a40c384de65f653abe8639a6803c0c34a

      SHA256

      5754923bbd79a8a909e74f82cb8e1ca1811039f3f983ece060923a3ebee9aa2c

      SHA512

      41a886189f89728948e723c1bbc94d896ea7115e466d8cafbb00cbb3e6ef95263583935068d80990c56bcf480fa8705713b13fe4dcbeff3245a7f9cc7b948ee0

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5407972.exe

      Filesize

      1.1MB

      MD5

      1f3d5f4268ae5e0defe79f5079702fc6

      SHA1

      cb25e72fb66afafcac6a97618b822a6d2ae113a3

      SHA256

      ddd892989b9b55134c05950c0dcdd20fb45a8ae88cd9966e4b60d48aa230fbb8

      SHA512

      b33150915ddb0afa5696144b453721e1a2dc02e3d8864f780ab27bed8b875064b4697c3ff565ac798cbf4e958a4dc6766c19ab905dbfd1b8d0fd455d79f3a229

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5407972.exe

      Filesize

      1.1MB

      MD5

      1f3d5f4268ae5e0defe79f5079702fc6

      SHA1

      cb25e72fb66afafcac6a97618b822a6d2ae113a3

      SHA256

      ddd892989b9b55134c05950c0dcdd20fb45a8ae88cd9966e4b60d48aa230fbb8

      SHA512

      b33150915ddb0afa5696144b453721e1a2dc02e3d8864f780ab27bed8b875064b4697c3ff565ac798cbf4e958a4dc6766c19ab905dbfd1b8d0fd455d79f3a229

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5407972.exe

      Filesize

      1.1MB

      MD5

      1f3d5f4268ae5e0defe79f5079702fc6

      SHA1

      cb25e72fb66afafcac6a97618b822a6d2ae113a3

      SHA256

      ddd892989b9b55134c05950c0dcdd20fb45a8ae88cd9966e4b60d48aa230fbb8

      SHA512

      b33150915ddb0afa5696144b453721e1a2dc02e3d8864f780ab27bed8b875064b4697c3ff565ac798cbf4e958a4dc6766c19ab905dbfd1b8d0fd455d79f3a229

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5407972.exe

      Filesize

      1.1MB

      MD5

      1f3d5f4268ae5e0defe79f5079702fc6

      SHA1

      cb25e72fb66afafcac6a97618b822a6d2ae113a3

      SHA256

      ddd892989b9b55134c05950c0dcdd20fb45a8ae88cd9966e4b60d48aa230fbb8

      SHA512

      b33150915ddb0afa5696144b453721e1a2dc02e3d8864f780ab27bed8b875064b4697c3ff565ac798cbf4e958a4dc6766c19ab905dbfd1b8d0fd455d79f3a229

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5407972.exe

      Filesize

      1.1MB

      MD5

      1f3d5f4268ae5e0defe79f5079702fc6

      SHA1

      cb25e72fb66afafcac6a97618b822a6d2ae113a3

      SHA256

      ddd892989b9b55134c05950c0dcdd20fb45a8ae88cd9966e4b60d48aa230fbb8

      SHA512

      b33150915ddb0afa5696144b453721e1a2dc02e3d8864f780ab27bed8b875064b4697c3ff565ac798cbf4e958a4dc6766c19ab905dbfd1b8d0fd455d79f3a229

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5407972.exe

      Filesize

      1.1MB

      MD5

      1f3d5f4268ae5e0defe79f5079702fc6

      SHA1

      cb25e72fb66afafcac6a97618b822a6d2ae113a3

      SHA256

      ddd892989b9b55134c05950c0dcdd20fb45a8ae88cd9966e4b60d48aa230fbb8

      SHA512

      b33150915ddb0afa5696144b453721e1a2dc02e3d8864f780ab27bed8b875064b4697c3ff565ac798cbf4e958a4dc6766c19ab905dbfd1b8d0fd455d79f3a229

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5407972.exe

      Filesize

      1.1MB

      MD5

      1f3d5f4268ae5e0defe79f5079702fc6

      SHA1

      cb25e72fb66afafcac6a97618b822a6d2ae113a3

      SHA256

      ddd892989b9b55134c05950c0dcdd20fb45a8ae88cd9966e4b60d48aa230fbb8

      SHA512

      b33150915ddb0afa5696144b453721e1a2dc02e3d8864f780ab27bed8b875064b4697c3ff565ac798cbf4e958a4dc6766c19ab905dbfd1b8d0fd455d79f3a229

    • memory/2656-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/2656-58-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2656-62-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2656-60-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2656-56-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2656-55-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2656-54-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2656-53-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2656-67-0x0000000000430000-0x0000000000436000-memory.dmp

      Filesize

      24KB