Analysis
-
max time kernel
246s -
max time network
264s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
11/02/2023, 00:39
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20221111-en
General
-
Target
file.exe
-
Size
797KB
-
MD5
33ce6988ab0cb0eb3b229ebdfddc9e83
-
SHA1
0d06f8491bf61a16b917a2829dc952fae6ac37af
-
SHA256
0e932b85a279881dc2dbf643c3998110222fb0344b9a451af2ade01cbd7f35b1
-
SHA512
cea4e1e84fb5d3459b019e415e28b40e632f0c4c1356369572f7ba3e6ed60d1519ccd24f0be478404a673836dfc0c4179ae3d857ca48401cc23de829a2eca312
-
SSDEEP
12288:ZMr6y90r4dSVQLMzz1Tj1zK9//beJeOJ6L72bk3BDbXqmCZnsYoJ34CRB8/UWgcS:TyoVQQzzb2GqX2batb7CZsYolHR19
Malware Config
Extracted
redline
dunm
193.233.20.12:4132
-
auth_value
352959e3707029296ec94306d74e2334
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 240 gYK93uz.exe 520 grY80cQ.exe 3464 azO12Uo.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" grY80cQ.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce gYK93uz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" gYK93uz.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce grY80cQ.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2100 wrote to memory of 240 2100 file.exe 78 PID 2100 wrote to memory of 240 2100 file.exe 78 PID 2100 wrote to memory of 240 2100 file.exe 78 PID 240 wrote to memory of 520 240 gYK93uz.exe 79 PID 240 wrote to memory of 520 240 gYK93uz.exe 79 PID 240 wrote to memory of 520 240 gYK93uz.exe 79 PID 520 wrote to memory of 3464 520 grY80cQ.exe 80 PID 520 wrote to memory of 3464 520 grY80cQ.exe 80 PID 520 wrote to memory of 3464 520 grY80cQ.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gYK93uz.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gYK93uz.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:240 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\grY80cQ.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\grY80cQ.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\azO12Uo.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\azO12Uo.exe4⤵
- Executes dropped EXE
PID:3464
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
693KB
MD5d999fece20700976f1483237ebdc4b50
SHA1930d3f2bc323d5cace1f03e2d681a42b3593ad0a
SHA256071bfbb050b677960ee4a58bd0450df9755efe89599dfc565fc04d6b6b7d0b25
SHA51252f3dfd5d471fa86e38786c2eb2ad656d4b460e9f987534708bee78a67889665df5900c245b4a0c2d685001701785d3ea25a5bd06c2fafd5d4fe0c0d8a94e3fd
-
Filesize
693KB
MD5d999fece20700976f1483237ebdc4b50
SHA1930d3f2bc323d5cace1f03e2d681a42b3593ad0a
SHA256071bfbb050b677960ee4a58bd0450df9755efe89599dfc565fc04d6b6b7d0b25
SHA51252f3dfd5d471fa86e38786c2eb2ad656d4b460e9f987534708bee78a67889665df5900c245b4a0c2d685001701785d3ea25a5bd06c2fafd5d4fe0c0d8a94e3fd
-
Filesize
286KB
MD56fb36304199ed2a8e517727914ead17d
SHA111f732a94318ddc71610bde8f62cd5d095c10e98
SHA25695e51d78b486af6898127935afbd4ba25ed11911171aef5b9ea4d4e7b3e4d5a7
SHA5125de966be2c87093ac5a40151930aa1e69170b689a675a4b4cc86500e0d35886086ad5e5cfd3c95f0fc3490045459c2ac6e7a96adf204b673c9a95f2c457ae995
-
Filesize
286KB
MD56fb36304199ed2a8e517727914ead17d
SHA111f732a94318ddc71610bde8f62cd5d095c10e98
SHA25695e51d78b486af6898127935afbd4ba25ed11911171aef5b9ea4d4e7b3e4d5a7
SHA5125de966be2c87093ac5a40151930aa1e69170b689a675a4b4cc86500e0d35886086ad5e5cfd3c95f0fc3490045459c2ac6e7a96adf204b673c9a95f2c457ae995
-
Filesize
175KB
MD569f79e05d0c83aee310d9adfe5aa7f2b
SHA1485c490180380051a14316564fbda07723be11b1
SHA256c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2
SHA512f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42
-
Filesize
175KB
MD569f79e05d0c83aee310d9adfe5aa7f2b
SHA1485c490180380051a14316564fbda07723be11b1
SHA256c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2
SHA512f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42