Analysis
-
max time kernel
189s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2023 01:22
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20221111-en
General
-
Target
file.exe
-
Size
724KB
-
MD5
0aa866014807c995498bc2bcbfd3c088
-
SHA1
92f0336d4de6e186c65ec4dff95b3f84aa776b0f
-
SHA256
440fcaf7f11dcb34e2ee9140c5ad940a85a23dd53fb7cada3fd8669ce08ed2d3
-
SHA512
f675b647a85415077921e43cec5c00dcd543bfda4b57cb39c478780633c5e7929fab6a93689fa38280bac01482210029e85f00d99537893824ec29ec72bd2d4c
-
SSDEEP
12288:vMrBy90OTj2smCQqomkEs3ZMu0H3eeJ7t5OYhDODWUPn2y:WyPffVQqZNs3ZMVPKZXv2y
Malware Config
Extracted
redline
dunm
193.233.20.12:4132
-
auth_value
352959e3707029296ec94306d74e2334
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1696 gEq90dd.exe 1356 gop91Bd.exe 1464 acI32oi.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce gEq90dd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" gEq90dd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce gop91Bd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" gop91Bd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1464 acI32oi.exe 1464 acI32oi.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1464 acI32oi.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4368 wrote to memory of 1696 4368 file.exe 80 PID 4368 wrote to memory of 1696 4368 file.exe 80 PID 4368 wrote to memory of 1696 4368 file.exe 80 PID 1696 wrote to memory of 1356 1696 gEq90dd.exe 82 PID 1696 wrote to memory of 1356 1696 gEq90dd.exe 82 PID 1696 wrote to memory of 1356 1696 gEq90dd.exe 82 PID 1356 wrote to memory of 1464 1356 gop91Bd.exe 83 PID 1356 wrote to memory of 1464 1356 gop91Bd.exe 83 PID 1356 wrote to memory of 1464 1356 gop91Bd.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gEq90dd.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gEq90dd.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gop91Bd.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gop91Bd.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\acI32oi.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\acI32oi.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1464
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
620KB
MD51c6eeebbb7095e5343bbf243545bf317
SHA128be9388013c5049e0de2c4c2a416391450ca186
SHA2565e0693840ae31eb67425da4d396afdcaeb7b1244327fe70b9e75593ab734eeeb
SHA512980861befbd36f3d5aac24e00a29b9e855b29596c37a3ca90d9f4b9cb96e7f32fac02ca134771bbfb4ef6168a193db83941688da6d64d89b1ec7deaadd74f69d
-
Filesize
620KB
MD51c6eeebbb7095e5343bbf243545bf317
SHA128be9388013c5049e0de2c4c2a416391450ca186
SHA2565e0693840ae31eb67425da4d396afdcaeb7b1244327fe70b9e75593ab734eeeb
SHA512980861befbd36f3d5aac24e00a29b9e855b29596c37a3ca90d9f4b9cb96e7f32fac02ca134771bbfb4ef6168a193db83941688da6d64d89b1ec7deaadd74f69d
-
Filesize
286KB
MD5de6cf3719213c0cb44e477d0bfac3c36
SHA160e760e7e1e616a1066d5f2b62e9d8e1630ecc6c
SHA256beaed10894a137fdeb016beed485fc7df6198185d506fd65b557faabd4f48c0d
SHA5124f9cf7258076e3f28cf0f3d842afd74bc07cf38dc5914751c388e64458c61f967b02f88ce2f40be14aa45e9c63fb5562d7dda878bba6c2435f6eadef74cade5e
-
Filesize
286KB
MD5de6cf3719213c0cb44e477d0bfac3c36
SHA160e760e7e1e616a1066d5f2b62e9d8e1630ecc6c
SHA256beaed10894a137fdeb016beed485fc7df6198185d506fd65b557faabd4f48c0d
SHA5124f9cf7258076e3f28cf0f3d842afd74bc07cf38dc5914751c388e64458c61f967b02f88ce2f40be14aa45e9c63fb5562d7dda878bba6c2435f6eadef74cade5e
-
Filesize
175KB
MD569f79e05d0c83aee310d9adfe5aa7f2b
SHA1485c490180380051a14316564fbda07723be11b1
SHA256c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2
SHA512f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42
-
Filesize
175KB
MD569f79e05d0c83aee310d9adfe5aa7f2b
SHA1485c490180380051a14316564fbda07723be11b1
SHA256c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2
SHA512f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42