Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
14/02/2023, 03:18
Static task
static1
Behavioral task
behavioral1
Sample
b8e97b24ad13cd1247c1e454031b8f485da5d619e71efc2217158a97ad248380.exe
Resource
win10-20220812-en
General
-
Target
b8e97b24ad13cd1247c1e454031b8f485da5d619e71efc2217158a97ad248380.exe
-
Size
538KB
-
MD5
8955724f107e9e6289a124328e6c9dfe
-
SHA1
b2ddf44d510a76e89fa206712124496717285920
-
SHA256
b8e97b24ad13cd1247c1e454031b8f485da5d619e71efc2217158a97ad248380
-
SHA512
e8f26e7509cecdbfdb383e398507ff8913cb236ccebcf1dbaa5eea10ab34d1c567045e58a44767233ec15ddb13edb1e328c5c717ba0ef7da093bd534f7b4b5ec
-
SSDEEP
12288:/Mrhy90imT0odMDrFAMbvsbYatVzUztzuZ6gIBG3B9yMFRIK+a:GyDwxdMDK95DwhE6g+ORP
Malware Config
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/3624-274-0x0000000002340000-0x0000000002386000-memory.dmp family_redline behavioral1/memory/3624-280-0x00000000024D0000-0x0000000002514000-memory.dmp family_redline -
Executes dropped EXE 2 IoCs
pid Process 4144 vIk02.exe 3624 djq68.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b8e97b24ad13cd1247c1e454031b8f485da5d619e71efc2217158a97ad248380.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b8e97b24ad13cd1247c1e454031b8f485da5d619e71efc2217158a97ad248380.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vIk02.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vIk02.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3624 djq68.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3856 wrote to memory of 4144 3856 b8e97b24ad13cd1247c1e454031b8f485da5d619e71efc2217158a97ad248380.exe 67 PID 3856 wrote to memory of 4144 3856 b8e97b24ad13cd1247c1e454031b8f485da5d619e71efc2217158a97ad248380.exe 67 PID 3856 wrote to memory of 4144 3856 b8e97b24ad13cd1247c1e454031b8f485da5d619e71efc2217158a97ad248380.exe 67 PID 4144 wrote to memory of 3624 4144 vIk02.exe 68 PID 4144 wrote to memory of 3624 4144 vIk02.exe 68 PID 4144 wrote to memory of 3624 4144 vIk02.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8e97b24ad13cd1247c1e454031b8f485da5d619e71efc2217158a97ad248380.exe"C:\Users\Admin\AppData\Local\Temp\b8e97b24ad13cd1247c1e454031b8f485da5d619e71efc2217158a97ad248380.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vIk02.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vIk02.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\djq68.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\djq68.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3624
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
435KB
MD5bd6d176fa3ecb7c76e6ceda506135683
SHA18cbb7ae368939a23ebd9f8a4acf8196b143213e6
SHA25646f8e2267ab41e17ed1315fbda8052507afb9aaee209cdc409fbec208e20a32c
SHA51210e8b628a7449d428ff9edb2e51fa3d7b05bb6b645b23aca126a870ee738aad2fc951ddaa044cf67dc9397c75ef52dc755c06cab98185e786a23ab59a4a4d7c3
-
Filesize
435KB
MD5bd6d176fa3ecb7c76e6ceda506135683
SHA18cbb7ae368939a23ebd9f8a4acf8196b143213e6
SHA25646f8e2267ab41e17ed1315fbda8052507afb9aaee209cdc409fbec208e20a32c
SHA51210e8b628a7449d428ff9edb2e51fa3d7b05bb6b645b23aca126a870ee738aad2fc951ddaa044cf67dc9397c75ef52dc755c06cab98185e786a23ab59a4a4d7c3
-
Filesize
305KB
MD50c9076ec4095c5084780c931b13e72e7
SHA155b6e8bdc66a2eea0a733e94d6f30de4f46f8e42
SHA25659d5940bf01d2f15faae8ff641d5fced786e74ef03cb453d74a4d062e764db63
SHA5128cc2a68768ee3928c8fbec137a157f5cd48bc3ed0a07cebc6d425491ae7db62af20dac5d249e6a4754d09860c3aacf05f4d0067efdcf492fde0add557b32d99f
-
Filesize
305KB
MD50c9076ec4095c5084780c931b13e72e7
SHA155b6e8bdc66a2eea0a733e94d6f30de4f46f8e42
SHA25659d5940bf01d2f15faae8ff641d5fced786e74ef03cb453d74a4d062e764db63
SHA5128cc2a68768ee3928c8fbec137a157f5cd48bc3ed0a07cebc6d425491ae7db62af20dac5d249e6a4754d09860c3aacf05f4d0067efdcf492fde0add557b32d99f