Analysis
-
max time kernel
125s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
14/02/2023, 03:26
Static task
static1
Behavioral task
behavioral1
Sample
82db0d1edc910ecfffaf7893a6dac122a9b38e277730e5a7b8af5864a78ac998.exe
Resource
win10-20220812-en
General
-
Target
82db0d1edc910ecfffaf7893a6dac122a9b38e277730e5a7b8af5864a78ac998.exe
-
Size
769KB
-
MD5
a100bb6fb70396f78ca0a9bab420280f
-
SHA1
5522a22dd58ee17590d9af1df8fda9bee1c4a23c
-
SHA256
82db0d1edc910ecfffaf7893a6dac122a9b38e277730e5a7b8af5864a78ac998
-
SHA512
549ec2adabf76dacf061b63a8a4cb72d8f7dc49840469492d5bbbeea00ee08464068e39e19cf9f32181691108a69355408e14fac534bf26774ec5ef35f1e7496
-
SSDEEP
24576:oyI0ron5PszbfobhkjgF74VRr+ot8OlT:vz85sbfobWjg168a
Malware Config
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/4552-324-0x00000000024F0000-0x0000000002536000-memory.dmp family_redline behavioral1/memory/4552-330-0x0000000005020000-0x0000000005064000-memory.dmp family_redline -
Executes dropped EXE 3 IoCs
pid Process 4544 viw69.exe 1544 vWK41.exe 4552 dIk16.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 82db0d1edc910ecfffaf7893a6dac122a9b38e277730e5a7b8af5864a78ac998.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce viw69.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" viw69.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vWK41.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vWK41.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 82db0d1edc910ecfffaf7893a6dac122a9b38e277730e5a7b8af5864a78ac998.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4552 dIk16.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2660 wrote to memory of 4544 2660 82db0d1edc910ecfffaf7893a6dac122a9b38e277730e5a7b8af5864a78ac998.exe 66 PID 2660 wrote to memory of 4544 2660 82db0d1edc910ecfffaf7893a6dac122a9b38e277730e5a7b8af5864a78ac998.exe 66 PID 2660 wrote to memory of 4544 2660 82db0d1edc910ecfffaf7893a6dac122a9b38e277730e5a7b8af5864a78ac998.exe 66 PID 4544 wrote to memory of 1544 4544 viw69.exe 67 PID 4544 wrote to memory of 1544 4544 viw69.exe 67 PID 4544 wrote to memory of 1544 4544 viw69.exe 67 PID 1544 wrote to memory of 4552 1544 vWK41.exe 68 PID 1544 wrote to memory of 4552 1544 vWK41.exe 68 PID 1544 wrote to memory of 4552 1544 vWK41.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\82db0d1edc910ecfffaf7893a6dac122a9b38e277730e5a7b8af5864a78ac998.exe"C:\Users\Admin\AppData\Local\Temp\82db0d1edc910ecfffaf7893a6dac122a9b38e277730e5a7b8af5864a78ac998.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\viw69.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\viw69.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vWK41.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vWK41.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dIk16.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dIk16.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4552
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
665KB
MD565cfe024ff4d21259cc110ad45b73344
SHA161d7791b3c10a20eecfdac2faf86558781e57491
SHA256e3005fca17aa276c404eefa40abffee7440b2bc64eb3df8054f3da0303184ee3
SHA5124ba50d1a597bc7d43ce5ab50d916f5121e2377c3e5af7b4aa22be2fa7dfe9d1fde2d6e3737b7b5b66a9d5fcfbaf45fe7b73ed87d918926900396d88a26d1fc3c
-
Filesize
665KB
MD565cfe024ff4d21259cc110ad45b73344
SHA161d7791b3c10a20eecfdac2faf86558781e57491
SHA256e3005fca17aa276c404eefa40abffee7440b2bc64eb3df8054f3da0303184ee3
SHA5124ba50d1a597bc7d43ce5ab50d916f5121e2377c3e5af7b4aa22be2fa7dfe9d1fde2d6e3737b7b5b66a9d5fcfbaf45fe7b73ed87d918926900396d88a26d1fc3c
-
Filesize
520KB
MD56ed4ed260fe9efa440765709e1abca80
SHA1cfc3696291b1aabf2531fe93e1347b17162f9bbc
SHA256b9fc973a40df70ec74ca372c20971cdd9a040e669a1a83b6a4c433a792e53238
SHA5123d285257d22f78b4a9f38a2093b2991787bd498493db04129b41253d5906184565b5c2a9f9a1253be336a6e98197dbc981d2b82ba6302da3242d4c5b7ee614e1
-
Filesize
520KB
MD56ed4ed260fe9efa440765709e1abca80
SHA1cfc3696291b1aabf2531fe93e1347b17162f9bbc
SHA256b9fc973a40df70ec74ca372c20971cdd9a040e669a1a83b6a4c433a792e53238
SHA5123d285257d22f78b4a9f38a2093b2991787bd498493db04129b41253d5906184565b5c2a9f9a1253be336a6e98197dbc981d2b82ba6302da3242d4c5b7ee614e1
-
Filesize
305KB
MD50c9076ec4095c5084780c931b13e72e7
SHA155b6e8bdc66a2eea0a733e94d6f30de4f46f8e42
SHA25659d5940bf01d2f15faae8ff641d5fced786e74ef03cb453d74a4d062e764db63
SHA5128cc2a68768ee3928c8fbec137a157f5cd48bc3ed0a07cebc6d425491ae7db62af20dac5d249e6a4754d09860c3aacf05f4d0067efdcf492fde0add557b32d99f
-
Filesize
305KB
MD50c9076ec4095c5084780c931b13e72e7
SHA155b6e8bdc66a2eea0a733e94d6f30de4f46f8e42
SHA25659d5940bf01d2f15faae8ff641d5fced786e74ef03cb453d74a4d062e764db63
SHA5128cc2a68768ee3928c8fbec137a157f5cd48bc3ed0a07cebc6d425491ae7db62af20dac5d249e6a4754d09860c3aacf05f4d0067efdcf492fde0add557b32d99f