Analysis
-
max time kernel
154s -
max time network
169s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2023, 18:36
Static task
static1
Behavioral task
behavioral1
Sample
8e4f0a83bbe5e6fe4f9d146c22f4ea2a69afc14aa2e2530adcc8bcbbcb5b866a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
8e4f0a83bbe5e6fe4f9d146c22f4ea2a69afc14aa2e2530adcc8bcbbcb5b866a.exe
Resource
win10v2004-20230220-en
General
-
Target
8e4f0a83bbe5e6fe4f9d146c22f4ea2a69afc14aa2e2530adcc8bcbbcb5b866a.exe
-
Size
851KB
-
MD5
0c8a1fee073fb7d8fe9eb043794315cf
-
SHA1
d5b9b4b06e71002367dcd8c8a94abbdf39f2e2a9
-
SHA256
8e4f0a83bbe5e6fe4f9d146c22f4ea2a69afc14aa2e2530adcc8bcbbcb5b866a
-
SHA512
37175d9bd34d6826d7f36ba579141e5d5eab7768f45e791ffd75dca9e20d5445683891a319bc45d49958c36c26d034e170530d435a72f8c21b803eb63fb88e49
-
SSDEEP
12288:By90di5YUzbLIZWj5vI+2uowxijOmPrSvA/S/CWaV4D7KvVFuI1y5Q/WE7M3QUgj:ByQUzRxDlxijOGSo/CmGJGmQU+a8hJ
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dante
185.161.248.73:4164
-
auth_value
f4066af6b8a6f23125c8ee48288a3f90
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1940 y84555302.exe 1728 p74956975.exe 1332 1.exe 1532 r43086389.exe -
Loads dropped DLL 9 IoCs
pid Process 1440 8e4f0a83bbe5e6fe4f9d146c22f4ea2a69afc14aa2e2530adcc8bcbbcb5b866a.exe 1940 y84555302.exe 1940 y84555302.exe 1940 y84555302.exe 1728 p74956975.exe 1728 p74956975.exe 1332 1.exe 1940 y84555302.exe 1532 r43086389.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8e4f0a83bbe5e6fe4f9d146c22f4ea2a69afc14aa2e2530adcc8bcbbcb5b866a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8e4f0a83bbe5e6fe4f9d146c22f4ea2a69afc14aa2e2530adcc8bcbbcb5b866a.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y84555302.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y84555302.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1728 p74956975.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1440 wrote to memory of 1940 1440 8e4f0a83bbe5e6fe4f9d146c22f4ea2a69afc14aa2e2530adcc8bcbbcb5b866a.exe 28 PID 1440 wrote to memory of 1940 1440 8e4f0a83bbe5e6fe4f9d146c22f4ea2a69afc14aa2e2530adcc8bcbbcb5b866a.exe 28 PID 1440 wrote to memory of 1940 1440 8e4f0a83bbe5e6fe4f9d146c22f4ea2a69afc14aa2e2530adcc8bcbbcb5b866a.exe 28 PID 1440 wrote to memory of 1940 1440 8e4f0a83bbe5e6fe4f9d146c22f4ea2a69afc14aa2e2530adcc8bcbbcb5b866a.exe 28 PID 1440 wrote to memory of 1940 1440 8e4f0a83bbe5e6fe4f9d146c22f4ea2a69afc14aa2e2530adcc8bcbbcb5b866a.exe 28 PID 1440 wrote to memory of 1940 1440 8e4f0a83bbe5e6fe4f9d146c22f4ea2a69afc14aa2e2530adcc8bcbbcb5b866a.exe 28 PID 1440 wrote to memory of 1940 1440 8e4f0a83bbe5e6fe4f9d146c22f4ea2a69afc14aa2e2530adcc8bcbbcb5b866a.exe 28 PID 1940 wrote to memory of 1728 1940 y84555302.exe 29 PID 1940 wrote to memory of 1728 1940 y84555302.exe 29 PID 1940 wrote to memory of 1728 1940 y84555302.exe 29 PID 1940 wrote to memory of 1728 1940 y84555302.exe 29 PID 1940 wrote to memory of 1728 1940 y84555302.exe 29 PID 1940 wrote to memory of 1728 1940 y84555302.exe 29 PID 1940 wrote to memory of 1728 1940 y84555302.exe 29 PID 1728 wrote to memory of 1332 1728 p74956975.exe 30 PID 1728 wrote to memory of 1332 1728 p74956975.exe 30 PID 1728 wrote to memory of 1332 1728 p74956975.exe 30 PID 1728 wrote to memory of 1332 1728 p74956975.exe 30 PID 1728 wrote to memory of 1332 1728 p74956975.exe 30 PID 1728 wrote to memory of 1332 1728 p74956975.exe 30 PID 1728 wrote to memory of 1332 1728 p74956975.exe 30 PID 1940 wrote to memory of 1532 1940 y84555302.exe 31 PID 1940 wrote to memory of 1532 1940 y84555302.exe 31 PID 1940 wrote to memory of 1532 1940 y84555302.exe 31 PID 1940 wrote to memory of 1532 1940 y84555302.exe 31 PID 1940 wrote to memory of 1532 1940 y84555302.exe 31 PID 1940 wrote to memory of 1532 1940 y84555302.exe 31 PID 1940 wrote to memory of 1532 1940 y84555302.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e4f0a83bbe5e6fe4f9d146c22f4ea2a69afc14aa2e2530adcc8bcbbcb5b866a.exe"C:\Users\Admin\AppData\Local\Temp\8e4f0a83bbe5e6fe4f9d146c22f4ea2a69afc14aa2e2530adcc8bcbbcb5b866a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y84555302.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y84555302.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p74956975.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p74956975.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1332
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r43086389.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r43086389.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1532
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
571KB
MD5cc0cd8f215a5a33928b2d517752ecff3
SHA1f88153b0f55f1cc90e7c2b3484844e32fef40d39
SHA256428112cd4334f42542234412b15c0a47740cb6aedbc024b30c187c77e6b75277
SHA5122e152011eb235bfb0a46c4bbdae21f745e81ca04e82e4a03a8256b602cf7938a4ed416f8bafbe8617752b46d1d06ebdd3e0a502a7e0069084ff4840368a63ce4
-
Filesize
571KB
MD5cc0cd8f215a5a33928b2d517752ecff3
SHA1f88153b0f55f1cc90e7c2b3484844e32fef40d39
SHA256428112cd4334f42542234412b15c0a47740cb6aedbc024b30c187c77e6b75277
SHA5122e152011eb235bfb0a46c4bbdae21f745e81ca04e82e4a03a8256b602cf7938a4ed416f8bafbe8617752b46d1d06ebdd3e0a502a7e0069084ff4840368a63ce4
-
Filesize
476KB
MD54ba6b292ac197a12f3c2074171f28368
SHA1d42a8027083ee5b2d5ee9825f7e4072833191fe9
SHA256e4a6d25eaf6dfbc4c68d712e2d5f95707bd30e341ed687577eb6be74c780872c
SHA51215eb6dbd4bf548802a21b9de25bec8eb292da704aeb37d1444ea220bd8efd96eb34386c09f23dd0ddaa65595c047714a98c2fb917db9bf230473e3e7b9859361
-
Filesize
476KB
MD54ba6b292ac197a12f3c2074171f28368
SHA1d42a8027083ee5b2d5ee9825f7e4072833191fe9
SHA256e4a6d25eaf6dfbc4c68d712e2d5f95707bd30e341ed687577eb6be74c780872c
SHA51215eb6dbd4bf548802a21b9de25bec8eb292da704aeb37d1444ea220bd8efd96eb34386c09f23dd0ddaa65595c047714a98c2fb917db9bf230473e3e7b9859361
-
Filesize
476KB
MD54ba6b292ac197a12f3c2074171f28368
SHA1d42a8027083ee5b2d5ee9825f7e4072833191fe9
SHA256e4a6d25eaf6dfbc4c68d712e2d5f95707bd30e341ed687577eb6be74c780872c
SHA51215eb6dbd4bf548802a21b9de25bec8eb292da704aeb37d1444ea220bd8efd96eb34386c09f23dd0ddaa65595c047714a98c2fb917db9bf230473e3e7b9859361
-
Filesize
169KB
MD5e45903ab2513b25ef0505f2b3027240b
SHA1005fb0187d9f5a9e435de558641c64ec9adc6ad0
SHA256e968f5a11df27501b7fbd67065b7f797362c3e3a79a047bbe0ae59c68a2cb8e7
SHA512c23568f55df873067c4f8ad29ec011c2161e1f4d46048403e680aa6bd2aa7dd80a1cd76a92e44689018a48aaa9007e588e38d414df2948fcd70663dac7c14459
-
Filesize
169KB
MD5e45903ab2513b25ef0505f2b3027240b
SHA1005fb0187d9f5a9e435de558641c64ec9adc6ad0
SHA256e968f5a11df27501b7fbd67065b7f797362c3e3a79a047bbe0ae59c68a2cb8e7
SHA512c23568f55df873067c4f8ad29ec011c2161e1f4d46048403e680aa6bd2aa7dd80a1cd76a92e44689018a48aaa9007e588e38d414df2948fcd70663dac7c14459
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
571KB
MD5cc0cd8f215a5a33928b2d517752ecff3
SHA1f88153b0f55f1cc90e7c2b3484844e32fef40d39
SHA256428112cd4334f42542234412b15c0a47740cb6aedbc024b30c187c77e6b75277
SHA5122e152011eb235bfb0a46c4bbdae21f745e81ca04e82e4a03a8256b602cf7938a4ed416f8bafbe8617752b46d1d06ebdd3e0a502a7e0069084ff4840368a63ce4
-
Filesize
571KB
MD5cc0cd8f215a5a33928b2d517752ecff3
SHA1f88153b0f55f1cc90e7c2b3484844e32fef40d39
SHA256428112cd4334f42542234412b15c0a47740cb6aedbc024b30c187c77e6b75277
SHA5122e152011eb235bfb0a46c4bbdae21f745e81ca04e82e4a03a8256b602cf7938a4ed416f8bafbe8617752b46d1d06ebdd3e0a502a7e0069084ff4840368a63ce4
-
Filesize
476KB
MD54ba6b292ac197a12f3c2074171f28368
SHA1d42a8027083ee5b2d5ee9825f7e4072833191fe9
SHA256e4a6d25eaf6dfbc4c68d712e2d5f95707bd30e341ed687577eb6be74c780872c
SHA51215eb6dbd4bf548802a21b9de25bec8eb292da704aeb37d1444ea220bd8efd96eb34386c09f23dd0ddaa65595c047714a98c2fb917db9bf230473e3e7b9859361
-
Filesize
476KB
MD54ba6b292ac197a12f3c2074171f28368
SHA1d42a8027083ee5b2d5ee9825f7e4072833191fe9
SHA256e4a6d25eaf6dfbc4c68d712e2d5f95707bd30e341ed687577eb6be74c780872c
SHA51215eb6dbd4bf548802a21b9de25bec8eb292da704aeb37d1444ea220bd8efd96eb34386c09f23dd0ddaa65595c047714a98c2fb917db9bf230473e3e7b9859361
-
Filesize
476KB
MD54ba6b292ac197a12f3c2074171f28368
SHA1d42a8027083ee5b2d5ee9825f7e4072833191fe9
SHA256e4a6d25eaf6dfbc4c68d712e2d5f95707bd30e341ed687577eb6be74c780872c
SHA51215eb6dbd4bf548802a21b9de25bec8eb292da704aeb37d1444ea220bd8efd96eb34386c09f23dd0ddaa65595c047714a98c2fb917db9bf230473e3e7b9859361
-
Filesize
169KB
MD5e45903ab2513b25ef0505f2b3027240b
SHA1005fb0187d9f5a9e435de558641c64ec9adc6ad0
SHA256e968f5a11df27501b7fbd67065b7f797362c3e3a79a047bbe0ae59c68a2cb8e7
SHA512c23568f55df873067c4f8ad29ec011c2161e1f4d46048403e680aa6bd2aa7dd80a1cd76a92e44689018a48aaa9007e588e38d414df2948fcd70663dac7c14459
-
Filesize
169KB
MD5e45903ab2513b25ef0505f2b3027240b
SHA1005fb0187d9f5a9e435de558641c64ec9adc6ad0
SHA256e968f5a11df27501b7fbd67065b7f797362c3e3a79a047bbe0ae59c68a2cb8e7
SHA512c23568f55df873067c4f8ad29ec011c2161e1f4d46048403e680aa6bd2aa7dd80a1cd76a92e44689018a48aaa9007e588e38d414df2948fcd70663dac7c14459
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf