Analysis
-
max time kernel
183s -
max time network
197s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2023, 19:28
Static task
static1
Behavioral task
behavioral1
Sample
c4372a008ed59c20e52211d81cbbe713b578433e29b27f7ada73ede9977c86f8.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c4372a008ed59c20e52211d81cbbe713b578433e29b27f7ada73ede9977c86f8.exe
Resource
win10v2004-20230220-en
General
-
Target
c4372a008ed59c20e52211d81cbbe713b578433e29b27f7ada73ede9977c86f8.exe
-
Size
1.5MB
-
MD5
e83e1f22263cfc5cc68020e8679ec350
-
SHA1
cda05c2a0e673559a04e57a87f76820104b59417
-
SHA256
c4372a008ed59c20e52211d81cbbe713b578433e29b27f7ada73ede9977c86f8
-
SHA512
ed8581b16910432e465f937ddce7c7ca37f7fa77caa0e7bc49c4b2e6262357555b74d1685f8b7ba962657c1382375e2353afae93126c39aba471567b4392c78e
-
SSDEEP
24576:fyYjob4lkLuPtybLGdYVv3ZdqP3vkU+K5MMMIMD8hQZAyDkZSWUs7pxT+xw:qYfbP4zhZdqPsU+K+FrDJ/RpuP+x
Malware Config
Extracted
redline
most
185.161.248.73:4164
-
auth_value
7da4dfa153f2919e617aa016f7c36008
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 1932 i85375075.exe 588 i94055168.exe 1936 i57661276.exe 564 i72716165.exe 1800 a03266434.exe -
Loads dropped DLL 10 IoCs
pid Process 928 c4372a008ed59c20e52211d81cbbe713b578433e29b27f7ada73ede9977c86f8.exe 1932 i85375075.exe 1932 i85375075.exe 588 i94055168.exe 588 i94055168.exe 1936 i57661276.exe 1936 i57661276.exe 564 i72716165.exe 564 i72716165.exe 1800 a03266434.exe -
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce i72716165.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c4372a008ed59c20e52211d81cbbe713b578433e29b27f7ada73ede9977c86f8.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce i85375075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" i85375075.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce i94055168.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" i57661276.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce c4372a008ed59c20e52211d81cbbe713b578433e29b27f7ada73ede9977c86f8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" i94055168.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce i57661276.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" i72716165.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 928 wrote to memory of 1932 928 c4372a008ed59c20e52211d81cbbe713b578433e29b27f7ada73ede9977c86f8.exe 28 PID 928 wrote to memory of 1932 928 c4372a008ed59c20e52211d81cbbe713b578433e29b27f7ada73ede9977c86f8.exe 28 PID 928 wrote to memory of 1932 928 c4372a008ed59c20e52211d81cbbe713b578433e29b27f7ada73ede9977c86f8.exe 28 PID 928 wrote to memory of 1932 928 c4372a008ed59c20e52211d81cbbe713b578433e29b27f7ada73ede9977c86f8.exe 28 PID 928 wrote to memory of 1932 928 c4372a008ed59c20e52211d81cbbe713b578433e29b27f7ada73ede9977c86f8.exe 28 PID 928 wrote to memory of 1932 928 c4372a008ed59c20e52211d81cbbe713b578433e29b27f7ada73ede9977c86f8.exe 28 PID 928 wrote to memory of 1932 928 c4372a008ed59c20e52211d81cbbe713b578433e29b27f7ada73ede9977c86f8.exe 28 PID 1932 wrote to memory of 588 1932 i85375075.exe 29 PID 1932 wrote to memory of 588 1932 i85375075.exe 29 PID 1932 wrote to memory of 588 1932 i85375075.exe 29 PID 1932 wrote to memory of 588 1932 i85375075.exe 29 PID 1932 wrote to memory of 588 1932 i85375075.exe 29 PID 1932 wrote to memory of 588 1932 i85375075.exe 29 PID 1932 wrote to memory of 588 1932 i85375075.exe 29 PID 588 wrote to memory of 1936 588 i94055168.exe 30 PID 588 wrote to memory of 1936 588 i94055168.exe 30 PID 588 wrote to memory of 1936 588 i94055168.exe 30 PID 588 wrote to memory of 1936 588 i94055168.exe 30 PID 588 wrote to memory of 1936 588 i94055168.exe 30 PID 588 wrote to memory of 1936 588 i94055168.exe 30 PID 588 wrote to memory of 1936 588 i94055168.exe 30 PID 1936 wrote to memory of 564 1936 i57661276.exe 31 PID 1936 wrote to memory of 564 1936 i57661276.exe 31 PID 1936 wrote to memory of 564 1936 i57661276.exe 31 PID 1936 wrote to memory of 564 1936 i57661276.exe 31 PID 1936 wrote to memory of 564 1936 i57661276.exe 31 PID 1936 wrote to memory of 564 1936 i57661276.exe 31 PID 1936 wrote to memory of 564 1936 i57661276.exe 31 PID 564 wrote to memory of 1800 564 i72716165.exe 32 PID 564 wrote to memory of 1800 564 i72716165.exe 32 PID 564 wrote to memory of 1800 564 i72716165.exe 32 PID 564 wrote to memory of 1800 564 i72716165.exe 32 PID 564 wrote to memory of 1800 564 i72716165.exe 32 PID 564 wrote to memory of 1800 564 i72716165.exe 32 PID 564 wrote to memory of 1800 564 i72716165.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4372a008ed59c20e52211d81cbbe713b578433e29b27f7ada73ede9977c86f8.exe"C:\Users\Admin\AppData\Local\Temp\c4372a008ed59c20e52211d81cbbe713b578433e29b27f7ada73ede9977c86f8.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i85375075.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i85375075.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i94055168.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i94055168.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i57661276.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i57661276.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i72716165.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i72716165.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a03266434.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a03266434.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1800
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD53a77e49606c561f2e32719b7e78609a9
SHA1c670e86bf729d3a250e83bd1118209e225557a77
SHA256e220b0b18707d3c0afbeabd6d66b6195889e10ddb38d605b729eb125d1cf5489
SHA5121b929cc30012f188d2d869e9c32c92298c704eeddb33ecc867f4b09def361007de085bb189056f5d9ef3567f420f5a98e692a5b1a81ec3df63c928becf78a3c5
-
Filesize
1.3MB
MD53a77e49606c561f2e32719b7e78609a9
SHA1c670e86bf729d3a250e83bd1118209e225557a77
SHA256e220b0b18707d3c0afbeabd6d66b6195889e10ddb38d605b729eb125d1cf5489
SHA5121b929cc30012f188d2d869e9c32c92298c704eeddb33ecc867f4b09def361007de085bb189056f5d9ef3567f420f5a98e692a5b1a81ec3df63c928becf78a3c5
-
Filesize
1023KB
MD5883a09985eb5af646992337148d6fe7a
SHA19ccb379e966988f92e4c005b011f94e0f3c50378
SHA2568fed3ba6345f378bcc69688dd5f0e58c5310a031fac061233b4e06c2156e800f
SHA51233df08466f75aa57d45836ab07bd84e857c529c1f85a66fbce66bd642250f19a51b14e868b86cdd97cbebf0a42648bff874c801dc72043ebbeb35d3b51f77518
-
Filesize
1023KB
MD5883a09985eb5af646992337148d6fe7a
SHA19ccb379e966988f92e4c005b011f94e0f3c50378
SHA2568fed3ba6345f378bcc69688dd5f0e58c5310a031fac061233b4e06c2156e800f
SHA51233df08466f75aa57d45836ab07bd84e857c529c1f85a66fbce66bd642250f19a51b14e868b86cdd97cbebf0a42648bff874c801dc72043ebbeb35d3b51f77518
-
Filesize
852KB
MD5db2306ada1ac79944d60c4c0f6116daa
SHA1ef7c4862a32fbbacbcedca3aff3e5a5d3038ed80
SHA2565cb5438e58ab838649d85c16703362314250570d27992ffdf1231ff4326a4a82
SHA51260896b4f1c7a9a72868ab79b2e71932d1d9949d42bd957b7b707943a0e6ca715f9977ad37f416309d374b053b41b32b27b4834eb44dbcd9c9435cad1c967139d
-
Filesize
852KB
MD5db2306ada1ac79944d60c4c0f6116daa
SHA1ef7c4862a32fbbacbcedca3aff3e5a5d3038ed80
SHA2565cb5438e58ab838649d85c16703362314250570d27992ffdf1231ff4326a4a82
SHA51260896b4f1c7a9a72868ab79b2e71932d1d9949d42bd957b7b707943a0e6ca715f9977ad37f416309d374b053b41b32b27b4834eb44dbcd9c9435cad1c967139d
-
Filesize
375KB
MD5e858ae6c269fcf03e5bddb2cd2e2ea1d
SHA18ddfc158634cc8fd2a04a835e95d1592b10fb0ea
SHA256f9fce693b1a4602f7644859bf3e22feaa8d1652b7e25775eca04f223832a160d
SHA5129db1144a79e89876a1879526a3b6209ca83850e79ce0e6ba67637daa0cfba0a743bc82ed69c44781e05aabd9541c1f2cb87d746a18af71b881b7766a68f5d457
-
Filesize
375KB
MD5e858ae6c269fcf03e5bddb2cd2e2ea1d
SHA18ddfc158634cc8fd2a04a835e95d1592b10fb0ea
SHA256f9fce693b1a4602f7644859bf3e22feaa8d1652b7e25775eca04f223832a160d
SHA5129db1144a79e89876a1879526a3b6209ca83850e79ce0e6ba67637daa0cfba0a743bc82ed69c44781e05aabd9541c1f2cb87d746a18af71b881b7766a68f5d457
-
Filesize
169KB
MD575d2e8af96b32d0b12a337e2011dc9bb
SHA1fd147e771ab0b339087256efeb832b4769f2906a
SHA25616a536a9ef512ab417387fc158944d5a9acc8e1905845063b85838deaddd55e1
SHA512e56492879d6fe04134df8ca00a59e315359f4d26e58781810a41447c4a36c187f56a36c3ab91ff7ee47573a451fca201a1b5b6d6dde2cd630d0fb54b3d64e2dc
-
Filesize
169KB
MD575d2e8af96b32d0b12a337e2011dc9bb
SHA1fd147e771ab0b339087256efeb832b4769f2906a
SHA25616a536a9ef512ab417387fc158944d5a9acc8e1905845063b85838deaddd55e1
SHA512e56492879d6fe04134df8ca00a59e315359f4d26e58781810a41447c4a36c187f56a36c3ab91ff7ee47573a451fca201a1b5b6d6dde2cd630d0fb54b3d64e2dc
-
Filesize
1.3MB
MD53a77e49606c561f2e32719b7e78609a9
SHA1c670e86bf729d3a250e83bd1118209e225557a77
SHA256e220b0b18707d3c0afbeabd6d66b6195889e10ddb38d605b729eb125d1cf5489
SHA5121b929cc30012f188d2d869e9c32c92298c704eeddb33ecc867f4b09def361007de085bb189056f5d9ef3567f420f5a98e692a5b1a81ec3df63c928becf78a3c5
-
Filesize
1.3MB
MD53a77e49606c561f2e32719b7e78609a9
SHA1c670e86bf729d3a250e83bd1118209e225557a77
SHA256e220b0b18707d3c0afbeabd6d66b6195889e10ddb38d605b729eb125d1cf5489
SHA5121b929cc30012f188d2d869e9c32c92298c704eeddb33ecc867f4b09def361007de085bb189056f5d9ef3567f420f5a98e692a5b1a81ec3df63c928becf78a3c5
-
Filesize
1023KB
MD5883a09985eb5af646992337148d6fe7a
SHA19ccb379e966988f92e4c005b011f94e0f3c50378
SHA2568fed3ba6345f378bcc69688dd5f0e58c5310a031fac061233b4e06c2156e800f
SHA51233df08466f75aa57d45836ab07bd84e857c529c1f85a66fbce66bd642250f19a51b14e868b86cdd97cbebf0a42648bff874c801dc72043ebbeb35d3b51f77518
-
Filesize
1023KB
MD5883a09985eb5af646992337148d6fe7a
SHA19ccb379e966988f92e4c005b011f94e0f3c50378
SHA2568fed3ba6345f378bcc69688dd5f0e58c5310a031fac061233b4e06c2156e800f
SHA51233df08466f75aa57d45836ab07bd84e857c529c1f85a66fbce66bd642250f19a51b14e868b86cdd97cbebf0a42648bff874c801dc72043ebbeb35d3b51f77518
-
Filesize
852KB
MD5db2306ada1ac79944d60c4c0f6116daa
SHA1ef7c4862a32fbbacbcedca3aff3e5a5d3038ed80
SHA2565cb5438e58ab838649d85c16703362314250570d27992ffdf1231ff4326a4a82
SHA51260896b4f1c7a9a72868ab79b2e71932d1d9949d42bd957b7b707943a0e6ca715f9977ad37f416309d374b053b41b32b27b4834eb44dbcd9c9435cad1c967139d
-
Filesize
852KB
MD5db2306ada1ac79944d60c4c0f6116daa
SHA1ef7c4862a32fbbacbcedca3aff3e5a5d3038ed80
SHA2565cb5438e58ab838649d85c16703362314250570d27992ffdf1231ff4326a4a82
SHA51260896b4f1c7a9a72868ab79b2e71932d1d9949d42bd957b7b707943a0e6ca715f9977ad37f416309d374b053b41b32b27b4834eb44dbcd9c9435cad1c967139d
-
Filesize
375KB
MD5e858ae6c269fcf03e5bddb2cd2e2ea1d
SHA18ddfc158634cc8fd2a04a835e95d1592b10fb0ea
SHA256f9fce693b1a4602f7644859bf3e22feaa8d1652b7e25775eca04f223832a160d
SHA5129db1144a79e89876a1879526a3b6209ca83850e79ce0e6ba67637daa0cfba0a743bc82ed69c44781e05aabd9541c1f2cb87d746a18af71b881b7766a68f5d457
-
Filesize
375KB
MD5e858ae6c269fcf03e5bddb2cd2e2ea1d
SHA18ddfc158634cc8fd2a04a835e95d1592b10fb0ea
SHA256f9fce693b1a4602f7644859bf3e22feaa8d1652b7e25775eca04f223832a160d
SHA5129db1144a79e89876a1879526a3b6209ca83850e79ce0e6ba67637daa0cfba0a743bc82ed69c44781e05aabd9541c1f2cb87d746a18af71b881b7766a68f5d457
-
Filesize
169KB
MD575d2e8af96b32d0b12a337e2011dc9bb
SHA1fd147e771ab0b339087256efeb832b4769f2906a
SHA25616a536a9ef512ab417387fc158944d5a9acc8e1905845063b85838deaddd55e1
SHA512e56492879d6fe04134df8ca00a59e315359f4d26e58781810a41447c4a36c187f56a36c3ab91ff7ee47573a451fca201a1b5b6d6dde2cd630d0fb54b3d64e2dc
-
Filesize
169KB
MD575d2e8af96b32d0b12a337e2011dc9bb
SHA1fd147e771ab0b339087256efeb832b4769f2906a
SHA25616a536a9ef512ab417387fc158944d5a9acc8e1905845063b85838deaddd55e1
SHA512e56492879d6fe04134df8ca00a59e315359f4d26e58781810a41447c4a36c187f56a36c3ab91ff7ee47573a451fca201a1b5b6d6dde2cd630d0fb54b3d64e2dc