Analysis
-
max time kernel
124s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05-05-2023 18:46
Static task
static1
Behavioral task
behavioral1
Sample
a261d1e672e7ec157532d7575f844f60c22a86d6090f7a60b954564db3e86786.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a261d1e672e7ec157532d7575f844f60c22a86d6090f7a60b954564db3e86786.exe
Resource
win10v2004-20230220-en
General
-
Target
a261d1e672e7ec157532d7575f844f60c22a86d6090f7a60b954564db3e86786.exe
-
Size
783KB
-
MD5
f2d44afbeee16bd906dbf47a6722088d
-
SHA1
086b57717d947bee6dccefa8fe570817b3472a74
-
SHA256
a261d1e672e7ec157532d7575f844f60c22a86d6090f7a60b954564db3e86786
-
SHA512
534fc262275283866f11cf9397fd1e47a41dcda6cb444ee114004d2448cd39834c54d97b4bc5f3e4eafa0feb19239370ff5a84199d9f5b76b560952dbec88697
-
SSDEEP
24576:lyTbWN31lrbRbHMIIdHU2/1SodURRKz0GO2:AetP5bHMrdH7dSXRR
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dark
185.161.248.73:4164
-
auth_value
ae85b01f66afe8770afeed560513fc2d
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 2012 x78531217.exe 1464 m74187537.exe 1324 1.exe 1296 n82973927.exe -
Loads dropped DLL 9 IoCs
pid Process 1988 a261d1e672e7ec157532d7575f844f60c22a86d6090f7a60b954564db3e86786.exe 2012 x78531217.exe 2012 x78531217.exe 2012 x78531217.exe 1464 m74187537.exe 1464 m74187537.exe 1324 1.exe 2012 x78531217.exe 1296 n82973927.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce x78531217.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x78531217.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce a261d1e672e7ec157532d7575f844f60c22a86d6090f7a60b954564db3e86786.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a261d1e672e7ec157532d7575f844f60c22a86d6090f7a60b954564db3e86786.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1464 m74187537.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1988 wrote to memory of 2012 1988 a261d1e672e7ec157532d7575f844f60c22a86d6090f7a60b954564db3e86786.exe 28 PID 1988 wrote to memory of 2012 1988 a261d1e672e7ec157532d7575f844f60c22a86d6090f7a60b954564db3e86786.exe 28 PID 1988 wrote to memory of 2012 1988 a261d1e672e7ec157532d7575f844f60c22a86d6090f7a60b954564db3e86786.exe 28 PID 1988 wrote to memory of 2012 1988 a261d1e672e7ec157532d7575f844f60c22a86d6090f7a60b954564db3e86786.exe 28 PID 1988 wrote to memory of 2012 1988 a261d1e672e7ec157532d7575f844f60c22a86d6090f7a60b954564db3e86786.exe 28 PID 1988 wrote to memory of 2012 1988 a261d1e672e7ec157532d7575f844f60c22a86d6090f7a60b954564db3e86786.exe 28 PID 1988 wrote to memory of 2012 1988 a261d1e672e7ec157532d7575f844f60c22a86d6090f7a60b954564db3e86786.exe 28 PID 2012 wrote to memory of 1464 2012 x78531217.exe 29 PID 2012 wrote to memory of 1464 2012 x78531217.exe 29 PID 2012 wrote to memory of 1464 2012 x78531217.exe 29 PID 2012 wrote to memory of 1464 2012 x78531217.exe 29 PID 2012 wrote to memory of 1464 2012 x78531217.exe 29 PID 2012 wrote to memory of 1464 2012 x78531217.exe 29 PID 2012 wrote to memory of 1464 2012 x78531217.exe 29 PID 1464 wrote to memory of 1324 1464 m74187537.exe 30 PID 1464 wrote to memory of 1324 1464 m74187537.exe 30 PID 1464 wrote to memory of 1324 1464 m74187537.exe 30 PID 1464 wrote to memory of 1324 1464 m74187537.exe 30 PID 1464 wrote to memory of 1324 1464 m74187537.exe 30 PID 1464 wrote to memory of 1324 1464 m74187537.exe 30 PID 1464 wrote to memory of 1324 1464 m74187537.exe 30 PID 2012 wrote to memory of 1296 2012 x78531217.exe 31 PID 2012 wrote to memory of 1296 2012 x78531217.exe 31 PID 2012 wrote to memory of 1296 2012 x78531217.exe 31 PID 2012 wrote to memory of 1296 2012 x78531217.exe 31 PID 2012 wrote to memory of 1296 2012 x78531217.exe 31 PID 2012 wrote to memory of 1296 2012 x78531217.exe 31 PID 2012 wrote to memory of 1296 2012 x78531217.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a261d1e672e7ec157532d7575f844f60c22a86d6090f7a60b954564db3e86786.exe"C:\Users\Admin\AppData\Local\Temp\a261d1e672e7ec157532d7575f844f60c22a86d6090f7a60b954564db3e86786.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x78531217.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x78531217.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m74187537.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m74187537.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1324
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n82973927.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n82973927.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1296
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
578KB
MD5c413dca132c9619f5ef1680e00b6a316
SHA1fff11ddc3917914e813bf4b29b0416774c6c81b6
SHA25667662ae1315a45d1d509cfe6b1b0536ed4f9c29c0de2f283816fedd10d317a0e
SHA51263f5db5d437aa3a76478a8f771776e5a8ad0d1589182ec1b84c9711906d58cf4f55c38febbe47c72430946b1d797c9fc174a222c1f5950ece110d604a135d4ec
-
Filesize
578KB
MD5c413dca132c9619f5ef1680e00b6a316
SHA1fff11ddc3917914e813bf4b29b0416774c6c81b6
SHA25667662ae1315a45d1d509cfe6b1b0536ed4f9c29c0de2f283816fedd10d317a0e
SHA51263f5db5d437aa3a76478a8f771776e5a8ad0d1589182ec1b84c9711906d58cf4f55c38febbe47c72430946b1d797c9fc174a222c1f5950ece110d604a135d4ec
-
Filesize
575KB
MD5027eba01c624d1ee1807a3eb13a0776f
SHA1db928b92fa89e7ec224ade5f0452501007a5152d
SHA256084589a6f609fb944d36641c30aeb108bfad10453f133e5c6fddd2ab80959e11
SHA512469b0f9c4d882f9c8904f928aa57a9f3572942fab568d35614fae228e68640ef2bbcf16c4f45e6016beeb9ba91bc890e6f410e9e0f1555dadaf8d0c0d6c2f525
-
Filesize
575KB
MD5027eba01c624d1ee1807a3eb13a0776f
SHA1db928b92fa89e7ec224ade5f0452501007a5152d
SHA256084589a6f609fb944d36641c30aeb108bfad10453f133e5c6fddd2ab80959e11
SHA512469b0f9c4d882f9c8904f928aa57a9f3572942fab568d35614fae228e68640ef2bbcf16c4f45e6016beeb9ba91bc890e6f410e9e0f1555dadaf8d0c0d6c2f525
-
Filesize
575KB
MD5027eba01c624d1ee1807a3eb13a0776f
SHA1db928b92fa89e7ec224ade5f0452501007a5152d
SHA256084589a6f609fb944d36641c30aeb108bfad10453f133e5c6fddd2ab80959e11
SHA512469b0f9c4d882f9c8904f928aa57a9f3572942fab568d35614fae228e68640ef2bbcf16c4f45e6016beeb9ba91bc890e6f410e9e0f1555dadaf8d0c0d6c2f525
-
Filesize
172KB
MD548980871b9b1f65ec377327412513654
SHA1547e2d339d2b32845e32e07cddb1d7190f4bb78a
SHA25600e54c7498309c67a64ed70a653d93f9e1350c187c37245789fc2bff6923a4fc
SHA512ac1d1dd6ea003e2c31d13dbc556d3282d862169957e1bd97032578cbca284c5c3abd26fa7b7321d2894f511455113e436c14bf0788edaad657ed0da98ba8ee1d
-
Filesize
172KB
MD548980871b9b1f65ec377327412513654
SHA1547e2d339d2b32845e32e07cddb1d7190f4bb78a
SHA25600e54c7498309c67a64ed70a653d93f9e1350c187c37245789fc2bff6923a4fc
SHA512ac1d1dd6ea003e2c31d13dbc556d3282d862169957e1bd97032578cbca284c5c3abd26fa7b7321d2894f511455113e436c14bf0788edaad657ed0da98ba8ee1d
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
578KB
MD5c413dca132c9619f5ef1680e00b6a316
SHA1fff11ddc3917914e813bf4b29b0416774c6c81b6
SHA25667662ae1315a45d1d509cfe6b1b0536ed4f9c29c0de2f283816fedd10d317a0e
SHA51263f5db5d437aa3a76478a8f771776e5a8ad0d1589182ec1b84c9711906d58cf4f55c38febbe47c72430946b1d797c9fc174a222c1f5950ece110d604a135d4ec
-
Filesize
578KB
MD5c413dca132c9619f5ef1680e00b6a316
SHA1fff11ddc3917914e813bf4b29b0416774c6c81b6
SHA25667662ae1315a45d1d509cfe6b1b0536ed4f9c29c0de2f283816fedd10d317a0e
SHA51263f5db5d437aa3a76478a8f771776e5a8ad0d1589182ec1b84c9711906d58cf4f55c38febbe47c72430946b1d797c9fc174a222c1f5950ece110d604a135d4ec
-
Filesize
575KB
MD5027eba01c624d1ee1807a3eb13a0776f
SHA1db928b92fa89e7ec224ade5f0452501007a5152d
SHA256084589a6f609fb944d36641c30aeb108bfad10453f133e5c6fddd2ab80959e11
SHA512469b0f9c4d882f9c8904f928aa57a9f3572942fab568d35614fae228e68640ef2bbcf16c4f45e6016beeb9ba91bc890e6f410e9e0f1555dadaf8d0c0d6c2f525
-
Filesize
575KB
MD5027eba01c624d1ee1807a3eb13a0776f
SHA1db928b92fa89e7ec224ade5f0452501007a5152d
SHA256084589a6f609fb944d36641c30aeb108bfad10453f133e5c6fddd2ab80959e11
SHA512469b0f9c4d882f9c8904f928aa57a9f3572942fab568d35614fae228e68640ef2bbcf16c4f45e6016beeb9ba91bc890e6f410e9e0f1555dadaf8d0c0d6c2f525
-
Filesize
575KB
MD5027eba01c624d1ee1807a3eb13a0776f
SHA1db928b92fa89e7ec224ade5f0452501007a5152d
SHA256084589a6f609fb944d36641c30aeb108bfad10453f133e5c6fddd2ab80959e11
SHA512469b0f9c4d882f9c8904f928aa57a9f3572942fab568d35614fae228e68640ef2bbcf16c4f45e6016beeb9ba91bc890e6f410e9e0f1555dadaf8d0c0d6c2f525
-
Filesize
172KB
MD548980871b9b1f65ec377327412513654
SHA1547e2d339d2b32845e32e07cddb1d7190f4bb78a
SHA25600e54c7498309c67a64ed70a653d93f9e1350c187c37245789fc2bff6923a4fc
SHA512ac1d1dd6ea003e2c31d13dbc556d3282d862169957e1bd97032578cbca284c5c3abd26fa7b7321d2894f511455113e436c14bf0788edaad657ed0da98ba8ee1d
-
Filesize
172KB
MD548980871b9b1f65ec377327412513654
SHA1547e2d339d2b32845e32e07cddb1d7190f4bb78a
SHA25600e54c7498309c67a64ed70a653d93f9e1350c187c37245789fc2bff6923a4fc
SHA512ac1d1dd6ea003e2c31d13dbc556d3282d862169957e1bd97032578cbca284c5c3abd26fa7b7321d2894f511455113e436c14bf0788edaad657ed0da98ba8ee1d
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf