Analysis
-
max time kernel
152s -
max time network
188s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05-05-2023 18:57
Static task
static1
Behavioral task
behavioral1
Sample
ad204399c025f009a9aeac4c927cb7515a6878c3109124b0944912c9f955f817.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ad204399c025f009a9aeac4c927cb7515a6878c3109124b0944912c9f955f817.exe
Resource
win10v2004-20230220-en
General
-
Target
ad204399c025f009a9aeac4c927cb7515a6878c3109124b0944912c9f955f817.exe
-
Size
1.2MB
-
MD5
58c2cdbc2aa7bffde6da05e41849ab6a
-
SHA1
e32ae8e0d906647aa3d405b3e9d1596d879a1a29
-
SHA256
ad204399c025f009a9aeac4c927cb7515a6878c3109124b0944912c9f955f817
-
SHA512
7b1d1341f6629e243655122d680e5ff08cd75805daf38485157baf720a2dc5b1354c616493e3332effce0b046a650256606f20eb19a615c38c484509831f1d1c
-
SSDEEP
24576:VyCiCrc9T+lxqsRy2xyagZPQNkOZfP3rHmQef41YVfDadmT07m:wJCrcV+lxqSxyjcFZf/KQefyabadmT
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 2024 z78404625.exe 672 z14593748.exe 1396 z90540759.exe 1244 s69877547.exe 1680 1.exe 580 t61265919.exe -
Loads dropped DLL 13 IoCs
pid Process 1112 ad204399c025f009a9aeac4c927cb7515a6878c3109124b0944912c9f955f817.exe 2024 z78404625.exe 2024 z78404625.exe 672 z14593748.exe 672 z14593748.exe 1396 z90540759.exe 1396 z90540759.exe 1396 z90540759.exe 1244 s69877547.exe 1244 s69877547.exe 1680 1.exe 1396 z90540759.exe 580 t61265919.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z14593748.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z90540759.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z90540759.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce ad204399c025f009a9aeac4c927cb7515a6878c3109124b0944912c9f955f817.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ad204399c025f009a9aeac4c927cb7515a6878c3109124b0944912c9f955f817.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z78404625.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z78404625.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z14593748.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1244 s69877547.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1112 wrote to memory of 2024 1112 ad204399c025f009a9aeac4c927cb7515a6878c3109124b0944912c9f955f817.exe 27 PID 1112 wrote to memory of 2024 1112 ad204399c025f009a9aeac4c927cb7515a6878c3109124b0944912c9f955f817.exe 27 PID 1112 wrote to memory of 2024 1112 ad204399c025f009a9aeac4c927cb7515a6878c3109124b0944912c9f955f817.exe 27 PID 1112 wrote to memory of 2024 1112 ad204399c025f009a9aeac4c927cb7515a6878c3109124b0944912c9f955f817.exe 27 PID 1112 wrote to memory of 2024 1112 ad204399c025f009a9aeac4c927cb7515a6878c3109124b0944912c9f955f817.exe 27 PID 1112 wrote to memory of 2024 1112 ad204399c025f009a9aeac4c927cb7515a6878c3109124b0944912c9f955f817.exe 27 PID 1112 wrote to memory of 2024 1112 ad204399c025f009a9aeac4c927cb7515a6878c3109124b0944912c9f955f817.exe 27 PID 2024 wrote to memory of 672 2024 z78404625.exe 28 PID 2024 wrote to memory of 672 2024 z78404625.exe 28 PID 2024 wrote to memory of 672 2024 z78404625.exe 28 PID 2024 wrote to memory of 672 2024 z78404625.exe 28 PID 2024 wrote to memory of 672 2024 z78404625.exe 28 PID 2024 wrote to memory of 672 2024 z78404625.exe 28 PID 2024 wrote to memory of 672 2024 z78404625.exe 28 PID 672 wrote to memory of 1396 672 z14593748.exe 29 PID 672 wrote to memory of 1396 672 z14593748.exe 29 PID 672 wrote to memory of 1396 672 z14593748.exe 29 PID 672 wrote to memory of 1396 672 z14593748.exe 29 PID 672 wrote to memory of 1396 672 z14593748.exe 29 PID 672 wrote to memory of 1396 672 z14593748.exe 29 PID 672 wrote to memory of 1396 672 z14593748.exe 29 PID 1396 wrote to memory of 1244 1396 z90540759.exe 30 PID 1396 wrote to memory of 1244 1396 z90540759.exe 30 PID 1396 wrote to memory of 1244 1396 z90540759.exe 30 PID 1396 wrote to memory of 1244 1396 z90540759.exe 30 PID 1396 wrote to memory of 1244 1396 z90540759.exe 30 PID 1396 wrote to memory of 1244 1396 z90540759.exe 30 PID 1396 wrote to memory of 1244 1396 z90540759.exe 30 PID 1244 wrote to memory of 1680 1244 s69877547.exe 31 PID 1244 wrote to memory of 1680 1244 s69877547.exe 31 PID 1244 wrote to memory of 1680 1244 s69877547.exe 31 PID 1244 wrote to memory of 1680 1244 s69877547.exe 31 PID 1244 wrote to memory of 1680 1244 s69877547.exe 31 PID 1244 wrote to memory of 1680 1244 s69877547.exe 31 PID 1244 wrote to memory of 1680 1244 s69877547.exe 31 PID 1396 wrote to memory of 580 1396 z90540759.exe 32 PID 1396 wrote to memory of 580 1396 z90540759.exe 32 PID 1396 wrote to memory of 580 1396 z90540759.exe 32 PID 1396 wrote to memory of 580 1396 z90540759.exe 32 PID 1396 wrote to memory of 580 1396 z90540759.exe 32 PID 1396 wrote to memory of 580 1396 z90540759.exe 32 PID 1396 wrote to memory of 580 1396 z90540759.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad204399c025f009a9aeac4c927cb7515a6878c3109124b0944912c9f955f817.exe"C:\Users\Admin\AppData\Local\Temp\ad204399c025f009a9aeac4c927cb7515a6878c3109124b0944912c9f955f817.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z78404625.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z78404625.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z14593748.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z14593748.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z90540759.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z90540759.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s69877547.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s69877547.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1680
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t61265919.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t61265919.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:580
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5879b0a50147e1e9a3decf89ae0350c02
SHA1f074104b0779110d6c674ed14b8b3bd92dd8e5ad
SHA256ecb76ab7a34a1df10fa05551096bce599d78a049bbb094d2521fb3989fe63838
SHA5128160d6957a557344eb360a378d2441b45b567968a0a212e39cb5617b8b4cd0b29202281963db3c4a4dd8352adc041984007b9ad73f5cef8a37a807877e1f97c4
-
Filesize
1.0MB
MD5879b0a50147e1e9a3decf89ae0350c02
SHA1f074104b0779110d6c674ed14b8b3bd92dd8e5ad
SHA256ecb76ab7a34a1df10fa05551096bce599d78a049bbb094d2521fb3989fe63838
SHA5128160d6957a557344eb360a378d2441b45b567968a0a212e39cb5617b8b4cd0b29202281963db3c4a4dd8352adc041984007b9ad73f5cef8a37a807877e1f97c4
-
Filesize
764KB
MD580a220a96174c1fa4b0996649474d4cd
SHA17a51b6d7808297a0860580ff0928ea08138738c7
SHA2560af2fd47a480254c2ea2ec97da0cc53b414ae07629a6c68c00163e9bf3ed95a2
SHA512e06fa051d1f5a0c877fb651f19105c437577572df31aaebbabe162e86612dd2c8b8a998df620315dd9092163148e949cb769f464a99659fb49a093cd893d8e69
-
Filesize
764KB
MD580a220a96174c1fa4b0996649474d4cd
SHA17a51b6d7808297a0860580ff0928ea08138738c7
SHA2560af2fd47a480254c2ea2ec97da0cc53b414ae07629a6c68c00163e9bf3ed95a2
SHA512e06fa051d1f5a0c877fb651f19105c437577572df31aaebbabe162e86612dd2c8b8a998df620315dd9092163148e949cb769f464a99659fb49a093cd893d8e69
-
Filesize
581KB
MD599c27bd29e627a6fc6c7611755b78f00
SHA1810338d5243ae43fad071f791cd57c8916dbfb13
SHA25699c47d5237aa3c79bb3364365402539a6561a129be24b327d570153ae9e4154c
SHA5122081cb63ff00820fb03684fc7fd29207c6ae87c050a92631b1f0db568ad09d50d174b0ab05910dd55a97bf317e06e4ed3240136c6deb2844fdd3874765e61a64
-
Filesize
581KB
MD599c27bd29e627a6fc6c7611755b78f00
SHA1810338d5243ae43fad071f791cd57c8916dbfb13
SHA25699c47d5237aa3c79bb3364365402539a6561a129be24b327d570153ae9e4154c
SHA5122081cb63ff00820fb03684fc7fd29207c6ae87c050a92631b1f0db568ad09d50d174b0ab05910dd55a97bf317e06e4ed3240136c6deb2844fdd3874765e61a64
-
Filesize
580KB
MD5207d74c1f1c2506dfeee45a6ead56277
SHA1177c2305f147e4e0eed875b1e19abd47bc5af11e
SHA2569bd45d66822d7a20e2c4be4f80dc8c8e6ffedac69542438fce80887fc274addb
SHA5123cf54c746222a7f3d10d679b95e6f791617ab51ee5a5f8a22d9015c0e65e6f34069c8fe8f37e8a54961237dc1b6bc8f1a5c5e0074da6598f860ac7e75282bae7
-
Filesize
580KB
MD5207d74c1f1c2506dfeee45a6ead56277
SHA1177c2305f147e4e0eed875b1e19abd47bc5af11e
SHA2569bd45d66822d7a20e2c4be4f80dc8c8e6ffedac69542438fce80887fc274addb
SHA5123cf54c746222a7f3d10d679b95e6f791617ab51ee5a5f8a22d9015c0e65e6f34069c8fe8f37e8a54961237dc1b6bc8f1a5c5e0074da6598f860ac7e75282bae7
-
Filesize
580KB
MD5207d74c1f1c2506dfeee45a6ead56277
SHA1177c2305f147e4e0eed875b1e19abd47bc5af11e
SHA2569bd45d66822d7a20e2c4be4f80dc8c8e6ffedac69542438fce80887fc274addb
SHA5123cf54c746222a7f3d10d679b95e6f791617ab51ee5a5f8a22d9015c0e65e6f34069c8fe8f37e8a54961237dc1b6bc8f1a5c5e0074da6598f860ac7e75282bae7
-
Filesize
169KB
MD5c60d145a33947e8e046b940462d8ce51
SHA16de6b488e05bb8f6bd042154e5caf55e8c00e68e
SHA256bfda175770dcf20c818da9926ce735887bc0a852091926c8d1924b06302abedb
SHA5120f280b6cb45139fde34ac65d9b03ddb96b588d9e79c15be9edd48d2aecd2df6e3ca471dd443441d4ba3a0c210b201e6c472dcd87634fac4c1c09e0fca7af9bab
-
Filesize
169KB
MD5c60d145a33947e8e046b940462d8ce51
SHA16de6b488e05bb8f6bd042154e5caf55e8c00e68e
SHA256bfda175770dcf20c818da9926ce735887bc0a852091926c8d1924b06302abedb
SHA5120f280b6cb45139fde34ac65d9b03ddb96b588d9e79c15be9edd48d2aecd2df6e3ca471dd443441d4ba3a0c210b201e6c472dcd87634fac4c1c09e0fca7af9bab
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
1.0MB
MD5879b0a50147e1e9a3decf89ae0350c02
SHA1f074104b0779110d6c674ed14b8b3bd92dd8e5ad
SHA256ecb76ab7a34a1df10fa05551096bce599d78a049bbb094d2521fb3989fe63838
SHA5128160d6957a557344eb360a378d2441b45b567968a0a212e39cb5617b8b4cd0b29202281963db3c4a4dd8352adc041984007b9ad73f5cef8a37a807877e1f97c4
-
Filesize
1.0MB
MD5879b0a50147e1e9a3decf89ae0350c02
SHA1f074104b0779110d6c674ed14b8b3bd92dd8e5ad
SHA256ecb76ab7a34a1df10fa05551096bce599d78a049bbb094d2521fb3989fe63838
SHA5128160d6957a557344eb360a378d2441b45b567968a0a212e39cb5617b8b4cd0b29202281963db3c4a4dd8352adc041984007b9ad73f5cef8a37a807877e1f97c4
-
Filesize
764KB
MD580a220a96174c1fa4b0996649474d4cd
SHA17a51b6d7808297a0860580ff0928ea08138738c7
SHA2560af2fd47a480254c2ea2ec97da0cc53b414ae07629a6c68c00163e9bf3ed95a2
SHA512e06fa051d1f5a0c877fb651f19105c437577572df31aaebbabe162e86612dd2c8b8a998df620315dd9092163148e949cb769f464a99659fb49a093cd893d8e69
-
Filesize
764KB
MD580a220a96174c1fa4b0996649474d4cd
SHA17a51b6d7808297a0860580ff0928ea08138738c7
SHA2560af2fd47a480254c2ea2ec97da0cc53b414ae07629a6c68c00163e9bf3ed95a2
SHA512e06fa051d1f5a0c877fb651f19105c437577572df31aaebbabe162e86612dd2c8b8a998df620315dd9092163148e949cb769f464a99659fb49a093cd893d8e69
-
Filesize
581KB
MD599c27bd29e627a6fc6c7611755b78f00
SHA1810338d5243ae43fad071f791cd57c8916dbfb13
SHA25699c47d5237aa3c79bb3364365402539a6561a129be24b327d570153ae9e4154c
SHA5122081cb63ff00820fb03684fc7fd29207c6ae87c050a92631b1f0db568ad09d50d174b0ab05910dd55a97bf317e06e4ed3240136c6deb2844fdd3874765e61a64
-
Filesize
581KB
MD599c27bd29e627a6fc6c7611755b78f00
SHA1810338d5243ae43fad071f791cd57c8916dbfb13
SHA25699c47d5237aa3c79bb3364365402539a6561a129be24b327d570153ae9e4154c
SHA5122081cb63ff00820fb03684fc7fd29207c6ae87c050a92631b1f0db568ad09d50d174b0ab05910dd55a97bf317e06e4ed3240136c6deb2844fdd3874765e61a64
-
Filesize
580KB
MD5207d74c1f1c2506dfeee45a6ead56277
SHA1177c2305f147e4e0eed875b1e19abd47bc5af11e
SHA2569bd45d66822d7a20e2c4be4f80dc8c8e6ffedac69542438fce80887fc274addb
SHA5123cf54c746222a7f3d10d679b95e6f791617ab51ee5a5f8a22d9015c0e65e6f34069c8fe8f37e8a54961237dc1b6bc8f1a5c5e0074da6598f860ac7e75282bae7
-
Filesize
580KB
MD5207d74c1f1c2506dfeee45a6ead56277
SHA1177c2305f147e4e0eed875b1e19abd47bc5af11e
SHA2569bd45d66822d7a20e2c4be4f80dc8c8e6ffedac69542438fce80887fc274addb
SHA5123cf54c746222a7f3d10d679b95e6f791617ab51ee5a5f8a22d9015c0e65e6f34069c8fe8f37e8a54961237dc1b6bc8f1a5c5e0074da6598f860ac7e75282bae7
-
Filesize
580KB
MD5207d74c1f1c2506dfeee45a6ead56277
SHA1177c2305f147e4e0eed875b1e19abd47bc5af11e
SHA2569bd45d66822d7a20e2c4be4f80dc8c8e6ffedac69542438fce80887fc274addb
SHA5123cf54c746222a7f3d10d679b95e6f791617ab51ee5a5f8a22d9015c0e65e6f34069c8fe8f37e8a54961237dc1b6bc8f1a5c5e0074da6598f860ac7e75282bae7
-
Filesize
169KB
MD5c60d145a33947e8e046b940462d8ce51
SHA16de6b488e05bb8f6bd042154e5caf55e8c00e68e
SHA256bfda175770dcf20c818da9926ce735887bc0a852091926c8d1924b06302abedb
SHA5120f280b6cb45139fde34ac65d9b03ddb96b588d9e79c15be9edd48d2aecd2df6e3ca471dd443441d4ba3a0c210b201e6c472dcd87634fac4c1c09e0fca7af9bab
-
Filesize
169KB
MD5c60d145a33947e8e046b940462d8ce51
SHA16de6b488e05bb8f6bd042154e5caf55e8c00e68e
SHA256bfda175770dcf20c818da9926ce735887bc0a852091926c8d1924b06302abedb
SHA5120f280b6cb45139fde34ac65d9b03ddb96b588d9e79c15be9edd48d2aecd2df6e3ca471dd443441d4ba3a0c210b201e6c472dcd87634fac4c1c09e0fca7af9bab
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf