Analysis
-
max time kernel
128s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05-05-2023 19:16
Static task
static1
Behavioral task
behavioral1
Sample
bcb714471859a6a6dde881e9caf7c7feb071fecf1f07c8024590d11604b0120f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bcb714471859a6a6dde881e9caf7c7feb071fecf1f07c8024590d11604b0120f.exe
Resource
win10v2004-20230220-en
General
-
Target
bcb714471859a6a6dde881e9caf7c7feb071fecf1f07c8024590d11604b0120f.exe
-
Size
1.2MB
-
MD5
3393cc3b8e66157ab221e80135934e6f
-
SHA1
02f22eafdb1fab90ccdf54112207a92e73918b71
-
SHA256
bcb714471859a6a6dde881e9caf7c7feb071fecf1f07c8024590d11604b0120f
-
SHA512
2eef466a0dbf16ad78c7ce381188a5e765005d22bd6fa51946a4a5c48c9ca55418384af3cb72c7b87cbb4e294c12bba9508441cff79b6d9796eedde7c0efc6b6
-
SSDEEP
24576:Ey9d11mZg/CwkVxCklKE51sxffi/vI/WqtAcGsuhNKa20dgTa5z:T9djq8QBlN51s5fi2Wqf0dgT
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
z20680301.exez23113807.exez95999060.exes56114922.exe1.exet19679674.exepid process 1136 z20680301.exe 1476 z23113807.exe 1180 z95999060.exe 1780 s56114922.exe 1540 1.exe 892 t19679674.exe -
Loads dropped DLL 13 IoCs
Processes:
bcb714471859a6a6dde881e9caf7c7feb071fecf1f07c8024590d11604b0120f.exez20680301.exez23113807.exez95999060.exes56114922.exe1.exet19679674.exepid process 1704 bcb714471859a6a6dde881e9caf7c7feb071fecf1f07c8024590d11604b0120f.exe 1136 z20680301.exe 1136 z20680301.exe 1476 z23113807.exe 1476 z23113807.exe 1180 z95999060.exe 1180 z95999060.exe 1180 z95999060.exe 1780 s56114922.exe 1780 s56114922.exe 1540 1.exe 1180 z95999060.exe 892 t19679674.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
z23113807.exez95999060.exebcb714471859a6a6dde881e9caf7c7feb071fecf1f07c8024590d11604b0120f.exez20680301.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z23113807.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z23113807.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z95999060.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z95999060.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce bcb714471859a6a6dde881e9caf7c7feb071fecf1f07c8024590d11604b0120f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bcb714471859a6a6dde881e9caf7c7feb071fecf1f07c8024590d11604b0120f.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z20680301.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z20680301.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
s56114922.exedescription pid process Token: SeDebugPrivilege 1780 s56114922.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
bcb714471859a6a6dde881e9caf7c7feb071fecf1f07c8024590d11604b0120f.exez20680301.exez23113807.exez95999060.exes56114922.exedescription pid process target process PID 1704 wrote to memory of 1136 1704 bcb714471859a6a6dde881e9caf7c7feb071fecf1f07c8024590d11604b0120f.exe z20680301.exe PID 1704 wrote to memory of 1136 1704 bcb714471859a6a6dde881e9caf7c7feb071fecf1f07c8024590d11604b0120f.exe z20680301.exe PID 1704 wrote to memory of 1136 1704 bcb714471859a6a6dde881e9caf7c7feb071fecf1f07c8024590d11604b0120f.exe z20680301.exe PID 1704 wrote to memory of 1136 1704 bcb714471859a6a6dde881e9caf7c7feb071fecf1f07c8024590d11604b0120f.exe z20680301.exe PID 1704 wrote to memory of 1136 1704 bcb714471859a6a6dde881e9caf7c7feb071fecf1f07c8024590d11604b0120f.exe z20680301.exe PID 1704 wrote to memory of 1136 1704 bcb714471859a6a6dde881e9caf7c7feb071fecf1f07c8024590d11604b0120f.exe z20680301.exe PID 1704 wrote to memory of 1136 1704 bcb714471859a6a6dde881e9caf7c7feb071fecf1f07c8024590d11604b0120f.exe z20680301.exe PID 1136 wrote to memory of 1476 1136 z20680301.exe z23113807.exe PID 1136 wrote to memory of 1476 1136 z20680301.exe z23113807.exe PID 1136 wrote to memory of 1476 1136 z20680301.exe z23113807.exe PID 1136 wrote to memory of 1476 1136 z20680301.exe z23113807.exe PID 1136 wrote to memory of 1476 1136 z20680301.exe z23113807.exe PID 1136 wrote to memory of 1476 1136 z20680301.exe z23113807.exe PID 1136 wrote to memory of 1476 1136 z20680301.exe z23113807.exe PID 1476 wrote to memory of 1180 1476 z23113807.exe z95999060.exe PID 1476 wrote to memory of 1180 1476 z23113807.exe z95999060.exe PID 1476 wrote to memory of 1180 1476 z23113807.exe z95999060.exe PID 1476 wrote to memory of 1180 1476 z23113807.exe z95999060.exe PID 1476 wrote to memory of 1180 1476 z23113807.exe z95999060.exe PID 1476 wrote to memory of 1180 1476 z23113807.exe z95999060.exe PID 1476 wrote to memory of 1180 1476 z23113807.exe z95999060.exe PID 1180 wrote to memory of 1780 1180 z95999060.exe s56114922.exe PID 1180 wrote to memory of 1780 1180 z95999060.exe s56114922.exe PID 1180 wrote to memory of 1780 1180 z95999060.exe s56114922.exe PID 1180 wrote to memory of 1780 1180 z95999060.exe s56114922.exe PID 1180 wrote to memory of 1780 1180 z95999060.exe s56114922.exe PID 1180 wrote to memory of 1780 1180 z95999060.exe s56114922.exe PID 1180 wrote to memory of 1780 1180 z95999060.exe s56114922.exe PID 1780 wrote to memory of 1540 1780 s56114922.exe 1.exe PID 1780 wrote to memory of 1540 1780 s56114922.exe 1.exe PID 1780 wrote to memory of 1540 1780 s56114922.exe 1.exe PID 1780 wrote to memory of 1540 1780 s56114922.exe 1.exe PID 1780 wrote to memory of 1540 1780 s56114922.exe 1.exe PID 1780 wrote to memory of 1540 1780 s56114922.exe 1.exe PID 1780 wrote to memory of 1540 1780 s56114922.exe 1.exe PID 1180 wrote to memory of 892 1180 z95999060.exe t19679674.exe PID 1180 wrote to memory of 892 1180 z95999060.exe t19679674.exe PID 1180 wrote to memory of 892 1180 z95999060.exe t19679674.exe PID 1180 wrote to memory of 892 1180 z95999060.exe t19679674.exe PID 1180 wrote to memory of 892 1180 z95999060.exe t19679674.exe PID 1180 wrote to memory of 892 1180 z95999060.exe t19679674.exe PID 1180 wrote to memory of 892 1180 z95999060.exe t19679674.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcb714471859a6a6dde881e9caf7c7feb071fecf1f07c8024590d11604b0120f.exe"C:\Users\Admin\AppData\Local\Temp\bcb714471859a6a6dde881e9caf7c7feb071fecf1f07c8024590d11604b0120f.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z20680301.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z20680301.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z23113807.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z23113807.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z95999060.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z95999060.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s56114922.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s56114922.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t19679674.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t19679674.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:892
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5a4040a1ea080096c5b6be1fdfe74f421
SHA169e21148370e96125578924ae27851a4e8d5cdc3
SHA256c3d5bf105c6ac7b6f7568d69470c121cf6e5b433b8b93730f2005119a96b873a
SHA512cd74dde134c15417823dc06fc0e640b5853dd101638f10739cb5d29a133aa3cc1cf9055de404a0ca863c69f8c64d6a3564a345f096efea26b1e5c8d3341381ed
-
Filesize
1.0MB
MD5a4040a1ea080096c5b6be1fdfe74f421
SHA169e21148370e96125578924ae27851a4e8d5cdc3
SHA256c3d5bf105c6ac7b6f7568d69470c121cf6e5b433b8b93730f2005119a96b873a
SHA512cd74dde134c15417823dc06fc0e640b5853dd101638f10739cb5d29a133aa3cc1cf9055de404a0ca863c69f8c64d6a3564a345f096efea26b1e5c8d3341381ed
-
Filesize
752KB
MD56915dfd40b070b2d5116189d71c45a4c
SHA1fa50605b4e53accc46927c1b3b528a8b20e618c5
SHA25612d6cf4d16047e3d20e76e1e8145e18c00344965be67ecc497a1e381e1732887
SHA5125d2774f492ef36b9bdbd154e79d902c95e644a65e80291a44f480d8c3d98b95c62a0e17ef535cd4049e1135c1aabdab7be121c94ee7568042b7f6d312334f0d4
-
Filesize
752KB
MD56915dfd40b070b2d5116189d71c45a4c
SHA1fa50605b4e53accc46927c1b3b528a8b20e618c5
SHA25612d6cf4d16047e3d20e76e1e8145e18c00344965be67ecc497a1e381e1732887
SHA5125d2774f492ef36b9bdbd154e79d902c95e644a65e80291a44f480d8c3d98b95c62a0e17ef535cd4049e1135c1aabdab7be121c94ee7568042b7f6d312334f0d4
-
Filesize
569KB
MD51ed977646d877489963bbf6ad4d224ce
SHA1b06976289f9ddfbf60c5a723c630cd8d69ff165d
SHA256bcdeca96051724afa9443be90fa388955502d78a8333e99ffb8fc8d55f3c25d5
SHA512f4696c700866d4dcbdfa12a92fb18b506edb307172771aa98254e1f022e4339db0a6dc405afad136059501d34f1c65948611720e881fe7a61df4cc695316df15
-
Filesize
569KB
MD51ed977646d877489963bbf6ad4d224ce
SHA1b06976289f9ddfbf60c5a723c630cd8d69ff165d
SHA256bcdeca96051724afa9443be90fa388955502d78a8333e99ffb8fc8d55f3c25d5
SHA512f4696c700866d4dcbdfa12a92fb18b506edb307172771aa98254e1f022e4339db0a6dc405afad136059501d34f1c65948611720e881fe7a61df4cc695316df15
-
Filesize
488KB
MD56549cec60f02a3723f16e29fd47c2d98
SHA197bb0453b0af0279cdf9775a7a573c6e7c07a252
SHA256b0752602753874878a3d20a4118a40c3ac6a25101e523510e0110fd37464628e
SHA51280294f114fd631f5cbc777945936b1248928943adb4a82c7c71034f242c3bb0c88c8892f26c847cc272db8e6753dc78c53981c72e2a9b0d44cb5e8b5d8808642
-
Filesize
488KB
MD56549cec60f02a3723f16e29fd47c2d98
SHA197bb0453b0af0279cdf9775a7a573c6e7c07a252
SHA256b0752602753874878a3d20a4118a40c3ac6a25101e523510e0110fd37464628e
SHA51280294f114fd631f5cbc777945936b1248928943adb4a82c7c71034f242c3bb0c88c8892f26c847cc272db8e6753dc78c53981c72e2a9b0d44cb5e8b5d8808642
-
Filesize
488KB
MD56549cec60f02a3723f16e29fd47c2d98
SHA197bb0453b0af0279cdf9775a7a573c6e7c07a252
SHA256b0752602753874878a3d20a4118a40c3ac6a25101e523510e0110fd37464628e
SHA51280294f114fd631f5cbc777945936b1248928943adb4a82c7c71034f242c3bb0c88c8892f26c847cc272db8e6753dc78c53981c72e2a9b0d44cb5e8b5d8808642
-
Filesize
170KB
MD520b750c87e499a7bdcc89c1137e323a1
SHA1bb316ced9563aa56f444bea68ac05729538b56a5
SHA2568a2668fcf94ec4b768c5c72a17e94bce3d2748353275121c6fb94c9ede011226
SHA51293e7d416c4fe8e2ec931f84699bb2610b206317818984bc51aba01d4252ddf5761d0cd6425294ca3d12f0efcbe456c22c6c995aa10a5b7ca336d6413fff5db7d
-
Filesize
170KB
MD520b750c87e499a7bdcc89c1137e323a1
SHA1bb316ced9563aa56f444bea68ac05729538b56a5
SHA2568a2668fcf94ec4b768c5c72a17e94bce3d2748353275121c6fb94c9ede011226
SHA51293e7d416c4fe8e2ec931f84699bb2610b206317818984bc51aba01d4252ddf5761d0cd6425294ca3d12f0efcbe456c22c6c995aa10a5b7ca336d6413fff5db7d
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
1.0MB
MD5a4040a1ea080096c5b6be1fdfe74f421
SHA169e21148370e96125578924ae27851a4e8d5cdc3
SHA256c3d5bf105c6ac7b6f7568d69470c121cf6e5b433b8b93730f2005119a96b873a
SHA512cd74dde134c15417823dc06fc0e640b5853dd101638f10739cb5d29a133aa3cc1cf9055de404a0ca863c69f8c64d6a3564a345f096efea26b1e5c8d3341381ed
-
Filesize
1.0MB
MD5a4040a1ea080096c5b6be1fdfe74f421
SHA169e21148370e96125578924ae27851a4e8d5cdc3
SHA256c3d5bf105c6ac7b6f7568d69470c121cf6e5b433b8b93730f2005119a96b873a
SHA512cd74dde134c15417823dc06fc0e640b5853dd101638f10739cb5d29a133aa3cc1cf9055de404a0ca863c69f8c64d6a3564a345f096efea26b1e5c8d3341381ed
-
Filesize
752KB
MD56915dfd40b070b2d5116189d71c45a4c
SHA1fa50605b4e53accc46927c1b3b528a8b20e618c5
SHA25612d6cf4d16047e3d20e76e1e8145e18c00344965be67ecc497a1e381e1732887
SHA5125d2774f492ef36b9bdbd154e79d902c95e644a65e80291a44f480d8c3d98b95c62a0e17ef535cd4049e1135c1aabdab7be121c94ee7568042b7f6d312334f0d4
-
Filesize
752KB
MD56915dfd40b070b2d5116189d71c45a4c
SHA1fa50605b4e53accc46927c1b3b528a8b20e618c5
SHA25612d6cf4d16047e3d20e76e1e8145e18c00344965be67ecc497a1e381e1732887
SHA5125d2774f492ef36b9bdbd154e79d902c95e644a65e80291a44f480d8c3d98b95c62a0e17ef535cd4049e1135c1aabdab7be121c94ee7568042b7f6d312334f0d4
-
Filesize
569KB
MD51ed977646d877489963bbf6ad4d224ce
SHA1b06976289f9ddfbf60c5a723c630cd8d69ff165d
SHA256bcdeca96051724afa9443be90fa388955502d78a8333e99ffb8fc8d55f3c25d5
SHA512f4696c700866d4dcbdfa12a92fb18b506edb307172771aa98254e1f022e4339db0a6dc405afad136059501d34f1c65948611720e881fe7a61df4cc695316df15
-
Filesize
569KB
MD51ed977646d877489963bbf6ad4d224ce
SHA1b06976289f9ddfbf60c5a723c630cd8d69ff165d
SHA256bcdeca96051724afa9443be90fa388955502d78a8333e99ffb8fc8d55f3c25d5
SHA512f4696c700866d4dcbdfa12a92fb18b506edb307172771aa98254e1f022e4339db0a6dc405afad136059501d34f1c65948611720e881fe7a61df4cc695316df15
-
Filesize
488KB
MD56549cec60f02a3723f16e29fd47c2d98
SHA197bb0453b0af0279cdf9775a7a573c6e7c07a252
SHA256b0752602753874878a3d20a4118a40c3ac6a25101e523510e0110fd37464628e
SHA51280294f114fd631f5cbc777945936b1248928943adb4a82c7c71034f242c3bb0c88c8892f26c847cc272db8e6753dc78c53981c72e2a9b0d44cb5e8b5d8808642
-
Filesize
488KB
MD56549cec60f02a3723f16e29fd47c2d98
SHA197bb0453b0af0279cdf9775a7a573c6e7c07a252
SHA256b0752602753874878a3d20a4118a40c3ac6a25101e523510e0110fd37464628e
SHA51280294f114fd631f5cbc777945936b1248928943adb4a82c7c71034f242c3bb0c88c8892f26c847cc272db8e6753dc78c53981c72e2a9b0d44cb5e8b5d8808642
-
Filesize
488KB
MD56549cec60f02a3723f16e29fd47c2d98
SHA197bb0453b0af0279cdf9775a7a573c6e7c07a252
SHA256b0752602753874878a3d20a4118a40c3ac6a25101e523510e0110fd37464628e
SHA51280294f114fd631f5cbc777945936b1248928943adb4a82c7c71034f242c3bb0c88c8892f26c847cc272db8e6753dc78c53981c72e2a9b0d44cb5e8b5d8808642
-
Filesize
170KB
MD520b750c87e499a7bdcc89c1137e323a1
SHA1bb316ced9563aa56f444bea68ac05729538b56a5
SHA2568a2668fcf94ec4b768c5c72a17e94bce3d2748353275121c6fb94c9ede011226
SHA51293e7d416c4fe8e2ec931f84699bb2610b206317818984bc51aba01d4252ddf5761d0cd6425294ca3d12f0efcbe456c22c6c995aa10a5b7ca336d6413fff5db7d
-
Filesize
170KB
MD520b750c87e499a7bdcc89c1137e323a1
SHA1bb316ced9563aa56f444bea68ac05729538b56a5
SHA2568a2668fcf94ec4b768c5c72a17e94bce3d2748353275121c6fb94c9ede011226
SHA51293e7d416c4fe8e2ec931f84699bb2610b206317818984bc51aba01d4252ddf5761d0cd6425294ca3d12f0efcbe456c22c6c995aa10a5b7ca336d6413fff5db7d
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf