Analysis
-
max time kernel
124s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05-05-2023 19:17
Static task
static1
Behavioral task
behavioral1
Sample
ab61f8eec6552709a30b7be2680b637c649e711394fc55bb607d919efb9c3c0c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ab61f8eec6552709a30b7be2680b637c649e711394fc55bb607d919efb9c3c0c.exe
Resource
win10v2004-20230220-en
General
-
Target
ab61f8eec6552709a30b7be2680b637c649e711394fc55bb607d919efb9c3c0c.exe
-
Size
1.2MB
-
MD5
bd4dc0cf8ed8e06f4fb6bc06b62aecd1
-
SHA1
6aa23b176fa7f8544422121d976e228a16b48d2d
-
SHA256
ab61f8eec6552709a30b7be2680b637c649e711394fc55bb607d919efb9c3c0c
-
SHA512
6e300075abc0e8675f61acbe736756ea76989a7beb03aa266d1a82e720a17009cf2c79aa58afa22738d428717f308de0d653e41b90a30ad6934212d8b7e899e0
-
SSDEEP
24576:iyhaBb6G1K0zChckgEotr6cDxRy4pvCIr23egMWTpLjnsQ6:JYBbb1K0mhcPx7lvCIFeTlAQ
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
z92636741.exez93861579.exez91191651.exes08083808.exe1.exet73838859.exepid process 612 z92636741.exe 436 z93861579.exe 1488 z91191651.exe 872 s08083808.exe 1740 1.exe 1068 t73838859.exe -
Loads dropped DLL 13 IoCs
Processes:
ab61f8eec6552709a30b7be2680b637c649e711394fc55bb607d919efb9c3c0c.exez92636741.exez93861579.exez91191651.exes08083808.exe1.exet73838859.exepid process 2044 ab61f8eec6552709a30b7be2680b637c649e711394fc55bb607d919efb9c3c0c.exe 612 z92636741.exe 612 z92636741.exe 436 z93861579.exe 436 z93861579.exe 1488 z91191651.exe 1488 z91191651.exe 1488 z91191651.exe 872 s08083808.exe 872 s08083808.exe 1740 1.exe 1488 z91191651.exe 1068 t73838859.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
ab61f8eec6552709a30b7be2680b637c649e711394fc55bb607d919efb9c3c0c.exez92636741.exez93861579.exez91191651.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ab61f8eec6552709a30b7be2680b637c649e711394fc55bb607d919efb9c3c0c.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z92636741.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z92636741.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z93861579.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z93861579.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z91191651.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z91191651.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce ab61f8eec6552709a30b7be2680b637c649e711394fc55bb607d919efb9c3c0c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
s08083808.exedescription pid process Token: SeDebugPrivilege 872 s08083808.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
ab61f8eec6552709a30b7be2680b637c649e711394fc55bb607d919efb9c3c0c.exez92636741.exez93861579.exez91191651.exes08083808.exedescription pid process target process PID 2044 wrote to memory of 612 2044 ab61f8eec6552709a30b7be2680b637c649e711394fc55bb607d919efb9c3c0c.exe z92636741.exe PID 2044 wrote to memory of 612 2044 ab61f8eec6552709a30b7be2680b637c649e711394fc55bb607d919efb9c3c0c.exe z92636741.exe PID 2044 wrote to memory of 612 2044 ab61f8eec6552709a30b7be2680b637c649e711394fc55bb607d919efb9c3c0c.exe z92636741.exe PID 2044 wrote to memory of 612 2044 ab61f8eec6552709a30b7be2680b637c649e711394fc55bb607d919efb9c3c0c.exe z92636741.exe PID 2044 wrote to memory of 612 2044 ab61f8eec6552709a30b7be2680b637c649e711394fc55bb607d919efb9c3c0c.exe z92636741.exe PID 2044 wrote to memory of 612 2044 ab61f8eec6552709a30b7be2680b637c649e711394fc55bb607d919efb9c3c0c.exe z92636741.exe PID 2044 wrote to memory of 612 2044 ab61f8eec6552709a30b7be2680b637c649e711394fc55bb607d919efb9c3c0c.exe z92636741.exe PID 612 wrote to memory of 436 612 z92636741.exe z93861579.exe PID 612 wrote to memory of 436 612 z92636741.exe z93861579.exe PID 612 wrote to memory of 436 612 z92636741.exe z93861579.exe PID 612 wrote to memory of 436 612 z92636741.exe z93861579.exe PID 612 wrote to memory of 436 612 z92636741.exe z93861579.exe PID 612 wrote to memory of 436 612 z92636741.exe z93861579.exe PID 612 wrote to memory of 436 612 z92636741.exe z93861579.exe PID 436 wrote to memory of 1488 436 z93861579.exe z91191651.exe PID 436 wrote to memory of 1488 436 z93861579.exe z91191651.exe PID 436 wrote to memory of 1488 436 z93861579.exe z91191651.exe PID 436 wrote to memory of 1488 436 z93861579.exe z91191651.exe PID 436 wrote to memory of 1488 436 z93861579.exe z91191651.exe PID 436 wrote to memory of 1488 436 z93861579.exe z91191651.exe PID 436 wrote to memory of 1488 436 z93861579.exe z91191651.exe PID 1488 wrote to memory of 872 1488 z91191651.exe s08083808.exe PID 1488 wrote to memory of 872 1488 z91191651.exe s08083808.exe PID 1488 wrote to memory of 872 1488 z91191651.exe s08083808.exe PID 1488 wrote to memory of 872 1488 z91191651.exe s08083808.exe PID 1488 wrote to memory of 872 1488 z91191651.exe s08083808.exe PID 1488 wrote to memory of 872 1488 z91191651.exe s08083808.exe PID 1488 wrote to memory of 872 1488 z91191651.exe s08083808.exe PID 872 wrote to memory of 1740 872 s08083808.exe 1.exe PID 872 wrote to memory of 1740 872 s08083808.exe 1.exe PID 872 wrote to memory of 1740 872 s08083808.exe 1.exe PID 872 wrote to memory of 1740 872 s08083808.exe 1.exe PID 872 wrote to memory of 1740 872 s08083808.exe 1.exe PID 872 wrote to memory of 1740 872 s08083808.exe 1.exe PID 872 wrote to memory of 1740 872 s08083808.exe 1.exe PID 1488 wrote to memory of 1068 1488 z91191651.exe t73838859.exe PID 1488 wrote to memory of 1068 1488 z91191651.exe t73838859.exe PID 1488 wrote to memory of 1068 1488 z91191651.exe t73838859.exe PID 1488 wrote to memory of 1068 1488 z91191651.exe t73838859.exe PID 1488 wrote to memory of 1068 1488 z91191651.exe t73838859.exe PID 1488 wrote to memory of 1068 1488 z91191651.exe t73838859.exe PID 1488 wrote to memory of 1068 1488 z91191651.exe t73838859.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab61f8eec6552709a30b7be2680b637c649e711394fc55bb607d919efb9c3c0c.exe"C:\Users\Admin\AppData\Local\Temp\ab61f8eec6552709a30b7be2680b637c649e711394fc55bb607d919efb9c3c0c.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z92636741.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z92636741.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z93861579.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z93861579.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z91191651.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z91191651.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s08083808.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s08083808.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1740
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t73838859.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t73838859.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1068
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD58fa11ddf94005162d9ee2b9ce3b45c52
SHA104731b9588c11d1780ae62a9ee6fd13291726709
SHA256aa73f6b2b03895b5e631a80eb22a5e1d7531a4fd8bd7dd76dc4cfcb152281472
SHA512faa2088686a5369e3e6d5b166965797898a85c14a974e34f58c0ca01f514218a6071825ee8e688bff9c8429c2385ccce7b353a0ea394ee2a03ce2d02cb446005
-
Filesize
1.0MB
MD58fa11ddf94005162d9ee2b9ce3b45c52
SHA104731b9588c11d1780ae62a9ee6fd13291726709
SHA256aa73f6b2b03895b5e631a80eb22a5e1d7531a4fd8bd7dd76dc4cfcb152281472
SHA512faa2088686a5369e3e6d5b166965797898a85c14a974e34f58c0ca01f514218a6071825ee8e688bff9c8429c2385ccce7b353a0ea394ee2a03ce2d02cb446005
-
Filesize
760KB
MD51074a55c41d987fab9c21e545a5a4859
SHA1985417f1bd38a23927a694b6fc0440d42ba75641
SHA25680d35bbd5472c35897f1a1443634326fd44fbadf06c45c347a64879ed06c1c92
SHA512fe05c5a22c503d25ba4b8fb848aa750b0352a13fb1bfe06edf21296ffd8cbdbb7431863a0ceb78ee086e0008749dee94ec10d3be901a9cef61efc4077c0162ed
-
Filesize
760KB
MD51074a55c41d987fab9c21e545a5a4859
SHA1985417f1bd38a23927a694b6fc0440d42ba75641
SHA25680d35bbd5472c35897f1a1443634326fd44fbadf06c45c347a64879ed06c1c92
SHA512fe05c5a22c503d25ba4b8fb848aa750b0352a13fb1bfe06edf21296ffd8cbdbb7431863a0ceb78ee086e0008749dee94ec10d3be901a9cef61efc4077c0162ed
-
Filesize
578KB
MD50dcf6150c6dfecf560948f2dff8047eb
SHA1a042f38966e4cc5590a27747779deba393c29d72
SHA2566ce8631c89057924ee29fec1c437a96ad6205da632cff1ffeaa3d4129aab0ffc
SHA51250510a41191d2ee961f9675f590e32ab5676d857caf3bb0a097fdb1a9b125c1671b3af76af708f34bbdedfc4f1922a2e5e14b0b520175bcec012ff83a8028e1a
-
Filesize
578KB
MD50dcf6150c6dfecf560948f2dff8047eb
SHA1a042f38966e4cc5590a27747779deba393c29d72
SHA2566ce8631c89057924ee29fec1c437a96ad6205da632cff1ffeaa3d4129aab0ffc
SHA51250510a41191d2ee961f9675f590e32ab5676d857caf3bb0a097fdb1a9b125c1671b3af76af708f34bbdedfc4f1922a2e5e14b0b520175bcec012ff83a8028e1a
-
Filesize
502KB
MD5b4e51c6adcc8fb1b7624edc8df6e9e55
SHA1769da8e1e5c47dbe142e6ce7e311765a8a799061
SHA256c3d468fbfdfacc750366de89a2a60e4e7f07248fa8e5c8528830f7aed04e8106
SHA51275e68963b4ccf26aeae4a646e8391fb102eecac254af469c646cbe6fd261e95b26204c8e5dc8b57d92ceae5ba42e7e2f9496875a595206ee787998c21019ab43
-
Filesize
502KB
MD5b4e51c6adcc8fb1b7624edc8df6e9e55
SHA1769da8e1e5c47dbe142e6ce7e311765a8a799061
SHA256c3d468fbfdfacc750366de89a2a60e4e7f07248fa8e5c8528830f7aed04e8106
SHA51275e68963b4ccf26aeae4a646e8391fb102eecac254af469c646cbe6fd261e95b26204c8e5dc8b57d92ceae5ba42e7e2f9496875a595206ee787998c21019ab43
-
Filesize
502KB
MD5b4e51c6adcc8fb1b7624edc8df6e9e55
SHA1769da8e1e5c47dbe142e6ce7e311765a8a799061
SHA256c3d468fbfdfacc750366de89a2a60e4e7f07248fa8e5c8528830f7aed04e8106
SHA51275e68963b4ccf26aeae4a646e8391fb102eecac254af469c646cbe6fd261e95b26204c8e5dc8b57d92ceae5ba42e7e2f9496875a595206ee787998c21019ab43
-
Filesize
169KB
MD54ea7b47da0a32256b398856128781f82
SHA1516b534d2f17d9cd90166d57faacc9ebac03eb30
SHA2566c1aea1052431f1e043f3906997c3ad6c0d7289263d727c3d6e899e1c2215e98
SHA5125395725958bf0c7b5ca8b86e12dc0e76081ed06fe94f64a7a47ed843e11da7adac804116105114eca45a821ebb38c10736e36566c08779c9f2c563325f0dd12a
-
Filesize
169KB
MD54ea7b47da0a32256b398856128781f82
SHA1516b534d2f17d9cd90166d57faacc9ebac03eb30
SHA2566c1aea1052431f1e043f3906997c3ad6c0d7289263d727c3d6e899e1c2215e98
SHA5125395725958bf0c7b5ca8b86e12dc0e76081ed06fe94f64a7a47ed843e11da7adac804116105114eca45a821ebb38c10736e36566c08779c9f2c563325f0dd12a
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
1.0MB
MD58fa11ddf94005162d9ee2b9ce3b45c52
SHA104731b9588c11d1780ae62a9ee6fd13291726709
SHA256aa73f6b2b03895b5e631a80eb22a5e1d7531a4fd8bd7dd76dc4cfcb152281472
SHA512faa2088686a5369e3e6d5b166965797898a85c14a974e34f58c0ca01f514218a6071825ee8e688bff9c8429c2385ccce7b353a0ea394ee2a03ce2d02cb446005
-
Filesize
1.0MB
MD58fa11ddf94005162d9ee2b9ce3b45c52
SHA104731b9588c11d1780ae62a9ee6fd13291726709
SHA256aa73f6b2b03895b5e631a80eb22a5e1d7531a4fd8bd7dd76dc4cfcb152281472
SHA512faa2088686a5369e3e6d5b166965797898a85c14a974e34f58c0ca01f514218a6071825ee8e688bff9c8429c2385ccce7b353a0ea394ee2a03ce2d02cb446005
-
Filesize
760KB
MD51074a55c41d987fab9c21e545a5a4859
SHA1985417f1bd38a23927a694b6fc0440d42ba75641
SHA25680d35bbd5472c35897f1a1443634326fd44fbadf06c45c347a64879ed06c1c92
SHA512fe05c5a22c503d25ba4b8fb848aa750b0352a13fb1bfe06edf21296ffd8cbdbb7431863a0ceb78ee086e0008749dee94ec10d3be901a9cef61efc4077c0162ed
-
Filesize
760KB
MD51074a55c41d987fab9c21e545a5a4859
SHA1985417f1bd38a23927a694b6fc0440d42ba75641
SHA25680d35bbd5472c35897f1a1443634326fd44fbadf06c45c347a64879ed06c1c92
SHA512fe05c5a22c503d25ba4b8fb848aa750b0352a13fb1bfe06edf21296ffd8cbdbb7431863a0ceb78ee086e0008749dee94ec10d3be901a9cef61efc4077c0162ed
-
Filesize
578KB
MD50dcf6150c6dfecf560948f2dff8047eb
SHA1a042f38966e4cc5590a27747779deba393c29d72
SHA2566ce8631c89057924ee29fec1c437a96ad6205da632cff1ffeaa3d4129aab0ffc
SHA51250510a41191d2ee961f9675f590e32ab5676d857caf3bb0a097fdb1a9b125c1671b3af76af708f34bbdedfc4f1922a2e5e14b0b520175bcec012ff83a8028e1a
-
Filesize
578KB
MD50dcf6150c6dfecf560948f2dff8047eb
SHA1a042f38966e4cc5590a27747779deba393c29d72
SHA2566ce8631c89057924ee29fec1c437a96ad6205da632cff1ffeaa3d4129aab0ffc
SHA51250510a41191d2ee961f9675f590e32ab5676d857caf3bb0a097fdb1a9b125c1671b3af76af708f34bbdedfc4f1922a2e5e14b0b520175bcec012ff83a8028e1a
-
Filesize
502KB
MD5b4e51c6adcc8fb1b7624edc8df6e9e55
SHA1769da8e1e5c47dbe142e6ce7e311765a8a799061
SHA256c3d468fbfdfacc750366de89a2a60e4e7f07248fa8e5c8528830f7aed04e8106
SHA51275e68963b4ccf26aeae4a646e8391fb102eecac254af469c646cbe6fd261e95b26204c8e5dc8b57d92ceae5ba42e7e2f9496875a595206ee787998c21019ab43
-
Filesize
502KB
MD5b4e51c6adcc8fb1b7624edc8df6e9e55
SHA1769da8e1e5c47dbe142e6ce7e311765a8a799061
SHA256c3d468fbfdfacc750366de89a2a60e4e7f07248fa8e5c8528830f7aed04e8106
SHA51275e68963b4ccf26aeae4a646e8391fb102eecac254af469c646cbe6fd261e95b26204c8e5dc8b57d92ceae5ba42e7e2f9496875a595206ee787998c21019ab43
-
Filesize
502KB
MD5b4e51c6adcc8fb1b7624edc8df6e9e55
SHA1769da8e1e5c47dbe142e6ce7e311765a8a799061
SHA256c3d468fbfdfacc750366de89a2a60e4e7f07248fa8e5c8528830f7aed04e8106
SHA51275e68963b4ccf26aeae4a646e8391fb102eecac254af469c646cbe6fd261e95b26204c8e5dc8b57d92ceae5ba42e7e2f9496875a595206ee787998c21019ab43
-
Filesize
169KB
MD54ea7b47da0a32256b398856128781f82
SHA1516b534d2f17d9cd90166d57faacc9ebac03eb30
SHA2566c1aea1052431f1e043f3906997c3ad6c0d7289263d727c3d6e899e1c2215e98
SHA5125395725958bf0c7b5ca8b86e12dc0e76081ed06fe94f64a7a47ed843e11da7adac804116105114eca45a821ebb38c10736e36566c08779c9f2c563325f0dd12a
-
Filesize
169KB
MD54ea7b47da0a32256b398856128781f82
SHA1516b534d2f17d9cd90166d57faacc9ebac03eb30
SHA2566c1aea1052431f1e043f3906997c3ad6c0d7289263d727c3d6e899e1c2215e98
SHA5125395725958bf0c7b5ca8b86e12dc0e76081ed06fe94f64a7a47ed843e11da7adac804116105114eca45a821ebb38c10736e36566c08779c9f2c563325f0dd12a
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf