Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05-05-2023 19:36
Static task
static1
Behavioral task
behavioral1
Sample
caddb88bafcb35d541d3aee61d1b066eced0cc5111dd59a12a3bed7fab91e702.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
caddb88bafcb35d541d3aee61d1b066eced0cc5111dd59a12a3bed7fab91e702.exe
Resource
win10v2004-20230220-en
General
-
Target
caddb88bafcb35d541d3aee61d1b066eced0cc5111dd59a12a3bed7fab91e702.exe
-
Size
1.2MB
-
MD5
a281d670149537a1e76be55f94b8d6a0
-
SHA1
073da2dbf2a50a9851ddb719d7a5e85a92c4d347
-
SHA256
caddb88bafcb35d541d3aee61d1b066eced0cc5111dd59a12a3bed7fab91e702
-
SHA512
d5ea1953dbc0d7f18549c1b70c7337e725e08fea5c73ecdea3e1c1c73a7f21a25b560dec4ccfa24c09a8d26b2c543bb26ae4baca75a6f30e532d3056c07872de
-
SSDEEP
24576:Xy9WGn+mYhkp4pUCJvf/2X/acJLg1k4m2caDJUrMuUu8BrJaQ:iEGn+mQcYJX+PacZg1kT2cacMtc
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
z24433129.exez85718859.exez67943034.exes03555321.exe1.exet79103961.exepid process 556 z24433129.exe 472 z85718859.exe 632 z67943034.exe 1428 s03555321.exe 1740 1.exe 624 t79103961.exe -
Loads dropped DLL 13 IoCs
Processes:
caddb88bafcb35d541d3aee61d1b066eced0cc5111dd59a12a3bed7fab91e702.exez24433129.exez85718859.exez67943034.exes03555321.exe1.exet79103961.exepid process 920 caddb88bafcb35d541d3aee61d1b066eced0cc5111dd59a12a3bed7fab91e702.exe 556 z24433129.exe 556 z24433129.exe 472 z85718859.exe 472 z85718859.exe 632 z67943034.exe 632 z67943034.exe 632 z67943034.exe 1428 s03555321.exe 1428 s03555321.exe 1740 1.exe 632 z67943034.exe 624 t79103961.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
caddb88bafcb35d541d3aee61d1b066eced0cc5111dd59a12a3bed7fab91e702.exez24433129.exez85718859.exez67943034.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" caddb88bafcb35d541d3aee61d1b066eced0cc5111dd59a12a3bed7fab91e702.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z24433129.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z24433129.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z85718859.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z85718859.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z67943034.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z67943034.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce caddb88bafcb35d541d3aee61d1b066eced0cc5111dd59a12a3bed7fab91e702.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
s03555321.exedescription pid process Token: SeDebugPrivilege 1428 s03555321.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
caddb88bafcb35d541d3aee61d1b066eced0cc5111dd59a12a3bed7fab91e702.exez24433129.exez85718859.exez67943034.exes03555321.exedescription pid process target process PID 920 wrote to memory of 556 920 caddb88bafcb35d541d3aee61d1b066eced0cc5111dd59a12a3bed7fab91e702.exe z24433129.exe PID 920 wrote to memory of 556 920 caddb88bafcb35d541d3aee61d1b066eced0cc5111dd59a12a3bed7fab91e702.exe z24433129.exe PID 920 wrote to memory of 556 920 caddb88bafcb35d541d3aee61d1b066eced0cc5111dd59a12a3bed7fab91e702.exe z24433129.exe PID 920 wrote to memory of 556 920 caddb88bafcb35d541d3aee61d1b066eced0cc5111dd59a12a3bed7fab91e702.exe z24433129.exe PID 920 wrote to memory of 556 920 caddb88bafcb35d541d3aee61d1b066eced0cc5111dd59a12a3bed7fab91e702.exe z24433129.exe PID 920 wrote to memory of 556 920 caddb88bafcb35d541d3aee61d1b066eced0cc5111dd59a12a3bed7fab91e702.exe z24433129.exe PID 920 wrote to memory of 556 920 caddb88bafcb35d541d3aee61d1b066eced0cc5111dd59a12a3bed7fab91e702.exe z24433129.exe PID 556 wrote to memory of 472 556 z24433129.exe z85718859.exe PID 556 wrote to memory of 472 556 z24433129.exe z85718859.exe PID 556 wrote to memory of 472 556 z24433129.exe z85718859.exe PID 556 wrote to memory of 472 556 z24433129.exe z85718859.exe PID 556 wrote to memory of 472 556 z24433129.exe z85718859.exe PID 556 wrote to memory of 472 556 z24433129.exe z85718859.exe PID 556 wrote to memory of 472 556 z24433129.exe z85718859.exe PID 472 wrote to memory of 632 472 z85718859.exe z67943034.exe PID 472 wrote to memory of 632 472 z85718859.exe z67943034.exe PID 472 wrote to memory of 632 472 z85718859.exe z67943034.exe PID 472 wrote to memory of 632 472 z85718859.exe z67943034.exe PID 472 wrote to memory of 632 472 z85718859.exe z67943034.exe PID 472 wrote to memory of 632 472 z85718859.exe z67943034.exe PID 472 wrote to memory of 632 472 z85718859.exe z67943034.exe PID 632 wrote to memory of 1428 632 z67943034.exe s03555321.exe PID 632 wrote to memory of 1428 632 z67943034.exe s03555321.exe PID 632 wrote to memory of 1428 632 z67943034.exe s03555321.exe PID 632 wrote to memory of 1428 632 z67943034.exe s03555321.exe PID 632 wrote to memory of 1428 632 z67943034.exe s03555321.exe PID 632 wrote to memory of 1428 632 z67943034.exe s03555321.exe PID 632 wrote to memory of 1428 632 z67943034.exe s03555321.exe PID 1428 wrote to memory of 1740 1428 s03555321.exe 1.exe PID 1428 wrote to memory of 1740 1428 s03555321.exe 1.exe PID 1428 wrote to memory of 1740 1428 s03555321.exe 1.exe PID 1428 wrote to memory of 1740 1428 s03555321.exe 1.exe PID 1428 wrote to memory of 1740 1428 s03555321.exe 1.exe PID 1428 wrote to memory of 1740 1428 s03555321.exe 1.exe PID 1428 wrote to memory of 1740 1428 s03555321.exe 1.exe PID 632 wrote to memory of 624 632 z67943034.exe t79103961.exe PID 632 wrote to memory of 624 632 z67943034.exe t79103961.exe PID 632 wrote to memory of 624 632 z67943034.exe t79103961.exe PID 632 wrote to memory of 624 632 z67943034.exe t79103961.exe PID 632 wrote to memory of 624 632 z67943034.exe t79103961.exe PID 632 wrote to memory of 624 632 z67943034.exe t79103961.exe PID 632 wrote to memory of 624 632 z67943034.exe t79103961.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\caddb88bafcb35d541d3aee61d1b066eced0cc5111dd59a12a3bed7fab91e702.exe"C:\Users\Admin\AppData\Local\Temp\caddb88bafcb35d541d3aee61d1b066eced0cc5111dd59a12a3bed7fab91e702.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z24433129.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z24433129.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z85718859.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z85718859.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z67943034.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z67943034.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s03555321.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s03555321.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t79103961.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t79103961.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:624
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5cd40a6586e84f6014e88f2be38f1ca00
SHA1f192f5eac152af4e43ae1685794174b85b739c8a
SHA256c7bfecf1399702c82866f0f6eec06593258288afe5e985f428f5736ade56402e
SHA512ffeb22f91259362080fec13cafab9beda70965816d731dfb5a09aff5249477087e55d67bb8668d3c6213d36afab920e070860eb0ac0aec24ce6a98292f47120f
-
Filesize
1.0MB
MD5cd40a6586e84f6014e88f2be38f1ca00
SHA1f192f5eac152af4e43ae1685794174b85b739c8a
SHA256c7bfecf1399702c82866f0f6eec06593258288afe5e985f428f5736ade56402e
SHA512ffeb22f91259362080fec13cafab9beda70965816d731dfb5a09aff5249477087e55d67bb8668d3c6213d36afab920e070860eb0ac0aec24ce6a98292f47120f
-
Filesize
752KB
MD58b71c258757cd49ddfe44ceff9deef73
SHA1bb88851efaee14c3c9cebec4746818d2a0211fb7
SHA256684b722e05f3d466da084305df72a0a4e97b1339f5b60e9dbfb2144253a33f9b
SHA512f23c6dc71a71ee6baadd82b9422b9ef5b183fbf6e41ea890a543e86736f3f0fc1c11830d1079ef43dc0fda52173c44cb92bb3d65b6519c017c2e5db6e8b97077
-
Filesize
752KB
MD58b71c258757cd49ddfe44ceff9deef73
SHA1bb88851efaee14c3c9cebec4746818d2a0211fb7
SHA256684b722e05f3d466da084305df72a0a4e97b1339f5b60e9dbfb2144253a33f9b
SHA512f23c6dc71a71ee6baadd82b9422b9ef5b183fbf6e41ea890a543e86736f3f0fc1c11830d1079ef43dc0fda52173c44cb92bb3d65b6519c017c2e5db6e8b97077
-
Filesize
570KB
MD50651074aa9169ef994839c0eeaa976ba
SHA1b8d5f21d70a1ca7b88fdc06fd4dc7a628056db97
SHA256e7e05df09b66290107e796e716d793ed925e49e85fd7fb8504a0a982c1c98463
SHA512f65f280aeb843fe801bde32a39ca92b3eae9ce0f1aee8bdf5779e3922a3308ddf14cabc1ee275dfb12e27b888e8998f9dce2b5956d4169d15352493c26e8c248
-
Filesize
570KB
MD50651074aa9169ef994839c0eeaa976ba
SHA1b8d5f21d70a1ca7b88fdc06fd4dc7a628056db97
SHA256e7e05df09b66290107e796e716d793ed925e49e85fd7fb8504a0a982c1c98463
SHA512f65f280aeb843fe801bde32a39ca92b3eae9ce0f1aee8bdf5779e3922a3308ddf14cabc1ee275dfb12e27b888e8998f9dce2b5956d4169d15352493c26e8c248
-
Filesize
488KB
MD56ba9b364205b4b9b759ede67d77fb893
SHA1efedb83a3e0ea81cfff2a3c56f00fe3e50712c3f
SHA25655e8a78e318da9c0cddf8b8b750e0cee8790861ba4e786965ce3f7845b5dfd03
SHA5127ee3869c8509014eca1f7a7179c3708cf563bcbfaf260309ba8c3d4ea601ed42b3947bf245270996976e713c5cd290e7b2ca53e40eba476526c4449fc55faee3
-
Filesize
488KB
MD56ba9b364205b4b9b759ede67d77fb893
SHA1efedb83a3e0ea81cfff2a3c56f00fe3e50712c3f
SHA25655e8a78e318da9c0cddf8b8b750e0cee8790861ba4e786965ce3f7845b5dfd03
SHA5127ee3869c8509014eca1f7a7179c3708cf563bcbfaf260309ba8c3d4ea601ed42b3947bf245270996976e713c5cd290e7b2ca53e40eba476526c4449fc55faee3
-
Filesize
488KB
MD56ba9b364205b4b9b759ede67d77fb893
SHA1efedb83a3e0ea81cfff2a3c56f00fe3e50712c3f
SHA25655e8a78e318da9c0cddf8b8b750e0cee8790861ba4e786965ce3f7845b5dfd03
SHA5127ee3869c8509014eca1f7a7179c3708cf563bcbfaf260309ba8c3d4ea601ed42b3947bf245270996976e713c5cd290e7b2ca53e40eba476526c4449fc55faee3
-
Filesize
169KB
MD54439d2f2df343c4759027a1b0026fb45
SHA1afd7f61816d22d9bc3a785978ed2c7f636fe229c
SHA256e6e8649000ca6e77e6c5f23e6d9f79623eccb8b7de28900bb87ae2fa050281a8
SHA51281e0a9a753f236f33c052ea43447881df67ef4a2373695b508b90f23b5749680b73e0b12c0d8692d487d4de0b5abc1cc1b0e2a63c2c9c78a99c439bd3f298498
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
1.0MB
MD5cd40a6586e84f6014e88f2be38f1ca00
SHA1f192f5eac152af4e43ae1685794174b85b739c8a
SHA256c7bfecf1399702c82866f0f6eec06593258288afe5e985f428f5736ade56402e
SHA512ffeb22f91259362080fec13cafab9beda70965816d731dfb5a09aff5249477087e55d67bb8668d3c6213d36afab920e070860eb0ac0aec24ce6a98292f47120f
-
Filesize
1.0MB
MD5cd40a6586e84f6014e88f2be38f1ca00
SHA1f192f5eac152af4e43ae1685794174b85b739c8a
SHA256c7bfecf1399702c82866f0f6eec06593258288afe5e985f428f5736ade56402e
SHA512ffeb22f91259362080fec13cafab9beda70965816d731dfb5a09aff5249477087e55d67bb8668d3c6213d36afab920e070860eb0ac0aec24ce6a98292f47120f
-
Filesize
752KB
MD58b71c258757cd49ddfe44ceff9deef73
SHA1bb88851efaee14c3c9cebec4746818d2a0211fb7
SHA256684b722e05f3d466da084305df72a0a4e97b1339f5b60e9dbfb2144253a33f9b
SHA512f23c6dc71a71ee6baadd82b9422b9ef5b183fbf6e41ea890a543e86736f3f0fc1c11830d1079ef43dc0fda52173c44cb92bb3d65b6519c017c2e5db6e8b97077
-
Filesize
752KB
MD58b71c258757cd49ddfe44ceff9deef73
SHA1bb88851efaee14c3c9cebec4746818d2a0211fb7
SHA256684b722e05f3d466da084305df72a0a4e97b1339f5b60e9dbfb2144253a33f9b
SHA512f23c6dc71a71ee6baadd82b9422b9ef5b183fbf6e41ea890a543e86736f3f0fc1c11830d1079ef43dc0fda52173c44cb92bb3d65b6519c017c2e5db6e8b97077
-
Filesize
570KB
MD50651074aa9169ef994839c0eeaa976ba
SHA1b8d5f21d70a1ca7b88fdc06fd4dc7a628056db97
SHA256e7e05df09b66290107e796e716d793ed925e49e85fd7fb8504a0a982c1c98463
SHA512f65f280aeb843fe801bde32a39ca92b3eae9ce0f1aee8bdf5779e3922a3308ddf14cabc1ee275dfb12e27b888e8998f9dce2b5956d4169d15352493c26e8c248
-
Filesize
570KB
MD50651074aa9169ef994839c0eeaa976ba
SHA1b8d5f21d70a1ca7b88fdc06fd4dc7a628056db97
SHA256e7e05df09b66290107e796e716d793ed925e49e85fd7fb8504a0a982c1c98463
SHA512f65f280aeb843fe801bde32a39ca92b3eae9ce0f1aee8bdf5779e3922a3308ddf14cabc1ee275dfb12e27b888e8998f9dce2b5956d4169d15352493c26e8c248
-
Filesize
488KB
MD56ba9b364205b4b9b759ede67d77fb893
SHA1efedb83a3e0ea81cfff2a3c56f00fe3e50712c3f
SHA25655e8a78e318da9c0cddf8b8b750e0cee8790861ba4e786965ce3f7845b5dfd03
SHA5127ee3869c8509014eca1f7a7179c3708cf563bcbfaf260309ba8c3d4ea601ed42b3947bf245270996976e713c5cd290e7b2ca53e40eba476526c4449fc55faee3
-
Filesize
488KB
MD56ba9b364205b4b9b759ede67d77fb893
SHA1efedb83a3e0ea81cfff2a3c56f00fe3e50712c3f
SHA25655e8a78e318da9c0cddf8b8b750e0cee8790861ba4e786965ce3f7845b5dfd03
SHA5127ee3869c8509014eca1f7a7179c3708cf563bcbfaf260309ba8c3d4ea601ed42b3947bf245270996976e713c5cd290e7b2ca53e40eba476526c4449fc55faee3
-
Filesize
488KB
MD56ba9b364205b4b9b759ede67d77fb893
SHA1efedb83a3e0ea81cfff2a3c56f00fe3e50712c3f
SHA25655e8a78e318da9c0cddf8b8b750e0cee8790861ba4e786965ce3f7845b5dfd03
SHA5127ee3869c8509014eca1f7a7179c3708cf563bcbfaf260309ba8c3d4ea601ed42b3947bf245270996976e713c5cd290e7b2ca53e40eba476526c4449fc55faee3
-
Filesize
169KB
MD54439d2f2df343c4759027a1b0026fb45
SHA1afd7f61816d22d9bc3a785978ed2c7f636fe229c
SHA256e6e8649000ca6e77e6c5f23e6d9f79623eccb8b7de28900bb87ae2fa050281a8
SHA51281e0a9a753f236f33c052ea43447881df67ef4a2373695b508b90f23b5749680b73e0b12c0d8692d487d4de0b5abc1cc1b0e2a63c2c9c78a99c439bd3f298498
-
Filesize
169KB
MD54439d2f2df343c4759027a1b0026fb45
SHA1afd7f61816d22d9bc3a785978ed2c7f636fe229c
SHA256e6e8649000ca6e77e6c5f23e6d9f79623eccb8b7de28900bb87ae2fa050281a8
SHA51281e0a9a753f236f33c052ea43447881df67ef4a2373695b508b90f23b5749680b73e0b12c0d8692d487d4de0b5abc1cc1b0e2a63c2c9c78a99c439bd3f298498
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf