Analysis
-
max time kernel
126s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2023, 19:40
Static task
static1
Behavioral task
behavioral1
Sample
cd91974381bd2557f7b980d4592ca410a99b75d9f71e24179fc23e8bc208e6af.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
cd91974381bd2557f7b980d4592ca410a99b75d9f71e24179fc23e8bc208e6af.exe
Resource
win10v2004-20230220-en
General
-
Target
cd91974381bd2557f7b980d4592ca410a99b75d9f71e24179fc23e8bc208e6af.exe
-
Size
866KB
-
MD5
cf2e0a1294abe7bba2e134b3a7ec123d
-
SHA1
efe06de2d8d62fb74a732e2fad10ec6084cc9266
-
SHA256
cd91974381bd2557f7b980d4592ca410a99b75d9f71e24179fc23e8bc208e6af
-
SHA512
1e571c2e4a28e8e2201e464b87b883f0b860204a6c77736be72efd43ce61c185a5d48e9b5359b2f86d9a7db308b60cdb69d35135d93102d7b982478bd297f748
-
SSDEEP
24576:DygmUle+v6lMhbaE0BYR7Zqi/7oUxmyiIJnCzT:WgGvOYQ7MisURBJS
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dark
185.161.248.73:4164
-
auth_value
ae85b01f66afe8770afeed560513fc2d
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1856 y74151772.exe 872 p73582587.exe 268 1.exe 564 r00309771.exe -
Loads dropped DLL 9 IoCs
pid Process 1336 cd91974381bd2557f7b980d4592ca410a99b75d9f71e24179fc23e8bc208e6af.exe 1856 y74151772.exe 1856 y74151772.exe 1856 y74151772.exe 872 p73582587.exe 872 p73582587.exe 268 1.exe 1856 y74151772.exe 564 r00309771.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y74151772.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y74151772.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce cd91974381bd2557f7b980d4592ca410a99b75d9f71e24179fc23e8bc208e6af.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cd91974381bd2557f7b980d4592ca410a99b75d9f71e24179fc23e8bc208e6af.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 872 p73582587.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1336 wrote to memory of 1856 1336 cd91974381bd2557f7b980d4592ca410a99b75d9f71e24179fc23e8bc208e6af.exe 27 PID 1336 wrote to memory of 1856 1336 cd91974381bd2557f7b980d4592ca410a99b75d9f71e24179fc23e8bc208e6af.exe 27 PID 1336 wrote to memory of 1856 1336 cd91974381bd2557f7b980d4592ca410a99b75d9f71e24179fc23e8bc208e6af.exe 27 PID 1336 wrote to memory of 1856 1336 cd91974381bd2557f7b980d4592ca410a99b75d9f71e24179fc23e8bc208e6af.exe 27 PID 1336 wrote to memory of 1856 1336 cd91974381bd2557f7b980d4592ca410a99b75d9f71e24179fc23e8bc208e6af.exe 27 PID 1336 wrote to memory of 1856 1336 cd91974381bd2557f7b980d4592ca410a99b75d9f71e24179fc23e8bc208e6af.exe 27 PID 1336 wrote to memory of 1856 1336 cd91974381bd2557f7b980d4592ca410a99b75d9f71e24179fc23e8bc208e6af.exe 27 PID 1856 wrote to memory of 872 1856 y74151772.exe 28 PID 1856 wrote to memory of 872 1856 y74151772.exe 28 PID 1856 wrote to memory of 872 1856 y74151772.exe 28 PID 1856 wrote to memory of 872 1856 y74151772.exe 28 PID 1856 wrote to memory of 872 1856 y74151772.exe 28 PID 1856 wrote to memory of 872 1856 y74151772.exe 28 PID 1856 wrote to memory of 872 1856 y74151772.exe 28 PID 872 wrote to memory of 268 872 p73582587.exe 29 PID 872 wrote to memory of 268 872 p73582587.exe 29 PID 872 wrote to memory of 268 872 p73582587.exe 29 PID 872 wrote to memory of 268 872 p73582587.exe 29 PID 872 wrote to memory of 268 872 p73582587.exe 29 PID 872 wrote to memory of 268 872 p73582587.exe 29 PID 872 wrote to memory of 268 872 p73582587.exe 29 PID 1856 wrote to memory of 564 1856 y74151772.exe 30 PID 1856 wrote to memory of 564 1856 y74151772.exe 30 PID 1856 wrote to memory of 564 1856 y74151772.exe 30 PID 1856 wrote to memory of 564 1856 y74151772.exe 30 PID 1856 wrote to memory of 564 1856 y74151772.exe 30 PID 1856 wrote to memory of 564 1856 y74151772.exe 30 PID 1856 wrote to memory of 564 1856 y74151772.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd91974381bd2557f7b980d4592ca410a99b75d9f71e24179fc23e8bc208e6af.exe"C:\Users\Admin\AppData\Local\Temp\cd91974381bd2557f7b980d4592ca410a99b75d9f71e24179fc23e8bc208e6af.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y74151772.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y74151772.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p73582587.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p73582587.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:268
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r00309771.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r00309771.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:564
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
577KB
MD5eba88f270aa7fdb5d32af4a7b31749a2
SHA19b746ec19145551200bd3025c2222679455c7d38
SHA25658a4b59e1780655827ed3ba9cfdbc42a4f1e9564a41840c9750b8e39170b758a
SHA51262628a23eaa8a771044bf77c3a8543b65adc2e633c83ff70e186250764dea590992e0951c875bd02a54570a763502f0ffcc7f4a4e7d95eacb0a829f864942e87
-
Filesize
577KB
MD5eba88f270aa7fdb5d32af4a7b31749a2
SHA19b746ec19145551200bd3025c2222679455c7d38
SHA25658a4b59e1780655827ed3ba9cfdbc42a4f1e9564a41840c9750b8e39170b758a
SHA51262628a23eaa8a771044bf77c3a8543b65adc2e633c83ff70e186250764dea590992e0951c875bd02a54570a763502f0ffcc7f4a4e7d95eacb0a829f864942e87
-
Filesize
502KB
MD5df3201d42fbfcd4a68e9777706fcb076
SHA1c6a56c4e37cf67b5a2fbce3903fcc2eafb34f370
SHA256aa908ce88709cea8cb9d13c4d5880c2dc678c314f0a3efe007195a7cf55767c2
SHA512cc7f33a55a41519e63a55fcef564fc2726189c2c083fe5b9cc4192f8648c0d4b596bb27aecf2e50503ab52ed891b52b66c56e21437519f6dcf3e11d899b93404
-
Filesize
502KB
MD5df3201d42fbfcd4a68e9777706fcb076
SHA1c6a56c4e37cf67b5a2fbce3903fcc2eafb34f370
SHA256aa908ce88709cea8cb9d13c4d5880c2dc678c314f0a3efe007195a7cf55767c2
SHA512cc7f33a55a41519e63a55fcef564fc2726189c2c083fe5b9cc4192f8648c0d4b596bb27aecf2e50503ab52ed891b52b66c56e21437519f6dcf3e11d899b93404
-
Filesize
502KB
MD5df3201d42fbfcd4a68e9777706fcb076
SHA1c6a56c4e37cf67b5a2fbce3903fcc2eafb34f370
SHA256aa908ce88709cea8cb9d13c4d5880c2dc678c314f0a3efe007195a7cf55767c2
SHA512cc7f33a55a41519e63a55fcef564fc2726189c2c083fe5b9cc4192f8648c0d4b596bb27aecf2e50503ab52ed891b52b66c56e21437519f6dcf3e11d899b93404
-
Filesize
172KB
MD52256e3a2d6666e648110d62867c2cb54
SHA1dd6a7c8389f2d72d77a934485c152a94f1d3d1dc
SHA256b6ffae5accbd21ae2c64f0bf21b509488574f79c69c2dc1a15f40b4abbdb6f3e
SHA5125ddc5a3c6737f2763ccf952b6798b2cbecd69b81c4e0e45f6b2e7cfcbdb91f2e1c25251a43e3539414bb6f6fbeb81a31c284c2364d389470bac6e8ca8c457894
-
Filesize
172KB
MD52256e3a2d6666e648110d62867c2cb54
SHA1dd6a7c8389f2d72d77a934485c152a94f1d3d1dc
SHA256b6ffae5accbd21ae2c64f0bf21b509488574f79c69c2dc1a15f40b4abbdb6f3e
SHA5125ddc5a3c6737f2763ccf952b6798b2cbecd69b81c4e0e45f6b2e7cfcbdb91f2e1c25251a43e3539414bb6f6fbeb81a31c284c2364d389470bac6e8ca8c457894
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
577KB
MD5eba88f270aa7fdb5d32af4a7b31749a2
SHA19b746ec19145551200bd3025c2222679455c7d38
SHA25658a4b59e1780655827ed3ba9cfdbc42a4f1e9564a41840c9750b8e39170b758a
SHA51262628a23eaa8a771044bf77c3a8543b65adc2e633c83ff70e186250764dea590992e0951c875bd02a54570a763502f0ffcc7f4a4e7d95eacb0a829f864942e87
-
Filesize
577KB
MD5eba88f270aa7fdb5d32af4a7b31749a2
SHA19b746ec19145551200bd3025c2222679455c7d38
SHA25658a4b59e1780655827ed3ba9cfdbc42a4f1e9564a41840c9750b8e39170b758a
SHA51262628a23eaa8a771044bf77c3a8543b65adc2e633c83ff70e186250764dea590992e0951c875bd02a54570a763502f0ffcc7f4a4e7d95eacb0a829f864942e87
-
Filesize
502KB
MD5df3201d42fbfcd4a68e9777706fcb076
SHA1c6a56c4e37cf67b5a2fbce3903fcc2eafb34f370
SHA256aa908ce88709cea8cb9d13c4d5880c2dc678c314f0a3efe007195a7cf55767c2
SHA512cc7f33a55a41519e63a55fcef564fc2726189c2c083fe5b9cc4192f8648c0d4b596bb27aecf2e50503ab52ed891b52b66c56e21437519f6dcf3e11d899b93404
-
Filesize
502KB
MD5df3201d42fbfcd4a68e9777706fcb076
SHA1c6a56c4e37cf67b5a2fbce3903fcc2eafb34f370
SHA256aa908ce88709cea8cb9d13c4d5880c2dc678c314f0a3efe007195a7cf55767c2
SHA512cc7f33a55a41519e63a55fcef564fc2726189c2c083fe5b9cc4192f8648c0d4b596bb27aecf2e50503ab52ed891b52b66c56e21437519f6dcf3e11d899b93404
-
Filesize
502KB
MD5df3201d42fbfcd4a68e9777706fcb076
SHA1c6a56c4e37cf67b5a2fbce3903fcc2eafb34f370
SHA256aa908ce88709cea8cb9d13c4d5880c2dc678c314f0a3efe007195a7cf55767c2
SHA512cc7f33a55a41519e63a55fcef564fc2726189c2c083fe5b9cc4192f8648c0d4b596bb27aecf2e50503ab52ed891b52b66c56e21437519f6dcf3e11d899b93404
-
Filesize
172KB
MD52256e3a2d6666e648110d62867c2cb54
SHA1dd6a7c8389f2d72d77a934485c152a94f1d3d1dc
SHA256b6ffae5accbd21ae2c64f0bf21b509488574f79c69c2dc1a15f40b4abbdb6f3e
SHA5125ddc5a3c6737f2763ccf952b6798b2cbecd69b81c4e0e45f6b2e7cfcbdb91f2e1c25251a43e3539414bb6f6fbeb81a31c284c2364d389470bac6e8ca8c457894
-
Filesize
172KB
MD52256e3a2d6666e648110d62867c2cb54
SHA1dd6a7c8389f2d72d77a934485c152a94f1d3d1dc
SHA256b6ffae5accbd21ae2c64f0bf21b509488574f79c69c2dc1a15f40b4abbdb6f3e
SHA5125ddc5a3c6737f2763ccf952b6798b2cbecd69b81c4e0e45f6b2e7cfcbdb91f2e1c25251a43e3539414bb6f6fbeb81a31c284c2364d389470bac6e8ca8c457894
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf