Analysis
-
max time kernel
132s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2023, 20:09
Static task
static1
Behavioral task
behavioral1
Sample
e320703110bd60543200fb196309fa7611a6edbbd5c6483236498c04057306eb.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e320703110bd60543200fb196309fa7611a6edbbd5c6483236498c04057306eb.exe
Resource
win10v2004-20230220-en
General
-
Target
e320703110bd60543200fb196309fa7611a6edbbd5c6483236498c04057306eb.exe
-
Size
1.5MB
-
MD5
924a443b45f37857dac34f1056951816
-
SHA1
f55da1aaa0b4e6ea8e60a1fcf6393bbbf019c2eb
-
SHA256
e320703110bd60543200fb196309fa7611a6edbbd5c6483236498c04057306eb
-
SHA512
45e9b3d3e263e90358e980520dcbb201e30ab2bff221ff89416d831ce001f847922ce5535e72c8dd0a73d393102a7e8a37c2026c3182fa235855814ed4ddef33
-
SSDEEP
24576:qytVTzzv/HVeEwJWmiWS180apXmZLUOhiSE/fAypdB3kFE+iQq/SGFeVuxI:xrvzvmbFp2ZLUyan1pdFZQq/SGFeVu
Malware Config
Extracted
redline
most
185.161.248.73:4164
-
auth_value
7da4dfa153f2919e617aa016f7c36008
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 1864 i99368495.exe 2004 i75310627.exe 944 i93053318.exe 1536 i14877730.exe 1496 a94896790.exe -
Loads dropped DLL 10 IoCs
pid Process 1852 e320703110bd60543200fb196309fa7611a6edbbd5c6483236498c04057306eb.exe 1864 i99368495.exe 1864 i99368495.exe 2004 i75310627.exe 2004 i75310627.exe 944 i93053318.exe 944 i93053318.exe 1536 i14877730.exe 1536 i14877730.exe 1496 a94896790.exe -
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce e320703110bd60543200fb196309fa7611a6edbbd5c6483236498c04057306eb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e320703110bd60543200fb196309fa7611a6edbbd5c6483236498c04057306eb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce i99368495.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" i75310627.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce i93053318.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" i14877730.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" i99368495.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce i75310627.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" i93053318.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce i14877730.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 1852 wrote to memory of 1864 1852 e320703110bd60543200fb196309fa7611a6edbbd5c6483236498c04057306eb.exe 26 PID 1852 wrote to memory of 1864 1852 e320703110bd60543200fb196309fa7611a6edbbd5c6483236498c04057306eb.exe 26 PID 1852 wrote to memory of 1864 1852 e320703110bd60543200fb196309fa7611a6edbbd5c6483236498c04057306eb.exe 26 PID 1852 wrote to memory of 1864 1852 e320703110bd60543200fb196309fa7611a6edbbd5c6483236498c04057306eb.exe 26 PID 1852 wrote to memory of 1864 1852 e320703110bd60543200fb196309fa7611a6edbbd5c6483236498c04057306eb.exe 26 PID 1852 wrote to memory of 1864 1852 e320703110bd60543200fb196309fa7611a6edbbd5c6483236498c04057306eb.exe 26 PID 1852 wrote to memory of 1864 1852 e320703110bd60543200fb196309fa7611a6edbbd5c6483236498c04057306eb.exe 26 PID 1864 wrote to memory of 2004 1864 i99368495.exe 27 PID 1864 wrote to memory of 2004 1864 i99368495.exe 27 PID 1864 wrote to memory of 2004 1864 i99368495.exe 27 PID 1864 wrote to memory of 2004 1864 i99368495.exe 27 PID 1864 wrote to memory of 2004 1864 i99368495.exe 27 PID 1864 wrote to memory of 2004 1864 i99368495.exe 27 PID 1864 wrote to memory of 2004 1864 i99368495.exe 27 PID 2004 wrote to memory of 944 2004 i75310627.exe 28 PID 2004 wrote to memory of 944 2004 i75310627.exe 28 PID 2004 wrote to memory of 944 2004 i75310627.exe 28 PID 2004 wrote to memory of 944 2004 i75310627.exe 28 PID 2004 wrote to memory of 944 2004 i75310627.exe 28 PID 2004 wrote to memory of 944 2004 i75310627.exe 28 PID 2004 wrote to memory of 944 2004 i75310627.exe 28 PID 944 wrote to memory of 1536 944 i93053318.exe 29 PID 944 wrote to memory of 1536 944 i93053318.exe 29 PID 944 wrote to memory of 1536 944 i93053318.exe 29 PID 944 wrote to memory of 1536 944 i93053318.exe 29 PID 944 wrote to memory of 1536 944 i93053318.exe 29 PID 944 wrote to memory of 1536 944 i93053318.exe 29 PID 944 wrote to memory of 1536 944 i93053318.exe 29 PID 1536 wrote to memory of 1496 1536 i14877730.exe 30 PID 1536 wrote to memory of 1496 1536 i14877730.exe 30 PID 1536 wrote to memory of 1496 1536 i14877730.exe 30 PID 1536 wrote to memory of 1496 1536 i14877730.exe 30 PID 1536 wrote to memory of 1496 1536 i14877730.exe 30 PID 1536 wrote to memory of 1496 1536 i14877730.exe 30 PID 1536 wrote to memory of 1496 1536 i14877730.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e320703110bd60543200fb196309fa7611a6edbbd5c6483236498c04057306eb.exe"C:\Users\Admin\AppData\Local\Temp\e320703110bd60543200fb196309fa7611a6edbbd5c6483236498c04057306eb.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i99368495.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i99368495.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i75310627.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i75310627.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i93053318.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i93053318.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i14877730.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i14877730.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a94896790.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a94896790.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1496
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD56c8c7e1794cada406a803cfeaf380e85
SHA139fb188dc2ea6196a9a684591d283b4bbe3f933b
SHA25600f2e4fa7645b65b97c3c09ddb40e6f1df2da6b6b7263ee9db6c123ada67dc53
SHA512f1a2e6dcf65d17a9ec57ba5d82b265426aa4357ad5521f9d424f46199fd4117aa55786dc3481c28acb7fcc19a95702e0d5179cecacba35ccef50d82e1c898a0c
-
Filesize
1.3MB
MD56c8c7e1794cada406a803cfeaf380e85
SHA139fb188dc2ea6196a9a684591d283b4bbe3f933b
SHA25600f2e4fa7645b65b97c3c09ddb40e6f1df2da6b6b7263ee9db6c123ada67dc53
SHA512f1a2e6dcf65d17a9ec57ba5d82b265426aa4357ad5521f9d424f46199fd4117aa55786dc3481c28acb7fcc19a95702e0d5179cecacba35ccef50d82e1c898a0c
-
Filesize
1015KB
MD5498ed43d955ccbadf1b080f13398a801
SHA1c56b640e243380525f33cd4aa6517fa0567e8050
SHA256af92381e52921dd59fcbd1845162203aa7d24d1adb0c1a862df92c644ed70d5e
SHA51292f25be303b3623be670150c71874d0a51bc83039183dc4650b8cb98573e932598dcfe2247f5ea7b99ecf4090f1c649381b5bbc328b3a234302b43af5f01c87f
-
Filesize
1015KB
MD5498ed43d955ccbadf1b080f13398a801
SHA1c56b640e243380525f33cd4aa6517fa0567e8050
SHA256af92381e52921dd59fcbd1845162203aa7d24d1adb0c1a862df92c644ed70d5e
SHA51292f25be303b3623be670150c71874d0a51bc83039183dc4650b8cb98573e932598dcfe2247f5ea7b99ecf4090f1c649381b5bbc328b3a234302b43af5f01c87f
-
Filesize
843KB
MD5423bff3beca44b5da89f052fce3851cc
SHA1d34d7fb0abc6d66d961fc6128d982a7eec693332
SHA256bd321d94b1ef4fb3ced9d323d9a0ebfa13d8172cd7cb0faeb22e3ed82a4bc5b9
SHA512611425bc65c56103479d2adcf0488b96487bb6e93b5b657b52aecd0fb0e6cd839fab48d1fca79251961c7dba114ac5324444312a0a6bf683d5a5482f0c32907c
-
Filesize
843KB
MD5423bff3beca44b5da89f052fce3851cc
SHA1d34d7fb0abc6d66d961fc6128d982a7eec693332
SHA256bd321d94b1ef4fb3ced9d323d9a0ebfa13d8172cd7cb0faeb22e3ed82a4bc5b9
SHA512611425bc65c56103479d2adcf0488b96487bb6e93b5b657b52aecd0fb0e6cd839fab48d1fca79251961c7dba114ac5324444312a0a6bf683d5a5482f0c32907c
-
Filesize
371KB
MD52f8d694329d848a4fd217e08a013fb31
SHA1b130255327465ee99c5a5110c1c04756cf7f3b8a
SHA25637202597325e353833a7b4c225b8228797703f8721f88999aa490a56f37a8526
SHA512c63caacd76503a50ad08fe3bc8df8a79cb6242decc4711f9ec62c87b49f9609f758f9b919192fd75419a18075b10e857ee35c8da79e3e972c1022a77d9027e99
-
Filesize
371KB
MD52f8d694329d848a4fd217e08a013fb31
SHA1b130255327465ee99c5a5110c1c04756cf7f3b8a
SHA25637202597325e353833a7b4c225b8228797703f8721f88999aa490a56f37a8526
SHA512c63caacd76503a50ad08fe3bc8df8a79cb6242decc4711f9ec62c87b49f9609f758f9b919192fd75419a18075b10e857ee35c8da79e3e972c1022a77d9027e99
-
Filesize
169KB
MD5169549c977777cc55ce335e92d1d6d02
SHA12f5e83db6dafdcf5766a705918b9eae2d06d179c
SHA25652f17fd42ea6677e4e377062fcd584a09441763d326a1a20457ab6572440018c
SHA512150add524883c4b81e40fb2a3728487d369c4a42d96bab8daebd286d9bf2aae93fc51c6c3d5b2cd92fffdc5780db327ff8cb84bf944a93e6d007e1b50ee7e9f0
-
Filesize
169KB
MD5169549c977777cc55ce335e92d1d6d02
SHA12f5e83db6dafdcf5766a705918b9eae2d06d179c
SHA25652f17fd42ea6677e4e377062fcd584a09441763d326a1a20457ab6572440018c
SHA512150add524883c4b81e40fb2a3728487d369c4a42d96bab8daebd286d9bf2aae93fc51c6c3d5b2cd92fffdc5780db327ff8cb84bf944a93e6d007e1b50ee7e9f0
-
Filesize
1.3MB
MD56c8c7e1794cada406a803cfeaf380e85
SHA139fb188dc2ea6196a9a684591d283b4bbe3f933b
SHA25600f2e4fa7645b65b97c3c09ddb40e6f1df2da6b6b7263ee9db6c123ada67dc53
SHA512f1a2e6dcf65d17a9ec57ba5d82b265426aa4357ad5521f9d424f46199fd4117aa55786dc3481c28acb7fcc19a95702e0d5179cecacba35ccef50d82e1c898a0c
-
Filesize
1.3MB
MD56c8c7e1794cada406a803cfeaf380e85
SHA139fb188dc2ea6196a9a684591d283b4bbe3f933b
SHA25600f2e4fa7645b65b97c3c09ddb40e6f1df2da6b6b7263ee9db6c123ada67dc53
SHA512f1a2e6dcf65d17a9ec57ba5d82b265426aa4357ad5521f9d424f46199fd4117aa55786dc3481c28acb7fcc19a95702e0d5179cecacba35ccef50d82e1c898a0c
-
Filesize
1015KB
MD5498ed43d955ccbadf1b080f13398a801
SHA1c56b640e243380525f33cd4aa6517fa0567e8050
SHA256af92381e52921dd59fcbd1845162203aa7d24d1adb0c1a862df92c644ed70d5e
SHA51292f25be303b3623be670150c71874d0a51bc83039183dc4650b8cb98573e932598dcfe2247f5ea7b99ecf4090f1c649381b5bbc328b3a234302b43af5f01c87f
-
Filesize
1015KB
MD5498ed43d955ccbadf1b080f13398a801
SHA1c56b640e243380525f33cd4aa6517fa0567e8050
SHA256af92381e52921dd59fcbd1845162203aa7d24d1adb0c1a862df92c644ed70d5e
SHA51292f25be303b3623be670150c71874d0a51bc83039183dc4650b8cb98573e932598dcfe2247f5ea7b99ecf4090f1c649381b5bbc328b3a234302b43af5f01c87f
-
Filesize
843KB
MD5423bff3beca44b5da89f052fce3851cc
SHA1d34d7fb0abc6d66d961fc6128d982a7eec693332
SHA256bd321d94b1ef4fb3ced9d323d9a0ebfa13d8172cd7cb0faeb22e3ed82a4bc5b9
SHA512611425bc65c56103479d2adcf0488b96487bb6e93b5b657b52aecd0fb0e6cd839fab48d1fca79251961c7dba114ac5324444312a0a6bf683d5a5482f0c32907c
-
Filesize
843KB
MD5423bff3beca44b5da89f052fce3851cc
SHA1d34d7fb0abc6d66d961fc6128d982a7eec693332
SHA256bd321d94b1ef4fb3ced9d323d9a0ebfa13d8172cd7cb0faeb22e3ed82a4bc5b9
SHA512611425bc65c56103479d2adcf0488b96487bb6e93b5b657b52aecd0fb0e6cd839fab48d1fca79251961c7dba114ac5324444312a0a6bf683d5a5482f0c32907c
-
Filesize
371KB
MD52f8d694329d848a4fd217e08a013fb31
SHA1b130255327465ee99c5a5110c1c04756cf7f3b8a
SHA25637202597325e353833a7b4c225b8228797703f8721f88999aa490a56f37a8526
SHA512c63caacd76503a50ad08fe3bc8df8a79cb6242decc4711f9ec62c87b49f9609f758f9b919192fd75419a18075b10e857ee35c8da79e3e972c1022a77d9027e99
-
Filesize
371KB
MD52f8d694329d848a4fd217e08a013fb31
SHA1b130255327465ee99c5a5110c1c04756cf7f3b8a
SHA25637202597325e353833a7b4c225b8228797703f8721f88999aa490a56f37a8526
SHA512c63caacd76503a50ad08fe3bc8df8a79cb6242decc4711f9ec62c87b49f9609f758f9b919192fd75419a18075b10e857ee35c8da79e3e972c1022a77d9027e99
-
Filesize
169KB
MD5169549c977777cc55ce335e92d1d6d02
SHA12f5e83db6dafdcf5766a705918b9eae2d06d179c
SHA25652f17fd42ea6677e4e377062fcd584a09441763d326a1a20457ab6572440018c
SHA512150add524883c4b81e40fb2a3728487d369c4a42d96bab8daebd286d9bf2aae93fc51c6c3d5b2cd92fffdc5780db327ff8cb84bf944a93e6d007e1b50ee7e9f0
-
Filesize
169KB
MD5169549c977777cc55ce335e92d1d6d02
SHA12f5e83db6dafdcf5766a705918b9eae2d06d179c
SHA25652f17fd42ea6677e4e377062fcd584a09441763d326a1a20457ab6572440018c
SHA512150add524883c4b81e40fb2a3728487d369c4a42d96bab8daebd286d9bf2aae93fc51c6c3d5b2cd92fffdc5780db327ff8cb84bf944a93e6d007e1b50ee7e9f0