Analysis
-
max time kernel
128s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2023, 20:14
Static task
static1
Behavioral task
behavioral1
Sample
e70afe93ee61f9d6f4cbe3baaf6e027edc4b18affa11a4da47d2cc9ed024bbf5.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e70afe93ee61f9d6f4cbe3baaf6e027edc4b18affa11a4da47d2cc9ed024bbf5.exe
Resource
win10v2004-20230220-en
General
-
Target
e70afe93ee61f9d6f4cbe3baaf6e027edc4b18affa11a4da47d2cc9ed024bbf5.exe
-
Size
1.2MB
-
MD5
f2f1783f389df806a8b85e5456637223
-
SHA1
83413619f224f4348532db5a455655713c5b8f5f
-
SHA256
e70afe93ee61f9d6f4cbe3baaf6e027edc4b18affa11a4da47d2cc9ed024bbf5
-
SHA512
ddd0f2a411e37fd948de4408e662a6b390cebde7a92db4b853bce0ba093501336c177295ac9646841be2766ca69f91508351dc553cd37da5c98fe4d26870600a
-
SSDEEP
24576:gyaJG8TPlqHZr3HB6Jzv2vPe0U/fIDX69Allmts+02r7icN2i87mjt4Uox:na/9esxCPLUXSXxqSBMZUWty
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 1440 z45864421.exe 520 z03274834.exe 1736 z94845549.exe 1704 s93289741.exe 848 1.exe 1912 t07561661.exe -
Loads dropped DLL 13 IoCs
pid Process 1888 e70afe93ee61f9d6f4cbe3baaf6e027edc4b18affa11a4da47d2cc9ed024bbf5.exe 1440 z45864421.exe 1440 z45864421.exe 520 z03274834.exe 520 z03274834.exe 1736 z94845549.exe 1736 z94845549.exe 1736 z94845549.exe 1704 s93289741.exe 1704 s93289741.exe 848 1.exe 1736 z94845549.exe 1912 t07561661.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z03274834.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z03274834.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z94845549.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z94845549.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce e70afe93ee61f9d6f4cbe3baaf6e027edc4b18affa11a4da47d2cc9ed024bbf5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e70afe93ee61f9d6f4cbe3baaf6e027edc4b18affa11a4da47d2cc9ed024bbf5.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z45864421.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z45864421.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1704 s93289741.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1888 wrote to memory of 1440 1888 e70afe93ee61f9d6f4cbe3baaf6e027edc4b18affa11a4da47d2cc9ed024bbf5.exe 27 PID 1888 wrote to memory of 1440 1888 e70afe93ee61f9d6f4cbe3baaf6e027edc4b18affa11a4da47d2cc9ed024bbf5.exe 27 PID 1888 wrote to memory of 1440 1888 e70afe93ee61f9d6f4cbe3baaf6e027edc4b18affa11a4da47d2cc9ed024bbf5.exe 27 PID 1888 wrote to memory of 1440 1888 e70afe93ee61f9d6f4cbe3baaf6e027edc4b18affa11a4da47d2cc9ed024bbf5.exe 27 PID 1888 wrote to memory of 1440 1888 e70afe93ee61f9d6f4cbe3baaf6e027edc4b18affa11a4da47d2cc9ed024bbf5.exe 27 PID 1888 wrote to memory of 1440 1888 e70afe93ee61f9d6f4cbe3baaf6e027edc4b18affa11a4da47d2cc9ed024bbf5.exe 27 PID 1888 wrote to memory of 1440 1888 e70afe93ee61f9d6f4cbe3baaf6e027edc4b18affa11a4da47d2cc9ed024bbf5.exe 27 PID 1440 wrote to memory of 520 1440 z45864421.exe 28 PID 1440 wrote to memory of 520 1440 z45864421.exe 28 PID 1440 wrote to memory of 520 1440 z45864421.exe 28 PID 1440 wrote to memory of 520 1440 z45864421.exe 28 PID 1440 wrote to memory of 520 1440 z45864421.exe 28 PID 1440 wrote to memory of 520 1440 z45864421.exe 28 PID 1440 wrote to memory of 520 1440 z45864421.exe 28 PID 520 wrote to memory of 1736 520 z03274834.exe 29 PID 520 wrote to memory of 1736 520 z03274834.exe 29 PID 520 wrote to memory of 1736 520 z03274834.exe 29 PID 520 wrote to memory of 1736 520 z03274834.exe 29 PID 520 wrote to memory of 1736 520 z03274834.exe 29 PID 520 wrote to memory of 1736 520 z03274834.exe 29 PID 520 wrote to memory of 1736 520 z03274834.exe 29 PID 1736 wrote to memory of 1704 1736 z94845549.exe 30 PID 1736 wrote to memory of 1704 1736 z94845549.exe 30 PID 1736 wrote to memory of 1704 1736 z94845549.exe 30 PID 1736 wrote to memory of 1704 1736 z94845549.exe 30 PID 1736 wrote to memory of 1704 1736 z94845549.exe 30 PID 1736 wrote to memory of 1704 1736 z94845549.exe 30 PID 1736 wrote to memory of 1704 1736 z94845549.exe 30 PID 1704 wrote to memory of 848 1704 s93289741.exe 31 PID 1704 wrote to memory of 848 1704 s93289741.exe 31 PID 1704 wrote to memory of 848 1704 s93289741.exe 31 PID 1704 wrote to memory of 848 1704 s93289741.exe 31 PID 1704 wrote to memory of 848 1704 s93289741.exe 31 PID 1704 wrote to memory of 848 1704 s93289741.exe 31 PID 1704 wrote to memory of 848 1704 s93289741.exe 31 PID 1736 wrote to memory of 1912 1736 z94845549.exe 32 PID 1736 wrote to memory of 1912 1736 z94845549.exe 32 PID 1736 wrote to memory of 1912 1736 z94845549.exe 32 PID 1736 wrote to memory of 1912 1736 z94845549.exe 32 PID 1736 wrote to memory of 1912 1736 z94845549.exe 32 PID 1736 wrote to memory of 1912 1736 z94845549.exe 32 PID 1736 wrote to memory of 1912 1736 z94845549.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e70afe93ee61f9d6f4cbe3baaf6e027edc4b18affa11a4da47d2cc9ed024bbf5.exe"C:\Users\Admin\AppData\Local\Temp\e70afe93ee61f9d6f4cbe3baaf6e027edc4b18affa11a4da47d2cc9ed024bbf5.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z45864421.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z45864421.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z03274834.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z03274834.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z94845549.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z94845549.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s93289741.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s93289741.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:848
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t07561661.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t07561661.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1912
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD524f6aa14573ffcd7fa338b8b5364e4ee
SHA1cab80e7e81a648ff9f60d468446dc93448060b83
SHA2565026f2a5c5bdede756d4ef2cfa98c54b1824c67ab69d9cbcdf8b2143703300c4
SHA5121cca1914614f81fcb5cde77b1a08ae9f9e0f30829a20f9368f0d62705dbc01cb3b25e4706b2eb8b05a24df7372544fd73607912f543741a1489ae59fda2076e4
-
Filesize
1.0MB
MD524f6aa14573ffcd7fa338b8b5364e4ee
SHA1cab80e7e81a648ff9f60d468446dc93448060b83
SHA2565026f2a5c5bdede756d4ef2cfa98c54b1824c67ab69d9cbcdf8b2143703300c4
SHA5121cca1914614f81fcb5cde77b1a08ae9f9e0f30829a20f9368f0d62705dbc01cb3b25e4706b2eb8b05a24df7372544fd73607912f543741a1489ae59fda2076e4
-
Filesize
764KB
MD563ce1f1986abb5548da58ddd4b6ee2cf
SHA13a66cbce1d43dd285c8faa7a8540d7ed46eea1b7
SHA256dc30f84182b39157e67644e6fbfc3a8fadde680a8c3e3ecbb66b4b17c932b78c
SHA51243125890b637e96365543ba91893c6ee880bef3e0f56afcf1f9d1b55b75d8a1572005f21a405867e9e66f880cbc2a6f28d7c82f37141635a1832d26f9964a7bf
-
Filesize
764KB
MD563ce1f1986abb5548da58ddd4b6ee2cf
SHA13a66cbce1d43dd285c8faa7a8540d7ed46eea1b7
SHA256dc30f84182b39157e67644e6fbfc3a8fadde680a8c3e3ecbb66b4b17c932b78c
SHA51243125890b637e96365543ba91893c6ee880bef3e0f56afcf1f9d1b55b75d8a1572005f21a405867e9e66f880cbc2a6f28d7c82f37141635a1832d26f9964a7bf
-
Filesize
582KB
MD5eb67c4a0f59c53b4bcb9d935609a3f01
SHA1a20ea65a6aae226eae22ca0d61aa6ffcda0310eb
SHA256fd9de31b480091f3c3faae1ef6f223a94dbec40bc32dac3292ce18c8063be4af
SHA512ae9c4c297dffa1e3c479a1ff5a4e6b64f281e4640a6cc5a55d9ecea44b84f6846021883fc7ecd35f0d9e6582f2c93a9d8a1f1ed98ff917e3040ea3100e5d077d
-
Filesize
582KB
MD5eb67c4a0f59c53b4bcb9d935609a3f01
SHA1a20ea65a6aae226eae22ca0d61aa6ffcda0310eb
SHA256fd9de31b480091f3c3faae1ef6f223a94dbec40bc32dac3292ce18c8063be4af
SHA512ae9c4c297dffa1e3c479a1ff5a4e6b64f281e4640a6cc5a55d9ecea44b84f6846021883fc7ecd35f0d9e6582f2c93a9d8a1f1ed98ff917e3040ea3100e5d077d
-
Filesize
582KB
MD5f9fcf23b830d68d48a0732e9c638d11c
SHA1f8a5ddea4c3e654106038764dadbcd00fafaa70e
SHA256078f84fbed50bd9f0d6ac231530b76443988cb6e2fce820394259d6aeb982d3d
SHA512cf0e563b33b0c2f1ad25cfda574d48c3eaf2e1524c7cba3f4fe0b13dabfad76cd43c748b4863a1b6c7ca6007fa984d06f0d7228ede5e205bfb32519f5fe04426
-
Filesize
582KB
MD5f9fcf23b830d68d48a0732e9c638d11c
SHA1f8a5ddea4c3e654106038764dadbcd00fafaa70e
SHA256078f84fbed50bd9f0d6ac231530b76443988cb6e2fce820394259d6aeb982d3d
SHA512cf0e563b33b0c2f1ad25cfda574d48c3eaf2e1524c7cba3f4fe0b13dabfad76cd43c748b4863a1b6c7ca6007fa984d06f0d7228ede5e205bfb32519f5fe04426
-
Filesize
582KB
MD5f9fcf23b830d68d48a0732e9c638d11c
SHA1f8a5ddea4c3e654106038764dadbcd00fafaa70e
SHA256078f84fbed50bd9f0d6ac231530b76443988cb6e2fce820394259d6aeb982d3d
SHA512cf0e563b33b0c2f1ad25cfda574d48c3eaf2e1524c7cba3f4fe0b13dabfad76cd43c748b4863a1b6c7ca6007fa984d06f0d7228ede5e205bfb32519f5fe04426
-
Filesize
169KB
MD5721a9c49a54bc5bccc9b44e7ef3de972
SHA1c7bcb7285c6f325c2076d597316dea3d93bee085
SHA2568447e65fcd104544ab30cc87c8be87ddff8cd4082a429892e17c29e33d801e19
SHA5121f87bdf64af2b69c4598a3edf4fd284efa904b883e767e6e8827e61328f6d5ae15d5a58e16249f7cb795d90fafcf86461c9c5392ef7eea609e6c17ef54c94377
-
Filesize
169KB
MD5721a9c49a54bc5bccc9b44e7ef3de972
SHA1c7bcb7285c6f325c2076d597316dea3d93bee085
SHA2568447e65fcd104544ab30cc87c8be87ddff8cd4082a429892e17c29e33d801e19
SHA5121f87bdf64af2b69c4598a3edf4fd284efa904b883e767e6e8827e61328f6d5ae15d5a58e16249f7cb795d90fafcf86461c9c5392ef7eea609e6c17ef54c94377
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
1.0MB
MD524f6aa14573ffcd7fa338b8b5364e4ee
SHA1cab80e7e81a648ff9f60d468446dc93448060b83
SHA2565026f2a5c5bdede756d4ef2cfa98c54b1824c67ab69d9cbcdf8b2143703300c4
SHA5121cca1914614f81fcb5cde77b1a08ae9f9e0f30829a20f9368f0d62705dbc01cb3b25e4706b2eb8b05a24df7372544fd73607912f543741a1489ae59fda2076e4
-
Filesize
1.0MB
MD524f6aa14573ffcd7fa338b8b5364e4ee
SHA1cab80e7e81a648ff9f60d468446dc93448060b83
SHA2565026f2a5c5bdede756d4ef2cfa98c54b1824c67ab69d9cbcdf8b2143703300c4
SHA5121cca1914614f81fcb5cde77b1a08ae9f9e0f30829a20f9368f0d62705dbc01cb3b25e4706b2eb8b05a24df7372544fd73607912f543741a1489ae59fda2076e4
-
Filesize
764KB
MD563ce1f1986abb5548da58ddd4b6ee2cf
SHA13a66cbce1d43dd285c8faa7a8540d7ed46eea1b7
SHA256dc30f84182b39157e67644e6fbfc3a8fadde680a8c3e3ecbb66b4b17c932b78c
SHA51243125890b637e96365543ba91893c6ee880bef3e0f56afcf1f9d1b55b75d8a1572005f21a405867e9e66f880cbc2a6f28d7c82f37141635a1832d26f9964a7bf
-
Filesize
764KB
MD563ce1f1986abb5548da58ddd4b6ee2cf
SHA13a66cbce1d43dd285c8faa7a8540d7ed46eea1b7
SHA256dc30f84182b39157e67644e6fbfc3a8fadde680a8c3e3ecbb66b4b17c932b78c
SHA51243125890b637e96365543ba91893c6ee880bef3e0f56afcf1f9d1b55b75d8a1572005f21a405867e9e66f880cbc2a6f28d7c82f37141635a1832d26f9964a7bf
-
Filesize
582KB
MD5eb67c4a0f59c53b4bcb9d935609a3f01
SHA1a20ea65a6aae226eae22ca0d61aa6ffcda0310eb
SHA256fd9de31b480091f3c3faae1ef6f223a94dbec40bc32dac3292ce18c8063be4af
SHA512ae9c4c297dffa1e3c479a1ff5a4e6b64f281e4640a6cc5a55d9ecea44b84f6846021883fc7ecd35f0d9e6582f2c93a9d8a1f1ed98ff917e3040ea3100e5d077d
-
Filesize
582KB
MD5eb67c4a0f59c53b4bcb9d935609a3f01
SHA1a20ea65a6aae226eae22ca0d61aa6ffcda0310eb
SHA256fd9de31b480091f3c3faae1ef6f223a94dbec40bc32dac3292ce18c8063be4af
SHA512ae9c4c297dffa1e3c479a1ff5a4e6b64f281e4640a6cc5a55d9ecea44b84f6846021883fc7ecd35f0d9e6582f2c93a9d8a1f1ed98ff917e3040ea3100e5d077d
-
Filesize
582KB
MD5f9fcf23b830d68d48a0732e9c638d11c
SHA1f8a5ddea4c3e654106038764dadbcd00fafaa70e
SHA256078f84fbed50bd9f0d6ac231530b76443988cb6e2fce820394259d6aeb982d3d
SHA512cf0e563b33b0c2f1ad25cfda574d48c3eaf2e1524c7cba3f4fe0b13dabfad76cd43c748b4863a1b6c7ca6007fa984d06f0d7228ede5e205bfb32519f5fe04426
-
Filesize
582KB
MD5f9fcf23b830d68d48a0732e9c638d11c
SHA1f8a5ddea4c3e654106038764dadbcd00fafaa70e
SHA256078f84fbed50bd9f0d6ac231530b76443988cb6e2fce820394259d6aeb982d3d
SHA512cf0e563b33b0c2f1ad25cfda574d48c3eaf2e1524c7cba3f4fe0b13dabfad76cd43c748b4863a1b6c7ca6007fa984d06f0d7228ede5e205bfb32519f5fe04426
-
Filesize
582KB
MD5f9fcf23b830d68d48a0732e9c638d11c
SHA1f8a5ddea4c3e654106038764dadbcd00fafaa70e
SHA256078f84fbed50bd9f0d6ac231530b76443988cb6e2fce820394259d6aeb982d3d
SHA512cf0e563b33b0c2f1ad25cfda574d48c3eaf2e1524c7cba3f4fe0b13dabfad76cd43c748b4863a1b6c7ca6007fa984d06f0d7228ede5e205bfb32519f5fe04426
-
Filesize
169KB
MD5721a9c49a54bc5bccc9b44e7ef3de972
SHA1c7bcb7285c6f325c2076d597316dea3d93bee085
SHA2568447e65fcd104544ab30cc87c8be87ddff8cd4082a429892e17c29e33d801e19
SHA5121f87bdf64af2b69c4598a3edf4fd284efa904b883e767e6e8827e61328f6d5ae15d5a58e16249f7cb795d90fafcf86461c9c5392ef7eea609e6c17ef54c94377
-
Filesize
169KB
MD5721a9c49a54bc5bccc9b44e7ef3de972
SHA1c7bcb7285c6f325c2076d597316dea3d93bee085
SHA2568447e65fcd104544ab30cc87c8be87ddff8cd4082a429892e17c29e33d801e19
SHA5121f87bdf64af2b69c4598a3edf4fd284efa904b883e767e6e8827e61328f6d5ae15d5a58e16249f7cb795d90fafcf86461c9c5392ef7eea609e6c17ef54c94377
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf