Analysis
-
max time kernel
128s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05-05-2023 20:34
Static task
static1
Behavioral task
behavioral1
Sample
f8f3639b70343ec746e90c05081f2f3be560905473964488dae725d01db19d4d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f8f3639b70343ec746e90c05081f2f3be560905473964488dae725d01db19d4d.exe
Resource
win10v2004-20230220-en
General
-
Target
f8f3639b70343ec746e90c05081f2f3be560905473964488dae725d01db19d4d.exe
-
Size
1.2MB
-
MD5
06838e0b33a419314b406e8967acadd3
-
SHA1
6a9e5f5331fb94404a91b5770cf38437fca1a690
-
SHA256
f8f3639b70343ec746e90c05081f2f3be560905473964488dae725d01db19d4d
-
SHA512
a13a114e463ca4fa20fc2fa1a3926ad3caf4627d08be9ad5a004b19d2855f9b1e8792111c72c5bf9e2c29cb266d24f643bfb06d2f96ad0857b0b53b15d22b11d
-
SSDEEP
24576:/yA0lLvIXkRWeyJYbo89IvXuKTiTmSsclPn3RFMi5P0dT0nkgGh5:KN20RtuhWiXlvo3IG3nM
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
z03536485.exez59265053.exez77361637.exes13301969.exe1.exet97213294.exepid process 1224 z03536485.exe 1980 z59265053.exe 544 z77361637.exe 1440 s13301969.exe 1624 1.exe 1008 t97213294.exe -
Loads dropped DLL 13 IoCs
Processes:
f8f3639b70343ec746e90c05081f2f3be560905473964488dae725d01db19d4d.exez03536485.exez59265053.exez77361637.exes13301969.exe1.exet97213294.exepid process 1660 f8f3639b70343ec746e90c05081f2f3be560905473964488dae725d01db19d4d.exe 1224 z03536485.exe 1224 z03536485.exe 1980 z59265053.exe 1980 z59265053.exe 544 z77361637.exe 544 z77361637.exe 544 z77361637.exe 1440 s13301969.exe 1440 s13301969.exe 1624 1.exe 544 z77361637.exe 1008 t97213294.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
z59265053.exez77361637.exef8f3639b70343ec746e90c05081f2f3be560905473964488dae725d01db19d4d.exez03536485.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z59265053.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z59265053.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z77361637.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z77361637.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce f8f3639b70343ec746e90c05081f2f3be560905473964488dae725d01db19d4d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f8f3639b70343ec746e90c05081f2f3be560905473964488dae725d01db19d4d.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z03536485.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z03536485.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
s13301969.exedescription pid process Token: SeDebugPrivilege 1440 s13301969.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
f8f3639b70343ec746e90c05081f2f3be560905473964488dae725d01db19d4d.exez03536485.exez59265053.exez77361637.exes13301969.exedescription pid process target process PID 1660 wrote to memory of 1224 1660 f8f3639b70343ec746e90c05081f2f3be560905473964488dae725d01db19d4d.exe z03536485.exe PID 1660 wrote to memory of 1224 1660 f8f3639b70343ec746e90c05081f2f3be560905473964488dae725d01db19d4d.exe z03536485.exe PID 1660 wrote to memory of 1224 1660 f8f3639b70343ec746e90c05081f2f3be560905473964488dae725d01db19d4d.exe z03536485.exe PID 1660 wrote to memory of 1224 1660 f8f3639b70343ec746e90c05081f2f3be560905473964488dae725d01db19d4d.exe z03536485.exe PID 1660 wrote to memory of 1224 1660 f8f3639b70343ec746e90c05081f2f3be560905473964488dae725d01db19d4d.exe z03536485.exe PID 1660 wrote to memory of 1224 1660 f8f3639b70343ec746e90c05081f2f3be560905473964488dae725d01db19d4d.exe z03536485.exe PID 1660 wrote to memory of 1224 1660 f8f3639b70343ec746e90c05081f2f3be560905473964488dae725d01db19d4d.exe z03536485.exe PID 1224 wrote to memory of 1980 1224 z03536485.exe z59265053.exe PID 1224 wrote to memory of 1980 1224 z03536485.exe z59265053.exe PID 1224 wrote to memory of 1980 1224 z03536485.exe z59265053.exe PID 1224 wrote to memory of 1980 1224 z03536485.exe z59265053.exe PID 1224 wrote to memory of 1980 1224 z03536485.exe z59265053.exe PID 1224 wrote to memory of 1980 1224 z03536485.exe z59265053.exe PID 1224 wrote to memory of 1980 1224 z03536485.exe z59265053.exe PID 1980 wrote to memory of 544 1980 z59265053.exe z77361637.exe PID 1980 wrote to memory of 544 1980 z59265053.exe z77361637.exe PID 1980 wrote to memory of 544 1980 z59265053.exe z77361637.exe PID 1980 wrote to memory of 544 1980 z59265053.exe z77361637.exe PID 1980 wrote to memory of 544 1980 z59265053.exe z77361637.exe PID 1980 wrote to memory of 544 1980 z59265053.exe z77361637.exe PID 1980 wrote to memory of 544 1980 z59265053.exe z77361637.exe PID 544 wrote to memory of 1440 544 z77361637.exe s13301969.exe PID 544 wrote to memory of 1440 544 z77361637.exe s13301969.exe PID 544 wrote to memory of 1440 544 z77361637.exe s13301969.exe PID 544 wrote to memory of 1440 544 z77361637.exe s13301969.exe PID 544 wrote to memory of 1440 544 z77361637.exe s13301969.exe PID 544 wrote to memory of 1440 544 z77361637.exe s13301969.exe PID 544 wrote to memory of 1440 544 z77361637.exe s13301969.exe PID 1440 wrote to memory of 1624 1440 s13301969.exe 1.exe PID 1440 wrote to memory of 1624 1440 s13301969.exe 1.exe PID 1440 wrote to memory of 1624 1440 s13301969.exe 1.exe PID 1440 wrote to memory of 1624 1440 s13301969.exe 1.exe PID 1440 wrote to memory of 1624 1440 s13301969.exe 1.exe PID 1440 wrote to memory of 1624 1440 s13301969.exe 1.exe PID 1440 wrote to memory of 1624 1440 s13301969.exe 1.exe PID 544 wrote to memory of 1008 544 z77361637.exe t97213294.exe PID 544 wrote to memory of 1008 544 z77361637.exe t97213294.exe PID 544 wrote to memory of 1008 544 z77361637.exe t97213294.exe PID 544 wrote to memory of 1008 544 z77361637.exe t97213294.exe PID 544 wrote to memory of 1008 544 z77361637.exe t97213294.exe PID 544 wrote to memory of 1008 544 z77361637.exe t97213294.exe PID 544 wrote to memory of 1008 544 z77361637.exe t97213294.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8f3639b70343ec746e90c05081f2f3be560905473964488dae725d01db19d4d.exe"C:\Users\Admin\AppData\Local\Temp\f8f3639b70343ec746e90c05081f2f3be560905473964488dae725d01db19d4d.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z03536485.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z03536485.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z59265053.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z59265053.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z77361637.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z77361637.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s13301969.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s13301969.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1624
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t97213294.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t97213294.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1008
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD51fe12a91a01a6d4ce55265c3fd8e5287
SHA129293e6cb7bb2da4d4be8f413e10220bc1462699
SHA256c1557aa2bdad99d91f520edd899e3a251f31f2be00e60b0e54002c7a64bd22de
SHA512f81d7a8583d6304a1463711cfd7090d87249e63203eafb6bbdde864b75d018bfed8be579563ab93757c421d105b5d0e8af624030eb62fcce8c2970c55cc8838d
-
Filesize
1.0MB
MD51fe12a91a01a6d4ce55265c3fd8e5287
SHA129293e6cb7bb2da4d4be8f413e10220bc1462699
SHA256c1557aa2bdad99d91f520edd899e3a251f31f2be00e60b0e54002c7a64bd22de
SHA512f81d7a8583d6304a1463711cfd7090d87249e63203eafb6bbdde864b75d018bfed8be579563ab93757c421d105b5d0e8af624030eb62fcce8c2970c55cc8838d
-
Filesize
764KB
MD5172d68d3f78c35aab97ee2c1b983c5fd
SHA16c50268be53a5b139c2faabf5321fc065e873c06
SHA256019fa2ab42d218e1cd74181a2518c6d4f7d95558d12f1e717bd934e55ac8e185
SHA5124fbacd57ce0c2037c3fe812adcf000653641ee1f45fa4b94781cde69dce813b2d53cfa432c44aa0b6a28f25b24aedf5e6df797b73f0e8542927b5cc397e94503
-
Filesize
764KB
MD5172d68d3f78c35aab97ee2c1b983c5fd
SHA16c50268be53a5b139c2faabf5321fc065e873c06
SHA256019fa2ab42d218e1cd74181a2518c6d4f7d95558d12f1e717bd934e55ac8e185
SHA5124fbacd57ce0c2037c3fe812adcf000653641ee1f45fa4b94781cde69dce813b2d53cfa432c44aa0b6a28f25b24aedf5e6df797b73f0e8542927b5cc397e94503
-
Filesize
582KB
MD5c90f4f42b79fe938e8bd29f60995125c
SHA1a2408200f5bf32ef76c9be28d220c4b5eebf9e26
SHA2562892808297ad96444592f512045d335f255da8ec75fb18e8833f28bd415c5677
SHA512eeb1ce6bd3670ab1a16a8cef2793ec400d7f8d5f0dc967261d05b72d14d8a4cd19aaab848ebb019c4153ba9221e841218836e293e0d5cb6a17694cd114899ef2
-
Filesize
582KB
MD5c90f4f42b79fe938e8bd29f60995125c
SHA1a2408200f5bf32ef76c9be28d220c4b5eebf9e26
SHA2562892808297ad96444592f512045d335f255da8ec75fb18e8833f28bd415c5677
SHA512eeb1ce6bd3670ab1a16a8cef2793ec400d7f8d5f0dc967261d05b72d14d8a4cd19aaab848ebb019c4153ba9221e841218836e293e0d5cb6a17694cd114899ef2
-
Filesize
582KB
MD50c3e3bde19c634efdd0b1413854f59e0
SHA12b3b3bde01c46e95fa2262ecdbff01446f5094a4
SHA256940411bb7d7c2748cbac6ae46b7cf1bc8d8a8e3c43f81a8dac940af8343c6038
SHA5122c8fcd7590595c89544f95d662bec3b6eac2e00b4e666a74e2344233867471a2576bd23a89b60bdb2db3ff3a7785a19977636ee8561b152ec760d32bb8b36846
-
Filesize
582KB
MD50c3e3bde19c634efdd0b1413854f59e0
SHA12b3b3bde01c46e95fa2262ecdbff01446f5094a4
SHA256940411bb7d7c2748cbac6ae46b7cf1bc8d8a8e3c43f81a8dac940af8343c6038
SHA5122c8fcd7590595c89544f95d662bec3b6eac2e00b4e666a74e2344233867471a2576bd23a89b60bdb2db3ff3a7785a19977636ee8561b152ec760d32bb8b36846
-
Filesize
582KB
MD50c3e3bde19c634efdd0b1413854f59e0
SHA12b3b3bde01c46e95fa2262ecdbff01446f5094a4
SHA256940411bb7d7c2748cbac6ae46b7cf1bc8d8a8e3c43f81a8dac940af8343c6038
SHA5122c8fcd7590595c89544f95d662bec3b6eac2e00b4e666a74e2344233867471a2576bd23a89b60bdb2db3ff3a7785a19977636ee8561b152ec760d32bb8b36846
-
Filesize
169KB
MD585ca107259e15ffcade5360e321a6dbc
SHA1f05b4365945860e1c809299bc4c5e25945ac7216
SHA2566ae48c21ff1cc7109880191d6dbe9014ca0a7d838cbf2bcd7884f1a09fd6b418
SHA512ea2ca0393a5259921b457735cd94ff9c0c33b30a9e0e56f820c8286f875fb1f27d2ab6828cb616c166068d5727af60137aaf234596658c39a3bd01198115c268
-
Filesize
169KB
MD585ca107259e15ffcade5360e321a6dbc
SHA1f05b4365945860e1c809299bc4c5e25945ac7216
SHA2566ae48c21ff1cc7109880191d6dbe9014ca0a7d838cbf2bcd7884f1a09fd6b418
SHA512ea2ca0393a5259921b457735cd94ff9c0c33b30a9e0e56f820c8286f875fb1f27d2ab6828cb616c166068d5727af60137aaf234596658c39a3bd01198115c268
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
1.0MB
MD51fe12a91a01a6d4ce55265c3fd8e5287
SHA129293e6cb7bb2da4d4be8f413e10220bc1462699
SHA256c1557aa2bdad99d91f520edd899e3a251f31f2be00e60b0e54002c7a64bd22de
SHA512f81d7a8583d6304a1463711cfd7090d87249e63203eafb6bbdde864b75d018bfed8be579563ab93757c421d105b5d0e8af624030eb62fcce8c2970c55cc8838d
-
Filesize
1.0MB
MD51fe12a91a01a6d4ce55265c3fd8e5287
SHA129293e6cb7bb2da4d4be8f413e10220bc1462699
SHA256c1557aa2bdad99d91f520edd899e3a251f31f2be00e60b0e54002c7a64bd22de
SHA512f81d7a8583d6304a1463711cfd7090d87249e63203eafb6bbdde864b75d018bfed8be579563ab93757c421d105b5d0e8af624030eb62fcce8c2970c55cc8838d
-
Filesize
764KB
MD5172d68d3f78c35aab97ee2c1b983c5fd
SHA16c50268be53a5b139c2faabf5321fc065e873c06
SHA256019fa2ab42d218e1cd74181a2518c6d4f7d95558d12f1e717bd934e55ac8e185
SHA5124fbacd57ce0c2037c3fe812adcf000653641ee1f45fa4b94781cde69dce813b2d53cfa432c44aa0b6a28f25b24aedf5e6df797b73f0e8542927b5cc397e94503
-
Filesize
764KB
MD5172d68d3f78c35aab97ee2c1b983c5fd
SHA16c50268be53a5b139c2faabf5321fc065e873c06
SHA256019fa2ab42d218e1cd74181a2518c6d4f7d95558d12f1e717bd934e55ac8e185
SHA5124fbacd57ce0c2037c3fe812adcf000653641ee1f45fa4b94781cde69dce813b2d53cfa432c44aa0b6a28f25b24aedf5e6df797b73f0e8542927b5cc397e94503
-
Filesize
582KB
MD5c90f4f42b79fe938e8bd29f60995125c
SHA1a2408200f5bf32ef76c9be28d220c4b5eebf9e26
SHA2562892808297ad96444592f512045d335f255da8ec75fb18e8833f28bd415c5677
SHA512eeb1ce6bd3670ab1a16a8cef2793ec400d7f8d5f0dc967261d05b72d14d8a4cd19aaab848ebb019c4153ba9221e841218836e293e0d5cb6a17694cd114899ef2
-
Filesize
582KB
MD5c90f4f42b79fe938e8bd29f60995125c
SHA1a2408200f5bf32ef76c9be28d220c4b5eebf9e26
SHA2562892808297ad96444592f512045d335f255da8ec75fb18e8833f28bd415c5677
SHA512eeb1ce6bd3670ab1a16a8cef2793ec400d7f8d5f0dc967261d05b72d14d8a4cd19aaab848ebb019c4153ba9221e841218836e293e0d5cb6a17694cd114899ef2
-
Filesize
582KB
MD50c3e3bde19c634efdd0b1413854f59e0
SHA12b3b3bde01c46e95fa2262ecdbff01446f5094a4
SHA256940411bb7d7c2748cbac6ae46b7cf1bc8d8a8e3c43f81a8dac940af8343c6038
SHA5122c8fcd7590595c89544f95d662bec3b6eac2e00b4e666a74e2344233867471a2576bd23a89b60bdb2db3ff3a7785a19977636ee8561b152ec760d32bb8b36846
-
Filesize
582KB
MD50c3e3bde19c634efdd0b1413854f59e0
SHA12b3b3bde01c46e95fa2262ecdbff01446f5094a4
SHA256940411bb7d7c2748cbac6ae46b7cf1bc8d8a8e3c43f81a8dac940af8343c6038
SHA5122c8fcd7590595c89544f95d662bec3b6eac2e00b4e666a74e2344233867471a2576bd23a89b60bdb2db3ff3a7785a19977636ee8561b152ec760d32bb8b36846
-
Filesize
582KB
MD50c3e3bde19c634efdd0b1413854f59e0
SHA12b3b3bde01c46e95fa2262ecdbff01446f5094a4
SHA256940411bb7d7c2748cbac6ae46b7cf1bc8d8a8e3c43f81a8dac940af8343c6038
SHA5122c8fcd7590595c89544f95d662bec3b6eac2e00b4e666a74e2344233867471a2576bd23a89b60bdb2db3ff3a7785a19977636ee8561b152ec760d32bb8b36846
-
Filesize
169KB
MD585ca107259e15ffcade5360e321a6dbc
SHA1f05b4365945860e1c809299bc4c5e25945ac7216
SHA2566ae48c21ff1cc7109880191d6dbe9014ca0a7d838cbf2bcd7884f1a09fd6b418
SHA512ea2ca0393a5259921b457735cd94ff9c0c33b30a9e0e56f820c8286f875fb1f27d2ab6828cb616c166068d5727af60137aaf234596658c39a3bd01198115c268
-
Filesize
169KB
MD585ca107259e15ffcade5360e321a6dbc
SHA1f05b4365945860e1c809299bc4c5e25945ac7216
SHA2566ae48c21ff1cc7109880191d6dbe9014ca0a7d838cbf2bcd7884f1a09fd6b418
SHA512ea2ca0393a5259921b457735cd94ff9c0c33b30a9e0e56f820c8286f875fb1f27d2ab6828cb616c166068d5727af60137aaf234596658c39a3bd01198115c268
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf