Analysis
-
max time kernel
128s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 22:14
Static task
static1
Behavioral task
behavioral1
Sample
631089a4c23dccbc39ce2f7cc0d9ffc42fa18874bad065d2da39808ab6fab33f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
631089a4c23dccbc39ce2f7cc0d9ffc42fa18874bad065d2da39808ab6fab33f.exe
Resource
win10v2004-20230220-en
General
-
Target
631089a4c23dccbc39ce2f7cc0d9ffc42fa18874bad065d2da39808ab6fab33f.exe
-
Size
794KB
-
MD5
a6e4b2ce9f7cf879d31fe1e2a08e8666
-
SHA1
e7f96de935562bf32d3524a47144989e02a6b718
-
SHA256
631089a4c23dccbc39ce2f7cc0d9ffc42fa18874bad065d2da39808ab6fab33f
-
SHA512
627114d79ca1c769aa3ea1bb9aeb53a302da351ca09700229660690d4179e5795c815307cb83131da12090c6ef73afdbac94c71bc7aea6c343f1be0fad2d4691
-
SSDEEP
24576:/yueo+YGvBJzaPTbi3sCQGsg3vebHVwAmcz:Ko+7BJGPTb4Jag3vG15mc
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dork
185.161.248.73:4164
-
auth_value
e81be7d6cfb453cc812e1b4890eeadad
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 2004 x02713678.exe 1524 m15459754.exe 896 1.exe 1296 n73998508.exe -
Loads dropped DLL 9 IoCs
pid Process 2040 631089a4c23dccbc39ce2f7cc0d9ffc42fa18874bad065d2da39808ab6fab33f.exe 2004 x02713678.exe 2004 x02713678.exe 2004 x02713678.exe 1524 m15459754.exe 1524 m15459754.exe 896 1.exe 2004 x02713678.exe 1296 n73998508.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x02713678.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 631089a4c23dccbc39ce2f7cc0d9ffc42fa18874bad065d2da39808ab6fab33f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 631089a4c23dccbc39ce2f7cc0d9ffc42fa18874bad065d2da39808ab6fab33f.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce x02713678.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1524 m15459754.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2004 2040 631089a4c23dccbc39ce2f7cc0d9ffc42fa18874bad065d2da39808ab6fab33f.exe 28 PID 2040 wrote to memory of 2004 2040 631089a4c23dccbc39ce2f7cc0d9ffc42fa18874bad065d2da39808ab6fab33f.exe 28 PID 2040 wrote to memory of 2004 2040 631089a4c23dccbc39ce2f7cc0d9ffc42fa18874bad065d2da39808ab6fab33f.exe 28 PID 2040 wrote to memory of 2004 2040 631089a4c23dccbc39ce2f7cc0d9ffc42fa18874bad065d2da39808ab6fab33f.exe 28 PID 2040 wrote to memory of 2004 2040 631089a4c23dccbc39ce2f7cc0d9ffc42fa18874bad065d2da39808ab6fab33f.exe 28 PID 2040 wrote to memory of 2004 2040 631089a4c23dccbc39ce2f7cc0d9ffc42fa18874bad065d2da39808ab6fab33f.exe 28 PID 2040 wrote to memory of 2004 2040 631089a4c23dccbc39ce2f7cc0d9ffc42fa18874bad065d2da39808ab6fab33f.exe 28 PID 2004 wrote to memory of 1524 2004 x02713678.exe 29 PID 2004 wrote to memory of 1524 2004 x02713678.exe 29 PID 2004 wrote to memory of 1524 2004 x02713678.exe 29 PID 2004 wrote to memory of 1524 2004 x02713678.exe 29 PID 2004 wrote to memory of 1524 2004 x02713678.exe 29 PID 2004 wrote to memory of 1524 2004 x02713678.exe 29 PID 2004 wrote to memory of 1524 2004 x02713678.exe 29 PID 1524 wrote to memory of 896 1524 m15459754.exe 30 PID 1524 wrote to memory of 896 1524 m15459754.exe 30 PID 1524 wrote to memory of 896 1524 m15459754.exe 30 PID 1524 wrote to memory of 896 1524 m15459754.exe 30 PID 1524 wrote to memory of 896 1524 m15459754.exe 30 PID 1524 wrote to memory of 896 1524 m15459754.exe 30 PID 1524 wrote to memory of 896 1524 m15459754.exe 30 PID 2004 wrote to memory of 1296 2004 x02713678.exe 31 PID 2004 wrote to memory of 1296 2004 x02713678.exe 31 PID 2004 wrote to memory of 1296 2004 x02713678.exe 31 PID 2004 wrote to memory of 1296 2004 x02713678.exe 31 PID 2004 wrote to memory of 1296 2004 x02713678.exe 31 PID 2004 wrote to memory of 1296 2004 x02713678.exe 31 PID 2004 wrote to memory of 1296 2004 x02713678.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\631089a4c23dccbc39ce2f7cc0d9ffc42fa18874bad065d2da39808ab6fab33f.exe"C:\Users\Admin\AppData\Local\Temp\631089a4c23dccbc39ce2f7cc0d9ffc42fa18874bad065d2da39808ab6fab33f.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x02713678.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x02713678.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m15459754.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m15459754.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:896
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n73998508.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n73998508.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1296
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
589KB
MD541dda4005e27a08cb3dd61caf6fcb0ee
SHA13acef2fc98a54f05bdf631a184273be7c23324e4
SHA2567d9b89bd0914d5bf893e0ec10acf678a09b5def77b950ad52bff007ee903f1ee
SHA512cb56d4f4d20483024624168fbe9222f90a957a9056a51f3f98e3a248aac55498e76517779b1fc883c5f7d6727260ffa3841a7394e6b2aa2a5080c10bd9d967e5
-
Filesize
589KB
MD541dda4005e27a08cb3dd61caf6fcb0ee
SHA13acef2fc98a54f05bdf631a184273be7c23324e4
SHA2567d9b89bd0914d5bf893e0ec10acf678a09b5def77b950ad52bff007ee903f1ee
SHA512cb56d4f4d20483024624168fbe9222f90a957a9056a51f3f98e3a248aac55498e76517779b1fc883c5f7d6727260ffa3841a7394e6b2aa2a5080c10bd9d967e5
-
Filesize
530KB
MD5c38ea33b6ee610fe2eb4f1924258028a
SHA12424c95c2e27434aeba0956dfa8a79ff0fdd68f2
SHA256c318fdf95b0677f21f961bd30522e1d72fbfe941773391c7f6d49b555a6ea261
SHA512017391789b782ae59df3d8bcf3015f13a0a0e637ed350c161074e39c188ed7686d1b346861c6c247cf9e985b0eb63c8b0b57a94705a43f107c7b37764143fa2f
-
Filesize
530KB
MD5c38ea33b6ee610fe2eb4f1924258028a
SHA12424c95c2e27434aeba0956dfa8a79ff0fdd68f2
SHA256c318fdf95b0677f21f961bd30522e1d72fbfe941773391c7f6d49b555a6ea261
SHA512017391789b782ae59df3d8bcf3015f13a0a0e637ed350c161074e39c188ed7686d1b346861c6c247cf9e985b0eb63c8b0b57a94705a43f107c7b37764143fa2f
-
Filesize
530KB
MD5c38ea33b6ee610fe2eb4f1924258028a
SHA12424c95c2e27434aeba0956dfa8a79ff0fdd68f2
SHA256c318fdf95b0677f21f961bd30522e1d72fbfe941773391c7f6d49b555a6ea261
SHA512017391789b782ae59df3d8bcf3015f13a0a0e637ed350c161074e39c188ed7686d1b346861c6c247cf9e985b0eb63c8b0b57a94705a43f107c7b37764143fa2f
-
Filesize
168KB
MD5f3ddb3e7e2d5d2c8335f02182f558258
SHA1dada57acc3eee8dfc4642154d21fc7d3dd0ab593
SHA2566571ee0a7d389f3ae154ce54713ed56fc21795b70e5a788de31445a0e67235de
SHA512a6c5d227b32fb42a67f8b7a0b7238032e01cef956b07fcf0898ce6f04c21b91710ffbd84b6823aeefd265a683564f608d37ebeccf0f20e3bb6e071818e7b737d
-
Filesize
168KB
MD5f3ddb3e7e2d5d2c8335f02182f558258
SHA1dada57acc3eee8dfc4642154d21fc7d3dd0ab593
SHA2566571ee0a7d389f3ae154ce54713ed56fc21795b70e5a788de31445a0e67235de
SHA512a6c5d227b32fb42a67f8b7a0b7238032e01cef956b07fcf0898ce6f04c21b91710ffbd84b6823aeefd265a683564f608d37ebeccf0f20e3bb6e071818e7b737d
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
589KB
MD541dda4005e27a08cb3dd61caf6fcb0ee
SHA13acef2fc98a54f05bdf631a184273be7c23324e4
SHA2567d9b89bd0914d5bf893e0ec10acf678a09b5def77b950ad52bff007ee903f1ee
SHA512cb56d4f4d20483024624168fbe9222f90a957a9056a51f3f98e3a248aac55498e76517779b1fc883c5f7d6727260ffa3841a7394e6b2aa2a5080c10bd9d967e5
-
Filesize
589KB
MD541dda4005e27a08cb3dd61caf6fcb0ee
SHA13acef2fc98a54f05bdf631a184273be7c23324e4
SHA2567d9b89bd0914d5bf893e0ec10acf678a09b5def77b950ad52bff007ee903f1ee
SHA512cb56d4f4d20483024624168fbe9222f90a957a9056a51f3f98e3a248aac55498e76517779b1fc883c5f7d6727260ffa3841a7394e6b2aa2a5080c10bd9d967e5
-
Filesize
530KB
MD5c38ea33b6ee610fe2eb4f1924258028a
SHA12424c95c2e27434aeba0956dfa8a79ff0fdd68f2
SHA256c318fdf95b0677f21f961bd30522e1d72fbfe941773391c7f6d49b555a6ea261
SHA512017391789b782ae59df3d8bcf3015f13a0a0e637ed350c161074e39c188ed7686d1b346861c6c247cf9e985b0eb63c8b0b57a94705a43f107c7b37764143fa2f
-
Filesize
530KB
MD5c38ea33b6ee610fe2eb4f1924258028a
SHA12424c95c2e27434aeba0956dfa8a79ff0fdd68f2
SHA256c318fdf95b0677f21f961bd30522e1d72fbfe941773391c7f6d49b555a6ea261
SHA512017391789b782ae59df3d8bcf3015f13a0a0e637ed350c161074e39c188ed7686d1b346861c6c247cf9e985b0eb63c8b0b57a94705a43f107c7b37764143fa2f
-
Filesize
530KB
MD5c38ea33b6ee610fe2eb4f1924258028a
SHA12424c95c2e27434aeba0956dfa8a79ff0fdd68f2
SHA256c318fdf95b0677f21f961bd30522e1d72fbfe941773391c7f6d49b555a6ea261
SHA512017391789b782ae59df3d8bcf3015f13a0a0e637ed350c161074e39c188ed7686d1b346861c6c247cf9e985b0eb63c8b0b57a94705a43f107c7b37764143fa2f
-
Filesize
168KB
MD5f3ddb3e7e2d5d2c8335f02182f558258
SHA1dada57acc3eee8dfc4642154d21fc7d3dd0ab593
SHA2566571ee0a7d389f3ae154ce54713ed56fc21795b70e5a788de31445a0e67235de
SHA512a6c5d227b32fb42a67f8b7a0b7238032e01cef956b07fcf0898ce6f04c21b91710ffbd84b6823aeefd265a683564f608d37ebeccf0f20e3bb6e071818e7b737d
-
Filesize
168KB
MD5f3ddb3e7e2d5d2c8335f02182f558258
SHA1dada57acc3eee8dfc4642154d21fc7d3dd0ab593
SHA2566571ee0a7d389f3ae154ce54713ed56fc21795b70e5a788de31445a0e67235de
SHA512a6c5d227b32fb42a67f8b7a0b7238032e01cef956b07fcf0898ce6f04c21b91710ffbd84b6823aeefd265a683564f608d37ebeccf0f20e3bb6e071818e7b737d
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf