Analysis
-
max time kernel
175s -
max time network
210s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 22:18
Static task
static1
Behavioral task
behavioral1
Sample
66cd9a81bd6bf52e972426659e5f639380ad67d01b2e2bef6ef7a25616a23e96.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
66cd9a81bd6bf52e972426659e5f639380ad67d01b2e2bef6ef7a25616a23e96.exe
Resource
win10v2004-20230220-en
General
-
Target
66cd9a81bd6bf52e972426659e5f639380ad67d01b2e2bef6ef7a25616a23e96.exe
-
Size
642KB
-
MD5
132f1f66a9ad40e725a298dfaa0d98cd
-
SHA1
9c432aa16a648795ece63456fe2dc493a5d2a759
-
SHA256
66cd9a81bd6bf52e972426659e5f639380ad67d01b2e2bef6ef7a25616a23e96
-
SHA512
7a866160c3364871baec5cd544a0831b24757125ffb1d203550290443753ba82a2a751c917b5377a814efe5a5a6fdf8b83033725da51dac174386bf61da652bc
-
SSDEEP
12288:4MrLy90DFr72FdV8HIgPhZsnP8qqYVO1mkNucbzuOpxhNbpj7gO:DyW/2CIOUnP8aV/k9mOpxzbFgO
Malware Config
Extracted
redline
darm
217.196.96.56:4138
-
auth_value
d88ac8ccc04ab9979b04b46313db1648
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 2 IoCs
pid Process 808 x9252102.exe 672 g7496243.exe -
Loads dropped DLL 4 IoCs
pid Process 1732 66cd9a81bd6bf52e972426659e5f639380ad67d01b2e2bef6ef7a25616a23e96.exe 808 x9252102.exe 808 x9252102.exe 672 g7496243.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 66cd9a81bd6bf52e972426659e5f639380ad67d01b2e2bef6ef7a25616a23e96.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 66cd9a81bd6bf52e972426659e5f639380ad67d01b2e2bef6ef7a25616a23e96.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce x9252102.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x9252102.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1732 wrote to memory of 808 1732 66cd9a81bd6bf52e972426659e5f639380ad67d01b2e2bef6ef7a25616a23e96.exe 28 PID 1732 wrote to memory of 808 1732 66cd9a81bd6bf52e972426659e5f639380ad67d01b2e2bef6ef7a25616a23e96.exe 28 PID 1732 wrote to memory of 808 1732 66cd9a81bd6bf52e972426659e5f639380ad67d01b2e2bef6ef7a25616a23e96.exe 28 PID 1732 wrote to memory of 808 1732 66cd9a81bd6bf52e972426659e5f639380ad67d01b2e2bef6ef7a25616a23e96.exe 28 PID 1732 wrote to memory of 808 1732 66cd9a81bd6bf52e972426659e5f639380ad67d01b2e2bef6ef7a25616a23e96.exe 28 PID 1732 wrote to memory of 808 1732 66cd9a81bd6bf52e972426659e5f639380ad67d01b2e2bef6ef7a25616a23e96.exe 28 PID 1732 wrote to memory of 808 1732 66cd9a81bd6bf52e972426659e5f639380ad67d01b2e2bef6ef7a25616a23e96.exe 28 PID 808 wrote to memory of 672 808 x9252102.exe 29 PID 808 wrote to memory of 672 808 x9252102.exe 29 PID 808 wrote to memory of 672 808 x9252102.exe 29 PID 808 wrote to memory of 672 808 x9252102.exe 29 PID 808 wrote to memory of 672 808 x9252102.exe 29 PID 808 wrote to memory of 672 808 x9252102.exe 29 PID 808 wrote to memory of 672 808 x9252102.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\66cd9a81bd6bf52e972426659e5f639380ad67d01b2e2bef6ef7a25616a23e96.exe"C:\Users\Admin\AppData\Local\Temp\66cd9a81bd6bf52e972426659e5f639380ad67d01b2e2bef6ef7a25616a23e96.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9252102.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9252102.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7496243.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7496243.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:672
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
383KB
MD5bf741a5bee2754e4c0319b941b4c2ed6
SHA19342fac83c75dc5038438e2f5bd35d73900bb87a
SHA2568f6a938518f684666f1692adaf02f1a7e68c000bd24e9b9e2eb44330ee91496f
SHA512fa808d814509112b7d14fab787df57a9eef1a01ae6587ec62a3cc7a430e6d8f36ee3088e08a0c231d55b18bb0665937a707b35469cd58d80fb6068ad84384b6f
-
Filesize
383KB
MD5bf741a5bee2754e4c0319b941b4c2ed6
SHA19342fac83c75dc5038438e2f5bd35d73900bb87a
SHA2568f6a938518f684666f1692adaf02f1a7e68c000bd24e9b9e2eb44330ee91496f
SHA512fa808d814509112b7d14fab787df57a9eef1a01ae6587ec62a3cc7a430e6d8f36ee3088e08a0c231d55b18bb0665937a707b35469cd58d80fb6068ad84384b6f
-
Filesize
168KB
MD5fc6cde39444c185caf24e4ede8d4fe6b
SHA1cf2f56bb0d096edc9f8bda4070b23827f0e6ae0e
SHA2567c07cd13d09bfeecb330539e167728438420acd2ae976c7b706e82ef5eff0a2f
SHA5128ec5480207f3f8e72ab796da948234ea5240b46c9cb2c18addd4d8b8e27c50340ab9a06cfdd0f2f6e1eca5171ffcb5ebb1dd3fcc42ea5a9d7a04790c9eda39f0
-
Filesize
168KB
MD5fc6cde39444c185caf24e4ede8d4fe6b
SHA1cf2f56bb0d096edc9f8bda4070b23827f0e6ae0e
SHA2567c07cd13d09bfeecb330539e167728438420acd2ae976c7b706e82ef5eff0a2f
SHA5128ec5480207f3f8e72ab796da948234ea5240b46c9cb2c18addd4d8b8e27c50340ab9a06cfdd0f2f6e1eca5171ffcb5ebb1dd3fcc42ea5a9d7a04790c9eda39f0
-
Filesize
383KB
MD5bf741a5bee2754e4c0319b941b4c2ed6
SHA19342fac83c75dc5038438e2f5bd35d73900bb87a
SHA2568f6a938518f684666f1692adaf02f1a7e68c000bd24e9b9e2eb44330ee91496f
SHA512fa808d814509112b7d14fab787df57a9eef1a01ae6587ec62a3cc7a430e6d8f36ee3088e08a0c231d55b18bb0665937a707b35469cd58d80fb6068ad84384b6f
-
Filesize
383KB
MD5bf741a5bee2754e4c0319b941b4c2ed6
SHA19342fac83c75dc5038438e2f5bd35d73900bb87a
SHA2568f6a938518f684666f1692adaf02f1a7e68c000bd24e9b9e2eb44330ee91496f
SHA512fa808d814509112b7d14fab787df57a9eef1a01ae6587ec62a3cc7a430e6d8f36ee3088e08a0c231d55b18bb0665937a707b35469cd58d80fb6068ad84384b6f
-
Filesize
168KB
MD5fc6cde39444c185caf24e4ede8d4fe6b
SHA1cf2f56bb0d096edc9f8bda4070b23827f0e6ae0e
SHA2567c07cd13d09bfeecb330539e167728438420acd2ae976c7b706e82ef5eff0a2f
SHA5128ec5480207f3f8e72ab796da948234ea5240b46c9cb2c18addd4d8b8e27c50340ab9a06cfdd0f2f6e1eca5171ffcb5ebb1dd3fcc42ea5a9d7a04790c9eda39f0
-
Filesize
168KB
MD5fc6cde39444c185caf24e4ede8d4fe6b
SHA1cf2f56bb0d096edc9f8bda4070b23827f0e6ae0e
SHA2567c07cd13d09bfeecb330539e167728438420acd2ae976c7b706e82ef5eff0a2f
SHA5128ec5480207f3f8e72ab796da948234ea5240b46c9cb2c18addd4d8b8e27c50340ab9a06cfdd0f2f6e1eca5171ffcb5ebb1dd3fcc42ea5a9d7a04790c9eda39f0