Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06-05-2023 21:26
Static task
static1
Behavioral task
behavioral1
Sample
3bb184eafaf18df62f5a3c5248ff17debba1d21703e45ca68441746b302aeca6.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3bb184eafaf18df62f5a3c5248ff17debba1d21703e45ca68441746b302aeca6.exe
Resource
win10v2004-20230220-en
General
-
Target
3bb184eafaf18df62f5a3c5248ff17debba1d21703e45ca68441746b302aeca6.exe
-
Size
1.2MB
-
MD5
f88e03d7f439ee7cf4e3bad75d66ac03
-
SHA1
fc6363dcee15a103c451af247691e4318eb34843
-
SHA256
3bb184eafaf18df62f5a3c5248ff17debba1d21703e45ca68441746b302aeca6
-
SHA512
1463a93c9b522f8a0bdc69a45564618bd405b83cc90cce545d8fb3bfc7800acfd2df56e31a535af206a4e2fcc3fe8fbb0e59648ba05a3ebf80ef59cc67caf1a5
-
SSDEEP
24576:ByignTXyHHXmzoc/S42KImH/CEfDnRJ+9siJwzjKdITb3yq:0igoAH/S4dNKQjv1iJUKd2bi
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
z33372511.exez60849953.exez89754360.exes64102883.exe1.exet33133724.exepid process 1688 z33372511.exe 2032 z60849953.exe 472 z89754360.exe 1628 s64102883.exe 1848 1.exe 1364 t33133724.exe -
Loads dropped DLL 13 IoCs
Processes:
3bb184eafaf18df62f5a3c5248ff17debba1d21703e45ca68441746b302aeca6.exez33372511.exez60849953.exez89754360.exes64102883.exe1.exet33133724.exepid process 1424 3bb184eafaf18df62f5a3c5248ff17debba1d21703e45ca68441746b302aeca6.exe 1688 z33372511.exe 1688 z33372511.exe 2032 z60849953.exe 2032 z60849953.exe 472 z89754360.exe 472 z89754360.exe 472 z89754360.exe 1628 s64102883.exe 1628 s64102883.exe 1848 1.exe 472 z89754360.exe 1364 t33133724.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
z33372511.exez60849953.exez89754360.exe3bb184eafaf18df62f5a3c5248ff17debba1d21703e45ca68441746b302aeca6.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z33372511.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z33372511.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z60849953.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z60849953.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z89754360.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z89754360.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3bb184eafaf18df62f5a3c5248ff17debba1d21703e45ca68441746b302aeca6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3bb184eafaf18df62f5a3c5248ff17debba1d21703e45ca68441746b302aeca6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
s64102883.exedescription pid process Token: SeDebugPrivilege 1628 s64102883.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
3bb184eafaf18df62f5a3c5248ff17debba1d21703e45ca68441746b302aeca6.exez33372511.exez60849953.exez89754360.exes64102883.exedescription pid process target process PID 1424 wrote to memory of 1688 1424 3bb184eafaf18df62f5a3c5248ff17debba1d21703e45ca68441746b302aeca6.exe z33372511.exe PID 1424 wrote to memory of 1688 1424 3bb184eafaf18df62f5a3c5248ff17debba1d21703e45ca68441746b302aeca6.exe z33372511.exe PID 1424 wrote to memory of 1688 1424 3bb184eafaf18df62f5a3c5248ff17debba1d21703e45ca68441746b302aeca6.exe z33372511.exe PID 1424 wrote to memory of 1688 1424 3bb184eafaf18df62f5a3c5248ff17debba1d21703e45ca68441746b302aeca6.exe z33372511.exe PID 1424 wrote to memory of 1688 1424 3bb184eafaf18df62f5a3c5248ff17debba1d21703e45ca68441746b302aeca6.exe z33372511.exe PID 1424 wrote to memory of 1688 1424 3bb184eafaf18df62f5a3c5248ff17debba1d21703e45ca68441746b302aeca6.exe z33372511.exe PID 1424 wrote to memory of 1688 1424 3bb184eafaf18df62f5a3c5248ff17debba1d21703e45ca68441746b302aeca6.exe z33372511.exe PID 1688 wrote to memory of 2032 1688 z33372511.exe z60849953.exe PID 1688 wrote to memory of 2032 1688 z33372511.exe z60849953.exe PID 1688 wrote to memory of 2032 1688 z33372511.exe z60849953.exe PID 1688 wrote to memory of 2032 1688 z33372511.exe z60849953.exe PID 1688 wrote to memory of 2032 1688 z33372511.exe z60849953.exe PID 1688 wrote to memory of 2032 1688 z33372511.exe z60849953.exe PID 1688 wrote to memory of 2032 1688 z33372511.exe z60849953.exe PID 2032 wrote to memory of 472 2032 z60849953.exe z89754360.exe PID 2032 wrote to memory of 472 2032 z60849953.exe z89754360.exe PID 2032 wrote to memory of 472 2032 z60849953.exe z89754360.exe PID 2032 wrote to memory of 472 2032 z60849953.exe z89754360.exe PID 2032 wrote to memory of 472 2032 z60849953.exe z89754360.exe PID 2032 wrote to memory of 472 2032 z60849953.exe z89754360.exe PID 2032 wrote to memory of 472 2032 z60849953.exe z89754360.exe PID 472 wrote to memory of 1628 472 z89754360.exe s64102883.exe PID 472 wrote to memory of 1628 472 z89754360.exe s64102883.exe PID 472 wrote to memory of 1628 472 z89754360.exe s64102883.exe PID 472 wrote to memory of 1628 472 z89754360.exe s64102883.exe PID 472 wrote to memory of 1628 472 z89754360.exe s64102883.exe PID 472 wrote to memory of 1628 472 z89754360.exe s64102883.exe PID 472 wrote to memory of 1628 472 z89754360.exe s64102883.exe PID 1628 wrote to memory of 1848 1628 s64102883.exe 1.exe PID 1628 wrote to memory of 1848 1628 s64102883.exe 1.exe PID 1628 wrote to memory of 1848 1628 s64102883.exe 1.exe PID 1628 wrote to memory of 1848 1628 s64102883.exe 1.exe PID 1628 wrote to memory of 1848 1628 s64102883.exe 1.exe PID 1628 wrote to memory of 1848 1628 s64102883.exe 1.exe PID 1628 wrote to memory of 1848 1628 s64102883.exe 1.exe PID 472 wrote to memory of 1364 472 z89754360.exe t33133724.exe PID 472 wrote to memory of 1364 472 z89754360.exe t33133724.exe PID 472 wrote to memory of 1364 472 z89754360.exe t33133724.exe PID 472 wrote to memory of 1364 472 z89754360.exe t33133724.exe PID 472 wrote to memory of 1364 472 z89754360.exe t33133724.exe PID 472 wrote to memory of 1364 472 z89754360.exe t33133724.exe PID 472 wrote to memory of 1364 472 z89754360.exe t33133724.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3bb184eafaf18df62f5a3c5248ff17debba1d21703e45ca68441746b302aeca6.exe"C:\Users\Admin\AppData\Local\Temp\3bb184eafaf18df62f5a3c5248ff17debba1d21703e45ca68441746b302aeca6.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z33372511.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z33372511.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z60849953.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z60849953.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z89754360.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z89754360.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s64102883.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s64102883.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1848
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t33133724.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t33133724.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1364
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD57895df1d991d14ee4023533a2cc0dfaa
SHA14364523c29e8d219e0446e4ae90e83da9a6e13d1
SHA2567dbc3c54f4291eaecd2076855b2c11cf656c07012056953b614bd2d88067079b
SHA5124eb530a4f04565e8eb312c3fd496e637f85a752b6c8de9f5aaa8bef3eeb44bde075aaf637c2a83daced71fc3ddcbe8f70459d666dd30a79c0d9d3454c0e53c03
-
Filesize
1.0MB
MD57895df1d991d14ee4023533a2cc0dfaa
SHA14364523c29e8d219e0446e4ae90e83da9a6e13d1
SHA2567dbc3c54f4291eaecd2076855b2c11cf656c07012056953b614bd2d88067079b
SHA5124eb530a4f04565e8eb312c3fd496e637f85a752b6c8de9f5aaa8bef3eeb44bde075aaf637c2a83daced71fc3ddcbe8f70459d666dd30a79c0d9d3454c0e53c03
-
Filesize
760KB
MD595fe7e298713afdb3aa9ecf21a9ebe7a
SHA1aaa8a725321ce113fc963abd4aea89c826a7129f
SHA2560ed06895e72ae5c05756e93293290f1575c6a68d2fe7852d210bbcc1c04644e2
SHA512f97e649efbfbd4af8ba06ba7d0c6096fccea9ffcec6cea911abc765233d2598d44367e21eff6c4e1aed836eb40acdd72327cc5160ed12b82017f24c3447fce72
-
Filesize
760KB
MD595fe7e298713afdb3aa9ecf21a9ebe7a
SHA1aaa8a725321ce113fc963abd4aea89c826a7129f
SHA2560ed06895e72ae5c05756e93293290f1575c6a68d2fe7852d210bbcc1c04644e2
SHA512f97e649efbfbd4af8ba06ba7d0c6096fccea9ffcec6cea911abc765233d2598d44367e21eff6c4e1aed836eb40acdd72327cc5160ed12b82017f24c3447fce72
-
Filesize
577KB
MD52dbe2f256f435beb799061f5e5ee72c3
SHA153e66bf4d979d9669588d4e14116e5004644454d
SHA2560546767f535588fd601d0d1a989b2d71c609a833ddebfbce3cb2ed9254dd6dff
SHA51256f9c069839ded6d5d2afdc8c4bc459f0d33c09ff56bad8300c02338ecc251151bd99a38336f461d5375972d6b485e281d8f15f5f5dafd7aff1ca232d644756a
-
Filesize
577KB
MD52dbe2f256f435beb799061f5e5ee72c3
SHA153e66bf4d979d9669588d4e14116e5004644454d
SHA2560546767f535588fd601d0d1a989b2d71c609a833ddebfbce3cb2ed9254dd6dff
SHA51256f9c069839ded6d5d2afdc8c4bc459f0d33c09ff56bad8300c02338ecc251151bd99a38336f461d5375972d6b485e281d8f15f5f5dafd7aff1ca232d644756a
-
Filesize
574KB
MD53d66870e8c7b63d94eb46f1849bcb3c2
SHA14042698ad3111e394489bb16cf2abf218fb954ba
SHA256eddbade494a696953f4e3b818915719e417d777e386a8d63b61ae05bba81d2d8
SHA5123297b29f25b1fd57391befc6f3505521bf6493f4a07fdda10ff85a02a58c22bfe05b813170df9aab0582fd6391b7cf1703bb22ca56a4239a73934e38c06ce5dd
-
Filesize
574KB
MD53d66870e8c7b63d94eb46f1849bcb3c2
SHA14042698ad3111e394489bb16cf2abf218fb954ba
SHA256eddbade494a696953f4e3b818915719e417d777e386a8d63b61ae05bba81d2d8
SHA5123297b29f25b1fd57391befc6f3505521bf6493f4a07fdda10ff85a02a58c22bfe05b813170df9aab0582fd6391b7cf1703bb22ca56a4239a73934e38c06ce5dd
-
Filesize
574KB
MD53d66870e8c7b63d94eb46f1849bcb3c2
SHA14042698ad3111e394489bb16cf2abf218fb954ba
SHA256eddbade494a696953f4e3b818915719e417d777e386a8d63b61ae05bba81d2d8
SHA5123297b29f25b1fd57391befc6f3505521bf6493f4a07fdda10ff85a02a58c22bfe05b813170df9aab0582fd6391b7cf1703bb22ca56a4239a73934e38c06ce5dd
-
Filesize
169KB
MD500c15f652158fe2f52151aaa36a66f1d
SHA16bc83659c162d28402d666d51a7f46a279e08161
SHA25607a425dafb0ba17a9ec6e5a2893503b24d06e907e0fdd851a9924dedc8f792b2
SHA512f1948c07276740f667ed146b9a4a8ad1913c4ef334fe2120fca860b08c25ff82a72412e67cf402fc73144587dd599446a00e6acec4374f56551a29c0239b94d9
-
Filesize
169KB
MD500c15f652158fe2f52151aaa36a66f1d
SHA16bc83659c162d28402d666d51a7f46a279e08161
SHA25607a425dafb0ba17a9ec6e5a2893503b24d06e907e0fdd851a9924dedc8f792b2
SHA512f1948c07276740f667ed146b9a4a8ad1913c4ef334fe2120fca860b08c25ff82a72412e67cf402fc73144587dd599446a00e6acec4374f56551a29c0239b94d9
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
1.0MB
MD57895df1d991d14ee4023533a2cc0dfaa
SHA14364523c29e8d219e0446e4ae90e83da9a6e13d1
SHA2567dbc3c54f4291eaecd2076855b2c11cf656c07012056953b614bd2d88067079b
SHA5124eb530a4f04565e8eb312c3fd496e637f85a752b6c8de9f5aaa8bef3eeb44bde075aaf637c2a83daced71fc3ddcbe8f70459d666dd30a79c0d9d3454c0e53c03
-
Filesize
1.0MB
MD57895df1d991d14ee4023533a2cc0dfaa
SHA14364523c29e8d219e0446e4ae90e83da9a6e13d1
SHA2567dbc3c54f4291eaecd2076855b2c11cf656c07012056953b614bd2d88067079b
SHA5124eb530a4f04565e8eb312c3fd496e637f85a752b6c8de9f5aaa8bef3eeb44bde075aaf637c2a83daced71fc3ddcbe8f70459d666dd30a79c0d9d3454c0e53c03
-
Filesize
760KB
MD595fe7e298713afdb3aa9ecf21a9ebe7a
SHA1aaa8a725321ce113fc963abd4aea89c826a7129f
SHA2560ed06895e72ae5c05756e93293290f1575c6a68d2fe7852d210bbcc1c04644e2
SHA512f97e649efbfbd4af8ba06ba7d0c6096fccea9ffcec6cea911abc765233d2598d44367e21eff6c4e1aed836eb40acdd72327cc5160ed12b82017f24c3447fce72
-
Filesize
760KB
MD595fe7e298713afdb3aa9ecf21a9ebe7a
SHA1aaa8a725321ce113fc963abd4aea89c826a7129f
SHA2560ed06895e72ae5c05756e93293290f1575c6a68d2fe7852d210bbcc1c04644e2
SHA512f97e649efbfbd4af8ba06ba7d0c6096fccea9ffcec6cea911abc765233d2598d44367e21eff6c4e1aed836eb40acdd72327cc5160ed12b82017f24c3447fce72
-
Filesize
577KB
MD52dbe2f256f435beb799061f5e5ee72c3
SHA153e66bf4d979d9669588d4e14116e5004644454d
SHA2560546767f535588fd601d0d1a989b2d71c609a833ddebfbce3cb2ed9254dd6dff
SHA51256f9c069839ded6d5d2afdc8c4bc459f0d33c09ff56bad8300c02338ecc251151bd99a38336f461d5375972d6b485e281d8f15f5f5dafd7aff1ca232d644756a
-
Filesize
577KB
MD52dbe2f256f435beb799061f5e5ee72c3
SHA153e66bf4d979d9669588d4e14116e5004644454d
SHA2560546767f535588fd601d0d1a989b2d71c609a833ddebfbce3cb2ed9254dd6dff
SHA51256f9c069839ded6d5d2afdc8c4bc459f0d33c09ff56bad8300c02338ecc251151bd99a38336f461d5375972d6b485e281d8f15f5f5dafd7aff1ca232d644756a
-
Filesize
574KB
MD53d66870e8c7b63d94eb46f1849bcb3c2
SHA14042698ad3111e394489bb16cf2abf218fb954ba
SHA256eddbade494a696953f4e3b818915719e417d777e386a8d63b61ae05bba81d2d8
SHA5123297b29f25b1fd57391befc6f3505521bf6493f4a07fdda10ff85a02a58c22bfe05b813170df9aab0582fd6391b7cf1703bb22ca56a4239a73934e38c06ce5dd
-
Filesize
574KB
MD53d66870e8c7b63d94eb46f1849bcb3c2
SHA14042698ad3111e394489bb16cf2abf218fb954ba
SHA256eddbade494a696953f4e3b818915719e417d777e386a8d63b61ae05bba81d2d8
SHA5123297b29f25b1fd57391befc6f3505521bf6493f4a07fdda10ff85a02a58c22bfe05b813170df9aab0582fd6391b7cf1703bb22ca56a4239a73934e38c06ce5dd
-
Filesize
574KB
MD53d66870e8c7b63d94eb46f1849bcb3c2
SHA14042698ad3111e394489bb16cf2abf218fb954ba
SHA256eddbade494a696953f4e3b818915719e417d777e386a8d63b61ae05bba81d2d8
SHA5123297b29f25b1fd57391befc6f3505521bf6493f4a07fdda10ff85a02a58c22bfe05b813170df9aab0582fd6391b7cf1703bb22ca56a4239a73934e38c06ce5dd
-
Filesize
169KB
MD500c15f652158fe2f52151aaa36a66f1d
SHA16bc83659c162d28402d666d51a7f46a279e08161
SHA25607a425dafb0ba17a9ec6e5a2893503b24d06e907e0fdd851a9924dedc8f792b2
SHA512f1948c07276740f667ed146b9a4a8ad1913c4ef334fe2120fca860b08c25ff82a72412e67cf402fc73144587dd599446a00e6acec4374f56551a29c0239b94d9
-
Filesize
169KB
MD500c15f652158fe2f52151aaa36a66f1d
SHA16bc83659c162d28402d666d51a7f46a279e08161
SHA25607a425dafb0ba17a9ec6e5a2893503b24d06e907e0fdd851a9924dedc8f792b2
SHA512f1948c07276740f667ed146b9a4a8ad1913c4ef334fe2120fca860b08c25ff82a72412e67cf402fc73144587dd599446a00e6acec4374f56551a29c0239b94d9
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf