Analysis
-
max time kernel
157s -
max time network
198s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06-05-2023 21:41
Static task
static1
Behavioral task
behavioral1
Sample
48502d871b14a575a961ec417407b2e55aadb2f5b0af0d214be7e57f3ada0609.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
48502d871b14a575a961ec417407b2e55aadb2f5b0af0d214be7e57f3ada0609.exe
Resource
win10v2004-20230220-en
General
-
Target
48502d871b14a575a961ec417407b2e55aadb2f5b0af0d214be7e57f3ada0609.exe
-
Size
1.2MB
-
MD5
6f649e371948c8f13ebd2ed3b7cdae04
-
SHA1
9eb9b925a948064f9f04483e9a0db7d1282a2d6b
-
SHA256
48502d871b14a575a961ec417407b2e55aadb2f5b0af0d214be7e57f3ada0609
-
SHA512
2b1581ac09bd31ae1cda266ed41dd945f21f8c8c33865a633f02a97b7806cc10517ef8cfabafdec5d8ed938ca5c78df5a4b5ba68942406a97b9dd6ccb2016ea7
-
SSDEEP
24576:UyTeP6Ep8pKRxvVw++h4Jpj0IMX4A7Xl5QFOLBNqNLPr6WjkkUWsN:jTZEupKJ+iohXnzQFOLTqNLPr6WgkUWs
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
z27893271.exez19811102.exez87342169.exes75560189.exe1.exet24344877.exepid process 884 z27893271.exe 628 z19811102.exe 1844 z87342169.exe 1284 s75560189.exe 436 1.exe 1624 t24344877.exe -
Loads dropped DLL 13 IoCs
Processes:
48502d871b14a575a961ec417407b2e55aadb2f5b0af0d214be7e57f3ada0609.exez27893271.exez19811102.exez87342169.exes75560189.exe1.exet24344877.exepid process 916 48502d871b14a575a961ec417407b2e55aadb2f5b0af0d214be7e57f3ada0609.exe 884 z27893271.exe 884 z27893271.exe 628 z19811102.exe 628 z19811102.exe 1844 z87342169.exe 1844 z87342169.exe 1844 z87342169.exe 1284 s75560189.exe 1284 s75560189.exe 436 1.exe 1844 z87342169.exe 1624 t24344877.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
z87342169.exe48502d871b14a575a961ec417407b2e55aadb2f5b0af0d214be7e57f3ada0609.exez27893271.exez19811102.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z87342169.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 48502d871b14a575a961ec417407b2e55aadb2f5b0af0d214be7e57f3ada0609.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 48502d871b14a575a961ec417407b2e55aadb2f5b0af0d214be7e57f3ada0609.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z27893271.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z27893271.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z19811102.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z19811102.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z87342169.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
s75560189.exedescription pid process Token: SeDebugPrivilege 1284 s75560189.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
48502d871b14a575a961ec417407b2e55aadb2f5b0af0d214be7e57f3ada0609.exez27893271.exez19811102.exez87342169.exes75560189.exedescription pid process target process PID 916 wrote to memory of 884 916 48502d871b14a575a961ec417407b2e55aadb2f5b0af0d214be7e57f3ada0609.exe z27893271.exe PID 916 wrote to memory of 884 916 48502d871b14a575a961ec417407b2e55aadb2f5b0af0d214be7e57f3ada0609.exe z27893271.exe PID 916 wrote to memory of 884 916 48502d871b14a575a961ec417407b2e55aadb2f5b0af0d214be7e57f3ada0609.exe z27893271.exe PID 916 wrote to memory of 884 916 48502d871b14a575a961ec417407b2e55aadb2f5b0af0d214be7e57f3ada0609.exe z27893271.exe PID 916 wrote to memory of 884 916 48502d871b14a575a961ec417407b2e55aadb2f5b0af0d214be7e57f3ada0609.exe z27893271.exe PID 916 wrote to memory of 884 916 48502d871b14a575a961ec417407b2e55aadb2f5b0af0d214be7e57f3ada0609.exe z27893271.exe PID 916 wrote to memory of 884 916 48502d871b14a575a961ec417407b2e55aadb2f5b0af0d214be7e57f3ada0609.exe z27893271.exe PID 884 wrote to memory of 628 884 z27893271.exe z19811102.exe PID 884 wrote to memory of 628 884 z27893271.exe z19811102.exe PID 884 wrote to memory of 628 884 z27893271.exe z19811102.exe PID 884 wrote to memory of 628 884 z27893271.exe z19811102.exe PID 884 wrote to memory of 628 884 z27893271.exe z19811102.exe PID 884 wrote to memory of 628 884 z27893271.exe z19811102.exe PID 884 wrote to memory of 628 884 z27893271.exe z19811102.exe PID 628 wrote to memory of 1844 628 z19811102.exe z87342169.exe PID 628 wrote to memory of 1844 628 z19811102.exe z87342169.exe PID 628 wrote to memory of 1844 628 z19811102.exe z87342169.exe PID 628 wrote to memory of 1844 628 z19811102.exe z87342169.exe PID 628 wrote to memory of 1844 628 z19811102.exe z87342169.exe PID 628 wrote to memory of 1844 628 z19811102.exe z87342169.exe PID 628 wrote to memory of 1844 628 z19811102.exe z87342169.exe PID 1844 wrote to memory of 1284 1844 z87342169.exe s75560189.exe PID 1844 wrote to memory of 1284 1844 z87342169.exe s75560189.exe PID 1844 wrote to memory of 1284 1844 z87342169.exe s75560189.exe PID 1844 wrote to memory of 1284 1844 z87342169.exe s75560189.exe PID 1844 wrote to memory of 1284 1844 z87342169.exe s75560189.exe PID 1844 wrote to memory of 1284 1844 z87342169.exe s75560189.exe PID 1844 wrote to memory of 1284 1844 z87342169.exe s75560189.exe PID 1284 wrote to memory of 436 1284 s75560189.exe 1.exe PID 1284 wrote to memory of 436 1284 s75560189.exe 1.exe PID 1284 wrote to memory of 436 1284 s75560189.exe 1.exe PID 1284 wrote to memory of 436 1284 s75560189.exe 1.exe PID 1284 wrote to memory of 436 1284 s75560189.exe 1.exe PID 1284 wrote to memory of 436 1284 s75560189.exe 1.exe PID 1284 wrote to memory of 436 1284 s75560189.exe 1.exe PID 1844 wrote to memory of 1624 1844 z87342169.exe t24344877.exe PID 1844 wrote to memory of 1624 1844 z87342169.exe t24344877.exe PID 1844 wrote to memory of 1624 1844 z87342169.exe t24344877.exe PID 1844 wrote to memory of 1624 1844 z87342169.exe t24344877.exe PID 1844 wrote to memory of 1624 1844 z87342169.exe t24344877.exe PID 1844 wrote to memory of 1624 1844 z87342169.exe t24344877.exe PID 1844 wrote to memory of 1624 1844 z87342169.exe t24344877.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\48502d871b14a575a961ec417407b2e55aadb2f5b0af0d214be7e57f3ada0609.exe"C:\Users\Admin\AppData\Local\Temp\48502d871b14a575a961ec417407b2e55aadb2f5b0af0d214be7e57f3ada0609.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z27893271.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z27893271.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z19811102.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z19811102.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z87342169.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z87342169.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s75560189.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s75560189.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:436
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t24344877.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t24344877.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1624
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD588ed0d2949fd76fa9c6a081906cb5146
SHA1d79c2e023faf8f9962bea49d1ceedeec439c04f8
SHA25666bbdd13c1de1e964cde9286302ad9a93ce9d4013189c3b2893558effa462f3a
SHA5128a8bfa8541f1aa21395944ce81b23d3689ddc41f27f7fd47cc5f04c8051d07a919609292cc3e721c263dc26d781331110560bec0d15b8105f2926f0f60a1b898
-
Filesize
1.0MB
MD588ed0d2949fd76fa9c6a081906cb5146
SHA1d79c2e023faf8f9962bea49d1ceedeec439c04f8
SHA25666bbdd13c1de1e964cde9286302ad9a93ce9d4013189c3b2893558effa462f3a
SHA5128a8bfa8541f1aa21395944ce81b23d3689ddc41f27f7fd47cc5f04c8051d07a919609292cc3e721c263dc26d781331110560bec0d15b8105f2926f0f60a1b898
-
Filesize
764KB
MD55b8e3a8d764d3629265577366fa9eb28
SHA19ac7b99c1b73cdfeac98df43a4848b53c81a666e
SHA256861cf4e5ed7f7e8fafcdfe5b63a5213fc4293de898d34b3a8ef3adf50584b40a
SHA5120f867e0523e1b510f0e21848469ca6141ee548c5b4f9fa7aa68f006200f534cebc4898bffd4604c4d73840247824fe93736431936c870302f664cbc8a6951a96
-
Filesize
764KB
MD55b8e3a8d764d3629265577366fa9eb28
SHA19ac7b99c1b73cdfeac98df43a4848b53c81a666e
SHA256861cf4e5ed7f7e8fafcdfe5b63a5213fc4293de898d34b3a8ef3adf50584b40a
SHA5120f867e0523e1b510f0e21848469ca6141ee548c5b4f9fa7aa68f006200f534cebc4898bffd4604c4d73840247824fe93736431936c870302f664cbc8a6951a96
-
Filesize
582KB
MD5a86059db89b42bfd21aa7155a943394b
SHA1da9e5235ecc06a55abf8811c4019bd729079312a
SHA256759a20c589917231bbc0b59628649831beafde47ecc6b468a8e7957272c0075c
SHA51249df089859116733b5d09c8c637513b3c4daa88130a65a5833cf55b49c1ab236b831a147c8b03178ae00590b4dc153166923ab9c326f7713bd547e97067e6218
-
Filesize
582KB
MD5a86059db89b42bfd21aa7155a943394b
SHA1da9e5235ecc06a55abf8811c4019bd729079312a
SHA256759a20c589917231bbc0b59628649831beafde47ecc6b468a8e7957272c0075c
SHA51249df089859116733b5d09c8c637513b3c4daa88130a65a5833cf55b49c1ab236b831a147c8b03178ae00590b4dc153166923ab9c326f7713bd547e97067e6218
-
Filesize
582KB
MD528a6c5bb2965de6c05cec6cee16b9ce2
SHA1a1300062a3a86b96d7658e41d10ed6ea5f8cadea
SHA2566f00913d06fecf91ca92442ea347910e3bf2e8544545e2852aa8c436c2e90fe9
SHA5125d089f5bced3668331c5f5570fde456a3b6bf2fadaa0f3e20ddbafe1c111e330b1cb39f847c781650fd1bfe83299522e8af800cc9f84fff24611859ed4685eb4
-
Filesize
582KB
MD528a6c5bb2965de6c05cec6cee16b9ce2
SHA1a1300062a3a86b96d7658e41d10ed6ea5f8cadea
SHA2566f00913d06fecf91ca92442ea347910e3bf2e8544545e2852aa8c436c2e90fe9
SHA5125d089f5bced3668331c5f5570fde456a3b6bf2fadaa0f3e20ddbafe1c111e330b1cb39f847c781650fd1bfe83299522e8af800cc9f84fff24611859ed4685eb4
-
Filesize
582KB
MD528a6c5bb2965de6c05cec6cee16b9ce2
SHA1a1300062a3a86b96d7658e41d10ed6ea5f8cadea
SHA2566f00913d06fecf91ca92442ea347910e3bf2e8544545e2852aa8c436c2e90fe9
SHA5125d089f5bced3668331c5f5570fde456a3b6bf2fadaa0f3e20ddbafe1c111e330b1cb39f847c781650fd1bfe83299522e8af800cc9f84fff24611859ed4685eb4
-
Filesize
169KB
MD520293161205cf24f1bb60d0a1ed59190
SHA11e74b398b71d1c7be3a27726488328fcf3ed52da
SHA2569ea222d9cf4a3f3ec3a573e562932f615811c7ba26c9a07cb8f113b91ff08c42
SHA5128cae4db568ec80ae6b90f72f7c99f6e78760066354c5319f4e08b65c817f31a9a8665bf5b0e8b9ab5fc0cfbbdda1967a1d124a3f089e399c8134662265261a58
-
Filesize
169KB
MD520293161205cf24f1bb60d0a1ed59190
SHA11e74b398b71d1c7be3a27726488328fcf3ed52da
SHA2569ea222d9cf4a3f3ec3a573e562932f615811c7ba26c9a07cb8f113b91ff08c42
SHA5128cae4db568ec80ae6b90f72f7c99f6e78760066354c5319f4e08b65c817f31a9a8665bf5b0e8b9ab5fc0cfbbdda1967a1d124a3f089e399c8134662265261a58
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
1.0MB
MD588ed0d2949fd76fa9c6a081906cb5146
SHA1d79c2e023faf8f9962bea49d1ceedeec439c04f8
SHA25666bbdd13c1de1e964cde9286302ad9a93ce9d4013189c3b2893558effa462f3a
SHA5128a8bfa8541f1aa21395944ce81b23d3689ddc41f27f7fd47cc5f04c8051d07a919609292cc3e721c263dc26d781331110560bec0d15b8105f2926f0f60a1b898
-
Filesize
1.0MB
MD588ed0d2949fd76fa9c6a081906cb5146
SHA1d79c2e023faf8f9962bea49d1ceedeec439c04f8
SHA25666bbdd13c1de1e964cde9286302ad9a93ce9d4013189c3b2893558effa462f3a
SHA5128a8bfa8541f1aa21395944ce81b23d3689ddc41f27f7fd47cc5f04c8051d07a919609292cc3e721c263dc26d781331110560bec0d15b8105f2926f0f60a1b898
-
Filesize
764KB
MD55b8e3a8d764d3629265577366fa9eb28
SHA19ac7b99c1b73cdfeac98df43a4848b53c81a666e
SHA256861cf4e5ed7f7e8fafcdfe5b63a5213fc4293de898d34b3a8ef3adf50584b40a
SHA5120f867e0523e1b510f0e21848469ca6141ee548c5b4f9fa7aa68f006200f534cebc4898bffd4604c4d73840247824fe93736431936c870302f664cbc8a6951a96
-
Filesize
764KB
MD55b8e3a8d764d3629265577366fa9eb28
SHA19ac7b99c1b73cdfeac98df43a4848b53c81a666e
SHA256861cf4e5ed7f7e8fafcdfe5b63a5213fc4293de898d34b3a8ef3adf50584b40a
SHA5120f867e0523e1b510f0e21848469ca6141ee548c5b4f9fa7aa68f006200f534cebc4898bffd4604c4d73840247824fe93736431936c870302f664cbc8a6951a96
-
Filesize
582KB
MD5a86059db89b42bfd21aa7155a943394b
SHA1da9e5235ecc06a55abf8811c4019bd729079312a
SHA256759a20c589917231bbc0b59628649831beafde47ecc6b468a8e7957272c0075c
SHA51249df089859116733b5d09c8c637513b3c4daa88130a65a5833cf55b49c1ab236b831a147c8b03178ae00590b4dc153166923ab9c326f7713bd547e97067e6218
-
Filesize
582KB
MD5a86059db89b42bfd21aa7155a943394b
SHA1da9e5235ecc06a55abf8811c4019bd729079312a
SHA256759a20c589917231bbc0b59628649831beafde47ecc6b468a8e7957272c0075c
SHA51249df089859116733b5d09c8c637513b3c4daa88130a65a5833cf55b49c1ab236b831a147c8b03178ae00590b4dc153166923ab9c326f7713bd547e97067e6218
-
Filesize
582KB
MD528a6c5bb2965de6c05cec6cee16b9ce2
SHA1a1300062a3a86b96d7658e41d10ed6ea5f8cadea
SHA2566f00913d06fecf91ca92442ea347910e3bf2e8544545e2852aa8c436c2e90fe9
SHA5125d089f5bced3668331c5f5570fde456a3b6bf2fadaa0f3e20ddbafe1c111e330b1cb39f847c781650fd1bfe83299522e8af800cc9f84fff24611859ed4685eb4
-
Filesize
582KB
MD528a6c5bb2965de6c05cec6cee16b9ce2
SHA1a1300062a3a86b96d7658e41d10ed6ea5f8cadea
SHA2566f00913d06fecf91ca92442ea347910e3bf2e8544545e2852aa8c436c2e90fe9
SHA5125d089f5bced3668331c5f5570fde456a3b6bf2fadaa0f3e20ddbafe1c111e330b1cb39f847c781650fd1bfe83299522e8af800cc9f84fff24611859ed4685eb4
-
Filesize
582KB
MD528a6c5bb2965de6c05cec6cee16b9ce2
SHA1a1300062a3a86b96d7658e41d10ed6ea5f8cadea
SHA2566f00913d06fecf91ca92442ea347910e3bf2e8544545e2852aa8c436c2e90fe9
SHA5125d089f5bced3668331c5f5570fde456a3b6bf2fadaa0f3e20ddbafe1c111e330b1cb39f847c781650fd1bfe83299522e8af800cc9f84fff24611859ed4685eb4
-
Filesize
169KB
MD520293161205cf24f1bb60d0a1ed59190
SHA11e74b398b71d1c7be3a27726488328fcf3ed52da
SHA2569ea222d9cf4a3f3ec3a573e562932f615811c7ba26c9a07cb8f113b91ff08c42
SHA5128cae4db568ec80ae6b90f72f7c99f6e78760066354c5319f4e08b65c817f31a9a8665bf5b0e8b9ab5fc0cfbbdda1967a1d124a3f089e399c8134662265261a58
-
Filesize
169KB
MD520293161205cf24f1bb60d0a1ed59190
SHA11e74b398b71d1c7be3a27726488328fcf3ed52da
SHA2569ea222d9cf4a3f3ec3a573e562932f615811c7ba26c9a07cb8f113b91ff08c42
SHA5128cae4db568ec80ae6b90f72f7c99f6e78760066354c5319f4e08b65c817f31a9a8665bf5b0e8b9ab5fc0cfbbdda1967a1d124a3f089e399c8134662265261a58
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf