Analysis
-
max time kernel
195s -
max time network
206s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 21:42
Static task
static1
Behavioral task
behavioral1
Sample
48cc12c115c5750e8d32947a1fbe51e11779a58b37edf2e1b7eec89ae5b2f5d2.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
48cc12c115c5750e8d32947a1fbe51e11779a58b37edf2e1b7eec89ae5b2f5d2.exe
Resource
win10v2004-20230221-en
General
-
Target
48cc12c115c5750e8d32947a1fbe51e11779a58b37edf2e1b7eec89ae5b2f5d2.exe
-
Size
479KB
-
MD5
acdf786e8286e13c651b27438d1d9b08
-
SHA1
b947b94293e3e272dd7c1b12754f23ef423da520
-
SHA256
48cc12c115c5750e8d32947a1fbe51e11779a58b37edf2e1b7eec89ae5b2f5d2
-
SHA512
8834552b3664374b2fa43c42ce9e356f338a87e4d58fcb15f5ce708a023f82955b727d83006a1229725a98af2b1488a91b9299bfff15650b10cab177fad9a457
-
SSDEEP
12288:rMrQy90I9yfuOfZvxrdw7+tBzU21BPlQfJQWvYzcmwiCF:zyrp6AajPlZWvYzPwlF
Malware Config
Extracted
redline
daris
217.196.96.56:4138
-
auth_value
3491f24ae0250969cd45ce4b3fe77549
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 2 IoCs
pid Process 268 y1584088.exe 440 k0265306.exe -
Loads dropped DLL 4 IoCs
pid Process 1404 48cc12c115c5750e8d32947a1fbe51e11779a58b37edf2e1b7eec89ae5b2f5d2.exe 268 y1584088.exe 268 y1584088.exe 440 k0265306.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y1584088.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y1584088.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 48cc12c115c5750e8d32947a1fbe51e11779a58b37edf2e1b7eec89ae5b2f5d2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 48cc12c115c5750e8d32947a1fbe51e11779a58b37edf2e1b7eec89ae5b2f5d2.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1404 wrote to memory of 268 1404 48cc12c115c5750e8d32947a1fbe51e11779a58b37edf2e1b7eec89ae5b2f5d2.exe 28 PID 1404 wrote to memory of 268 1404 48cc12c115c5750e8d32947a1fbe51e11779a58b37edf2e1b7eec89ae5b2f5d2.exe 28 PID 1404 wrote to memory of 268 1404 48cc12c115c5750e8d32947a1fbe51e11779a58b37edf2e1b7eec89ae5b2f5d2.exe 28 PID 1404 wrote to memory of 268 1404 48cc12c115c5750e8d32947a1fbe51e11779a58b37edf2e1b7eec89ae5b2f5d2.exe 28 PID 1404 wrote to memory of 268 1404 48cc12c115c5750e8d32947a1fbe51e11779a58b37edf2e1b7eec89ae5b2f5d2.exe 28 PID 1404 wrote to memory of 268 1404 48cc12c115c5750e8d32947a1fbe51e11779a58b37edf2e1b7eec89ae5b2f5d2.exe 28 PID 1404 wrote to memory of 268 1404 48cc12c115c5750e8d32947a1fbe51e11779a58b37edf2e1b7eec89ae5b2f5d2.exe 28 PID 268 wrote to memory of 440 268 y1584088.exe 29 PID 268 wrote to memory of 440 268 y1584088.exe 29 PID 268 wrote to memory of 440 268 y1584088.exe 29 PID 268 wrote to memory of 440 268 y1584088.exe 29 PID 268 wrote to memory of 440 268 y1584088.exe 29 PID 268 wrote to memory of 440 268 y1584088.exe 29 PID 268 wrote to memory of 440 268 y1584088.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\48cc12c115c5750e8d32947a1fbe51e11779a58b37edf2e1b7eec89ae5b2f5d2.exe"C:\Users\Admin\AppData\Local\Temp\48cc12c115c5750e8d32947a1fbe51e11779a58b37edf2e1b7eec89ae5b2f5d2.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1584088.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1584088.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0265306.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0265306.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:440
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
308KB
MD5ef90918841f5c02182d8e4d8125f7334
SHA1ff6dfdc695758f5b3a518f28ec878b283763d9aa
SHA256582780c20397191cb2225e8f362c5e6af3f66dbfa5c77c81f9096bcaf59a6834
SHA51251449d08fc2cc7baa0888a1c24cd055bdaacc46a2d43df5d67f9694cb748e99bc7a5d0ba851e76bfd71b562e6fe15a9a0556b731f8df8acf33cbc4e91aeb28fb
-
Filesize
308KB
MD5ef90918841f5c02182d8e4d8125f7334
SHA1ff6dfdc695758f5b3a518f28ec878b283763d9aa
SHA256582780c20397191cb2225e8f362c5e6af3f66dbfa5c77c81f9096bcaf59a6834
SHA51251449d08fc2cc7baa0888a1c24cd055bdaacc46a2d43df5d67f9694cb748e99bc7a5d0ba851e76bfd71b562e6fe15a9a0556b731f8df8acf33cbc4e91aeb28fb
-
Filesize
168KB
MD5bbeb564bc08a42d68f8702bc08401a54
SHA1355d73653e1018bc9e0b9b4069e57307cf13142d
SHA256fc402c7b39013dbe4a2836d6bf59df3d9eb8da0b3e20964e0e18937ac4063d8b
SHA512765ad5128b51afabfcbc5c3cb8f1e67c042b384773faf8ef6a657abd25f0f764483f893419124461cc31b5c5a62045f056f9babb2c2359682943075cb361807f
-
Filesize
168KB
MD5bbeb564bc08a42d68f8702bc08401a54
SHA1355d73653e1018bc9e0b9b4069e57307cf13142d
SHA256fc402c7b39013dbe4a2836d6bf59df3d9eb8da0b3e20964e0e18937ac4063d8b
SHA512765ad5128b51afabfcbc5c3cb8f1e67c042b384773faf8ef6a657abd25f0f764483f893419124461cc31b5c5a62045f056f9babb2c2359682943075cb361807f
-
Filesize
308KB
MD5ef90918841f5c02182d8e4d8125f7334
SHA1ff6dfdc695758f5b3a518f28ec878b283763d9aa
SHA256582780c20397191cb2225e8f362c5e6af3f66dbfa5c77c81f9096bcaf59a6834
SHA51251449d08fc2cc7baa0888a1c24cd055bdaacc46a2d43df5d67f9694cb748e99bc7a5d0ba851e76bfd71b562e6fe15a9a0556b731f8df8acf33cbc4e91aeb28fb
-
Filesize
308KB
MD5ef90918841f5c02182d8e4d8125f7334
SHA1ff6dfdc695758f5b3a518f28ec878b283763d9aa
SHA256582780c20397191cb2225e8f362c5e6af3f66dbfa5c77c81f9096bcaf59a6834
SHA51251449d08fc2cc7baa0888a1c24cd055bdaacc46a2d43df5d67f9694cb748e99bc7a5d0ba851e76bfd71b562e6fe15a9a0556b731f8df8acf33cbc4e91aeb28fb
-
Filesize
168KB
MD5bbeb564bc08a42d68f8702bc08401a54
SHA1355d73653e1018bc9e0b9b4069e57307cf13142d
SHA256fc402c7b39013dbe4a2836d6bf59df3d9eb8da0b3e20964e0e18937ac4063d8b
SHA512765ad5128b51afabfcbc5c3cb8f1e67c042b384773faf8ef6a657abd25f0f764483f893419124461cc31b5c5a62045f056f9babb2c2359682943075cb361807f
-
Filesize
168KB
MD5bbeb564bc08a42d68f8702bc08401a54
SHA1355d73653e1018bc9e0b9b4069e57307cf13142d
SHA256fc402c7b39013dbe4a2836d6bf59df3d9eb8da0b3e20964e0e18937ac4063d8b
SHA512765ad5128b51afabfcbc5c3cb8f1e67c042b384773faf8ef6a657abd25f0f764483f893419124461cc31b5c5a62045f056f9babb2c2359682943075cb361807f