Analysis
-
max time kernel
246s -
max time network
327s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06-05-2023 21:52
Static task
static1
Behavioral task
behavioral1
Sample
503b368d21196997afd4334606082a7f225bc9c38b38cbcb4113f1741b2ca52b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
503b368d21196997afd4334606082a7f225bc9c38b38cbcb4113f1741b2ca52b.exe
Resource
win10v2004-20230220-en
General
-
Target
503b368d21196997afd4334606082a7f225bc9c38b38cbcb4113f1741b2ca52b.exe
-
Size
1.2MB
-
MD5
de8add7614a1fb6b462bf55d1d95d168
-
SHA1
f7f7c03917d85af7f7a63cf04e1a26fbcf3fc969
-
SHA256
503b368d21196997afd4334606082a7f225bc9c38b38cbcb4113f1741b2ca52b
-
SHA512
2957411afa1d30072ca023ffef7e2298bc8bc6edf27106753872484442884d771946bcfcd155689ededb76a68cd07298c724341833e03edb533d3e24b0f885e7
-
SSDEEP
24576:nyhzzb67jYAC60QyCl+fAtIMLKcPDjsm0AzCpPjY5Y71Vzbjy:yhvgOLrfY7LnPDjsua852b
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
z28239153.exez70352680.exez71166041.exes41344260.exe1.exet06754969.exepid process 620 z28239153.exe 988 z70352680.exe 976 z71166041.exe 844 s41344260.exe 1624 1.exe 1716 t06754969.exe -
Loads dropped DLL 13 IoCs
Processes:
503b368d21196997afd4334606082a7f225bc9c38b38cbcb4113f1741b2ca52b.exez28239153.exez70352680.exez71166041.exes41344260.exe1.exet06754969.exepid process 1916 503b368d21196997afd4334606082a7f225bc9c38b38cbcb4113f1741b2ca52b.exe 620 z28239153.exe 620 z28239153.exe 988 z70352680.exe 988 z70352680.exe 976 z71166041.exe 976 z71166041.exe 976 z71166041.exe 844 s41344260.exe 844 s41344260.exe 1624 1.exe 976 z71166041.exe 1716 t06754969.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
z71166041.exe503b368d21196997afd4334606082a7f225bc9c38b38cbcb4113f1741b2ca52b.exez28239153.exez70352680.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z71166041.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 503b368d21196997afd4334606082a7f225bc9c38b38cbcb4113f1741b2ca52b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 503b368d21196997afd4334606082a7f225bc9c38b38cbcb4113f1741b2ca52b.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z28239153.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z28239153.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z70352680.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z70352680.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z71166041.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
s41344260.exedescription pid process Token: SeDebugPrivilege 844 s41344260.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
503b368d21196997afd4334606082a7f225bc9c38b38cbcb4113f1741b2ca52b.exez28239153.exez70352680.exez71166041.exes41344260.exedescription pid process target process PID 1916 wrote to memory of 620 1916 503b368d21196997afd4334606082a7f225bc9c38b38cbcb4113f1741b2ca52b.exe z28239153.exe PID 1916 wrote to memory of 620 1916 503b368d21196997afd4334606082a7f225bc9c38b38cbcb4113f1741b2ca52b.exe z28239153.exe PID 1916 wrote to memory of 620 1916 503b368d21196997afd4334606082a7f225bc9c38b38cbcb4113f1741b2ca52b.exe z28239153.exe PID 1916 wrote to memory of 620 1916 503b368d21196997afd4334606082a7f225bc9c38b38cbcb4113f1741b2ca52b.exe z28239153.exe PID 1916 wrote to memory of 620 1916 503b368d21196997afd4334606082a7f225bc9c38b38cbcb4113f1741b2ca52b.exe z28239153.exe PID 1916 wrote to memory of 620 1916 503b368d21196997afd4334606082a7f225bc9c38b38cbcb4113f1741b2ca52b.exe z28239153.exe PID 1916 wrote to memory of 620 1916 503b368d21196997afd4334606082a7f225bc9c38b38cbcb4113f1741b2ca52b.exe z28239153.exe PID 620 wrote to memory of 988 620 z28239153.exe z70352680.exe PID 620 wrote to memory of 988 620 z28239153.exe z70352680.exe PID 620 wrote to memory of 988 620 z28239153.exe z70352680.exe PID 620 wrote to memory of 988 620 z28239153.exe z70352680.exe PID 620 wrote to memory of 988 620 z28239153.exe z70352680.exe PID 620 wrote to memory of 988 620 z28239153.exe z70352680.exe PID 620 wrote to memory of 988 620 z28239153.exe z70352680.exe PID 988 wrote to memory of 976 988 z70352680.exe z71166041.exe PID 988 wrote to memory of 976 988 z70352680.exe z71166041.exe PID 988 wrote to memory of 976 988 z70352680.exe z71166041.exe PID 988 wrote to memory of 976 988 z70352680.exe z71166041.exe PID 988 wrote to memory of 976 988 z70352680.exe z71166041.exe PID 988 wrote to memory of 976 988 z70352680.exe z71166041.exe PID 988 wrote to memory of 976 988 z70352680.exe z71166041.exe PID 976 wrote to memory of 844 976 z71166041.exe s41344260.exe PID 976 wrote to memory of 844 976 z71166041.exe s41344260.exe PID 976 wrote to memory of 844 976 z71166041.exe s41344260.exe PID 976 wrote to memory of 844 976 z71166041.exe s41344260.exe PID 976 wrote to memory of 844 976 z71166041.exe s41344260.exe PID 976 wrote to memory of 844 976 z71166041.exe s41344260.exe PID 976 wrote to memory of 844 976 z71166041.exe s41344260.exe PID 844 wrote to memory of 1624 844 s41344260.exe 1.exe PID 844 wrote to memory of 1624 844 s41344260.exe 1.exe PID 844 wrote to memory of 1624 844 s41344260.exe 1.exe PID 844 wrote to memory of 1624 844 s41344260.exe 1.exe PID 844 wrote to memory of 1624 844 s41344260.exe 1.exe PID 844 wrote to memory of 1624 844 s41344260.exe 1.exe PID 844 wrote to memory of 1624 844 s41344260.exe 1.exe PID 976 wrote to memory of 1716 976 z71166041.exe t06754969.exe PID 976 wrote to memory of 1716 976 z71166041.exe t06754969.exe PID 976 wrote to memory of 1716 976 z71166041.exe t06754969.exe PID 976 wrote to memory of 1716 976 z71166041.exe t06754969.exe PID 976 wrote to memory of 1716 976 z71166041.exe t06754969.exe PID 976 wrote to memory of 1716 976 z71166041.exe t06754969.exe PID 976 wrote to memory of 1716 976 z71166041.exe t06754969.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\503b368d21196997afd4334606082a7f225bc9c38b38cbcb4113f1741b2ca52b.exe"C:\Users\Admin\AppData\Local\Temp\503b368d21196997afd4334606082a7f225bc9c38b38cbcb4113f1741b2ca52b.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z28239153.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z28239153.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z70352680.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z70352680.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z71166041.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z71166041.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s41344260.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s41344260.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1624
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t06754969.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t06754969.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1716
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD587f92ca28a7f44afe135db67306dbf25
SHA12c67989969e3dc438376d4c0d69c284f67be782a
SHA256c02488a7f2d56cbbdeac155b3f56fcc7a390aa99d84036c9fd26669ec66b026a
SHA51278ec26ea9e4ddf0de1802f4cebc941394cd2bba646b29f351390f39b78ec6e02b19c1882447a70a758156214d15e4c501314425b4bfad9298edb25cb5bb2a146
-
Filesize
1.0MB
MD587f92ca28a7f44afe135db67306dbf25
SHA12c67989969e3dc438376d4c0d69c284f67be782a
SHA256c02488a7f2d56cbbdeac155b3f56fcc7a390aa99d84036c9fd26669ec66b026a
SHA51278ec26ea9e4ddf0de1802f4cebc941394cd2bba646b29f351390f39b78ec6e02b19c1882447a70a758156214d15e4c501314425b4bfad9298edb25cb5bb2a146
-
Filesize
761KB
MD59b8c307e09b98e5a241e1bda37378d52
SHA186dc0a3b2423b8f774fc664ffa995a204081d4d8
SHA25687b950c48583d395966585708357194e669363cbd2b0b5d172e25c42fcba6988
SHA512faac4cf03ed9e2a038aee565c4756718755c0176fbbdc264d459940c6d57abb9c84d18b51d1f056a0de348111c41194dbb523cce68c0a966f13969625f875524
-
Filesize
761KB
MD59b8c307e09b98e5a241e1bda37378d52
SHA186dc0a3b2423b8f774fc664ffa995a204081d4d8
SHA25687b950c48583d395966585708357194e669363cbd2b0b5d172e25c42fcba6988
SHA512faac4cf03ed9e2a038aee565c4756718755c0176fbbdc264d459940c6d57abb9c84d18b51d1f056a0de348111c41194dbb523cce68c0a966f13969625f875524
-
Filesize
578KB
MD51860ba7ae26a1f004fb4409cc7f71b0a
SHA1dacd1134ebca3313b7f44f39092ff82c8b0ccfa3
SHA2569ae9d9b713ce92c80fce6eb5bf8e5dcd32a4468ded614f1eeb1db103a0bcb64a
SHA512c284465345901854ce546e63255d52c53f4662fd4f29f473bac90da2e420fc2a41bc730852931c737269960fef19beb626c3ccbb45fdaa2c3e261d36801e4241
-
Filesize
578KB
MD51860ba7ae26a1f004fb4409cc7f71b0a
SHA1dacd1134ebca3313b7f44f39092ff82c8b0ccfa3
SHA2569ae9d9b713ce92c80fce6eb5bf8e5dcd32a4468ded614f1eeb1db103a0bcb64a
SHA512c284465345901854ce546e63255d52c53f4662fd4f29f473bac90da2e420fc2a41bc730852931c737269960fef19beb626c3ccbb45fdaa2c3e261d36801e4241
-
Filesize
580KB
MD53ae55e949ec2ac91e84d0ff803eb2c1f
SHA1914752c665f25528c3861097705b3a37fa64f69d
SHA25687e50655c0d756851d93947284392e9f999e20f8f2351cefa214255d9c27cd9c
SHA512359d7177a3c0abaef07ce80516182cbaca595ddaf4cd6c3ec119db4ca539cc3c0f213acfda4782df89c765991dfbf5e62aa1c02b4aed38d01e653bde2d7d7817
-
Filesize
580KB
MD53ae55e949ec2ac91e84d0ff803eb2c1f
SHA1914752c665f25528c3861097705b3a37fa64f69d
SHA25687e50655c0d756851d93947284392e9f999e20f8f2351cefa214255d9c27cd9c
SHA512359d7177a3c0abaef07ce80516182cbaca595ddaf4cd6c3ec119db4ca539cc3c0f213acfda4782df89c765991dfbf5e62aa1c02b4aed38d01e653bde2d7d7817
-
Filesize
580KB
MD53ae55e949ec2ac91e84d0ff803eb2c1f
SHA1914752c665f25528c3861097705b3a37fa64f69d
SHA25687e50655c0d756851d93947284392e9f999e20f8f2351cefa214255d9c27cd9c
SHA512359d7177a3c0abaef07ce80516182cbaca595ddaf4cd6c3ec119db4ca539cc3c0f213acfda4782df89c765991dfbf5e62aa1c02b4aed38d01e653bde2d7d7817
-
Filesize
169KB
MD51f4fc6aabd50f89b2c6f30ad586cc8ea
SHA1b6dfd47d2bc8ad45dca397f0322228f1f2aab695
SHA25676026674ec7053acaef187a863a670bd492ea61c4384592b81599912853d7eb0
SHA512f56ea609b74502bff96941cd6f357468db71007386da5b3ff5cd2dac9ebf185906997e03e961388bc050492b3cbad93f79646d82a62ae248c770af060a1097c1
-
Filesize
169KB
MD51f4fc6aabd50f89b2c6f30ad586cc8ea
SHA1b6dfd47d2bc8ad45dca397f0322228f1f2aab695
SHA25676026674ec7053acaef187a863a670bd492ea61c4384592b81599912853d7eb0
SHA512f56ea609b74502bff96941cd6f357468db71007386da5b3ff5cd2dac9ebf185906997e03e961388bc050492b3cbad93f79646d82a62ae248c770af060a1097c1
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
1.0MB
MD587f92ca28a7f44afe135db67306dbf25
SHA12c67989969e3dc438376d4c0d69c284f67be782a
SHA256c02488a7f2d56cbbdeac155b3f56fcc7a390aa99d84036c9fd26669ec66b026a
SHA51278ec26ea9e4ddf0de1802f4cebc941394cd2bba646b29f351390f39b78ec6e02b19c1882447a70a758156214d15e4c501314425b4bfad9298edb25cb5bb2a146
-
Filesize
1.0MB
MD587f92ca28a7f44afe135db67306dbf25
SHA12c67989969e3dc438376d4c0d69c284f67be782a
SHA256c02488a7f2d56cbbdeac155b3f56fcc7a390aa99d84036c9fd26669ec66b026a
SHA51278ec26ea9e4ddf0de1802f4cebc941394cd2bba646b29f351390f39b78ec6e02b19c1882447a70a758156214d15e4c501314425b4bfad9298edb25cb5bb2a146
-
Filesize
761KB
MD59b8c307e09b98e5a241e1bda37378d52
SHA186dc0a3b2423b8f774fc664ffa995a204081d4d8
SHA25687b950c48583d395966585708357194e669363cbd2b0b5d172e25c42fcba6988
SHA512faac4cf03ed9e2a038aee565c4756718755c0176fbbdc264d459940c6d57abb9c84d18b51d1f056a0de348111c41194dbb523cce68c0a966f13969625f875524
-
Filesize
761KB
MD59b8c307e09b98e5a241e1bda37378d52
SHA186dc0a3b2423b8f774fc664ffa995a204081d4d8
SHA25687b950c48583d395966585708357194e669363cbd2b0b5d172e25c42fcba6988
SHA512faac4cf03ed9e2a038aee565c4756718755c0176fbbdc264d459940c6d57abb9c84d18b51d1f056a0de348111c41194dbb523cce68c0a966f13969625f875524
-
Filesize
578KB
MD51860ba7ae26a1f004fb4409cc7f71b0a
SHA1dacd1134ebca3313b7f44f39092ff82c8b0ccfa3
SHA2569ae9d9b713ce92c80fce6eb5bf8e5dcd32a4468ded614f1eeb1db103a0bcb64a
SHA512c284465345901854ce546e63255d52c53f4662fd4f29f473bac90da2e420fc2a41bc730852931c737269960fef19beb626c3ccbb45fdaa2c3e261d36801e4241
-
Filesize
578KB
MD51860ba7ae26a1f004fb4409cc7f71b0a
SHA1dacd1134ebca3313b7f44f39092ff82c8b0ccfa3
SHA2569ae9d9b713ce92c80fce6eb5bf8e5dcd32a4468ded614f1eeb1db103a0bcb64a
SHA512c284465345901854ce546e63255d52c53f4662fd4f29f473bac90da2e420fc2a41bc730852931c737269960fef19beb626c3ccbb45fdaa2c3e261d36801e4241
-
Filesize
580KB
MD53ae55e949ec2ac91e84d0ff803eb2c1f
SHA1914752c665f25528c3861097705b3a37fa64f69d
SHA25687e50655c0d756851d93947284392e9f999e20f8f2351cefa214255d9c27cd9c
SHA512359d7177a3c0abaef07ce80516182cbaca595ddaf4cd6c3ec119db4ca539cc3c0f213acfda4782df89c765991dfbf5e62aa1c02b4aed38d01e653bde2d7d7817
-
Filesize
580KB
MD53ae55e949ec2ac91e84d0ff803eb2c1f
SHA1914752c665f25528c3861097705b3a37fa64f69d
SHA25687e50655c0d756851d93947284392e9f999e20f8f2351cefa214255d9c27cd9c
SHA512359d7177a3c0abaef07ce80516182cbaca595ddaf4cd6c3ec119db4ca539cc3c0f213acfda4782df89c765991dfbf5e62aa1c02b4aed38d01e653bde2d7d7817
-
Filesize
580KB
MD53ae55e949ec2ac91e84d0ff803eb2c1f
SHA1914752c665f25528c3861097705b3a37fa64f69d
SHA25687e50655c0d756851d93947284392e9f999e20f8f2351cefa214255d9c27cd9c
SHA512359d7177a3c0abaef07ce80516182cbaca595ddaf4cd6c3ec119db4ca539cc3c0f213acfda4782df89c765991dfbf5e62aa1c02b4aed38d01e653bde2d7d7817
-
Filesize
169KB
MD51f4fc6aabd50f89b2c6f30ad586cc8ea
SHA1b6dfd47d2bc8ad45dca397f0322228f1f2aab695
SHA25676026674ec7053acaef187a863a670bd492ea61c4384592b81599912853d7eb0
SHA512f56ea609b74502bff96941cd6f357468db71007386da5b3ff5cd2dac9ebf185906997e03e961388bc050492b3cbad93f79646d82a62ae248c770af060a1097c1
-
Filesize
169KB
MD51f4fc6aabd50f89b2c6f30ad586cc8ea
SHA1b6dfd47d2bc8ad45dca397f0322228f1f2aab695
SHA25676026674ec7053acaef187a863a670bd492ea61c4384592b81599912853d7eb0
SHA512f56ea609b74502bff96941cd6f357468db71007386da5b3ff5cd2dac9ebf185906997e03e961388bc050492b3cbad93f79646d82a62ae248c770af060a1097c1
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf