Analysis
-
max time kernel
139s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06-05-2023 21:56
Static task
static1
Behavioral task
behavioral1
Sample
532200885ba494518ae845bf21fdd08495e40350ae7425cc366d9fb4bcb27df5.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
532200885ba494518ae845bf21fdd08495e40350ae7425cc366d9fb4bcb27df5.exe
Resource
win10v2004-20230220-en
General
-
Target
532200885ba494518ae845bf21fdd08495e40350ae7425cc366d9fb4bcb27df5.exe
-
Size
775KB
-
MD5
e0a0df607e1013aea0028806391597be
-
SHA1
c37d66eb8eef33e9130864cf82dcba08f2656bb6
-
SHA256
532200885ba494518ae845bf21fdd08495e40350ae7425cc366d9fb4bcb27df5
-
SHA512
f9f034c4f9de4db219d5fe98032b4297ea30b58fdcc51510466e19ecb911adddf458d0659b11ab9e785cd6faa2b30e2af4658bc9d1f69884a8367ff8d57186c5
-
SSDEEP
12288:Iy90enFX4LMNTX9JcLCb2WBpWO67ycq1BVj9TFXEbwvC2xwh+E4s:Iynx4GX9ACBSFq1BVhTF0bwvC2fbs
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dark
185.161.248.73:4164
-
auth_value
ae85b01f66afe8770afeed560513fc2d
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1596 x37066951.exe 280 m90678940.exe 1168 1.exe 1668 n39911236.exe -
Loads dropped DLL 9 IoCs
pid Process 1888 532200885ba494518ae845bf21fdd08495e40350ae7425cc366d9fb4bcb27df5.exe 1596 x37066951.exe 1596 x37066951.exe 1596 x37066951.exe 280 m90678940.exe 280 m90678940.exe 1168 1.exe 1596 x37066951.exe 1668 n39911236.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 532200885ba494518ae845bf21fdd08495e40350ae7425cc366d9fb4bcb27df5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 532200885ba494518ae845bf21fdd08495e40350ae7425cc366d9fb4bcb27df5.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce x37066951.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x37066951.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 280 m90678940.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1888 wrote to memory of 1596 1888 532200885ba494518ae845bf21fdd08495e40350ae7425cc366d9fb4bcb27df5.exe 27 PID 1888 wrote to memory of 1596 1888 532200885ba494518ae845bf21fdd08495e40350ae7425cc366d9fb4bcb27df5.exe 27 PID 1888 wrote to memory of 1596 1888 532200885ba494518ae845bf21fdd08495e40350ae7425cc366d9fb4bcb27df5.exe 27 PID 1888 wrote to memory of 1596 1888 532200885ba494518ae845bf21fdd08495e40350ae7425cc366d9fb4bcb27df5.exe 27 PID 1888 wrote to memory of 1596 1888 532200885ba494518ae845bf21fdd08495e40350ae7425cc366d9fb4bcb27df5.exe 27 PID 1888 wrote to memory of 1596 1888 532200885ba494518ae845bf21fdd08495e40350ae7425cc366d9fb4bcb27df5.exe 27 PID 1888 wrote to memory of 1596 1888 532200885ba494518ae845bf21fdd08495e40350ae7425cc366d9fb4bcb27df5.exe 27 PID 1596 wrote to memory of 280 1596 x37066951.exe 28 PID 1596 wrote to memory of 280 1596 x37066951.exe 28 PID 1596 wrote to memory of 280 1596 x37066951.exe 28 PID 1596 wrote to memory of 280 1596 x37066951.exe 28 PID 1596 wrote to memory of 280 1596 x37066951.exe 28 PID 1596 wrote to memory of 280 1596 x37066951.exe 28 PID 1596 wrote to memory of 280 1596 x37066951.exe 28 PID 280 wrote to memory of 1168 280 m90678940.exe 29 PID 280 wrote to memory of 1168 280 m90678940.exe 29 PID 280 wrote to memory of 1168 280 m90678940.exe 29 PID 280 wrote to memory of 1168 280 m90678940.exe 29 PID 280 wrote to memory of 1168 280 m90678940.exe 29 PID 280 wrote to memory of 1168 280 m90678940.exe 29 PID 280 wrote to memory of 1168 280 m90678940.exe 29 PID 1596 wrote to memory of 1668 1596 x37066951.exe 30 PID 1596 wrote to memory of 1668 1596 x37066951.exe 30 PID 1596 wrote to memory of 1668 1596 x37066951.exe 30 PID 1596 wrote to memory of 1668 1596 x37066951.exe 30 PID 1596 wrote to memory of 1668 1596 x37066951.exe 30 PID 1596 wrote to memory of 1668 1596 x37066951.exe 30 PID 1596 wrote to memory of 1668 1596 x37066951.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\532200885ba494518ae845bf21fdd08495e40350ae7425cc366d9fb4bcb27df5.exe"C:\Users\Admin\AppData\Local\Temp\532200885ba494518ae845bf21fdd08495e40350ae7425cc366d9fb4bcb27df5.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x37066951.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x37066951.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m90678940.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m90678940.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:280 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1168
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n39911236.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n39911236.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1668
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
570KB
MD5f8b2f15b0f8dca991d9c9496e8f017af
SHA12bd3fffd44f338c90b3f2f55a7fc182d18046ed7
SHA25675697ef25a497b97b89e128189132b680bcda5ea0e09b36a053744679a549e46
SHA512cce30d13915d228646f48984a1410a6e60602bfefbc5591be2fd0c37810fabade06acd858d8e8b37ddc09d5d24bc108b37e078fa4b95754f74b5c37037572c23
-
Filesize
570KB
MD5f8b2f15b0f8dca991d9c9496e8f017af
SHA12bd3fffd44f338c90b3f2f55a7fc182d18046ed7
SHA25675697ef25a497b97b89e128189132b680bcda5ea0e09b36a053744679a549e46
SHA512cce30d13915d228646f48984a1410a6e60602bfefbc5591be2fd0c37810fabade06acd858d8e8b37ddc09d5d24bc108b37e078fa4b95754f74b5c37037572c23
-
Filesize
488KB
MD548f97776f9b88fb139bfe2636004eb30
SHA19639f80bd424a7885da823cc41ef7308a13df411
SHA256961c52e0fa0717deabe7d0c20b9a8d3a76b0ae6d7e023626100648ff22057681
SHA512ba89c2e853d85cfb4fb6610dc037db493ed6e422c5c225bb02cb663497be289e5104d629293f674e5c6edd3b4eb3d29031440856c4e958c997e07f4df064393b
-
Filesize
488KB
MD548f97776f9b88fb139bfe2636004eb30
SHA19639f80bd424a7885da823cc41ef7308a13df411
SHA256961c52e0fa0717deabe7d0c20b9a8d3a76b0ae6d7e023626100648ff22057681
SHA512ba89c2e853d85cfb4fb6610dc037db493ed6e422c5c225bb02cb663497be289e5104d629293f674e5c6edd3b4eb3d29031440856c4e958c997e07f4df064393b
-
Filesize
488KB
MD548f97776f9b88fb139bfe2636004eb30
SHA19639f80bd424a7885da823cc41ef7308a13df411
SHA256961c52e0fa0717deabe7d0c20b9a8d3a76b0ae6d7e023626100648ff22057681
SHA512ba89c2e853d85cfb4fb6610dc037db493ed6e422c5c225bb02cb663497be289e5104d629293f674e5c6edd3b4eb3d29031440856c4e958c997e07f4df064393b
-
Filesize
172KB
MD58abb54c7ebf2f501b94b5e27a77251d5
SHA195985f802d9d8f97ed0a0ba7a7336e0c9c44c114
SHA256022fc3c7219b64264068aa7831b97e829980b79001a52f67a71411f7c0d711ef
SHA5122445e48e732db1369a6025c7b974b8d0f06478acc1aa21e1383eb5ffc7be9675f98d81f6c4c32cb142dfb6d244da77aa3169e975d8e12a541fde97e7bf2d2d69
-
Filesize
172KB
MD58abb54c7ebf2f501b94b5e27a77251d5
SHA195985f802d9d8f97ed0a0ba7a7336e0c9c44c114
SHA256022fc3c7219b64264068aa7831b97e829980b79001a52f67a71411f7c0d711ef
SHA5122445e48e732db1369a6025c7b974b8d0f06478acc1aa21e1383eb5ffc7be9675f98d81f6c4c32cb142dfb6d244da77aa3169e975d8e12a541fde97e7bf2d2d69
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
570KB
MD5f8b2f15b0f8dca991d9c9496e8f017af
SHA12bd3fffd44f338c90b3f2f55a7fc182d18046ed7
SHA25675697ef25a497b97b89e128189132b680bcda5ea0e09b36a053744679a549e46
SHA512cce30d13915d228646f48984a1410a6e60602bfefbc5591be2fd0c37810fabade06acd858d8e8b37ddc09d5d24bc108b37e078fa4b95754f74b5c37037572c23
-
Filesize
570KB
MD5f8b2f15b0f8dca991d9c9496e8f017af
SHA12bd3fffd44f338c90b3f2f55a7fc182d18046ed7
SHA25675697ef25a497b97b89e128189132b680bcda5ea0e09b36a053744679a549e46
SHA512cce30d13915d228646f48984a1410a6e60602bfefbc5591be2fd0c37810fabade06acd858d8e8b37ddc09d5d24bc108b37e078fa4b95754f74b5c37037572c23
-
Filesize
488KB
MD548f97776f9b88fb139bfe2636004eb30
SHA19639f80bd424a7885da823cc41ef7308a13df411
SHA256961c52e0fa0717deabe7d0c20b9a8d3a76b0ae6d7e023626100648ff22057681
SHA512ba89c2e853d85cfb4fb6610dc037db493ed6e422c5c225bb02cb663497be289e5104d629293f674e5c6edd3b4eb3d29031440856c4e958c997e07f4df064393b
-
Filesize
488KB
MD548f97776f9b88fb139bfe2636004eb30
SHA19639f80bd424a7885da823cc41ef7308a13df411
SHA256961c52e0fa0717deabe7d0c20b9a8d3a76b0ae6d7e023626100648ff22057681
SHA512ba89c2e853d85cfb4fb6610dc037db493ed6e422c5c225bb02cb663497be289e5104d629293f674e5c6edd3b4eb3d29031440856c4e958c997e07f4df064393b
-
Filesize
488KB
MD548f97776f9b88fb139bfe2636004eb30
SHA19639f80bd424a7885da823cc41ef7308a13df411
SHA256961c52e0fa0717deabe7d0c20b9a8d3a76b0ae6d7e023626100648ff22057681
SHA512ba89c2e853d85cfb4fb6610dc037db493ed6e422c5c225bb02cb663497be289e5104d629293f674e5c6edd3b4eb3d29031440856c4e958c997e07f4df064393b
-
Filesize
172KB
MD58abb54c7ebf2f501b94b5e27a77251d5
SHA195985f802d9d8f97ed0a0ba7a7336e0c9c44c114
SHA256022fc3c7219b64264068aa7831b97e829980b79001a52f67a71411f7c0d711ef
SHA5122445e48e732db1369a6025c7b974b8d0f06478acc1aa21e1383eb5ffc7be9675f98d81f6c4c32cb142dfb6d244da77aa3169e975d8e12a541fde97e7bf2d2d69
-
Filesize
172KB
MD58abb54c7ebf2f501b94b5e27a77251d5
SHA195985f802d9d8f97ed0a0ba7a7336e0c9c44c114
SHA256022fc3c7219b64264068aa7831b97e829980b79001a52f67a71411f7c0d711ef
SHA5122445e48e732db1369a6025c7b974b8d0f06478acc1aa21e1383eb5ffc7be9675f98d81f6c4c32cb142dfb6d244da77aa3169e975d8e12a541fde97e7bf2d2d69
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf