Analysis
-
max time kernel
137s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06-05-2023 22:05
Static task
static1
Behavioral task
behavioral1
Sample
5b78ffa959b3dc563253f20b6dd99954d9b919303631c12db225da0345e5ccf1.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5b78ffa959b3dc563253f20b6dd99954d9b919303631c12db225da0345e5ccf1.exe
Resource
win10v2004-20230220-en
General
-
Target
5b78ffa959b3dc563253f20b6dd99954d9b919303631c12db225da0345e5ccf1.exe
-
Size
793KB
-
MD5
caaaa9aa524b1ac11089da0295c4132d
-
SHA1
48970adb1136c1dddd0f928caf98fb09542cd8df
-
SHA256
5b78ffa959b3dc563253f20b6dd99954d9b919303631c12db225da0345e5ccf1
-
SHA512
75f1a3020d15eac3be24ba582f729a42edc09fa3b3bdc37126fd161d3adf4947e58ba503dbafd58c98838741c065118f0308349ec2e057113d785c21830124aa
-
SSDEEP
12288:Zy90uuTWZRsa6Iui0lV4PFHRiYVCL9wwECKVI+qmLeq/gM3La35TsyY:ZybEIU4NHRikCxwwE+mMM3LiTW
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dork
185.161.248.73:4164
-
auth_value
e81be7d6cfb453cc812e1b4890eeadad
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1204 x49211052.exe 1720 m42024360.exe 1916 1.exe 1564 n96182240.exe -
Loads dropped DLL 9 IoCs
pid Process 880 5b78ffa959b3dc563253f20b6dd99954d9b919303631c12db225da0345e5ccf1.exe 1204 x49211052.exe 1204 x49211052.exe 1204 x49211052.exe 1720 m42024360.exe 1720 m42024360.exe 1916 1.exe 1204 x49211052.exe 1564 n96182240.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x49211052.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5b78ffa959b3dc563253f20b6dd99954d9b919303631c12db225da0345e5ccf1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5b78ffa959b3dc563253f20b6dd99954d9b919303631c12db225da0345e5ccf1.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce x49211052.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1720 m42024360.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 880 wrote to memory of 1204 880 5b78ffa959b3dc563253f20b6dd99954d9b919303631c12db225da0345e5ccf1.exe 27 PID 880 wrote to memory of 1204 880 5b78ffa959b3dc563253f20b6dd99954d9b919303631c12db225da0345e5ccf1.exe 27 PID 880 wrote to memory of 1204 880 5b78ffa959b3dc563253f20b6dd99954d9b919303631c12db225da0345e5ccf1.exe 27 PID 880 wrote to memory of 1204 880 5b78ffa959b3dc563253f20b6dd99954d9b919303631c12db225da0345e5ccf1.exe 27 PID 880 wrote to memory of 1204 880 5b78ffa959b3dc563253f20b6dd99954d9b919303631c12db225da0345e5ccf1.exe 27 PID 880 wrote to memory of 1204 880 5b78ffa959b3dc563253f20b6dd99954d9b919303631c12db225da0345e5ccf1.exe 27 PID 880 wrote to memory of 1204 880 5b78ffa959b3dc563253f20b6dd99954d9b919303631c12db225da0345e5ccf1.exe 27 PID 1204 wrote to memory of 1720 1204 x49211052.exe 28 PID 1204 wrote to memory of 1720 1204 x49211052.exe 28 PID 1204 wrote to memory of 1720 1204 x49211052.exe 28 PID 1204 wrote to memory of 1720 1204 x49211052.exe 28 PID 1204 wrote to memory of 1720 1204 x49211052.exe 28 PID 1204 wrote to memory of 1720 1204 x49211052.exe 28 PID 1204 wrote to memory of 1720 1204 x49211052.exe 28 PID 1720 wrote to memory of 1916 1720 m42024360.exe 29 PID 1720 wrote to memory of 1916 1720 m42024360.exe 29 PID 1720 wrote to memory of 1916 1720 m42024360.exe 29 PID 1720 wrote to memory of 1916 1720 m42024360.exe 29 PID 1720 wrote to memory of 1916 1720 m42024360.exe 29 PID 1720 wrote to memory of 1916 1720 m42024360.exe 29 PID 1720 wrote to memory of 1916 1720 m42024360.exe 29 PID 1204 wrote to memory of 1564 1204 x49211052.exe 30 PID 1204 wrote to memory of 1564 1204 x49211052.exe 30 PID 1204 wrote to memory of 1564 1204 x49211052.exe 30 PID 1204 wrote to memory of 1564 1204 x49211052.exe 30 PID 1204 wrote to memory of 1564 1204 x49211052.exe 30 PID 1204 wrote to memory of 1564 1204 x49211052.exe 30 PID 1204 wrote to memory of 1564 1204 x49211052.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b78ffa959b3dc563253f20b6dd99954d9b919303631c12db225da0345e5ccf1.exe"C:\Users\Admin\AppData\Local\Temp\5b78ffa959b3dc563253f20b6dd99954d9b919303631c12db225da0345e5ccf1.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x49211052.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x49211052.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m42024360.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m42024360.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1916
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n96182240.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n96182240.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1564
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
589KB
MD52d0b67849962c65a08904383f1bc2879
SHA12706f9c6cbff29649b8d9997e89a0aa2b5437723
SHA256060b223824562a54d544c43ea14a1e950cf1f0446159acce4b45b7522e8f3d92
SHA512651282cadd0050d03e149ab51431c93d30310e3e5ff9de7e6285dba025373fecd3068144a11c6525fc61103822ff3238d8d270f16bb64fd2aa737d037a42bcce
-
Filesize
589KB
MD52d0b67849962c65a08904383f1bc2879
SHA12706f9c6cbff29649b8d9997e89a0aa2b5437723
SHA256060b223824562a54d544c43ea14a1e950cf1f0446159acce4b45b7522e8f3d92
SHA512651282cadd0050d03e149ab51431c93d30310e3e5ff9de7e6285dba025373fecd3068144a11c6525fc61103822ff3238d8d270f16bb64fd2aa737d037a42bcce
-
Filesize
529KB
MD578ccdb726dd25c1db093e9440e0d5b3e
SHA169de83fb054ddc3832beef3d92c4eff07214c5ff
SHA25674b49262d7ab691a97cf42c5f32385f3f46dfad3c3c02e49f9edd41e27d18a28
SHA5127be4ef0be45ca86c74fcc0a599f23604696acfd6236b242e9f4519ee8e7aad33f6f68cfaa7c2edd5067bbd69ea31cfda5a77a9386cc126cf88588d7917510622
-
Filesize
529KB
MD578ccdb726dd25c1db093e9440e0d5b3e
SHA169de83fb054ddc3832beef3d92c4eff07214c5ff
SHA25674b49262d7ab691a97cf42c5f32385f3f46dfad3c3c02e49f9edd41e27d18a28
SHA5127be4ef0be45ca86c74fcc0a599f23604696acfd6236b242e9f4519ee8e7aad33f6f68cfaa7c2edd5067bbd69ea31cfda5a77a9386cc126cf88588d7917510622
-
Filesize
529KB
MD578ccdb726dd25c1db093e9440e0d5b3e
SHA169de83fb054ddc3832beef3d92c4eff07214c5ff
SHA25674b49262d7ab691a97cf42c5f32385f3f46dfad3c3c02e49f9edd41e27d18a28
SHA5127be4ef0be45ca86c74fcc0a599f23604696acfd6236b242e9f4519ee8e7aad33f6f68cfaa7c2edd5067bbd69ea31cfda5a77a9386cc126cf88588d7917510622
-
Filesize
169KB
MD5d76ed2d8813c064822fdbe845d726ac7
SHA1ac10dbd42fbc220f99de2ff0dadefddd2a15f1cb
SHA2561a389b50b7013f81555ce142311d184b99c4e1c88fcf79644f0034a4db5351a8
SHA512eb534ccf9de7f245d76125768e94d6f88dc4dd9931730e9a8c8b84c1c00492fb881f49494d916ac1cf79c876ccd1c709f59f792aa43c5244a5457ef9ee3d38dc
-
Filesize
169KB
MD5d76ed2d8813c064822fdbe845d726ac7
SHA1ac10dbd42fbc220f99de2ff0dadefddd2a15f1cb
SHA2561a389b50b7013f81555ce142311d184b99c4e1c88fcf79644f0034a4db5351a8
SHA512eb534ccf9de7f245d76125768e94d6f88dc4dd9931730e9a8c8b84c1c00492fb881f49494d916ac1cf79c876ccd1c709f59f792aa43c5244a5457ef9ee3d38dc
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
589KB
MD52d0b67849962c65a08904383f1bc2879
SHA12706f9c6cbff29649b8d9997e89a0aa2b5437723
SHA256060b223824562a54d544c43ea14a1e950cf1f0446159acce4b45b7522e8f3d92
SHA512651282cadd0050d03e149ab51431c93d30310e3e5ff9de7e6285dba025373fecd3068144a11c6525fc61103822ff3238d8d270f16bb64fd2aa737d037a42bcce
-
Filesize
589KB
MD52d0b67849962c65a08904383f1bc2879
SHA12706f9c6cbff29649b8d9997e89a0aa2b5437723
SHA256060b223824562a54d544c43ea14a1e950cf1f0446159acce4b45b7522e8f3d92
SHA512651282cadd0050d03e149ab51431c93d30310e3e5ff9de7e6285dba025373fecd3068144a11c6525fc61103822ff3238d8d270f16bb64fd2aa737d037a42bcce
-
Filesize
529KB
MD578ccdb726dd25c1db093e9440e0d5b3e
SHA169de83fb054ddc3832beef3d92c4eff07214c5ff
SHA25674b49262d7ab691a97cf42c5f32385f3f46dfad3c3c02e49f9edd41e27d18a28
SHA5127be4ef0be45ca86c74fcc0a599f23604696acfd6236b242e9f4519ee8e7aad33f6f68cfaa7c2edd5067bbd69ea31cfda5a77a9386cc126cf88588d7917510622
-
Filesize
529KB
MD578ccdb726dd25c1db093e9440e0d5b3e
SHA169de83fb054ddc3832beef3d92c4eff07214c5ff
SHA25674b49262d7ab691a97cf42c5f32385f3f46dfad3c3c02e49f9edd41e27d18a28
SHA5127be4ef0be45ca86c74fcc0a599f23604696acfd6236b242e9f4519ee8e7aad33f6f68cfaa7c2edd5067bbd69ea31cfda5a77a9386cc126cf88588d7917510622
-
Filesize
529KB
MD578ccdb726dd25c1db093e9440e0d5b3e
SHA169de83fb054ddc3832beef3d92c4eff07214c5ff
SHA25674b49262d7ab691a97cf42c5f32385f3f46dfad3c3c02e49f9edd41e27d18a28
SHA5127be4ef0be45ca86c74fcc0a599f23604696acfd6236b242e9f4519ee8e7aad33f6f68cfaa7c2edd5067bbd69ea31cfda5a77a9386cc126cf88588d7917510622
-
Filesize
169KB
MD5d76ed2d8813c064822fdbe845d726ac7
SHA1ac10dbd42fbc220f99de2ff0dadefddd2a15f1cb
SHA2561a389b50b7013f81555ce142311d184b99c4e1c88fcf79644f0034a4db5351a8
SHA512eb534ccf9de7f245d76125768e94d6f88dc4dd9931730e9a8c8b84c1c00492fb881f49494d916ac1cf79c876ccd1c709f59f792aa43c5244a5457ef9ee3d38dc
-
Filesize
169KB
MD5d76ed2d8813c064822fdbe845d726ac7
SHA1ac10dbd42fbc220f99de2ff0dadefddd2a15f1cb
SHA2561a389b50b7013f81555ce142311d184b99c4e1c88fcf79644f0034a4db5351a8
SHA512eb534ccf9de7f245d76125768e94d6f88dc4dd9931730e9a8c8b84c1c00492fb881f49494d916ac1cf79c876ccd1c709f59f792aa43c5244a5457ef9ee3d38dc
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf