Analysis
-
max time kernel
149s -
max time network
187s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06-05-2023 22:54
Static task
static1
Behavioral task
behavioral1
Sample
0a798259526762d68920a658209b0e6416f495a2127e182c135bff029f5ba8eb.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0a798259526762d68920a658209b0e6416f495a2127e182c135bff029f5ba8eb.exe
Resource
win10v2004-20230220-en
General
-
Target
0a798259526762d68920a658209b0e6416f495a2127e182c135bff029f5ba8eb.exe
-
Size
1.2MB
-
MD5
fc81f8ae4764baf58422360378dcc1d1
-
SHA1
6fce0e598acc363480c335c832abe90c13d2424a
-
SHA256
0a798259526762d68920a658209b0e6416f495a2127e182c135bff029f5ba8eb
-
SHA512
46dc9a8c3d74031b0a8b9672959479204482da291d4e187b45a77714514ce15ee27da3c0e47552157ecf2fa204706c8c9eb38826a5906e49d658b9355a2649e3
-
SSDEEP
24576:dyzLpnrPguE1MyaCLUA1FsyfNh/JS+38nvdSwsDKTM53:4v5KaCgA1FsYNtKvDsDKT
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
z25338459.exez81714914.exez88885603.exes89183155.exe1.exet54576409.exepid process 2036 z25338459.exe 1280 z81714914.exe 676 z88885603.exe 1780 s89183155.exe 1452 1.exe 1052 t54576409.exe -
Loads dropped DLL 13 IoCs
Processes:
0a798259526762d68920a658209b0e6416f495a2127e182c135bff029f5ba8eb.exez25338459.exez81714914.exez88885603.exes89183155.exe1.exet54576409.exepid process 1276 0a798259526762d68920a658209b0e6416f495a2127e182c135bff029f5ba8eb.exe 2036 z25338459.exe 2036 z25338459.exe 1280 z81714914.exe 1280 z81714914.exe 676 z88885603.exe 676 z88885603.exe 676 z88885603.exe 1780 s89183155.exe 1780 s89183155.exe 1452 1.exe 676 z88885603.exe 1052 t54576409.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
z81714914.exez88885603.exe0a798259526762d68920a658209b0e6416f495a2127e182c135bff029f5ba8eb.exez25338459.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z81714914.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z81714914.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z88885603.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z88885603.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0a798259526762d68920a658209b0e6416f495a2127e182c135bff029f5ba8eb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0a798259526762d68920a658209b0e6416f495a2127e182c135bff029f5ba8eb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z25338459.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z25338459.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
s89183155.exedescription pid process Token: SeDebugPrivilege 1780 s89183155.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
0a798259526762d68920a658209b0e6416f495a2127e182c135bff029f5ba8eb.exez25338459.exez81714914.exez88885603.exes89183155.exedescription pid process target process PID 1276 wrote to memory of 2036 1276 0a798259526762d68920a658209b0e6416f495a2127e182c135bff029f5ba8eb.exe z25338459.exe PID 1276 wrote to memory of 2036 1276 0a798259526762d68920a658209b0e6416f495a2127e182c135bff029f5ba8eb.exe z25338459.exe PID 1276 wrote to memory of 2036 1276 0a798259526762d68920a658209b0e6416f495a2127e182c135bff029f5ba8eb.exe z25338459.exe PID 1276 wrote to memory of 2036 1276 0a798259526762d68920a658209b0e6416f495a2127e182c135bff029f5ba8eb.exe z25338459.exe PID 1276 wrote to memory of 2036 1276 0a798259526762d68920a658209b0e6416f495a2127e182c135bff029f5ba8eb.exe z25338459.exe PID 1276 wrote to memory of 2036 1276 0a798259526762d68920a658209b0e6416f495a2127e182c135bff029f5ba8eb.exe z25338459.exe PID 1276 wrote to memory of 2036 1276 0a798259526762d68920a658209b0e6416f495a2127e182c135bff029f5ba8eb.exe z25338459.exe PID 2036 wrote to memory of 1280 2036 z25338459.exe z81714914.exe PID 2036 wrote to memory of 1280 2036 z25338459.exe z81714914.exe PID 2036 wrote to memory of 1280 2036 z25338459.exe z81714914.exe PID 2036 wrote to memory of 1280 2036 z25338459.exe z81714914.exe PID 2036 wrote to memory of 1280 2036 z25338459.exe z81714914.exe PID 2036 wrote to memory of 1280 2036 z25338459.exe z81714914.exe PID 2036 wrote to memory of 1280 2036 z25338459.exe z81714914.exe PID 1280 wrote to memory of 676 1280 z81714914.exe z88885603.exe PID 1280 wrote to memory of 676 1280 z81714914.exe z88885603.exe PID 1280 wrote to memory of 676 1280 z81714914.exe z88885603.exe PID 1280 wrote to memory of 676 1280 z81714914.exe z88885603.exe PID 1280 wrote to memory of 676 1280 z81714914.exe z88885603.exe PID 1280 wrote to memory of 676 1280 z81714914.exe z88885603.exe PID 1280 wrote to memory of 676 1280 z81714914.exe z88885603.exe PID 676 wrote to memory of 1780 676 z88885603.exe s89183155.exe PID 676 wrote to memory of 1780 676 z88885603.exe s89183155.exe PID 676 wrote to memory of 1780 676 z88885603.exe s89183155.exe PID 676 wrote to memory of 1780 676 z88885603.exe s89183155.exe PID 676 wrote to memory of 1780 676 z88885603.exe s89183155.exe PID 676 wrote to memory of 1780 676 z88885603.exe s89183155.exe PID 676 wrote to memory of 1780 676 z88885603.exe s89183155.exe PID 1780 wrote to memory of 1452 1780 s89183155.exe 1.exe PID 1780 wrote to memory of 1452 1780 s89183155.exe 1.exe PID 1780 wrote to memory of 1452 1780 s89183155.exe 1.exe PID 1780 wrote to memory of 1452 1780 s89183155.exe 1.exe PID 1780 wrote to memory of 1452 1780 s89183155.exe 1.exe PID 1780 wrote to memory of 1452 1780 s89183155.exe 1.exe PID 1780 wrote to memory of 1452 1780 s89183155.exe 1.exe PID 676 wrote to memory of 1052 676 z88885603.exe t54576409.exe PID 676 wrote to memory of 1052 676 z88885603.exe t54576409.exe PID 676 wrote to memory of 1052 676 z88885603.exe t54576409.exe PID 676 wrote to memory of 1052 676 z88885603.exe t54576409.exe PID 676 wrote to memory of 1052 676 z88885603.exe t54576409.exe PID 676 wrote to memory of 1052 676 z88885603.exe t54576409.exe PID 676 wrote to memory of 1052 676 z88885603.exe t54576409.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a798259526762d68920a658209b0e6416f495a2127e182c135bff029f5ba8eb.exe"C:\Users\Admin\AppData\Local\Temp\0a798259526762d68920a658209b0e6416f495a2127e182c135bff029f5ba8eb.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z25338459.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z25338459.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z81714914.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z81714914.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z88885603.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z88885603.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s89183155.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s89183155.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1452
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t54576409.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t54576409.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1052
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD560a2f52ff9556f92032a812b24dfc4ee
SHA15216048132b4f507839bb686037b39e3aedf2d6d
SHA256ef3153474ede9f02e0a737948666db35d05e082fff6cf518f01524a023f3bf51
SHA512c849c016b17a6171013f4020486f1287ef18ecb9e865cc0ca74af739256ec4a38ea4339147d27940d6df5f6657efe308e9be62172f0a90c5d9f52020d6c59859
-
Filesize
1.0MB
MD560a2f52ff9556f92032a812b24dfc4ee
SHA15216048132b4f507839bb686037b39e3aedf2d6d
SHA256ef3153474ede9f02e0a737948666db35d05e082fff6cf518f01524a023f3bf51
SHA512c849c016b17a6171013f4020486f1287ef18ecb9e865cc0ca74af739256ec4a38ea4339147d27940d6df5f6657efe308e9be62172f0a90c5d9f52020d6c59859
-
Filesize
753KB
MD52594aebeef67a9d17be886f881b40755
SHA1fe5dda6aad2552759f98fb21d743d63064ddd32e
SHA2560b183a8b9e9b84e8809e3e7d1695b6f27ef23fa09b10ec89c5c44f2a78e71393
SHA5123780fbfea71e5fb2dce163110e2acf1e50498c38f1ec44791be2622b733439d146a8dadfa29be5975840cdf3bebbe26e592e6530c4ecbb46c0541ae06fa7d61a
-
Filesize
753KB
MD52594aebeef67a9d17be886f881b40755
SHA1fe5dda6aad2552759f98fb21d743d63064ddd32e
SHA2560b183a8b9e9b84e8809e3e7d1695b6f27ef23fa09b10ec89c5c44f2a78e71393
SHA5123780fbfea71e5fb2dce163110e2acf1e50498c38f1ec44791be2622b733439d146a8dadfa29be5975840cdf3bebbe26e592e6530c4ecbb46c0541ae06fa7d61a
-
Filesize
570KB
MD59eb4fe183529c655eba749f8fb47b335
SHA1b79bfc5796063019d7307ada17bc84084c7e9990
SHA25662de75667849eaf159b01a0996e20e28c57fb7fa47f2e2f035f0a6e79f86e065
SHA5122748e9b16f6ffd9ed23823031a66d96ece21b8b5d1534e7dd5a6419a94390d469c785619b803c1394ad853ba168aa1677a661158d4093da66011498d5345481b
-
Filesize
570KB
MD59eb4fe183529c655eba749f8fb47b335
SHA1b79bfc5796063019d7307ada17bc84084c7e9990
SHA25662de75667849eaf159b01a0996e20e28c57fb7fa47f2e2f035f0a6e79f86e065
SHA5122748e9b16f6ffd9ed23823031a66d96ece21b8b5d1534e7dd5a6419a94390d469c785619b803c1394ad853ba168aa1677a661158d4093da66011498d5345481b
-
Filesize
488KB
MD5dee6e031a2d429af3c97b6e62572c162
SHA1f4ffd3e2ee77c33795583b0cae9da9c18ba20752
SHA256bc77263513e15e1c3644acdf2c78108adb6673e8bd8e28ac37d16d7642de8721
SHA51220787cafb60e8f59ef27bd66295e6e707de1f5178dea9a4e2dd486ceac353c4c6c942e8e8de0965b5089629195223a359cdc994c5734c4d3c2567f2366def700
-
Filesize
488KB
MD5dee6e031a2d429af3c97b6e62572c162
SHA1f4ffd3e2ee77c33795583b0cae9da9c18ba20752
SHA256bc77263513e15e1c3644acdf2c78108adb6673e8bd8e28ac37d16d7642de8721
SHA51220787cafb60e8f59ef27bd66295e6e707de1f5178dea9a4e2dd486ceac353c4c6c942e8e8de0965b5089629195223a359cdc994c5734c4d3c2567f2366def700
-
Filesize
488KB
MD5dee6e031a2d429af3c97b6e62572c162
SHA1f4ffd3e2ee77c33795583b0cae9da9c18ba20752
SHA256bc77263513e15e1c3644acdf2c78108adb6673e8bd8e28ac37d16d7642de8721
SHA51220787cafb60e8f59ef27bd66295e6e707de1f5178dea9a4e2dd486ceac353c4c6c942e8e8de0965b5089629195223a359cdc994c5734c4d3c2567f2366def700
-
Filesize
170KB
MD5851d1031f7fc8a25bcd44733cd9ca354
SHA1f3110f08bff21ab0a53ab796232145238f47f581
SHA256d2659a2672012556a0504b1bd11f63a29c2b84bc8b6f2a4782412d9c99a68965
SHA512bc4d39eadbec54eb13515e0c07f756e250dc0e0707a241fcf826a0e5443560351f923e9232a84e98674bfe6e68baada7ca370e2fdfb3e11cb5ec884fd52a3750
-
Filesize
170KB
MD5851d1031f7fc8a25bcd44733cd9ca354
SHA1f3110f08bff21ab0a53ab796232145238f47f581
SHA256d2659a2672012556a0504b1bd11f63a29c2b84bc8b6f2a4782412d9c99a68965
SHA512bc4d39eadbec54eb13515e0c07f756e250dc0e0707a241fcf826a0e5443560351f923e9232a84e98674bfe6e68baada7ca370e2fdfb3e11cb5ec884fd52a3750
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
1.0MB
MD560a2f52ff9556f92032a812b24dfc4ee
SHA15216048132b4f507839bb686037b39e3aedf2d6d
SHA256ef3153474ede9f02e0a737948666db35d05e082fff6cf518f01524a023f3bf51
SHA512c849c016b17a6171013f4020486f1287ef18ecb9e865cc0ca74af739256ec4a38ea4339147d27940d6df5f6657efe308e9be62172f0a90c5d9f52020d6c59859
-
Filesize
1.0MB
MD560a2f52ff9556f92032a812b24dfc4ee
SHA15216048132b4f507839bb686037b39e3aedf2d6d
SHA256ef3153474ede9f02e0a737948666db35d05e082fff6cf518f01524a023f3bf51
SHA512c849c016b17a6171013f4020486f1287ef18ecb9e865cc0ca74af739256ec4a38ea4339147d27940d6df5f6657efe308e9be62172f0a90c5d9f52020d6c59859
-
Filesize
753KB
MD52594aebeef67a9d17be886f881b40755
SHA1fe5dda6aad2552759f98fb21d743d63064ddd32e
SHA2560b183a8b9e9b84e8809e3e7d1695b6f27ef23fa09b10ec89c5c44f2a78e71393
SHA5123780fbfea71e5fb2dce163110e2acf1e50498c38f1ec44791be2622b733439d146a8dadfa29be5975840cdf3bebbe26e592e6530c4ecbb46c0541ae06fa7d61a
-
Filesize
753KB
MD52594aebeef67a9d17be886f881b40755
SHA1fe5dda6aad2552759f98fb21d743d63064ddd32e
SHA2560b183a8b9e9b84e8809e3e7d1695b6f27ef23fa09b10ec89c5c44f2a78e71393
SHA5123780fbfea71e5fb2dce163110e2acf1e50498c38f1ec44791be2622b733439d146a8dadfa29be5975840cdf3bebbe26e592e6530c4ecbb46c0541ae06fa7d61a
-
Filesize
570KB
MD59eb4fe183529c655eba749f8fb47b335
SHA1b79bfc5796063019d7307ada17bc84084c7e9990
SHA25662de75667849eaf159b01a0996e20e28c57fb7fa47f2e2f035f0a6e79f86e065
SHA5122748e9b16f6ffd9ed23823031a66d96ece21b8b5d1534e7dd5a6419a94390d469c785619b803c1394ad853ba168aa1677a661158d4093da66011498d5345481b
-
Filesize
570KB
MD59eb4fe183529c655eba749f8fb47b335
SHA1b79bfc5796063019d7307ada17bc84084c7e9990
SHA25662de75667849eaf159b01a0996e20e28c57fb7fa47f2e2f035f0a6e79f86e065
SHA5122748e9b16f6ffd9ed23823031a66d96ece21b8b5d1534e7dd5a6419a94390d469c785619b803c1394ad853ba168aa1677a661158d4093da66011498d5345481b
-
Filesize
488KB
MD5dee6e031a2d429af3c97b6e62572c162
SHA1f4ffd3e2ee77c33795583b0cae9da9c18ba20752
SHA256bc77263513e15e1c3644acdf2c78108adb6673e8bd8e28ac37d16d7642de8721
SHA51220787cafb60e8f59ef27bd66295e6e707de1f5178dea9a4e2dd486ceac353c4c6c942e8e8de0965b5089629195223a359cdc994c5734c4d3c2567f2366def700
-
Filesize
488KB
MD5dee6e031a2d429af3c97b6e62572c162
SHA1f4ffd3e2ee77c33795583b0cae9da9c18ba20752
SHA256bc77263513e15e1c3644acdf2c78108adb6673e8bd8e28ac37d16d7642de8721
SHA51220787cafb60e8f59ef27bd66295e6e707de1f5178dea9a4e2dd486ceac353c4c6c942e8e8de0965b5089629195223a359cdc994c5734c4d3c2567f2366def700
-
Filesize
488KB
MD5dee6e031a2d429af3c97b6e62572c162
SHA1f4ffd3e2ee77c33795583b0cae9da9c18ba20752
SHA256bc77263513e15e1c3644acdf2c78108adb6673e8bd8e28ac37d16d7642de8721
SHA51220787cafb60e8f59ef27bd66295e6e707de1f5178dea9a4e2dd486ceac353c4c6c942e8e8de0965b5089629195223a359cdc994c5734c4d3c2567f2366def700
-
Filesize
170KB
MD5851d1031f7fc8a25bcd44733cd9ca354
SHA1f3110f08bff21ab0a53ab796232145238f47f581
SHA256d2659a2672012556a0504b1bd11f63a29c2b84bc8b6f2a4782412d9c99a68965
SHA512bc4d39eadbec54eb13515e0c07f756e250dc0e0707a241fcf826a0e5443560351f923e9232a84e98674bfe6e68baada7ca370e2fdfb3e11cb5ec884fd52a3750
-
Filesize
170KB
MD5851d1031f7fc8a25bcd44733cd9ca354
SHA1f3110f08bff21ab0a53ab796232145238f47f581
SHA256d2659a2672012556a0504b1bd11f63a29c2b84bc8b6f2a4782412d9c99a68965
SHA512bc4d39eadbec54eb13515e0c07f756e250dc0e0707a241fcf826a0e5443560351f923e9232a84e98674bfe6e68baada7ca370e2fdfb3e11cb5ec884fd52a3750
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf