Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 20:11
Static task
static1
Behavioral task
behavioral1
Sample
025b2053120d6931f561bacae0ac2a0326ad0ed5f05ae7fa27ce4840e90aa6d4.bin.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
025b2053120d6931f561bacae0ac2a0326ad0ed5f05ae7fa27ce4840e90aa6d4.bin.exe
Resource
win10v2004-20230220-en
General
-
Target
025b2053120d6931f561bacae0ac2a0326ad0ed5f05ae7fa27ce4840e90aa6d4.bin.exe
-
Size
1.5MB
-
MD5
9156b8249fd57e61aa2490d78cc2aff1
-
SHA1
839602d5d88af79809f52c600400280fcc49f7e1
-
SHA256
025b2053120d6931f561bacae0ac2a0326ad0ed5f05ae7fa27ce4840e90aa6d4
-
SHA512
a58b65546cb454de0c5a1aa9383e6e9c706bee28e441995999638d2faa33fafcde70fe52428a2a7d72ad9b0b4e40b9e1e7f3e456ddd5eda789b041ceaa1465fd
-
SSDEEP
24576:kyOnl2yFYKDokXGSy/7Gu3qWTdHqZEr9V3wzOECwM92Oxq+qds57BgCx:zUHFYJyGS8TdK4MyB1924gdA7
Malware Config
Extracted
redline
most
185.161.248.73:4164
-
auth_value
7da4dfa153f2919e617aa016f7c36008
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 1868 i51408402.exe 1352 i33535751.exe 1328 i32538085.exe 1628 i68294020.exe 112 a91175423.exe -
Loads dropped DLL 10 IoCs
pid Process 1692 025b2053120d6931f561bacae0ac2a0326ad0ed5f05ae7fa27ce4840e90aa6d4.bin.exe 1868 i51408402.exe 1868 i51408402.exe 1352 i33535751.exe 1352 i33535751.exe 1328 i32538085.exe 1328 i32538085.exe 1628 i68294020.exe 1628 i68294020.exe 112 a91175423.exe -
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 025b2053120d6931f561bacae0ac2a0326ad0ed5f05ae7fa27ce4840e90aa6d4.bin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" i51408402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" i33535751.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce i32538085.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" i32538085.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" i68294020.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 025b2053120d6931f561bacae0ac2a0326ad0ed5f05ae7fa27ce4840e90aa6d4.bin.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce i51408402.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce i33535751.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce i68294020.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 1692 wrote to memory of 1868 1692 025b2053120d6931f561bacae0ac2a0326ad0ed5f05ae7fa27ce4840e90aa6d4.bin.exe 27 PID 1692 wrote to memory of 1868 1692 025b2053120d6931f561bacae0ac2a0326ad0ed5f05ae7fa27ce4840e90aa6d4.bin.exe 27 PID 1692 wrote to memory of 1868 1692 025b2053120d6931f561bacae0ac2a0326ad0ed5f05ae7fa27ce4840e90aa6d4.bin.exe 27 PID 1692 wrote to memory of 1868 1692 025b2053120d6931f561bacae0ac2a0326ad0ed5f05ae7fa27ce4840e90aa6d4.bin.exe 27 PID 1692 wrote to memory of 1868 1692 025b2053120d6931f561bacae0ac2a0326ad0ed5f05ae7fa27ce4840e90aa6d4.bin.exe 27 PID 1692 wrote to memory of 1868 1692 025b2053120d6931f561bacae0ac2a0326ad0ed5f05ae7fa27ce4840e90aa6d4.bin.exe 27 PID 1692 wrote to memory of 1868 1692 025b2053120d6931f561bacae0ac2a0326ad0ed5f05ae7fa27ce4840e90aa6d4.bin.exe 27 PID 1868 wrote to memory of 1352 1868 i51408402.exe 28 PID 1868 wrote to memory of 1352 1868 i51408402.exe 28 PID 1868 wrote to memory of 1352 1868 i51408402.exe 28 PID 1868 wrote to memory of 1352 1868 i51408402.exe 28 PID 1868 wrote to memory of 1352 1868 i51408402.exe 28 PID 1868 wrote to memory of 1352 1868 i51408402.exe 28 PID 1868 wrote to memory of 1352 1868 i51408402.exe 28 PID 1352 wrote to memory of 1328 1352 i33535751.exe 29 PID 1352 wrote to memory of 1328 1352 i33535751.exe 29 PID 1352 wrote to memory of 1328 1352 i33535751.exe 29 PID 1352 wrote to memory of 1328 1352 i33535751.exe 29 PID 1352 wrote to memory of 1328 1352 i33535751.exe 29 PID 1352 wrote to memory of 1328 1352 i33535751.exe 29 PID 1352 wrote to memory of 1328 1352 i33535751.exe 29 PID 1328 wrote to memory of 1628 1328 i32538085.exe 30 PID 1328 wrote to memory of 1628 1328 i32538085.exe 30 PID 1328 wrote to memory of 1628 1328 i32538085.exe 30 PID 1328 wrote to memory of 1628 1328 i32538085.exe 30 PID 1328 wrote to memory of 1628 1328 i32538085.exe 30 PID 1328 wrote to memory of 1628 1328 i32538085.exe 30 PID 1328 wrote to memory of 1628 1328 i32538085.exe 30 PID 1628 wrote to memory of 112 1628 i68294020.exe 31 PID 1628 wrote to memory of 112 1628 i68294020.exe 31 PID 1628 wrote to memory of 112 1628 i68294020.exe 31 PID 1628 wrote to memory of 112 1628 i68294020.exe 31 PID 1628 wrote to memory of 112 1628 i68294020.exe 31 PID 1628 wrote to memory of 112 1628 i68294020.exe 31 PID 1628 wrote to memory of 112 1628 i68294020.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\025b2053120d6931f561bacae0ac2a0326ad0ed5f05ae7fa27ce4840e90aa6d4.bin.exe"C:\Users\Admin\AppData\Local\Temp\025b2053120d6931f561bacae0ac2a0326ad0ed5f05ae7fa27ce4840e90aa6d4.bin.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i51408402.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i51408402.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i33535751.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i33535751.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i32538085.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i32538085.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i68294020.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i68294020.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a91175423.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a91175423.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:112
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD56416584652f8ba8c3d2c09fd9e53ae38
SHA10291aa50ccca1a61cdaa87e9f9ec4276c3386cd4
SHA256172371d1088655993d731bbc92dbc0159608616bce3278cc02f87d4ab5e152ee
SHA512d11d3b6f0b90586a1b496a289e582c50efca0b2b0f8ab7b748ac4c8aac481790e02ea86b04f61a3f4877f21e4ebef903312bcee0be82dacb404f790cb711cff9
-
Filesize
1.3MB
MD56416584652f8ba8c3d2c09fd9e53ae38
SHA10291aa50ccca1a61cdaa87e9f9ec4276c3386cd4
SHA256172371d1088655993d731bbc92dbc0159608616bce3278cc02f87d4ab5e152ee
SHA512d11d3b6f0b90586a1b496a289e582c50efca0b2b0f8ab7b748ac4c8aac481790e02ea86b04f61a3f4877f21e4ebef903312bcee0be82dacb404f790cb711cff9
-
Filesize
1014KB
MD51ab699d67803c2b6caa24e3aac094f37
SHA1d699e4f72292185cc0de5eb171f3eefe217ac2f7
SHA25682436e96350ed9613745e8fc267dc92eedfd9735520204deb3543301050acfac
SHA5126dc34c85339406e4a9930bb024b0eb974e3280382da02f0d92a89afdd24e0fe24c75baf53af41178cb777d8fe0d2618088a70618b77eb0e4aa84d86123d668dc
-
Filesize
1014KB
MD51ab699d67803c2b6caa24e3aac094f37
SHA1d699e4f72292185cc0de5eb171f3eefe217ac2f7
SHA25682436e96350ed9613745e8fc267dc92eedfd9735520204deb3543301050acfac
SHA5126dc34c85339406e4a9930bb024b0eb974e3280382da02f0d92a89afdd24e0fe24c75baf53af41178cb777d8fe0d2618088a70618b77eb0e4aa84d86123d668dc
-
Filesize
842KB
MD5f7d098e0dc5d66d127009c2c6a432f38
SHA1346655b9f9239256bd7a405823c5475c68059b74
SHA256406f551aa4a126e4ebc88b00d12dc44113539fa9b4f3427f4ca36b3c13bc4226
SHA51212c5dd2a07c04096c8dc1b40617cea22653ba90e8671da77a76aa4a537f74d1998813ea081946bb38be8c6ddf040e488ea12a2efcc30b0b1b402c522a9a9a268
-
Filesize
842KB
MD5f7d098e0dc5d66d127009c2c6a432f38
SHA1346655b9f9239256bd7a405823c5475c68059b74
SHA256406f551aa4a126e4ebc88b00d12dc44113539fa9b4f3427f4ca36b3c13bc4226
SHA51212c5dd2a07c04096c8dc1b40617cea22653ba90e8671da77a76aa4a537f74d1998813ea081946bb38be8c6ddf040e488ea12a2efcc30b0b1b402c522a9a9a268
-
Filesize
370KB
MD53f97db5e35c6c8fc4e422584befdb004
SHA1f0bf59dac1409323c8e2a019ce13406148601479
SHA2564ca13ab19d1c03fae68377ed66db38874914936a9a7393eae9067ff4784d2693
SHA51293a45d4f8ab27db9abb93ac1f05fe949e8f18d6c6f73b1ec8569f639dfb212031fa62f373047ab54bba3080bad88939b43f490b1dd4042830a0ad9bf5f56b44c
-
Filesize
370KB
MD53f97db5e35c6c8fc4e422584befdb004
SHA1f0bf59dac1409323c8e2a019ce13406148601479
SHA2564ca13ab19d1c03fae68377ed66db38874914936a9a7393eae9067ff4784d2693
SHA51293a45d4f8ab27db9abb93ac1f05fe949e8f18d6c6f73b1ec8569f639dfb212031fa62f373047ab54bba3080bad88939b43f490b1dd4042830a0ad9bf5f56b44c
-
Filesize
169KB
MD5e9e4662dc1ee9b72bf650e154973cf7e
SHA1c55cd32d1008b4c119648e4748ee21b92ed81905
SHA256c6b5f284a320746214f909da086aaaecdad1d890e3d5683048d345616638f2d9
SHA512712461888e6c9a0aa4d732812fa9a201d4c49e73572c04e4466af3f5044aaad1137b87a5a8e373fb929a6cf22b9263835e5b43d04935d2e97ce73d98adbe0945
-
Filesize
169KB
MD5e9e4662dc1ee9b72bf650e154973cf7e
SHA1c55cd32d1008b4c119648e4748ee21b92ed81905
SHA256c6b5f284a320746214f909da086aaaecdad1d890e3d5683048d345616638f2d9
SHA512712461888e6c9a0aa4d732812fa9a201d4c49e73572c04e4466af3f5044aaad1137b87a5a8e373fb929a6cf22b9263835e5b43d04935d2e97ce73d98adbe0945
-
Filesize
1.3MB
MD56416584652f8ba8c3d2c09fd9e53ae38
SHA10291aa50ccca1a61cdaa87e9f9ec4276c3386cd4
SHA256172371d1088655993d731bbc92dbc0159608616bce3278cc02f87d4ab5e152ee
SHA512d11d3b6f0b90586a1b496a289e582c50efca0b2b0f8ab7b748ac4c8aac481790e02ea86b04f61a3f4877f21e4ebef903312bcee0be82dacb404f790cb711cff9
-
Filesize
1.3MB
MD56416584652f8ba8c3d2c09fd9e53ae38
SHA10291aa50ccca1a61cdaa87e9f9ec4276c3386cd4
SHA256172371d1088655993d731bbc92dbc0159608616bce3278cc02f87d4ab5e152ee
SHA512d11d3b6f0b90586a1b496a289e582c50efca0b2b0f8ab7b748ac4c8aac481790e02ea86b04f61a3f4877f21e4ebef903312bcee0be82dacb404f790cb711cff9
-
Filesize
1014KB
MD51ab699d67803c2b6caa24e3aac094f37
SHA1d699e4f72292185cc0de5eb171f3eefe217ac2f7
SHA25682436e96350ed9613745e8fc267dc92eedfd9735520204deb3543301050acfac
SHA5126dc34c85339406e4a9930bb024b0eb974e3280382da02f0d92a89afdd24e0fe24c75baf53af41178cb777d8fe0d2618088a70618b77eb0e4aa84d86123d668dc
-
Filesize
1014KB
MD51ab699d67803c2b6caa24e3aac094f37
SHA1d699e4f72292185cc0de5eb171f3eefe217ac2f7
SHA25682436e96350ed9613745e8fc267dc92eedfd9735520204deb3543301050acfac
SHA5126dc34c85339406e4a9930bb024b0eb974e3280382da02f0d92a89afdd24e0fe24c75baf53af41178cb777d8fe0d2618088a70618b77eb0e4aa84d86123d668dc
-
Filesize
842KB
MD5f7d098e0dc5d66d127009c2c6a432f38
SHA1346655b9f9239256bd7a405823c5475c68059b74
SHA256406f551aa4a126e4ebc88b00d12dc44113539fa9b4f3427f4ca36b3c13bc4226
SHA51212c5dd2a07c04096c8dc1b40617cea22653ba90e8671da77a76aa4a537f74d1998813ea081946bb38be8c6ddf040e488ea12a2efcc30b0b1b402c522a9a9a268
-
Filesize
842KB
MD5f7d098e0dc5d66d127009c2c6a432f38
SHA1346655b9f9239256bd7a405823c5475c68059b74
SHA256406f551aa4a126e4ebc88b00d12dc44113539fa9b4f3427f4ca36b3c13bc4226
SHA51212c5dd2a07c04096c8dc1b40617cea22653ba90e8671da77a76aa4a537f74d1998813ea081946bb38be8c6ddf040e488ea12a2efcc30b0b1b402c522a9a9a268
-
Filesize
370KB
MD53f97db5e35c6c8fc4e422584befdb004
SHA1f0bf59dac1409323c8e2a019ce13406148601479
SHA2564ca13ab19d1c03fae68377ed66db38874914936a9a7393eae9067ff4784d2693
SHA51293a45d4f8ab27db9abb93ac1f05fe949e8f18d6c6f73b1ec8569f639dfb212031fa62f373047ab54bba3080bad88939b43f490b1dd4042830a0ad9bf5f56b44c
-
Filesize
370KB
MD53f97db5e35c6c8fc4e422584befdb004
SHA1f0bf59dac1409323c8e2a019ce13406148601479
SHA2564ca13ab19d1c03fae68377ed66db38874914936a9a7393eae9067ff4784d2693
SHA51293a45d4f8ab27db9abb93ac1f05fe949e8f18d6c6f73b1ec8569f639dfb212031fa62f373047ab54bba3080bad88939b43f490b1dd4042830a0ad9bf5f56b44c
-
Filesize
169KB
MD5e9e4662dc1ee9b72bf650e154973cf7e
SHA1c55cd32d1008b4c119648e4748ee21b92ed81905
SHA256c6b5f284a320746214f909da086aaaecdad1d890e3d5683048d345616638f2d9
SHA512712461888e6c9a0aa4d732812fa9a201d4c49e73572c04e4466af3f5044aaad1137b87a5a8e373fb929a6cf22b9263835e5b43d04935d2e97ce73d98adbe0945
-
Filesize
169KB
MD5e9e4662dc1ee9b72bf650e154973cf7e
SHA1c55cd32d1008b4c119648e4748ee21b92ed81905
SHA256c6b5f284a320746214f909da086aaaecdad1d890e3d5683048d345616638f2d9
SHA512712461888e6c9a0aa4d732812fa9a201d4c49e73572c04e4466af3f5044aaad1137b87a5a8e373fb929a6cf22b9263835e5b43d04935d2e97ce73d98adbe0945