Analysis
-
max time kernel
239s -
max time network
346s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 21:11
Static task
static1
Behavioral task
behavioral1
Sample
2f789c2ea5567520c4e90ece6735278ecb3939c4e2f889667f061daf72d0e20a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2f789c2ea5567520c4e90ece6735278ecb3939c4e2f889667f061daf72d0e20a.exe
Resource
win10v2004-20230220-en
General
-
Target
2f789c2ea5567520c4e90ece6735278ecb3939c4e2f889667f061daf72d0e20a.exe
-
Size
874KB
-
MD5
2f72b3937b502dc83e42314dded399d9
-
SHA1
e4f96fa924bd5edb7cd16e8aaf7b2ce04ce68539
-
SHA256
2f789c2ea5567520c4e90ece6735278ecb3939c4e2f889667f061daf72d0e20a
-
SHA512
b48ca912c4ee4030fe7ad9d6f48c7e27d01ff75e2b95d45aabcecc2803105aaf7b298454cfaf052321143772eac28f99e3189173e481fdd0002d77890d2c4dc4
-
SSDEEP
24576:SyO/nfxcUbEBh421LHIYX27RUs9vueSG98tyCHgt:5EfCGED4gLvXaNRueZ9M
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dark
185.161.248.73:4164
-
auth_value
ae85b01f66afe8770afeed560513fc2d
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1296 y83995303.exe 1368 p77428762.exe 1472 1.exe 924 r10218552.exe -
Loads dropped DLL 9 IoCs
pid Process 472 2f789c2ea5567520c4e90ece6735278ecb3939c4e2f889667f061daf72d0e20a.exe 1296 y83995303.exe 1296 y83995303.exe 1296 y83995303.exe 1368 p77428762.exe 1368 p77428762.exe 1472 1.exe 1296 y83995303.exe 924 r10218552.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y83995303.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y83995303.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2f789c2ea5567520c4e90ece6735278ecb3939c4e2f889667f061daf72d0e20a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2f789c2ea5567520c4e90ece6735278ecb3939c4e2f889667f061daf72d0e20a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1368 p77428762.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 472 wrote to memory of 1296 472 2f789c2ea5567520c4e90ece6735278ecb3939c4e2f889667f061daf72d0e20a.exe 28 PID 472 wrote to memory of 1296 472 2f789c2ea5567520c4e90ece6735278ecb3939c4e2f889667f061daf72d0e20a.exe 28 PID 472 wrote to memory of 1296 472 2f789c2ea5567520c4e90ece6735278ecb3939c4e2f889667f061daf72d0e20a.exe 28 PID 472 wrote to memory of 1296 472 2f789c2ea5567520c4e90ece6735278ecb3939c4e2f889667f061daf72d0e20a.exe 28 PID 472 wrote to memory of 1296 472 2f789c2ea5567520c4e90ece6735278ecb3939c4e2f889667f061daf72d0e20a.exe 28 PID 472 wrote to memory of 1296 472 2f789c2ea5567520c4e90ece6735278ecb3939c4e2f889667f061daf72d0e20a.exe 28 PID 472 wrote to memory of 1296 472 2f789c2ea5567520c4e90ece6735278ecb3939c4e2f889667f061daf72d0e20a.exe 28 PID 1296 wrote to memory of 1368 1296 y83995303.exe 29 PID 1296 wrote to memory of 1368 1296 y83995303.exe 29 PID 1296 wrote to memory of 1368 1296 y83995303.exe 29 PID 1296 wrote to memory of 1368 1296 y83995303.exe 29 PID 1296 wrote to memory of 1368 1296 y83995303.exe 29 PID 1296 wrote to memory of 1368 1296 y83995303.exe 29 PID 1296 wrote to memory of 1368 1296 y83995303.exe 29 PID 1368 wrote to memory of 1472 1368 p77428762.exe 30 PID 1368 wrote to memory of 1472 1368 p77428762.exe 30 PID 1368 wrote to memory of 1472 1368 p77428762.exe 30 PID 1368 wrote to memory of 1472 1368 p77428762.exe 30 PID 1368 wrote to memory of 1472 1368 p77428762.exe 30 PID 1368 wrote to memory of 1472 1368 p77428762.exe 30 PID 1368 wrote to memory of 1472 1368 p77428762.exe 30 PID 1296 wrote to memory of 924 1296 y83995303.exe 31 PID 1296 wrote to memory of 924 1296 y83995303.exe 31 PID 1296 wrote to memory of 924 1296 y83995303.exe 31 PID 1296 wrote to memory of 924 1296 y83995303.exe 31 PID 1296 wrote to memory of 924 1296 y83995303.exe 31 PID 1296 wrote to memory of 924 1296 y83995303.exe 31 PID 1296 wrote to memory of 924 1296 y83995303.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f789c2ea5567520c4e90ece6735278ecb3939c4e2f889667f061daf72d0e20a.exe"C:\Users\Admin\AppData\Local\Temp\2f789c2ea5567520c4e90ece6735278ecb3939c4e2f889667f061daf72d0e20a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y83995303.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y83995303.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p77428762.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p77428762.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1472
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r10218552.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r10218552.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:924
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
582KB
MD5ef4bebb74ee1e97ec7966ce172a19e87
SHA1d905c9134493fec6dba69483344bafa0829b2f56
SHA256217d0d6cacaefc0cc070491472f017fb3afd73de942b24ca0f4b4c414104adc2
SHA512f66dee151124fce233ab4a89c13b7285ddcca21b3e3ac5cbd72f009ace622938c50ca6c29d9265a3920f93dd0d0ab9815992445613b2b651e82d3282ce0194fa
-
Filesize
582KB
MD5ef4bebb74ee1e97ec7966ce172a19e87
SHA1d905c9134493fec6dba69483344bafa0829b2f56
SHA256217d0d6cacaefc0cc070491472f017fb3afd73de942b24ca0f4b4c414104adc2
SHA512f66dee151124fce233ab4a89c13b7285ddcca21b3e3ac5cbd72f009ace622938c50ca6c29d9265a3920f93dd0d0ab9815992445613b2b651e82d3282ce0194fa
-
Filesize
582KB
MD5d8db05f0ead83db396cbb5eee4a5f589
SHA14ca14dbfeb87a7e0597c838d9928e832d6ed97d8
SHA256eff25953a3638aac11a141b0142835eaaae0ce5fc9600e93f7534e2dc2a2d88f
SHA512df6c1e4c851a674cdd340810a3b75b4a98d7c41634ae00942265a2fe54bb4ab6f8f43f94841d07f9dd0c571f2a6140f0b55da97e09e82f2a78e50d9e0f72ad18
-
Filesize
582KB
MD5d8db05f0ead83db396cbb5eee4a5f589
SHA14ca14dbfeb87a7e0597c838d9928e832d6ed97d8
SHA256eff25953a3638aac11a141b0142835eaaae0ce5fc9600e93f7534e2dc2a2d88f
SHA512df6c1e4c851a674cdd340810a3b75b4a98d7c41634ae00942265a2fe54bb4ab6f8f43f94841d07f9dd0c571f2a6140f0b55da97e09e82f2a78e50d9e0f72ad18
-
Filesize
582KB
MD5d8db05f0ead83db396cbb5eee4a5f589
SHA14ca14dbfeb87a7e0597c838d9928e832d6ed97d8
SHA256eff25953a3638aac11a141b0142835eaaae0ce5fc9600e93f7534e2dc2a2d88f
SHA512df6c1e4c851a674cdd340810a3b75b4a98d7c41634ae00942265a2fe54bb4ab6f8f43f94841d07f9dd0c571f2a6140f0b55da97e09e82f2a78e50d9e0f72ad18
-
Filesize
171KB
MD5c84bb4afd5fe3ebf50b2ae46299a44bd
SHA16750b6f77cbf77a7c8ae38d5e3dd643d362ba759
SHA256ec6bf945134bbdab601b782234f8a937d1d5466df92fe76cf1549d9ec44aafed
SHA5127a18c64096d6b290122779109f5a1630e2723bb46aadee41bc33653c0f88db123ebac29b37ea2a5f6a905deba2f902b7ce828a9b9046b2b47a53f1043404ecf2
-
Filesize
171KB
MD5c84bb4afd5fe3ebf50b2ae46299a44bd
SHA16750b6f77cbf77a7c8ae38d5e3dd643d362ba759
SHA256ec6bf945134bbdab601b782234f8a937d1d5466df92fe76cf1549d9ec44aafed
SHA5127a18c64096d6b290122779109f5a1630e2723bb46aadee41bc33653c0f88db123ebac29b37ea2a5f6a905deba2f902b7ce828a9b9046b2b47a53f1043404ecf2
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
582KB
MD5ef4bebb74ee1e97ec7966ce172a19e87
SHA1d905c9134493fec6dba69483344bafa0829b2f56
SHA256217d0d6cacaefc0cc070491472f017fb3afd73de942b24ca0f4b4c414104adc2
SHA512f66dee151124fce233ab4a89c13b7285ddcca21b3e3ac5cbd72f009ace622938c50ca6c29d9265a3920f93dd0d0ab9815992445613b2b651e82d3282ce0194fa
-
Filesize
582KB
MD5ef4bebb74ee1e97ec7966ce172a19e87
SHA1d905c9134493fec6dba69483344bafa0829b2f56
SHA256217d0d6cacaefc0cc070491472f017fb3afd73de942b24ca0f4b4c414104adc2
SHA512f66dee151124fce233ab4a89c13b7285ddcca21b3e3ac5cbd72f009ace622938c50ca6c29d9265a3920f93dd0d0ab9815992445613b2b651e82d3282ce0194fa
-
Filesize
582KB
MD5d8db05f0ead83db396cbb5eee4a5f589
SHA14ca14dbfeb87a7e0597c838d9928e832d6ed97d8
SHA256eff25953a3638aac11a141b0142835eaaae0ce5fc9600e93f7534e2dc2a2d88f
SHA512df6c1e4c851a674cdd340810a3b75b4a98d7c41634ae00942265a2fe54bb4ab6f8f43f94841d07f9dd0c571f2a6140f0b55da97e09e82f2a78e50d9e0f72ad18
-
Filesize
582KB
MD5d8db05f0ead83db396cbb5eee4a5f589
SHA14ca14dbfeb87a7e0597c838d9928e832d6ed97d8
SHA256eff25953a3638aac11a141b0142835eaaae0ce5fc9600e93f7534e2dc2a2d88f
SHA512df6c1e4c851a674cdd340810a3b75b4a98d7c41634ae00942265a2fe54bb4ab6f8f43f94841d07f9dd0c571f2a6140f0b55da97e09e82f2a78e50d9e0f72ad18
-
Filesize
582KB
MD5d8db05f0ead83db396cbb5eee4a5f589
SHA14ca14dbfeb87a7e0597c838d9928e832d6ed97d8
SHA256eff25953a3638aac11a141b0142835eaaae0ce5fc9600e93f7534e2dc2a2d88f
SHA512df6c1e4c851a674cdd340810a3b75b4a98d7c41634ae00942265a2fe54bb4ab6f8f43f94841d07f9dd0c571f2a6140f0b55da97e09e82f2a78e50d9e0f72ad18
-
Filesize
171KB
MD5c84bb4afd5fe3ebf50b2ae46299a44bd
SHA16750b6f77cbf77a7c8ae38d5e3dd643d362ba759
SHA256ec6bf945134bbdab601b782234f8a937d1d5466df92fe76cf1549d9ec44aafed
SHA5127a18c64096d6b290122779109f5a1630e2723bb46aadee41bc33653c0f88db123ebac29b37ea2a5f6a905deba2f902b7ce828a9b9046b2b47a53f1043404ecf2
-
Filesize
171KB
MD5c84bb4afd5fe3ebf50b2ae46299a44bd
SHA16750b6f77cbf77a7c8ae38d5e3dd643d362ba759
SHA256ec6bf945134bbdab601b782234f8a937d1d5466df92fe76cf1549d9ec44aafed
SHA5127a18c64096d6b290122779109f5a1630e2723bb46aadee41bc33653c0f88db123ebac29b37ea2a5f6a905deba2f902b7ce828a9b9046b2b47a53f1043404ecf2
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf