Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 20:36
Static task
static1
Behavioral task
behavioral1
Sample
141d2394effa1553b9a0fe07b200174e2ecc2f0eb2f39.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
141d2394effa1553b9a0fe07b200174e2ecc2f0eb2f39.exe
Resource
win10v2004-20230220-en
General
-
Target
141d2394effa1553b9a0fe07b200174e2ecc2f0eb2f39.exe
-
Size
774KB
-
MD5
85ee14a1ce8affbcaff2e82a6774a25a
-
SHA1
23bee76adcdf317310416845044c2da54909cf31
-
SHA256
141d2394effa1553b9a0fe07b200174e2ecc2f0eb2f39e917e1f2bb93063b7e0
-
SHA512
19e550aeb6669103f543b9822647ea136b802a3aa872357009bb968c163c170432bcc1c50118ccaddd619236fba07a722434492f041186daea2c6432d226afe4
-
SSDEEP
12288:+Mrby90eC20WEIpWZobIJ5KuhFLSS3ECEAhnuLzuM5zd7VtiZm:1y2IpWBJ5KuPb0CuzJ5Vd
Malware Config
Extracted
redline
diza
217.196.96.56:4138
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 2 IoCs
pid Process 1700 y1249747.exe 1512 k7763474.exe -
Loads dropped DLL 4 IoCs
pid Process 1764 141d2394effa1553b9a0fe07b200174e2ecc2f0eb2f39.exe 1700 y1249747.exe 1700 y1249747.exe 1512 k7763474.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 141d2394effa1553b9a0fe07b200174e2ecc2f0eb2f39.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 141d2394effa1553b9a0fe07b200174e2ecc2f0eb2f39.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y1249747.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y1249747.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1764 wrote to memory of 1700 1764 141d2394effa1553b9a0fe07b200174e2ecc2f0eb2f39.exe 28 PID 1764 wrote to memory of 1700 1764 141d2394effa1553b9a0fe07b200174e2ecc2f0eb2f39.exe 28 PID 1764 wrote to memory of 1700 1764 141d2394effa1553b9a0fe07b200174e2ecc2f0eb2f39.exe 28 PID 1764 wrote to memory of 1700 1764 141d2394effa1553b9a0fe07b200174e2ecc2f0eb2f39.exe 28 PID 1764 wrote to memory of 1700 1764 141d2394effa1553b9a0fe07b200174e2ecc2f0eb2f39.exe 28 PID 1764 wrote to memory of 1700 1764 141d2394effa1553b9a0fe07b200174e2ecc2f0eb2f39.exe 28 PID 1764 wrote to memory of 1700 1764 141d2394effa1553b9a0fe07b200174e2ecc2f0eb2f39.exe 28 PID 1700 wrote to memory of 1512 1700 y1249747.exe 29 PID 1700 wrote to memory of 1512 1700 y1249747.exe 29 PID 1700 wrote to memory of 1512 1700 y1249747.exe 29 PID 1700 wrote to memory of 1512 1700 y1249747.exe 29 PID 1700 wrote to memory of 1512 1700 y1249747.exe 29 PID 1700 wrote to memory of 1512 1700 y1249747.exe 29 PID 1700 wrote to memory of 1512 1700 y1249747.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\141d2394effa1553b9a0fe07b200174e2ecc2f0eb2f39.exe"C:\Users\Admin\AppData\Local\Temp\141d2394effa1553b9a0fe07b200174e2ecc2f0eb2f39.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1249747.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1249747.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7763474.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7763474.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1512
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
308KB
MD5b9223f22997364387984eec1ce6986d8
SHA1129f7603ed95b0aeef27c6dc064564dbf0f792e3
SHA2560b171bbc077279195e4894ec1fe84bcedbf722b2b24a4bd08396bc192533a71d
SHA512ddafa4002cc7c402600a7e73b8f7cae5f1e3fc05caf33dc4cd2f7a0308fc295e2b407fc407ed5393581c606074e2953bf518db6a38a05bcb26245e4645a33d4e
-
Filesize
308KB
MD5b9223f22997364387984eec1ce6986d8
SHA1129f7603ed95b0aeef27c6dc064564dbf0f792e3
SHA2560b171bbc077279195e4894ec1fe84bcedbf722b2b24a4bd08396bc192533a71d
SHA512ddafa4002cc7c402600a7e73b8f7cae5f1e3fc05caf33dc4cd2f7a0308fc295e2b407fc407ed5393581c606074e2953bf518db6a38a05bcb26245e4645a33d4e
-
Filesize
170KB
MD5811a39411f3e51bc1d4c88ef4a45c605
SHA1d8e4d044d3eba56831191807797058ae034c956a
SHA25652905ea3524de76754b3082e250ef7badcf878b8fba258539c8b2d427c3808d3
SHA51231a263acfb3e1431ce40ba8d784d2dcbdb34b0eba9725a78c5816434ec8472164b3e6ad2c9ea9747056db1d1567a0ec0dc6975ede5264f7962dea3ecc94dd36a
-
Filesize
170KB
MD5811a39411f3e51bc1d4c88ef4a45c605
SHA1d8e4d044d3eba56831191807797058ae034c956a
SHA25652905ea3524de76754b3082e250ef7badcf878b8fba258539c8b2d427c3808d3
SHA51231a263acfb3e1431ce40ba8d784d2dcbdb34b0eba9725a78c5816434ec8472164b3e6ad2c9ea9747056db1d1567a0ec0dc6975ede5264f7962dea3ecc94dd36a
-
Filesize
308KB
MD5b9223f22997364387984eec1ce6986d8
SHA1129f7603ed95b0aeef27c6dc064564dbf0f792e3
SHA2560b171bbc077279195e4894ec1fe84bcedbf722b2b24a4bd08396bc192533a71d
SHA512ddafa4002cc7c402600a7e73b8f7cae5f1e3fc05caf33dc4cd2f7a0308fc295e2b407fc407ed5393581c606074e2953bf518db6a38a05bcb26245e4645a33d4e
-
Filesize
308KB
MD5b9223f22997364387984eec1ce6986d8
SHA1129f7603ed95b0aeef27c6dc064564dbf0f792e3
SHA2560b171bbc077279195e4894ec1fe84bcedbf722b2b24a4bd08396bc192533a71d
SHA512ddafa4002cc7c402600a7e73b8f7cae5f1e3fc05caf33dc4cd2f7a0308fc295e2b407fc407ed5393581c606074e2953bf518db6a38a05bcb26245e4645a33d4e
-
Filesize
170KB
MD5811a39411f3e51bc1d4c88ef4a45c605
SHA1d8e4d044d3eba56831191807797058ae034c956a
SHA25652905ea3524de76754b3082e250ef7badcf878b8fba258539c8b2d427c3808d3
SHA51231a263acfb3e1431ce40ba8d784d2dcbdb34b0eba9725a78c5816434ec8472164b3e6ad2c9ea9747056db1d1567a0ec0dc6975ede5264f7962dea3ecc94dd36a
-
Filesize
170KB
MD5811a39411f3e51bc1d4c88ef4a45c605
SHA1d8e4d044d3eba56831191807797058ae034c956a
SHA25652905ea3524de76754b3082e250ef7badcf878b8fba258539c8b2d427c3808d3
SHA51231a263acfb3e1431ce40ba8d784d2dcbdb34b0eba9725a78c5816434ec8472164b3e6ad2c9ea9747056db1d1567a0ec0dc6975ede5264f7962dea3ecc94dd36a