Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 21:02
Static task
static1
Behavioral task
behavioral1
Sample
2749c9347b1bc1dce7b373c2b541d116fc379ce590b2f724463173b1cd402eca.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2749c9347b1bc1dce7b373c2b541d116fc379ce590b2f724463173b1cd402eca.exe
Resource
win10v2004-20230220-en
General
-
Target
2749c9347b1bc1dce7b373c2b541d116fc379ce590b2f724463173b1cd402eca.exe
-
Size
1.2MB
-
MD5
84a1279dc23c959a6e5aa8f0c11d7d62
-
SHA1
60e423763b5e63ce38581d2aa876a7d29c0658b9
-
SHA256
2749c9347b1bc1dce7b373c2b541d116fc379ce590b2f724463173b1cd402eca
-
SHA512
f5dc51491bc34169b3b123f394f223fa147ae8b0c1440f0fd28457ecc05ef5d88827f9d048655e80fe794c9cffd9b8ee22fe77438a9c2937737bfe185da9cd44
-
SSDEEP
24576:dyW9M70+6MWrjOK2bm0/m/C1dDE63BEnY65RxYSOZbtOet:4KqrQEOqvDE6x2BY5ZbtF
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 1924 z74169254.exe 912 z36042682.exe 1632 z05422395.exe 664 s47861949.exe 920 1.exe 1568 t97336927.exe -
Loads dropped DLL 13 IoCs
pid Process 1076 2749c9347b1bc1dce7b373c2b541d116fc379ce590b2f724463173b1cd402eca.exe 1924 z74169254.exe 1924 z74169254.exe 912 z36042682.exe 912 z36042682.exe 1632 z05422395.exe 1632 z05422395.exe 1632 z05422395.exe 664 s47861949.exe 664 s47861949.exe 920 1.exe 1632 z05422395.exe 1568 t97336927.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2749c9347b1bc1dce7b373c2b541d116fc379ce590b2f724463173b1cd402eca.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z74169254.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z74169254.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z36042682.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z36042682.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z05422395.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z05422395.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2749c9347b1bc1dce7b373c2b541d116fc379ce590b2f724463173b1cd402eca.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 664 s47861949.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1076 wrote to memory of 1924 1076 2749c9347b1bc1dce7b373c2b541d116fc379ce590b2f724463173b1cd402eca.exe 26 PID 1076 wrote to memory of 1924 1076 2749c9347b1bc1dce7b373c2b541d116fc379ce590b2f724463173b1cd402eca.exe 26 PID 1076 wrote to memory of 1924 1076 2749c9347b1bc1dce7b373c2b541d116fc379ce590b2f724463173b1cd402eca.exe 26 PID 1076 wrote to memory of 1924 1076 2749c9347b1bc1dce7b373c2b541d116fc379ce590b2f724463173b1cd402eca.exe 26 PID 1076 wrote to memory of 1924 1076 2749c9347b1bc1dce7b373c2b541d116fc379ce590b2f724463173b1cd402eca.exe 26 PID 1076 wrote to memory of 1924 1076 2749c9347b1bc1dce7b373c2b541d116fc379ce590b2f724463173b1cd402eca.exe 26 PID 1076 wrote to memory of 1924 1076 2749c9347b1bc1dce7b373c2b541d116fc379ce590b2f724463173b1cd402eca.exe 26 PID 1924 wrote to memory of 912 1924 z74169254.exe 27 PID 1924 wrote to memory of 912 1924 z74169254.exe 27 PID 1924 wrote to memory of 912 1924 z74169254.exe 27 PID 1924 wrote to memory of 912 1924 z74169254.exe 27 PID 1924 wrote to memory of 912 1924 z74169254.exe 27 PID 1924 wrote to memory of 912 1924 z74169254.exe 27 PID 1924 wrote to memory of 912 1924 z74169254.exe 27 PID 912 wrote to memory of 1632 912 z36042682.exe 28 PID 912 wrote to memory of 1632 912 z36042682.exe 28 PID 912 wrote to memory of 1632 912 z36042682.exe 28 PID 912 wrote to memory of 1632 912 z36042682.exe 28 PID 912 wrote to memory of 1632 912 z36042682.exe 28 PID 912 wrote to memory of 1632 912 z36042682.exe 28 PID 912 wrote to memory of 1632 912 z36042682.exe 28 PID 1632 wrote to memory of 664 1632 z05422395.exe 29 PID 1632 wrote to memory of 664 1632 z05422395.exe 29 PID 1632 wrote to memory of 664 1632 z05422395.exe 29 PID 1632 wrote to memory of 664 1632 z05422395.exe 29 PID 1632 wrote to memory of 664 1632 z05422395.exe 29 PID 1632 wrote to memory of 664 1632 z05422395.exe 29 PID 1632 wrote to memory of 664 1632 z05422395.exe 29 PID 664 wrote to memory of 920 664 s47861949.exe 30 PID 664 wrote to memory of 920 664 s47861949.exe 30 PID 664 wrote to memory of 920 664 s47861949.exe 30 PID 664 wrote to memory of 920 664 s47861949.exe 30 PID 664 wrote to memory of 920 664 s47861949.exe 30 PID 664 wrote to memory of 920 664 s47861949.exe 30 PID 664 wrote to memory of 920 664 s47861949.exe 30 PID 1632 wrote to memory of 1568 1632 z05422395.exe 31 PID 1632 wrote to memory of 1568 1632 z05422395.exe 31 PID 1632 wrote to memory of 1568 1632 z05422395.exe 31 PID 1632 wrote to memory of 1568 1632 z05422395.exe 31 PID 1632 wrote to memory of 1568 1632 z05422395.exe 31 PID 1632 wrote to memory of 1568 1632 z05422395.exe 31 PID 1632 wrote to memory of 1568 1632 z05422395.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2749c9347b1bc1dce7b373c2b541d116fc379ce590b2f724463173b1cd402eca.exe"C:\Users\Admin\AppData\Local\Temp\2749c9347b1bc1dce7b373c2b541d116fc379ce590b2f724463173b1cd402eca.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z74169254.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z74169254.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z36042682.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z36042682.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z05422395.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z05422395.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s47861949.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s47861949.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:920
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t97336927.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t97336927.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1568
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5da444da1507ee29bce795149e3610dd7
SHA19ac81cc88003f3de0e07f6436212afbd1d859eb7
SHA256bff0a5ae58aa14921573cdbde5d568a314ace283b4cb712072b70431242bcac6
SHA5123c6c0ed5b137d52e42e5600612644690646385d3258e5fde7f88117a9dad31a06797efd62bf4828db08ae0a0435a95ee6b895c0017529e33e26a6296466d0a3f
-
Filesize
1.0MB
MD5da444da1507ee29bce795149e3610dd7
SHA19ac81cc88003f3de0e07f6436212afbd1d859eb7
SHA256bff0a5ae58aa14921573cdbde5d568a314ace283b4cb712072b70431242bcac6
SHA5123c6c0ed5b137d52e42e5600612644690646385d3258e5fde7f88117a9dad31a06797efd62bf4828db08ae0a0435a95ee6b895c0017529e33e26a6296466d0a3f
-
Filesize
760KB
MD5c5a5dd5cb0e5abbd337168fa92580ac5
SHA17de56361d26b5b08bce655db19582d52861446f8
SHA2569ecca59b03fc52d03fec1c0ce398606aa5a99b3025a9429da68a9064e9d1a2d6
SHA5126afc146831a791fa66941b911c9d6225da175c40fea3776d227d60cf916031a9034f3099e75abdd70be54c6269dc9dbc7ca14d83d612ddd30d0b5ca5616755c4
-
Filesize
760KB
MD5c5a5dd5cb0e5abbd337168fa92580ac5
SHA17de56361d26b5b08bce655db19582d52861446f8
SHA2569ecca59b03fc52d03fec1c0ce398606aa5a99b3025a9429da68a9064e9d1a2d6
SHA5126afc146831a791fa66941b911c9d6225da175c40fea3776d227d60cf916031a9034f3099e75abdd70be54c6269dc9dbc7ca14d83d612ddd30d0b5ca5616755c4
-
Filesize
577KB
MD50dfef32b6d3aea939124669edc8b4d26
SHA11c5bbe9bd2f12f297c621cd905f502b2e1bd2edb
SHA256143fe4749cfe8cc185d962d3b8b04c356db3bd4e70b73b1d9d792986c9ec8ed2
SHA5129dfde5fe342a29f1b82ca48a86d8bbb99cc5ba4364ddb3018291d81fe4243858c60198940e11d372c573d8e598b5063744ebaca5c347b9336a88f7b7f316c902
-
Filesize
577KB
MD50dfef32b6d3aea939124669edc8b4d26
SHA11c5bbe9bd2f12f297c621cd905f502b2e1bd2edb
SHA256143fe4749cfe8cc185d962d3b8b04c356db3bd4e70b73b1d9d792986c9ec8ed2
SHA5129dfde5fe342a29f1b82ca48a86d8bbb99cc5ba4364ddb3018291d81fe4243858c60198940e11d372c573d8e598b5063744ebaca5c347b9336a88f7b7f316c902
-
Filesize
574KB
MD551a07f7a124dd22ffca68e6e6e4ba0e7
SHA1eddcf6c7b494d10e70da87c9f8922fecddd9df21
SHA256c2b773734dc1fa9664d2beab27e6f8a5a5a730a56df037398ccc6fece6bf65f5
SHA512c7edf0f66cb88ca9aa29c37ea4e0080f13a3b28f5a054d70441a93c12632c34d3ccf446827db93a1ada1863277b1d961c8872cb3a5b650ed5c212339926e1947
-
Filesize
574KB
MD551a07f7a124dd22ffca68e6e6e4ba0e7
SHA1eddcf6c7b494d10e70da87c9f8922fecddd9df21
SHA256c2b773734dc1fa9664d2beab27e6f8a5a5a730a56df037398ccc6fece6bf65f5
SHA512c7edf0f66cb88ca9aa29c37ea4e0080f13a3b28f5a054d70441a93c12632c34d3ccf446827db93a1ada1863277b1d961c8872cb3a5b650ed5c212339926e1947
-
Filesize
574KB
MD551a07f7a124dd22ffca68e6e6e4ba0e7
SHA1eddcf6c7b494d10e70da87c9f8922fecddd9df21
SHA256c2b773734dc1fa9664d2beab27e6f8a5a5a730a56df037398ccc6fece6bf65f5
SHA512c7edf0f66cb88ca9aa29c37ea4e0080f13a3b28f5a054d70441a93c12632c34d3ccf446827db93a1ada1863277b1d961c8872cb3a5b650ed5c212339926e1947
-
Filesize
169KB
MD52392fd58f1296948765c566a76bd93a7
SHA1b1fab88a513742db9cde9d043037615e9a60644a
SHA25638c22d7ec64be60b0d2e84acdbf996562c98cc72835fa2cb1f785e8bdae5a74e
SHA5129b6ba9b506d488f357876eca0b9ee4e96b4767ec33c280a2130f23586eb2aeb2a628a4657936b51fe460587a86e227e5f8b1f1fb1ce6f07eb1f73ae7173a5b71
-
Filesize
169KB
MD52392fd58f1296948765c566a76bd93a7
SHA1b1fab88a513742db9cde9d043037615e9a60644a
SHA25638c22d7ec64be60b0d2e84acdbf996562c98cc72835fa2cb1f785e8bdae5a74e
SHA5129b6ba9b506d488f357876eca0b9ee4e96b4767ec33c280a2130f23586eb2aeb2a628a4657936b51fe460587a86e227e5f8b1f1fb1ce6f07eb1f73ae7173a5b71
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
1.0MB
MD5da444da1507ee29bce795149e3610dd7
SHA19ac81cc88003f3de0e07f6436212afbd1d859eb7
SHA256bff0a5ae58aa14921573cdbde5d568a314ace283b4cb712072b70431242bcac6
SHA5123c6c0ed5b137d52e42e5600612644690646385d3258e5fde7f88117a9dad31a06797efd62bf4828db08ae0a0435a95ee6b895c0017529e33e26a6296466d0a3f
-
Filesize
1.0MB
MD5da444da1507ee29bce795149e3610dd7
SHA19ac81cc88003f3de0e07f6436212afbd1d859eb7
SHA256bff0a5ae58aa14921573cdbde5d568a314ace283b4cb712072b70431242bcac6
SHA5123c6c0ed5b137d52e42e5600612644690646385d3258e5fde7f88117a9dad31a06797efd62bf4828db08ae0a0435a95ee6b895c0017529e33e26a6296466d0a3f
-
Filesize
760KB
MD5c5a5dd5cb0e5abbd337168fa92580ac5
SHA17de56361d26b5b08bce655db19582d52861446f8
SHA2569ecca59b03fc52d03fec1c0ce398606aa5a99b3025a9429da68a9064e9d1a2d6
SHA5126afc146831a791fa66941b911c9d6225da175c40fea3776d227d60cf916031a9034f3099e75abdd70be54c6269dc9dbc7ca14d83d612ddd30d0b5ca5616755c4
-
Filesize
760KB
MD5c5a5dd5cb0e5abbd337168fa92580ac5
SHA17de56361d26b5b08bce655db19582d52861446f8
SHA2569ecca59b03fc52d03fec1c0ce398606aa5a99b3025a9429da68a9064e9d1a2d6
SHA5126afc146831a791fa66941b911c9d6225da175c40fea3776d227d60cf916031a9034f3099e75abdd70be54c6269dc9dbc7ca14d83d612ddd30d0b5ca5616755c4
-
Filesize
577KB
MD50dfef32b6d3aea939124669edc8b4d26
SHA11c5bbe9bd2f12f297c621cd905f502b2e1bd2edb
SHA256143fe4749cfe8cc185d962d3b8b04c356db3bd4e70b73b1d9d792986c9ec8ed2
SHA5129dfde5fe342a29f1b82ca48a86d8bbb99cc5ba4364ddb3018291d81fe4243858c60198940e11d372c573d8e598b5063744ebaca5c347b9336a88f7b7f316c902
-
Filesize
577KB
MD50dfef32b6d3aea939124669edc8b4d26
SHA11c5bbe9bd2f12f297c621cd905f502b2e1bd2edb
SHA256143fe4749cfe8cc185d962d3b8b04c356db3bd4e70b73b1d9d792986c9ec8ed2
SHA5129dfde5fe342a29f1b82ca48a86d8bbb99cc5ba4364ddb3018291d81fe4243858c60198940e11d372c573d8e598b5063744ebaca5c347b9336a88f7b7f316c902
-
Filesize
574KB
MD551a07f7a124dd22ffca68e6e6e4ba0e7
SHA1eddcf6c7b494d10e70da87c9f8922fecddd9df21
SHA256c2b773734dc1fa9664d2beab27e6f8a5a5a730a56df037398ccc6fece6bf65f5
SHA512c7edf0f66cb88ca9aa29c37ea4e0080f13a3b28f5a054d70441a93c12632c34d3ccf446827db93a1ada1863277b1d961c8872cb3a5b650ed5c212339926e1947
-
Filesize
574KB
MD551a07f7a124dd22ffca68e6e6e4ba0e7
SHA1eddcf6c7b494d10e70da87c9f8922fecddd9df21
SHA256c2b773734dc1fa9664d2beab27e6f8a5a5a730a56df037398ccc6fece6bf65f5
SHA512c7edf0f66cb88ca9aa29c37ea4e0080f13a3b28f5a054d70441a93c12632c34d3ccf446827db93a1ada1863277b1d961c8872cb3a5b650ed5c212339926e1947
-
Filesize
574KB
MD551a07f7a124dd22ffca68e6e6e4ba0e7
SHA1eddcf6c7b494d10e70da87c9f8922fecddd9df21
SHA256c2b773734dc1fa9664d2beab27e6f8a5a5a730a56df037398ccc6fece6bf65f5
SHA512c7edf0f66cb88ca9aa29c37ea4e0080f13a3b28f5a054d70441a93c12632c34d3ccf446827db93a1ada1863277b1d961c8872cb3a5b650ed5c212339926e1947
-
Filesize
169KB
MD52392fd58f1296948765c566a76bd93a7
SHA1b1fab88a513742db9cde9d043037615e9a60644a
SHA25638c22d7ec64be60b0d2e84acdbf996562c98cc72835fa2cb1f785e8bdae5a74e
SHA5129b6ba9b506d488f357876eca0b9ee4e96b4767ec33c280a2130f23586eb2aeb2a628a4657936b51fe460587a86e227e5f8b1f1fb1ce6f07eb1f73ae7173a5b71
-
Filesize
169KB
MD52392fd58f1296948765c566a76bd93a7
SHA1b1fab88a513742db9cde9d043037615e9a60644a
SHA25638c22d7ec64be60b0d2e84acdbf996562c98cc72835fa2cb1f785e8bdae5a74e
SHA5129b6ba9b506d488f357876eca0b9ee4e96b4767ec33c280a2130f23586eb2aeb2a628a4657936b51fe460587a86e227e5f8b1f1fb1ce6f07eb1f73ae7173a5b71
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf