Analysis
-
max time kernel
128s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
07-05-2023 02:47
Static task
static1
Behavioral task
behavioral1
Sample
63cb4ffbd121d63439b6314602b531312951b333b9ec543330d17ab470d4a613.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
63cb4ffbd121d63439b6314602b531312951b333b9ec543330d17ab470d4a613.exe
Resource
win10v2004-20230220-en
General
-
Target
63cb4ffbd121d63439b6314602b531312951b333b9ec543330d17ab470d4a613.exe
-
Size
867KB
-
MD5
42d5d7d3d34c3f2fd8b048cbd2c6b943
-
SHA1
5af25b61c901d2e0aff7edc5040d32f3bc0f7c7d
-
SHA256
63cb4ffbd121d63439b6314602b531312951b333b9ec543330d17ab470d4a613
-
SHA512
c7236d36931f2f6922842fed22055cd21931435466d5febcea2b2112846decd975addfc4618920c7492249e59c7e2a5eabde5379c60c2b86d96236e261bb9d9f
-
SSDEEP
12288:sy909rrPxKdPKYSwcywFzyiDug8LmC/s5oIaClK+1Lih2fIFTGdz2QLFYm40oM:sygIdPOJzhKJLf/coIHgaLi2+G5QnM
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dark
185.161.248.73:4164
-
auth_value
ae85b01f66afe8770afeed560513fc2d
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
Processes:
y64216743.exep43993831.exe1.exer19608747.exepid process 2004 y64216743.exe 1100 p43993831.exe 1680 1.exe 1436 r19608747.exe -
Loads dropped DLL 9 IoCs
Processes:
63cb4ffbd121d63439b6314602b531312951b333b9ec543330d17ab470d4a613.exey64216743.exep43993831.exe1.exer19608747.exepid process 2008 63cb4ffbd121d63439b6314602b531312951b333b9ec543330d17ab470d4a613.exe 2004 y64216743.exe 2004 y64216743.exe 2004 y64216743.exe 1100 p43993831.exe 1100 p43993831.exe 1680 1.exe 2004 y64216743.exe 1436 r19608747.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
y64216743.exe63cb4ffbd121d63439b6314602b531312951b333b9ec543330d17ab470d4a613.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y64216743.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 63cb4ffbd121d63439b6314602b531312951b333b9ec543330d17ab470d4a613.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 63cb4ffbd121d63439b6314602b531312951b333b9ec543330d17ab470d4a613.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y64216743.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
p43993831.exedescription pid process Token: SeDebugPrivilege 1100 p43993831.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
63cb4ffbd121d63439b6314602b531312951b333b9ec543330d17ab470d4a613.exey64216743.exep43993831.exedescription pid process target process PID 2008 wrote to memory of 2004 2008 63cb4ffbd121d63439b6314602b531312951b333b9ec543330d17ab470d4a613.exe y64216743.exe PID 2008 wrote to memory of 2004 2008 63cb4ffbd121d63439b6314602b531312951b333b9ec543330d17ab470d4a613.exe y64216743.exe PID 2008 wrote to memory of 2004 2008 63cb4ffbd121d63439b6314602b531312951b333b9ec543330d17ab470d4a613.exe y64216743.exe PID 2008 wrote to memory of 2004 2008 63cb4ffbd121d63439b6314602b531312951b333b9ec543330d17ab470d4a613.exe y64216743.exe PID 2008 wrote to memory of 2004 2008 63cb4ffbd121d63439b6314602b531312951b333b9ec543330d17ab470d4a613.exe y64216743.exe PID 2008 wrote to memory of 2004 2008 63cb4ffbd121d63439b6314602b531312951b333b9ec543330d17ab470d4a613.exe y64216743.exe PID 2008 wrote to memory of 2004 2008 63cb4ffbd121d63439b6314602b531312951b333b9ec543330d17ab470d4a613.exe y64216743.exe PID 2004 wrote to memory of 1100 2004 y64216743.exe p43993831.exe PID 2004 wrote to memory of 1100 2004 y64216743.exe p43993831.exe PID 2004 wrote to memory of 1100 2004 y64216743.exe p43993831.exe PID 2004 wrote to memory of 1100 2004 y64216743.exe p43993831.exe PID 2004 wrote to memory of 1100 2004 y64216743.exe p43993831.exe PID 2004 wrote to memory of 1100 2004 y64216743.exe p43993831.exe PID 2004 wrote to memory of 1100 2004 y64216743.exe p43993831.exe PID 1100 wrote to memory of 1680 1100 p43993831.exe 1.exe PID 1100 wrote to memory of 1680 1100 p43993831.exe 1.exe PID 1100 wrote to memory of 1680 1100 p43993831.exe 1.exe PID 1100 wrote to memory of 1680 1100 p43993831.exe 1.exe PID 1100 wrote to memory of 1680 1100 p43993831.exe 1.exe PID 1100 wrote to memory of 1680 1100 p43993831.exe 1.exe PID 1100 wrote to memory of 1680 1100 p43993831.exe 1.exe PID 2004 wrote to memory of 1436 2004 y64216743.exe r19608747.exe PID 2004 wrote to memory of 1436 2004 y64216743.exe r19608747.exe PID 2004 wrote to memory of 1436 2004 y64216743.exe r19608747.exe PID 2004 wrote to memory of 1436 2004 y64216743.exe r19608747.exe PID 2004 wrote to memory of 1436 2004 y64216743.exe r19608747.exe PID 2004 wrote to memory of 1436 2004 y64216743.exe r19608747.exe PID 2004 wrote to memory of 1436 2004 y64216743.exe r19608747.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\63cb4ffbd121d63439b6314602b531312951b333b9ec543330d17ab470d4a613.exe"C:\Users\Admin\AppData\Local\Temp\63cb4ffbd121d63439b6314602b531312951b333b9ec543330d17ab470d4a613.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y64216743.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y64216743.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p43993831.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p43993831.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r19608747.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r19608747.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y64216743.exeFilesize
577KB
MD5dca3c2e208614028dea3289684fe6666
SHA12b0bb4631be46e25432b75e352417a2c077cedbb
SHA256d49c6f0ea64b77f830166a56a884994dbb22a17a612f11d6b4a450148c3584ca
SHA512ced5be588dd5027b21d14534db06b400d19f31bddb79ac08cb248b06baf2b58f4ca2a9b0b60d2ae70f4ec517a8ab9b925a64d53b2bc19070a3f0247453fcf18f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y64216743.exeFilesize
577KB
MD5dca3c2e208614028dea3289684fe6666
SHA12b0bb4631be46e25432b75e352417a2c077cedbb
SHA256d49c6f0ea64b77f830166a56a884994dbb22a17a612f11d6b4a450148c3584ca
SHA512ced5be588dd5027b21d14534db06b400d19f31bddb79ac08cb248b06baf2b58f4ca2a9b0b60d2ae70f4ec517a8ab9b925a64d53b2bc19070a3f0247453fcf18f
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p43993831.exeFilesize
574KB
MD57a33eaf6d0f3e66c21551804f97d9daf
SHA1866fd97d25387331ded45b412ee208c25e5d2885
SHA256ba165fce6659f6688cd968fe81ee896e6b93b1c6d575c0a5262b3c64e0ed3e5a
SHA512719d80b7d7e41c042157eb80a931e35b7fa0d32bbb78c0343251848b8d9923e5b2b1399207f2817365addfab736a1268f7f0ba5ab2a090341302dbb14646020a
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p43993831.exeFilesize
574KB
MD57a33eaf6d0f3e66c21551804f97d9daf
SHA1866fd97d25387331ded45b412ee208c25e5d2885
SHA256ba165fce6659f6688cd968fe81ee896e6b93b1c6d575c0a5262b3c64e0ed3e5a
SHA512719d80b7d7e41c042157eb80a931e35b7fa0d32bbb78c0343251848b8d9923e5b2b1399207f2817365addfab736a1268f7f0ba5ab2a090341302dbb14646020a
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p43993831.exeFilesize
574KB
MD57a33eaf6d0f3e66c21551804f97d9daf
SHA1866fd97d25387331ded45b412ee208c25e5d2885
SHA256ba165fce6659f6688cd968fe81ee896e6b93b1c6d575c0a5262b3c64e0ed3e5a
SHA512719d80b7d7e41c042157eb80a931e35b7fa0d32bbb78c0343251848b8d9923e5b2b1399207f2817365addfab736a1268f7f0ba5ab2a090341302dbb14646020a
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r19608747.exeFilesize
170KB
MD5d8eaa3606b6eecd7429e9b5044c4172e
SHA1abb7ea02e89614b88617e296c648596c85b8460f
SHA256d99373ef7a79a855a063b0c7a5e4f77028abc7f0944fc5fa2843bd56a152a861
SHA5129dba133fc891471862791ba023694d062ff8d92fcae5fd70105d6c3fd5fc3be8105f053227cf11c33fbe33656f5b472706f8f903bfe4605bdd65e068fa7310af
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r19608747.exeFilesize
170KB
MD5d8eaa3606b6eecd7429e9b5044c4172e
SHA1abb7ea02e89614b88617e296c648596c85b8460f
SHA256d99373ef7a79a855a063b0c7a5e4f77028abc7f0944fc5fa2843bd56a152a861
SHA5129dba133fc891471862791ba023694d062ff8d92fcae5fd70105d6c3fd5fc3be8105f053227cf11c33fbe33656f5b472706f8f903bfe4605bdd65e068fa7310af
-
C:\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
C:\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\y64216743.exeFilesize
577KB
MD5dca3c2e208614028dea3289684fe6666
SHA12b0bb4631be46e25432b75e352417a2c077cedbb
SHA256d49c6f0ea64b77f830166a56a884994dbb22a17a612f11d6b4a450148c3584ca
SHA512ced5be588dd5027b21d14534db06b400d19f31bddb79ac08cb248b06baf2b58f4ca2a9b0b60d2ae70f4ec517a8ab9b925a64d53b2bc19070a3f0247453fcf18f
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\y64216743.exeFilesize
577KB
MD5dca3c2e208614028dea3289684fe6666
SHA12b0bb4631be46e25432b75e352417a2c077cedbb
SHA256d49c6f0ea64b77f830166a56a884994dbb22a17a612f11d6b4a450148c3584ca
SHA512ced5be588dd5027b21d14534db06b400d19f31bddb79ac08cb248b06baf2b58f4ca2a9b0b60d2ae70f4ec517a8ab9b925a64d53b2bc19070a3f0247453fcf18f
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\p43993831.exeFilesize
574KB
MD57a33eaf6d0f3e66c21551804f97d9daf
SHA1866fd97d25387331ded45b412ee208c25e5d2885
SHA256ba165fce6659f6688cd968fe81ee896e6b93b1c6d575c0a5262b3c64e0ed3e5a
SHA512719d80b7d7e41c042157eb80a931e35b7fa0d32bbb78c0343251848b8d9923e5b2b1399207f2817365addfab736a1268f7f0ba5ab2a090341302dbb14646020a
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\p43993831.exeFilesize
574KB
MD57a33eaf6d0f3e66c21551804f97d9daf
SHA1866fd97d25387331ded45b412ee208c25e5d2885
SHA256ba165fce6659f6688cd968fe81ee896e6b93b1c6d575c0a5262b3c64e0ed3e5a
SHA512719d80b7d7e41c042157eb80a931e35b7fa0d32bbb78c0343251848b8d9923e5b2b1399207f2817365addfab736a1268f7f0ba5ab2a090341302dbb14646020a
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\p43993831.exeFilesize
574KB
MD57a33eaf6d0f3e66c21551804f97d9daf
SHA1866fd97d25387331ded45b412ee208c25e5d2885
SHA256ba165fce6659f6688cd968fe81ee896e6b93b1c6d575c0a5262b3c64e0ed3e5a
SHA512719d80b7d7e41c042157eb80a931e35b7fa0d32bbb78c0343251848b8d9923e5b2b1399207f2817365addfab736a1268f7f0ba5ab2a090341302dbb14646020a
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\r19608747.exeFilesize
170KB
MD5d8eaa3606b6eecd7429e9b5044c4172e
SHA1abb7ea02e89614b88617e296c648596c85b8460f
SHA256d99373ef7a79a855a063b0c7a5e4f77028abc7f0944fc5fa2843bd56a152a861
SHA5129dba133fc891471862791ba023694d062ff8d92fcae5fd70105d6c3fd5fc3be8105f053227cf11c33fbe33656f5b472706f8f903bfe4605bdd65e068fa7310af
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\r19608747.exeFilesize
170KB
MD5d8eaa3606b6eecd7429e9b5044c4172e
SHA1abb7ea02e89614b88617e296c648596c85b8460f
SHA256d99373ef7a79a855a063b0c7a5e4f77028abc7f0944fc5fa2843bd56a152a861
SHA5129dba133fc891471862791ba023694d062ff8d92fcae5fd70105d6c3fd5fc3be8105f053227cf11c33fbe33656f5b472706f8f903bfe4605bdd65e068fa7310af
-
\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
memory/1100-118-0x0000000004E00000-0x0000000004E60000-memory.dmpFilesize
384KB
-
memory/1100-136-0x0000000004E00000-0x0000000004E60000-memory.dmpFilesize
384KB
-
memory/1100-94-0x0000000004E00000-0x0000000004E60000-memory.dmpFilesize
384KB
-
memory/1100-96-0x0000000004E00000-0x0000000004E60000-memory.dmpFilesize
384KB
-
memory/1100-98-0x0000000004E00000-0x0000000004E60000-memory.dmpFilesize
384KB
-
memory/1100-100-0x0000000004E00000-0x0000000004E60000-memory.dmpFilesize
384KB
-
memory/1100-102-0x0000000004E00000-0x0000000004E60000-memory.dmpFilesize
384KB
-
memory/1100-104-0x0000000004E00000-0x0000000004E60000-memory.dmpFilesize
384KB
-
memory/1100-106-0x0000000004E00000-0x0000000004E60000-memory.dmpFilesize
384KB
-
memory/1100-108-0x0000000004E00000-0x0000000004E60000-memory.dmpFilesize
384KB
-
memory/1100-110-0x0000000004E00000-0x0000000004E60000-memory.dmpFilesize
384KB
-
memory/1100-112-0x0000000004E00000-0x0000000004E60000-memory.dmpFilesize
384KB
-
memory/1100-114-0x0000000004E00000-0x0000000004E60000-memory.dmpFilesize
384KB
-
memory/1100-116-0x0000000004E00000-0x0000000004E60000-memory.dmpFilesize
384KB
-
memory/1100-90-0x0000000004E00000-0x0000000004E60000-memory.dmpFilesize
384KB
-
memory/1100-120-0x0000000004E00000-0x0000000004E60000-memory.dmpFilesize
384KB
-
memory/1100-122-0x0000000004E00000-0x0000000004E60000-memory.dmpFilesize
384KB
-
memory/1100-124-0x0000000004E00000-0x0000000004E60000-memory.dmpFilesize
384KB
-
memory/1100-126-0x0000000004E00000-0x0000000004E60000-memory.dmpFilesize
384KB
-
memory/1100-128-0x0000000004E00000-0x0000000004E60000-memory.dmpFilesize
384KB
-
memory/1100-130-0x0000000004E00000-0x0000000004E60000-memory.dmpFilesize
384KB
-
memory/1100-132-0x0000000004E00000-0x0000000004E60000-memory.dmpFilesize
384KB
-
memory/1100-134-0x0000000004E00000-0x0000000004E60000-memory.dmpFilesize
384KB
-
memory/1100-92-0x0000000004E00000-0x0000000004E60000-memory.dmpFilesize
384KB
-
memory/1100-138-0x0000000004E00000-0x0000000004E60000-memory.dmpFilesize
384KB
-
memory/1100-140-0x0000000004E00000-0x0000000004E60000-memory.dmpFilesize
384KB
-
memory/1100-142-0x0000000004E00000-0x0000000004E60000-memory.dmpFilesize
384KB
-
memory/1100-146-0x0000000004E00000-0x0000000004E60000-memory.dmpFilesize
384KB
-
memory/1100-144-0x0000000004E00000-0x0000000004E60000-memory.dmpFilesize
384KB
-
memory/1100-84-0x0000000004E00000-0x0000000004E60000-memory.dmpFilesize
384KB
-
memory/1100-2230-0x0000000004CC0000-0x0000000004D00000-memory.dmpFilesize
256KB
-
memory/1100-2231-0x0000000005270000-0x00000000052A2000-memory.dmpFilesize
200KB
-
memory/1100-88-0x0000000004E00000-0x0000000004E60000-memory.dmpFilesize
384KB
-
memory/1100-86-0x0000000004E00000-0x0000000004E60000-memory.dmpFilesize
384KB
-
memory/1100-83-0x0000000004E00000-0x0000000004E60000-memory.dmpFilesize
384KB
-
memory/1100-82-0x0000000004E00000-0x0000000004E66000-memory.dmpFilesize
408KB
-
memory/1100-78-0x0000000004C40000-0x0000000004CA8000-memory.dmpFilesize
416KB
-
memory/1100-79-0x00000000008B0000-0x000000000090B000-memory.dmpFilesize
364KB
-
memory/1100-81-0x0000000004CC0000-0x0000000004D00000-memory.dmpFilesize
256KB
-
memory/1100-80-0x0000000004CC0000-0x0000000004D00000-memory.dmpFilesize
256KB
-
memory/1436-2251-0x00000000008F0000-0x0000000000920000-memory.dmpFilesize
192KB
-
memory/1436-2252-0x00000000003A0000-0x00000000003A6000-memory.dmpFilesize
24KB
-
memory/1436-2253-0x0000000000C50000-0x0000000000C90000-memory.dmpFilesize
256KB
-
memory/1436-2255-0x0000000000C50000-0x0000000000C90000-memory.dmpFilesize
256KB
-
memory/1680-2248-0x00000000002F0000-0x00000000002F6000-memory.dmpFilesize
24KB
-
memory/1680-2243-0x0000000001040000-0x000000000106E000-memory.dmpFilesize
184KB
-
memory/1680-2254-0x0000000000FC0000-0x0000000001000000-memory.dmpFilesize
256KB
-
memory/1680-2256-0x0000000000FC0000-0x0000000001000000-memory.dmpFilesize
256KB