Analysis
-
max time kernel
129s -
max time network
185s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
07-05-2023 02:47
Static task
static1
Behavioral task
behavioral1
Sample
63fd1865804deb7c17fc66338fee3cf59e07d3ca37b27456e3614046936132c8.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
63fd1865804deb7c17fc66338fee3cf59e07d3ca37b27456e3614046936132c8.exe
Resource
win10v2004-20230220-en
General
-
Target
63fd1865804deb7c17fc66338fee3cf59e07d3ca37b27456e3614046936132c8.exe
-
Size
850KB
-
MD5
38bc1001f7e88d31f68dfd04f1aa82c9
-
SHA1
b3ff9f3c83be1e14075c6d7f0d80576e463ba544
-
SHA256
63fd1865804deb7c17fc66338fee3cf59e07d3ca37b27456e3614046936132c8
-
SHA512
9bf340dadcb946d2e7048cf3d3f282e262d68033c02dd1cb2ce6ba7ca2d276ab1303460269d5e979347fc33a66c434e7b13ab5b86b8b4ef732d50b48bd1eb142
-
SSDEEP
12288:jy90NsfVozCsvimC07UmPLSvAiD/gka+437Kv5fEjjCrSjGCL2uojWtD4E8+Hm:jyQTB7UySoi/x5cj2vWts9+Hm
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dante
185.161.248.73:4164
-
auth_value
f4066af6b8a6f23125c8ee48288a3f90
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
Processes:
y63145115.exep64737447.exe1.exer15521157.exepid process 1164 y63145115.exe 664 p64737447.exe 2000 1.exe 1448 r15521157.exe -
Loads dropped DLL 9 IoCs
Processes:
63fd1865804deb7c17fc66338fee3cf59e07d3ca37b27456e3614046936132c8.exey63145115.exep64737447.exe1.exer15521157.exepid process 928 63fd1865804deb7c17fc66338fee3cf59e07d3ca37b27456e3614046936132c8.exe 1164 y63145115.exe 1164 y63145115.exe 1164 y63145115.exe 664 p64737447.exe 664 p64737447.exe 2000 1.exe 1164 y63145115.exe 1448 r15521157.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
63fd1865804deb7c17fc66338fee3cf59e07d3ca37b27456e3614046936132c8.exey63145115.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 63fd1865804deb7c17fc66338fee3cf59e07d3ca37b27456e3614046936132c8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 63fd1865804deb7c17fc66338fee3cf59e07d3ca37b27456e3614046936132c8.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y63145115.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y63145115.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
p64737447.exedescription pid process Token: SeDebugPrivilege 664 p64737447.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
63fd1865804deb7c17fc66338fee3cf59e07d3ca37b27456e3614046936132c8.exey63145115.exep64737447.exedescription pid process target process PID 928 wrote to memory of 1164 928 63fd1865804deb7c17fc66338fee3cf59e07d3ca37b27456e3614046936132c8.exe y63145115.exe PID 928 wrote to memory of 1164 928 63fd1865804deb7c17fc66338fee3cf59e07d3ca37b27456e3614046936132c8.exe y63145115.exe PID 928 wrote to memory of 1164 928 63fd1865804deb7c17fc66338fee3cf59e07d3ca37b27456e3614046936132c8.exe y63145115.exe PID 928 wrote to memory of 1164 928 63fd1865804deb7c17fc66338fee3cf59e07d3ca37b27456e3614046936132c8.exe y63145115.exe PID 928 wrote to memory of 1164 928 63fd1865804deb7c17fc66338fee3cf59e07d3ca37b27456e3614046936132c8.exe y63145115.exe PID 928 wrote to memory of 1164 928 63fd1865804deb7c17fc66338fee3cf59e07d3ca37b27456e3614046936132c8.exe y63145115.exe PID 928 wrote to memory of 1164 928 63fd1865804deb7c17fc66338fee3cf59e07d3ca37b27456e3614046936132c8.exe y63145115.exe PID 1164 wrote to memory of 664 1164 y63145115.exe p64737447.exe PID 1164 wrote to memory of 664 1164 y63145115.exe p64737447.exe PID 1164 wrote to memory of 664 1164 y63145115.exe p64737447.exe PID 1164 wrote to memory of 664 1164 y63145115.exe p64737447.exe PID 1164 wrote to memory of 664 1164 y63145115.exe p64737447.exe PID 1164 wrote to memory of 664 1164 y63145115.exe p64737447.exe PID 1164 wrote to memory of 664 1164 y63145115.exe p64737447.exe PID 664 wrote to memory of 2000 664 p64737447.exe 1.exe PID 664 wrote to memory of 2000 664 p64737447.exe 1.exe PID 664 wrote to memory of 2000 664 p64737447.exe 1.exe PID 664 wrote to memory of 2000 664 p64737447.exe 1.exe PID 664 wrote to memory of 2000 664 p64737447.exe 1.exe PID 664 wrote to memory of 2000 664 p64737447.exe 1.exe PID 664 wrote to memory of 2000 664 p64737447.exe 1.exe PID 1164 wrote to memory of 1448 1164 y63145115.exe r15521157.exe PID 1164 wrote to memory of 1448 1164 y63145115.exe r15521157.exe PID 1164 wrote to memory of 1448 1164 y63145115.exe r15521157.exe PID 1164 wrote to memory of 1448 1164 y63145115.exe r15521157.exe PID 1164 wrote to memory of 1448 1164 y63145115.exe r15521157.exe PID 1164 wrote to memory of 1448 1164 y63145115.exe r15521157.exe PID 1164 wrote to memory of 1448 1164 y63145115.exe r15521157.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\63fd1865804deb7c17fc66338fee3cf59e07d3ca37b27456e3614046936132c8.exe"C:\Users\Admin\AppData\Local\Temp\63fd1865804deb7c17fc66338fee3cf59e07d3ca37b27456e3614046936132c8.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y63145115.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y63145115.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p64737447.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p64737447.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r15521157.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r15521157.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y63145115.exeFilesize
570KB
MD539fb64b04a6a92f3a45f8fc7f44ff8d8
SHA17487f39ae58ef1891626196750312e370198a914
SHA2560f04aec72a900f1f8844c1e2c5a174372660f7d155e7e186895b8a60f81e86f1
SHA512d453b08907de2c2d8928042fdb1749203c656dfbff422d3024a2756575fd8a0f4a6d5cda7b8338ea0b84c2d8f256bf087de767164c82527a40a1de715d4065c7
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y63145115.exeFilesize
570KB
MD539fb64b04a6a92f3a45f8fc7f44ff8d8
SHA17487f39ae58ef1891626196750312e370198a914
SHA2560f04aec72a900f1f8844c1e2c5a174372660f7d155e7e186895b8a60f81e86f1
SHA512d453b08907de2c2d8928042fdb1749203c656dfbff422d3024a2756575fd8a0f4a6d5cda7b8338ea0b84c2d8f256bf087de767164c82527a40a1de715d4065c7
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p64737447.exeFilesize
476KB
MD5eec89c646809fe24b17b01210e569651
SHA19f14387f38ee06b0331c68756b84646e35328c1c
SHA256147daa371af3820f0866855e858e31ba7053bcc8f37b9879666fd2d5c141546f
SHA51219885999987652d6468bcb5a99b26b8cc78dcea0e91f19db88bdf6335dc4116b7d7f94d14cf815fe07e4f7225e8e663fd4d22a16763a845ae6e5b5eba308249f
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p64737447.exeFilesize
476KB
MD5eec89c646809fe24b17b01210e569651
SHA19f14387f38ee06b0331c68756b84646e35328c1c
SHA256147daa371af3820f0866855e858e31ba7053bcc8f37b9879666fd2d5c141546f
SHA51219885999987652d6468bcb5a99b26b8cc78dcea0e91f19db88bdf6335dc4116b7d7f94d14cf815fe07e4f7225e8e663fd4d22a16763a845ae6e5b5eba308249f
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p64737447.exeFilesize
476KB
MD5eec89c646809fe24b17b01210e569651
SHA19f14387f38ee06b0331c68756b84646e35328c1c
SHA256147daa371af3820f0866855e858e31ba7053bcc8f37b9879666fd2d5c141546f
SHA51219885999987652d6468bcb5a99b26b8cc78dcea0e91f19db88bdf6335dc4116b7d7f94d14cf815fe07e4f7225e8e663fd4d22a16763a845ae6e5b5eba308249f
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r15521157.exeFilesize
169KB
MD5373538986be16199a240526faead20b3
SHA19796cc1a26aa82747d09f1453dbed9fe8f3b96c7
SHA25602840e2985df6a63ed576ac88eefa72140fa826b9a5fc718791e3806ffe9e3df
SHA512c71ea3d06ba7e8815f56a654897526504de61a47fbb7f11c4a2fb1d3565b515845f2fad2b7cb4b847d8677c0f8e6fc99f81d7cf8bbd45a25d6d2bb36abe08367
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r15521157.exeFilesize
169KB
MD5373538986be16199a240526faead20b3
SHA19796cc1a26aa82747d09f1453dbed9fe8f3b96c7
SHA25602840e2985df6a63ed576ac88eefa72140fa826b9a5fc718791e3806ffe9e3df
SHA512c71ea3d06ba7e8815f56a654897526504de61a47fbb7f11c4a2fb1d3565b515845f2fad2b7cb4b847d8677c0f8e6fc99f81d7cf8bbd45a25d6d2bb36abe08367
-
C:\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
C:\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\y63145115.exeFilesize
570KB
MD539fb64b04a6a92f3a45f8fc7f44ff8d8
SHA17487f39ae58ef1891626196750312e370198a914
SHA2560f04aec72a900f1f8844c1e2c5a174372660f7d155e7e186895b8a60f81e86f1
SHA512d453b08907de2c2d8928042fdb1749203c656dfbff422d3024a2756575fd8a0f4a6d5cda7b8338ea0b84c2d8f256bf087de767164c82527a40a1de715d4065c7
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\y63145115.exeFilesize
570KB
MD539fb64b04a6a92f3a45f8fc7f44ff8d8
SHA17487f39ae58ef1891626196750312e370198a914
SHA2560f04aec72a900f1f8844c1e2c5a174372660f7d155e7e186895b8a60f81e86f1
SHA512d453b08907de2c2d8928042fdb1749203c656dfbff422d3024a2756575fd8a0f4a6d5cda7b8338ea0b84c2d8f256bf087de767164c82527a40a1de715d4065c7
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\p64737447.exeFilesize
476KB
MD5eec89c646809fe24b17b01210e569651
SHA19f14387f38ee06b0331c68756b84646e35328c1c
SHA256147daa371af3820f0866855e858e31ba7053bcc8f37b9879666fd2d5c141546f
SHA51219885999987652d6468bcb5a99b26b8cc78dcea0e91f19db88bdf6335dc4116b7d7f94d14cf815fe07e4f7225e8e663fd4d22a16763a845ae6e5b5eba308249f
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\p64737447.exeFilesize
476KB
MD5eec89c646809fe24b17b01210e569651
SHA19f14387f38ee06b0331c68756b84646e35328c1c
SHA256147daa371af3820f0866855e858e31ba7053bcc8f37b9879666fd2d5c141546f
SHA51219885999987652d6468bcb5a99b26b8cc78dcea0e91f19db88bdf6335dc4116b7d7f94d14cf815fe07e4f7225e8e663fd4d22a16763a845ae6e5b5eba308249f
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\p64737447.exeFilesize
476KB
MD5eec89c646809fe24b17b01210e569651
SHA19f14387f38ee06b0331c68756b84646e35328c1c
SHA256147daa371af3820f0866855e858e31ba7053bcc8f37b9879666fd2d5c141546f
SHA51219885999987652d6468bcb5a99b26b8cc78dcea0e91f19db88bdf6335dc4116b7d7f94d14cf815fe07e4f7225e8e663fd4d22a16763a845ae6e5b5eba308249f
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\r15521157.exeFilesize
169KB
MD5373538986be16199a240526faead20b3
SHA19796cc1a26aa82747d09f1453dbed9fe8f3b96c7
SHA25602840e2985df6a63ed576ac88eefa72140fa826b9a5fc718791e3806ffe9e3df
SHA512c71ea3d06ba7e8815f56a654897526504de61a47fbb7f11c4a2fb1d3565b515845f2fad2b7cb4b847d8677c0f8e6fc99f81d7cf8bbd45a25d6d2bb36abe08367
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\r15521157.exeFilesize
169KB
MD5373538986be16199a240526faead20b3
SHA19796cc1a26aa82747d09f1453dbed9fe8f3b96c7
SHA25602840e2985df6a63ed576ac88eefa72140fa826b9a5fc718791e3806ffe9e3df
SHA512c71ea3d06ba7e8815f56a654897526504de61a47fbb7f11c4a2fb1d3565b515845f2fad2b7cb4b847d8677c0f8e6fc99f81d7cf8bbd45a25d6d2bb36abe08367
-
\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
memory/664-116-0x0000000002420000-0x0000000002480000-memory.dmpFilesize
384KB
-
memory/664-134-0x0000000002420000-0x0000000002480000-memory.dmpFilesize
384KB
-
memory/664-92-0x0000000002420000-0x0000000002480000-memory.dmpFilesize
384KB
-
memory/664-96-0x0000000002420000-0x0000000002480000-memory.dmpFilesize
384KB
-
memory/664-94-0x0000000002420000-0x0000000002480000-memory.dmpFilesize
384KB
-
memory/664-100-0x0000000002420000-0x0000000002480000-memory.dmpFilesize
384KB
-
memory/664-102-0x0000000002420000-0x0000000002480000-memory.dmpFilesize
384KB
-
memory/664-98-0x0000000002420000-0x0000000002480000-memory.dmpFilesize
384KB
-
memory/664-106-0x0000000002420000-0x0000000002480000-memory.dmpFilesize
384KB
-
memory/664-108-0x0000000002420000-0x0000000002480000-memory.dmpFilesize
384KB
-
memory/664-104-0x0000000002420000-0x0000000002480000-memory.dmpFilesize
384KB
-
memory/664-110-0x0000000002420000-0x0000000002480000-memory.dmpFilesize
384KB
-
memory/664-112-0x0000000002420000-0x0000000002480000-memory.dmpFilesize
384KB
-
memory/664-114-0x0000000002420000-0x0000000002480000-memory.dmpFilesize
384KB
-
memory/664-88-0x0000000002420000-0x0000000002480000-memory.dmpFilesize
384KB
-
memory/664-118-0x0000000002420000-0x0000000002480000-memory.dmpFilesize
384KB
-
memory/664-120-0x0000000002420000-0x0000000002480000-memory.dmpFilesize
384KB
-
memory/664-122-0x0000000002420000-0x0000000002480000-memory.dmpFilesize
384KB
-
memory/664-124-0x0000000002420000-0x0000000002480000-memory.dmpFilesize
384KB
-
memory/664-126-0x0000000002420000-0x0000000002480000-memory.dmpFilesize
384KB
-
memory/664-128-0x0000000002420000-0x0000000002480000-memory.dmpFilesize
384KB
-
memory/664-130-0x0000000002420000-0x0000000002480000-memory.dmpFilesize
384KB
-
memory/664-132-0x0000000002420000-0x0000000002480000-memory.dmpFilesize
384KB
-
memory/664-90-0x0000000002420000-0x0000000002480000-memory.dmpFilesize
384KB
-
memory/664-136-0x0000000002420000-0x0000000002480000-memory.dmpFilesize
384KB
-
memory/664-138-0x0000000002420000-0x0000000002480000-memory.dmpFilesize
384KB
-
memory/664-140-0x0000000002420000-0x0000000002480000-memory.dmpFilesize
384KB
-
memory/664-142-0x0000000002420000-0x0000000002480000-memory.dmpFilesize
384KB
-
memory/664-144-0x0000000002420000-0x0000000002480000-memory.dmpFilesize
384KB
-
memory/664-146-0x0000000002420000-0x0000000002480000-memory.dmpFilesize
384KB
-
memory/664-2232-0x0000000004E60000-0x0000000004EA0000-memory.dmpFilesize
256KB
-
memory/664-2233-0x00000000025B0000-0x00000000025E2000-memory.dmpFilesize
200KB
-
memory/664-86-0x0000000002420000-0x0000000002480000-memory.dmpFilesize
384KB
-
memory/664-85-0x0000000002420000-0x0000000002480000-memory.dmpFilesize
384KB
-
memory/664-84-0x0000000002420000-0x0000000002486000-memory.dmpFilesize
408KB
-
memory/664-83-0x0000000004E60000-0x0000000004EA0000-memory.dmpFilesize
256KB
-
memory/664-82-0x0000000004E60000-0x0000000004EA0000-memory.dmpFilesize
256KB
-
memory/664-81-0x0000000002290000-0x00000000022F8000-memory.dmpFilesize
416KB
-
memory/664-78-0x0000000000270000-0x00000000002CB000-memory.dmpFilesize
364KB
-
memory/664-79-0x0000000000400000-0x00000000006F8000-memory.dmpFilesize
3.0MB
-
memory/1448-2250-0x00000000012F0000-0x0000000001320000-memory.dmpFilesize
192KB
-
memory/1448-2252-0x00000000003D0000-0x00000000003D6000-memory.dmpFilesize
24KB
-
memory/1448-2254-0x0000000004C20000-0x0000000004C60000-memory.dmpFilesize
256KB
-
memory/2000-2251-0x0000000000240000-0x0000000000246000-memory.dmpFilesize
24KB
-
memory/2000-2243-0x00000000008E0000-0x000000000090E000-memory.dmpFilesize
184KB
-
memory/2000-2253-0x0000000004CF0000-0x0000000004D30000-memory.dmpFilesize
256KB
-
memory/2000-2255-0x0000000004CF0000-0x0000000004D30000-memory.dmpFilesize
256KB