Analysis
-
max time kernel
140s -
max time network
192s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
07-05-2023 07:20
Static task
static1
Behavioral task
behavioral1
Sample
d766509ed69f458ea39b23f065e1f66a7563d6549de756b4d8cb992abfb3b796.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d766509ed69f458ea39b23f065e1f66a7563d6549de756b4d8cb992abfb3b796.exe
Resource
win10v2004-20230220-en
General
-
Target
d766509ed69f458ea39b23f065e1f66a7563d6549de756b4d8cb992abfb3b796.exe
-
Size
793KB
-
MD5
b122aedf7b3b67d7c0af32075b6bc141
-
SHA1
349c9e7ce8481ef02f1441af343a17081f2a0b13
-
SHA256
d766509ed69f458ea39b23f065e1f66a7563d6549de756b4d8cb992abfb3b796
-
SHA512
52392a5579efa373b43d200818bcdb081a04f8b57f0177cc78ebfd1f19367b75de87e5a42d8ba9f52b935bbfe4cf057678313e2d7eeca03769c2478aedba2a84
-
SSDEEP
12288:vy90JaFHTdEWbr6vFweDF5Cd6ccVrFrmtJlMRBVkpkIJ27m34AQMVXDC:vy0aFzdEgrGu6CqWLMdLI0i4AZDC
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dork
185.161.248.73:4164
-
auth_value
e81be7d6cfb453cc812e1b4890eeadad
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
Processes:
x91895577.exem19944774.exe1.exen63791524.exepid process 912 x91895577.exe 752 m19944774.exe 1380 1.exe 1800 n63791524.exe -
Loads dropped DLL 9 IoCs
Processes:
d766509ed69f458ea39b23f065e1f66a7563d6549de756b4d8cb992abfb3b796.exex91895577.exem19944774.exe1.exen63791524.exepid process 2024 d766509ed69f458ea39b23f065e1f66a7563d6549de756b4d8cb992abfb3b796.exe 912 x91895577.exe 912 x91895577.exe 912 x91895577.exe 752 m19944774.exe 752 m19944774.exe 1380 1.exe 912 x91895577.exe 1800 n63791524.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
d766509ed69f458ea39b23f065e1f66a7563d6549de756b4d8cb992abfb3b796.exex91895577.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce d766509ed69f458ea39b23f065e1f66a7563d6549de756b4d8cb992abfb3b796.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d766509ed69f458ea39b23f065e1f66a7563d6549de756b4d8cb992abfb3b796.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce x91895577.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x91895577.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
m19944774.exedescription pid process Token: SeDebugPrivilege 752 m19944774.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
d766509ed69f458ea39b23f065e1f66a7563d6549de756b4d8cb992abfb3b796.exex91895577.exem19944774.exedescription pid process target process PID 2024 wrote to memory of 912 2024 d766509ed69f458ea39b23f065e1f66a7563d6549de756b4d8cb992abfb3b796.exe x91895577.exe PID 2024 wrote to memory of 912 2024 d766509ed69f458ea39b23f065e1f66a7563d6549de756b4d8cb992abfb3b796.exe x91895577.exe PID 2024 wrote to memory of 912 2024 d766509ed69f458ea39b23f065e1f66a7563d6549de756b4d8cb992abfb3b796.exe x91895577.exe PID 2024 wrote to memory of 912 2024 d766509ed69f458ea39b23f065e1f66a7563d6549de756b4d8cb992abfb3b796.exe x91895577.exe PID 2024 wrote to memory of 912 2024 d766509ed69f458ea39b23f065e1f66a7563d6549de756b4d8cb992abfb3b796.exe x91895577.exe PID 2024 wrote to memory of 912 2024 d766509ed69f458ea39b23f065e1f66a7563d6549de756b4d8cb992abfb3b796.exe x91895577.exe PID 2024 wrote to memory of 912 2024 d766509ed69f458ea39b23f065e1f66a7563d6549de756b4d8cb992abfb3b796.exe x91895577.exe PID 912 wrote to memory of 752 912 x91895577.exe m19944774.exe PID 912 wrote to memory of 752 912 x91895577.exe m19944774.exe PID 912 wrote to memory of 752 912 x91895577.exe m19944774.exe PID 912 wrote to memory of 752 912 x91895577.exe m19944774.exe PID 912 wrote to memory of 752 912 x91895577.exe m19944774.exe PID 912 wrote to memory of 752 912 x91895577.exe m19944774.exe PID 912 wrote to memory of 752 912 x91895577.exe m19944774.exe PID 752 wrote to memory of 1380 752 m19944774.exe 1.exe PID 752 wrote to memory of 1380 752 m19944774.exe 1.exe PID 752 wrote to memory of 1380 752 m19944774.exe 1.exe PID 752 wrote to memory of 1380 752 m19944774.exe 1.exe PID 752 wrote to memory of 1380 752 m19944774.exe 1.exe PID 752 wrote to memory of 1380 752 m19944774.exe 1.exe PID 752 wrote to memory of 1380 752 m19944774.exe 1.exe PID 912 wrote to memory of 1800 912 x91895577.exe n63791524.exe PID 912 wrote to memory of 1800 912 x91895577.exe n63791524.exe PID 912 wrote to memory of 1800 912 x91895577.exe n63791524.exe PID 912 wrote to memory of 1800 912 x91895577.exe n63791524.exe PID 912 wrote to memory of 1800 912 x91895577.exe n63791524.exe PID 912 wrote to memory of 1800 912 x91895577.exe n63791524.exe PID 912 wrote to memory of 1800 912 x91895577.exe n63791524.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d766509ed69f458ea39b23f065e1f66a7563d6549de756b4d8cb992abfb3b796.exe"C:\Users\Admin\AppData\Local\Temp\d766509ed69f458ea39b23f065e1f66a7563d6549de756b4d8cb992abfb3b796.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x91895577.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x91895577.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m19944774.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m19944774.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n63791524.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n63791524.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x91895577.exeFilesize
589KB
MD57fb36948d81ebcb3b71ad795a95e4258
SHA1fc7a04dc467dec0fd281a670c602b6e21be9f53e
SHA256dfc005366e446a0264b4922e57418d02c10d2d2558cd0b624da6b3f603ab8d03
SHA512df454d78c23a254f7e683594b7855caa093f9fe91827a633c46edf0cad7d2e80a65482bc500ca66e95dd429de664fb747064fbaa7931e83e39ba1c01d6ba3e33
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x91895577.exeFilesize
589KB
MD57fb36948d81ebcb3b71ad795a95e4258
SHA1fc7a04dc467dec0fd281a670c602b6e21be9f53e
SHA256dfc005366e446a0264b4922e57418d02c10d2d2558cd0b624da6b3f603ab8d03
SHA512df454d78c23a254f7e683594b7855caa093f9fe91827a633c46edf0cad7d2e80a65482bc500ca66e95dd429de664fb747064fbaa7931e83e39ba1c01d6ba3e33
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m19944774.exeFilesize
530KB
MD50cf427d3f55649fab7f699e24e42c9e4
SHA1ddaa9b25d727c34eba8592f89af5d62e69be32c5
SHA2569b4d690b9bbaed0d1761d4d0d904d19a2ee7b7f02bc4be6ebd61fce864463dfc
SHA512c5d6b92d0e12766a51f579d558b8c7c14932fbfc842e651e8e285f0bd72296a6131f5a9bf87dc9e898931e43d60152a9c114152e73297944a6de4e2a20bb3258
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m19944774.exeFilesize
530KB
MD50cf427d3f55649fab7f699e24e42c9e4
SHA1ddaa9b25d727c34eba8592f89af5d62e69be32c5
SHA2569b4d690b9bbaed0d1761d4d0d904d19a2ee7b7f02bc4be6ebd61fce864463dfc
SHA512c5d6b92d0e12766a51f579d558b8c7c14932fbfc842e651e8e285f0bd72296a6131f5a9bf87dc9e898931e43d60152a9c114152e73297944a6de4e2a20bb3258
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m19944774.exeFilesize
530KB
MD50cf427d3f55649fab7f699e24e42c9e4
SHA1ddaa9b25d727c34eba8592f89af5d62e69be32c5
SHA2569b4d690b9bbaed0d1761d4d0d904d19a2ee7b7f02bc4be6ebd61fce864463dfc
SHA512c5d6b92d0e12766a51f579d558b8c7c14932fbfc842e651e8e285f0bd72296a6131f5a9bf87dc9e898931e43d60152a9c114152e73297944a6de4e2a20bb3258
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n63791524.exeFilesize
168KB
MD509a041f66d6445d31592b5ac0ca4e26f
SHA1e0695beccaf17dbfd7d0dae33594e9aa7efb5b68
SHA25602fdadd2380f0a3c22b837697f3ed322bcc718caeef282765240f6a8cab9d749
SHA512d2819e5511f07c49d90ddfdadab35bc90d1788fd446b811cb1e2c931b7b68f111ea7814c91812be36eefde18bc1f82689316abc26780942eed85eadc295ac322
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n63791524.exeFilesize
168KB
MD509a041f66d6445d31592b5ac0ca4e26f
SHA1e0695beccaf17dbfd7d0dae33594e9aa7efb5b68
SHA25602fdadd2380f0a3c22b837697f3ed322bcc718caeef282765240f6a8cab9d749
SHA512d2819e5511f07c49d90ddfdadab35bc90d1788fd446b811cb1e2c931b7b68f111ea7814c91812be36eefde18bc1f82689316abc26780942eed85eadc295ac322
-
C:\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
C:\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\x91895577.exeFilesize
589KB
MD57fb36948d81ebcb3b71ad795a95e4258
SHA1fc7a04dc467dec0fd281a670c602b6e21be9f53e
SHA256dfc005366e446a0264b4922e57418d02c10d2d2558cd0b624da6b3f603ab8d03
SHA512df454d78c23a254f7e683594b7855caa093f9fe91827a633c46edf0cad7d2e80a65482bc500ca66e95dd429de664fb747064fbaa7931e83e39ba1c01d6ba3e33
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\x91895577.exeFilesize
589KB
MD57fb36948d81ebcb3b71ad795a95e4258
SHA1fc7a04dc467dec0fd281a670c602b6e21be9f53e
SHA256dfc005366e446a0264b4922e57418d02c10d2d2558cd0b624da6b3f603ab8d03
SHA512df454d78c23a254f7e683594b7855caa093f9fe91827a633c46edf0cad7d2e80a65482bc500ca66e95dd429de664fb747064fbaa7931e83e39ba1c01d6ba3e33
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\m19944774.exeFilesize
530KB
MD50cf427d3f55649fab7f699e24e42c9e4
SHA1ddaa9b25d727c34eba8592f89af5d62e69be32c5
SHA2569b4d690b9bbaed0d1761d4d0d904d19a2ee7b7f02bc4be6ebd61fce864463dfc
SHA512c5d6b92d0e12766a51f579d558b8c7c14932fbfc842e651e8e285f0bd72296a6131f5a9bf87dc9e898931e43d60152a9c114152e73297944a6de4e2a20bb3258
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\m19944774.exeFilesize
530KB
MD50cf427d3f55649fab7f699e24e42c9e4
SHA1ddaa9b25d727c34eba8592f89af5d62e69be32c5
SHA2569b4d690b9bbaed0d1761d4d0d904d19a2ee7b7f02bc4be6ebd61fce864463dfc
SHA512c5d6b92d0e12766a51f579d558b8c7c14932fbfc842e651e8e285f0bd72296a6131f5a9bf87dc9e898931e43d60152a9c114152e73297944a6de4e2a20bb3258
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\m19944774.exeFilesize
530KB
MD50cf427d3f55649fab7f699e24e42c9e4
SHA1ddaa9b25d727c34eba8592f89af5d62e69be32c5
SHA2569b4d690b9bbaed0d1761d4d0d904d19a2ee7b7f02bc4be6ebd61fce864463dfc
SHA512c5d6b92d0e12766a51f579d558b8c7c14932fbfc842e651e8e285f0bd72296a6131f5a9bf87dc9e898931e43d60152a9c114152e73297944a6de4e2a20bb3258
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\n63791524.exeFilesize
168KB
MD509a041f66d6445d31592b5ac0ca4e26f
SHA1e0695beccaf17dbfd7d0dae33594e9aa7efb5b68
SHA25602fdadd2380f0a3c22b837697f3ed322bcc718caeef282765240f6a8cab9d749
SHA512d2819e5511f07c49d90ddfdadab35bc90d1788fd446b811cb1e2c931b7b68f111ea7814c91812be36eefde18bc1f82689316abc26780942eed85eadc295ac322
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\n63791524.exeFilesize
168KB
MD509a041f66d6445d31592b5ac0ca4e26f
SHA1e0695beccaf17dbfd7d0dae33594e9aa7efb5b68
SHA25602fdadd2380f0a3c22b837697f3ed322bcc718caeef282765240f6a8cab9d749
SHA512d2819e5511f07c49d90ddfdadab35bc90d1788fd446b811cb1e2c931b7b68f111ea7814c91812be36eefde18bc1f82689316abc26780942eed85eadc295ac322
-
\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
memory/752-115-0x00000000027D0000-0x0000000002830000-memory.dmpFilesize
384KB
-
memory/752-141-0x00000000027D0000-0x0000000002830000-memory.dmpFilesize
384KB
-
memory/752-91-0x00000000027D0000-0x0000000002830000-memory.dmpFilesize
384KB
-
memory/752-95-0x00000000027D0000-0x0000000002830000-memory.dmpFilesize
384KB
-
memory/752-93-0x00000000027D0000-0x0000000002830000-memory.dmpFilesize
384KB
-
memory/752-99-0x00000000027D0000-0x0000000002830000-memory.dmpFilesize
384KB
-
memory/752-101-0x00000000027D0000-0x0000000002830000-memory.dmpFilesize
384KB
-
memory/752-103-0x00000000027D0000-0x0000000002830000-memory.dmpFilesize
384KB
-
memory/752-105-0x00000000027D0000-0x0000000002830000-memory.dmpFilesize
384KB
-
memory/752-107-0x00000000027D0000-0x0000000002830000-memory.dmpFilesize
384KB
-
memory/752-109-0x00000000027D0000-0x0000000002830000-memory.dmpFilesize
384KB
-
memory/752-97-0x00000000027D0000-0x0000000002830000-memory.dmpFilesize
384KB
-
memory/752-111-0x00000000027D0000-0x0000000002830000-memory.dmpFilesize
384KB
-
memory/752-113-0x00000000027D0000-0x0000000002830000-memory.dmpFilesize
384KB
-
memory/752-89-0x00000000027D0000-0x0000000002830000-memory.dmpFilesize
384KB
-
memory/752-117-0x00000000027D0000-0x0000000002830000-memory.dmpFilesize
384KB
-
memory/752-123-0x00000000027D0000-0x0000000002830000-memory.dmpFilesize
384KB
-
memory/752-127-0x00000000027D0000-0x0000000002830000-memory.dmpFilesize
384KB
-
memory/752-125-0x00000000027D0000-0x0000000002830000-memory.dmpFilesize
384KB
-
memory/752-121-0x00000000027D0000-0x0000000002830000-memory.dmpFilesize
384KB
-
memory/752-129-0x00000000027D0000-0x0000000002830000-memory.dmpFilesize
384KB
-
memory/752-131-0x00000000027D0000-0x0000000002830000-memory.dmpFilesize
384KB
-
memory/752-133-0x00000000027D0000-0x0000000002830000-memory.dmpFilesize
384KB
-
memory/752-135-0x00000000027D0000-0x0000000002830000-memory.dmpFilesize
384KB
-
memory/752-137-0x00000000027D0000-0x0000000002830000-memory.dmpFilesize
384KB
-
memory/752-87-0x00000000027D0000-0x0000000002830000-memory.dmpFilesize
384KB
-
memory/752-143-0x00000000027D0000-0x0000000002830000-memory.dmpFilesize
384KB
-
memory/752-145-0x00000000027D0000-0x0000000002830000-memory.dmpFilesize
384KB
-
memory/752-147-0x00000000027D0000-0x0000000002830000-memory.dmpFilesize
384KB
-
memory/752-139-0x00000000027D0000-0x0000000002830000-memory.dmpFilesize
384KB
-
memory/752-119-0x00000000027D0000-0x0000000002830000-memory.dmpFilesize
384KB
-
memory/752-2232-0x00000000029B0000-0x00000000029E2000-memory.dmpFilesize
200KB
-
memory/752-2231-0x00000000050F0000-0x0000000005130000-memory.dmpFilesize
256KB
-
memory/752-85-0x00000000027D0000-0x0000000002830000-memory.dmpFilesize
384KB
-
memory/752-84-0x00000000027D0000-0x0000000002830000-memory.dmpFilesize
384KB
-
memory/752-81-0x00000000050F0000-0x0000000005130000-memory.dmpFilesize
256KB
-
memory/752-83-0x00000000050F0000-0x0000000005130000-memory.dmpFilesize
256KB
-
memory/752-2242-0x00000000050F0000-0x0000000005130000-memory.dmpFilesize
256KB
-
memory/752-78-0x0000000000B50000-0x0000000000BAB000-memory.dmpFilesize
364KB
-
memory/752-79-0x0000000002740000-0x00000000027A8000-memory.dmpFilesize
416KB
-
memory/752-82-0x00000000050F0000-0x0000000005130000-memory.dmpFilesize
256KB
-
memory/752-80-0x00000000027D0000-0x0000000002836000-memory.dmpFilesize
408KB
-
memory/1380-2245-0x0000000000330000-0x0000000000336000-memory.dmpFilesize
24KB
-
memory/1380-2243-0x0000000000820000-0x000000000084E000-memory.dmpFilesize
184KB
-
memory/1380-2254-0x0000000004C10000-0x0000000004C50000-memory.dmpFilesize
256KB
-
memory/1380-2255-0x0000000004C10000-0x0000000004C50000-memory.dmpFilesize
256KB
-
memory/1800-2252-0x0000000001330000-0x0000000001360000-memory.dmpFilesize
192KB
-
memory/1800-2253-0x0000000000510000-0x0000000000516000-memory.dmpFilesize
24KB
-
memory/1800-2256-0x00000000048B0000-0x00000000048F0000-memory.dmpFilesize
256KB