Analysis
-
max time kernel
128s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
07-05-2023 08:25
Static task
static1
Behavioral task
behavioral1
Sample
f10f6e2ba34753c7feabffc1f5517e2e44b40b50d23758cda92a4e86ff52c898.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f10f6e2ba34753c7feabffc1f5517e2e44b40b50d23758cda92a4e86ff52c898.exe
Resource
win10v2004-20230220-en
General
-
Target
f10f6e2ba34753c7feabffc1f5517e2e44b40b50d23758cda92a4e86ff52c898.exe
-
Size
794KB
-
MD5
fe6bce573d48587d6140034cce8ae76b
-
SHA1
6f5ef27a9b356833a79e3eaa65c0e8617abe2ac2
-
SHA256
f10f6e2ba34753c7feabffc1f5517e2e44b40b50d23758cda92a4e86ff52c898
-
SHA512
370c0aa4a933efd106f30d3f38290878b45bbd0ed287993e323223dd5e78529ade1058540b2316987e23ac904e54b519b8120d203f1a4c84d50352754d0ed38a
-
SSDEEP
12288:Dy903nfTCsl6t/8+6nnQEL4R5mwrnPKIVneuuk7D6yuhqtOeUsPF:DycnfO2Y96n4RFrnSIs/euBSJF
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dante
185.161.248.73:4164
-
auth_value
f4066af6b8a6f23125c8ee48288a3f90
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
Processes:
x54111574.exem66957814.exe1.exen32582514.exepid process 1968 x54111574.exe 760 m66957814.exe 1404 1.exe 1440 n32582514.exe -
Loads dropped DLL 9 IoCs
Processes:
f10f6e2ba34753c7feabffc1f5517e2e44b40b50d23758cda92a4e86ff52c898.exex54111574.exem66957814.exe1.exen32582514.exepid process 1924 f10f6e2ba34753c7feabffc1f5517e2e44b40b50d23758cda92a4e86ff52c898.exe 1968 x54111574.exe 1968 x54111574.exe 1968 x54111574.exe 760 m66957814.exe 760 m66957814.exe 1404 1.exe 1968 x54111574.exe 1440 n32582514.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
f10f6e2ba34753c7feabffc1f5517e2e44b40b50d23758cda92a4e86ff52c898.exex54111574.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f10f6e2ba34753c7feabffc1f5517e2e44b40b50d23758cda92a4e86ff52c898.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce x54111574.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x54111574.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce f10f6e2ba34753c7feabffc1f5517e2e44b40b50d23758cda92a4e86ff52c898.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
m66957814.exedescription pid process Token: SeDebugPrivilege 760 m66957814.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
f10f6e2ba34753c7feabffc1f5517e2e44b40b50d23758cda92a4e86ff52c898.exex54111574.exem66957814.exedescription pid process target process PID 1924 wrote to memory of 1968 1924 f10f6e2ba34753c7feabffc1f5517e2e44b40b50d23758cda92a4e86ff52c898.exe x54111574.exe PID 1924 wrote to memory of 1968 1924 f10f6e2ba34753c7feabffc1f5517e2e44b40b50d23758cda92a4e86ff52c898.exe x54111574.exe PID 1924 wrote to memory of 1968 1924 f10f6e2ba34753c7feabffc1f5517e2e44b40b50d23758cda92a4e86ff52c898.exe x54111574.exe PID 1924 wrote to memory of 1968 1924 f10f6e2ba34753c7feabffc1f5517e2e44b40b50d23758cda92a4e86ff52c898.exe x54111574.exe PID 1924 wrote to memory of 1968 1924 f10f6e2ba34753c7feabffc1f5517e2e44b40b50d23758cda92a4e86ff52c898.exe x54111574.exe PID 1924 wrote to memory of 1968 1924 f10f6e2ba34753c7feabffc1f5517e2e44b40b50d23758cda92a4e86ff52c898.exe x54111574.exe PID 1924 wrote to memory of 1968 1924 f10f6e2ba34753c7feabffc1f5517e2e44b40b50d23758cda92a4e86ff52c898.exe x54111574.exe PID 1968 wrote to memory of 760 1968 x54111574.exe m66957814.exe PID 1968 wrote to memory of 760 1968 x54111574.exe m66957814.exe PID 1968 wrote to memory of 760 1968 x54111574.exe m66957814.exe PID 1968 wrote to memory of 760 1968 x54111574.exe m66957814.exe PID 1968 wrote to memory of 760 1968 x54111574.exe m66957814.exe PID 1968 wrote to memory of 760 1968 x54111574.exe m66957814.exe PID 1968 wrote to memory of 760 1968 x54111574.exe m66957814.exe PID 760 wrote to memory of 1404 760 m66957814.exe 1.exe PID 760 wrote to memory of 1404 760 m66957814.exe 1.exe PID 760 wrote to memory of 1404 760 m66957814.exe 1.exe PID 760 wrote to memory of 1404 760 m66957814.exe 1.exe PID 760 wrote to memory of 1404 760 m66957814.exe 1.exe PID 760 wrote to memory of 1404 760 m66957814.exe 1.exe PID 760 wrote to memory of 1404 760 m66957814.exe 1.exe PID 1968 wrote to memory of 1440 1968 x54111574.exe n32582514.exe PID 1968 wrote to memory of 1440 1968 x54111574.exe n32582514.exe PID 1968 wrote to memory of 1440 1968 x54111574.exe n32582514.exe PID 1968 wrote to memory of 1440 1968 x54111574.exe n32582514.exe PID 1968 wrote to memory of 1440 1968 x54111574.exe n32582514.exe PID 1968 wrote to memory of 1440 1968 x54111574.exe n32582514.exe PID 1968 wrote to memory of 1440 1968 x54111574.exe n32582514.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f10f6e2ba34753c7feabffc1f5517e2e44b40b50d23758cda92a4e86ff52c898.exe"C:\Users\Admin\AppData\Local\Temp\f10f6e2ba34753c7feabffc1f5517e2e44b40b50d23758cda92a4e86ff52c898.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x54111574.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x54111574.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m66957814.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m66957814.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n32582514.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n32582514.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x54111574.exeFilesize
590KB
MD5abec42d806ad931dd4db3aa4697ea0c6
SHA179e4467521ba105622c8542b20747e93ad1cb9e8
SHA256f5301caacc0d3c3d938a1331fd4806e8ca3f54e64d1cbbdec39ae8d020ca1283
SHA512b59e2a6fa5fbdfb883957d70adfd437a878c7d37a2025f6d7ec040c4790fa974b35c422db37706c4b803efe8a8bdfe204e3e296a1cde5457f8a3757d636c2bf8
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x54111574.exeFilesize
590KB
MD5abec42d806ad931dd4db3aa4697ea0c6
SHA179e4467521ba105622c8542b20747e93ad1cb9e8
SHA256f5301caacc0d3c3d938a1331fd4806e8ca3f54e64d1cbbdec39ae8d020ca1283
SHA512b59e2a6fa5fbdfb883957d70adfd437a878c7d37a2025f6d7ec040c4790fa974b35c422db37706c4b803efe8a8bdfe204e3e296a1cde5457f8a3757d636c2bf8
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m66957814.exeFilesize
530KB
MD5b0c9e0c6ea888ad509870f26c26af28a
SHA14bdb49d288f73ddce1d7a739aec7e2d7e6782aaf
SHA2565efd553ba9e9a9bf825772d6ab9524c815e5018662146fbf3d61e892934c475a
SHA512322506d8abce4e666c63e436bbc02c04967119ad855eba0f1adb7812e7432aa03e63c3681f7cf2372b8c9b14218caf2d88191d217a7d8c8c2e013ac0f5e244cd
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m66957814.exeFilesize
530KB
MD5b0c9e0c6ea888ad509870f26c26af28a
SHA14bdb49d288f73ddce1d7a739aec7e2d7e6782aaf
SHA2565efd553ba9e9a9bf825772d6ab9524c815e5018662146fbf3d61e892934c475a
SHA512322506d8abce4e666c63e436bbc02c04967119ad855eba0f1adb7812e7432aa03e63c3681f7cf2372b8c9b14218caf2d88191d217a7d8c8c2e013ac0f5e244cd
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m66957814.exeFilesize
530KB
MD5b0c9e0c6ea888ad509870f26c26af28a
SHA14bdb49d288f73ddce1d7a739aec7e2d7e6782aaf
SHA2565efd553ba9e9a9bf825772d6ab9524c815e5018662146fbf3d61e892934c475a
SHA512322506d8abce4e666c63e436bbc02c04967119ad855eba0f1adb7812e7432aa03e63c3681f7cf2372b8c9b14218caf2d88191d217a7d8c8c2e013ac0f5e244cd
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n32582514.exeFilesize
168KB
MD5f42107f42290421fb6ef489a872f9bcb
SHA12c1d8a4d2983c2f55ab2a282ca34f0b6035cfbdd
SHA25652f71fcc9493b4ab6bf3829a17bdfc05612fdfbd3283c16895c9a05c95e97e05
SHA512bb363c8bfbcbc32d2923fa070438f14ee8220d98561cb83e5462be5d0bf40ac15302f0820465a91ef9a3dd09cc519a02c03a5449cba62543dd2a1f4827626418
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n32582514.exeFilesize
168KB
MD5f42107f42290421fb6ef489a872f9bcb
SHA12c1d8a4d2983c2f55ab2a282ca34f0b6035cfbdd
SHA25652f71fcc9493b4ab6bf3829a17bdfc05612fdfbd3283c16895c9a05c95e97e05
SHA512bb363c8bfbcbc32d2923fa070438f14ee8220d98561cb83e5462be5d0bf40ac15302f0820465a91ef9a3dd09cc519a02c03a5449cba62543dd2a1f4827626418
-
C:\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
C:\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\x54111574.exeFilesize
590KB
MD5abec42d806ad931dd4db3aa4697ea0c6
SHA179e4467521ba105622c8542b20747e93ad1cb9e8
SHA256f5301caacc0d3c3d938a1331fd4806e8ca3f54e64d1cbbdec39ae8d020ca1283
SHA512b59e2a6fa5fbdfb883957d70adfd437a878c7d37a2025f6d7ec040c4790fa974b35c422db37706c4b803efe8a8bdfe204e3e296a1cde5457f8a3757d636c2bf8
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\x54111574.exeFilesize
590KB
MD5abec42d806ad931dd4db3aa4697ea0c6
SHA179e4467521ba105622c8542b20747e93ad1cb9e8
SHA256f5301caacc0d3c3d938a1331fd4806e8ca3f54e64d1cbbdec39ae8d020ca1283
SHA512b59e2a6fa5fbdfb883957d70adfd437a878c7d37a2025f6d7ec040c4790fa974b35c422db37706c4b803efe8a8bdfe204e3e296a1cde5457f8a3757d636c2bf8
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\m66957814.exeFilesize
530KB
MD5b0c9e0c6ea888ad509870f26c26af28a
SHA14bdb49d288f73ddce1d7a739aec7e2d7e6782aaf
SHA2565efd553ba9e9a9bf825772d6ab9524c815e5018662146fbf3d61e892934c475a
SHA512322506d8abce4e666c63e436bbc02c04967119ad855eba0f1adb7812e7432aa03e63c3681f7cf2372b8c9b14218caf2d88191d217a7d8c8c2e013ac0f5e244cd
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\m66957814.exeFilesize
530KB
MD5b0c9e0c6ea888ad509870f26c26af28a
SHA14bdb49d288f73ddce1d7a739aec7e2d7e6782aaf
SHA2565efd553ba9e9a9bf825772d6ab9524c815e5018662146fbf3d61e892934c475a
SHA512322506d8abce4e666c63e436bbc02c04967119ad855eba0f1adb7812e7432aa03e63c3681f7cf2372b8c9b14218caf2d88191d217a7d8c8c2e013ac0f5e244cd
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\m66957814.exeFilesize
530KB
MD5b0c9e0c6ea888ad509870f26c26af28a
SHA14bdb49d288f73ddce1d7a739aec7e2d7e6782aaf
SHA2565efd553ba9e9a9bf825772d6ab9524c815e5018662146fbf3d61e892934c475a
SHA512322506d8abce4e666c63e436bbc02c04967119ad855eba0f1adb7812e7432aa03e63c3681f7cf2372b8c9b14218caf2d88191d217a7d8c8c2e013ac0f5e244cd
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\n32582514.exeFilesize
168KB
MD5f42107f42290421fb6ef489a872f9bcb
SHA12c1d8a4d2983c2f55ab2a282ca34f0b6035cfbdd
SHA25652f71fcc9493b4ab6bf3829a17bdfc05612fdfbd3283c16895c9a05c95e97e05
SHA512bb363c8bfbcbc32d2923fa070438f14ee8220d98561cb83e5462be5d0bf40ac15302f0820465a91ef9a3dd09cc519a02c03a5449cba62543dd2a1f4827626418
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\n32582514.exeFilesize
168KB
MD5f42107f42290421fb6ef489a872f9bcb
SHA12c1d8a4d2983c2f55ab2a282ca34f0b6035cfbdd
SHA25652f71fcc9493b4ab6bf3829a17bdfc05612fdfbd3283c16895c9a05c95e97e05
SHA512bb363c8bfbcbc32d2923fa070438f14ee8220d98561cb83e5462be5d0bf40ac15302f0820465a91ef9a3dd09cc519a02c03a5449cba62543dd2a1f4827626418
-
\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
memory/760-125-0x0000000005120000-0x0000000005180000-memory.dmpFilesize
384KB
-
memory/760-135-0x0000000005120000-0x0000000005180000-memory.dmpFilesize
384KB
-
memory/760-91-0x0000000005120000-0x0000000005180000-memory.dmpFilesize
384KB
-
memory/760-93-0x0000000005120000-0x0000000005180000-memory.dmpFilesize
384KB
-
memory/760-95-0x0000000005120000-0x0000000005180000-memory.dmpFilesize
384KB
-
memory/760-97-0x0000000005120000-0x0000000005180000-memory.dmpFilesize
384KB
-
memory/760-99-0x0000000005120000-0x0000000005180000-memory.dmpFilesize
384KB
-
memory/760-101-0x0000000005120000-0x0000000005180000-memory.dmpFilesize
384KB
-
memory/760-109-0x0000000005120000-0x0000000005180000-memory.dmpFilesize
384KB
-
memory/760-111-0x0000000005120000-0x0000000005180000-memory.dmpFilesize
384KB
-
memory/760-107-0x0000000005120000-0x0000000005180000-memory.dmpFilesize
384KB
-
memory/760-117-0x0000000005120000-0x0000000005180000-memory.dmpFilesize
384KB
-
memory/760-123-0x0000000005120000-0x0000000005180000-memory.dmpFilesize
384KB
-
memory/760-121-0x0000000005120000-0x0000000005180000-memory.dmpFilesize
384KB
-
memory/760-87-0x0000000005120000-0x0000000005180000-memory.dmpFilesize
384KB
-
memory/760-119-0x0000000005120000-0x0000000005180000-memory.dmpFilesize
384KB
-
memory/760-127-0x0000000005120000-0x0000000005180000-memory.dmpFilesize
384KB
-
memory/760-133-0x0000000005120000-0x0000000005180000-memory.dmpFilesize
384KB
-
memory/760-137-0x0000000005120000-0x0000000005180000-memory.dmpFilesize
384KB
-
memory/760-143-0x0000000005120000-0x0000000005180000-memory.dmpFilesize
384KB
-
memory/760-145-0x0000000005120000-0x0000000005180000-memory.dmpFilesize
384KB
-
memory/760-141-0x0000000005120000-0x0000000005180000-memory.dmpFilesize
384KB
-
memory/760-139-0x0000000005120000-0x0000000005180000-memory.dmpFilesize
384KB
-
memory/760-89-0x0000000005120000-0x0000000005180000-memory.dmpFilesize
384KB
-
memory/760-131-0x0000000005120000-0x0000000005180000-memory.dmpFilesize
384KB
-
memory/760-129-0x0000000005120000-0x0000000005180000-memory.dmpFilesize
384KB
-
memory/760-115-0x0000000005120000-0x0000000005180000-memory.dmpFilesize
384KB
-
memory/760-113-0x0000000005120000-0x0000000005180000-memory.dmpFilesize
384KB
-
memory/760-105-0x0000000005120000-0x0000000005180000-memory.dmpFilesize
384KB
-
memory/760-103-0x0000000005120000-0x0000000005180000-memory.dmpFilesize
384KB
-
memory/760-2231-0x0000000004FE0000-0x0000000005020000-memory.dmpFilesize
256KB
-
memory/760-2232-0x0000000002770000-0x00000000027A2000-memory.dmpFilesize
200KB
-
memory/760-2234-0x0000000004FE0000-0x0000000005020000-memory.dmpFilesize
256KB
-
memory/760-85-0x0000000005120000-0x0000000005180000-memory.dmpFilesize
384KB
-
memory/760-84-0x0000000005120000-0x0000000005180000-memory.dmpFilesize
384KB
-
memory/760-83-0x0000000005120000-0x0000000005186000-memory.dmpFilesize
408KB
-
memory/760-82-0x0000000004FE0000-0x0000000005020000-memory.dmpFilesize
256KB
-
memory/760-78-0x0000000002420000-0x000000000247B000-memory.dmpFilesize
364KB
-
memory/760-81-0x0000000000400000-0x0000000000A95000-memory.dmpFilesize
6.6MB
-
memory/760-80-0x0000000002860000-0x00000000028C8000-memory.dmpFilesize
416KB
-
memory/760-79-0x0000000004FE0000-0x0000000005020000-memory.dmpFilesize
256KB
-
memory/1404-2242-0x0000000000CD0000-0x0000000000CFE000-memory.dmpFilesize
184KB
-
memory/1404-2250-0x0000000000710000-0x0000000000716000-memory.dmpFilesize
24KB
-
memory/1404-2254-0x00000000009C0000-0x0000000000A00000-memory.dmpFilesize
256KB
-
memory/1440-2251-0x0000000001220000-0x0000000001250000-memory.dmpFilesize
192KB
-
memory/1440-2252-0x0000000000360000-0x0000000000366000-memory.dmpFilesize
24KB
-
memory/1440-2253-0x00000000011E0000-0x0000000001220000-memory.dmpFilesize
256KB
-
memory/1440-2255-0x00000000011E0000-0x0000000001220000-memory.dmpFilesize
256KB