Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
07-05-2023 08:56
Static task
static1
Behavioral task
behavioral1
Sample
fdf77304628c3ff6a6ac0f12a9b4fe6a6474f7ccc27f7fd6ba6f79e26d393e2e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
fdf77304628c3ff6a6ac0f12a9b4fe6a6474f7ccc27f7fd6ba6f79e26d393e2e.exe
Resource
win10v2004-20230220-en
General
-
Target
fdf77304628c3ff6a6ac0f12a9b4fe6a6474f7ccc27f7fd6ba6f79e26d393e2e.exe
-
Size
1.5MB
-
MD5
8d302feb76da1f5008a155fb5b49687b
-
SHA1
8398d068d5305f8a1b8eab5197691f19529386c5
-
SHA256
fdf77304628c3ff6a6ac0f12a9b4fe6a6474f7ccc27f7fd6ba6f79e26d393e2e
-
SHA512
5d85be7a5a4e45857b7654bff17a1e7e732b27cf12a27c82500d97ed359b0b186c37f79434d9726610873e1bd0b0b69d1c279227d7e37bde627b1ab49c5b8407
-
SSDEEP
24576:8yecX29EPYNZT2wbLzY49Xp5FFWnMFy121B8TTuBTRi1O/HkL/zPkcHhqlJ/cm36:recXkEU92QzYYZ5FFWME12H8fuB9i1OD
Malware Config
Extracted
redline
most
185.161.248.73:4164
-
auth_value
7da4dfa153f2919e617aa016f7c36008
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
Processes:
i70627567.exei38997514.exei82626057.exei56848394.exea05879523.exepid process 924 i70627567.exe 1304 i38997514.exe 1864 i82626057.exe 1436 i56848394.exe 876 a05879523.exe -
Loads dropped DLL 10 IoCs
Processes:
fdf77304628c3ff6a6ac0f12a9b4fe6a6474f7ccc27f7fd6ba6f79e26d393e2e.exei70627567.exei38997514.exei82626057.exei56848394.exea05879523.exepid process 2000 fdf77304628c3ff6a6ac0f12a9b4fe6a6474f7ccc27f7fd6ba6f79e26d393e2e.exe 924 i70627567.exe 924 i70627567.exe 1304 i38997514.exe 1304 i38997514.exe 1864 i82626057.exe 1864 i82626057.exe 1436 i56848394.exe 1436 i56848394.exe 876 a05879523.exe -
Adds Run key to start application 2 TTPs 10 IoCs
Processes:
i56848394.exefdf77304628c3ff6a6ac0f12a9b4fe6a6474f7ccc27f7fd6ba6f79e26d393e2e.exei70627567.exei38997514.exei82626057.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce i56848394.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce fdf77304628c3ff6a6ac0f12a9b4fe6a6474f7ccc27f7fd6ba6f79e26d393e2e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fdf77304628c3ff6a6ac0f12a9b4fe6a6474f7ccc27f7fd6ba6f79e26d393e2e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" i70627567.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce i38997514.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce i82626057.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" i82626057.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce i70627567.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" i38997514.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" i56848394.exe -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
fdf77304628c3ff6a6ac0f12a9b4fe6a6474f7ccc27f7fd6ba6f79e26d393e2e.exei70627567.exei38997514.exei82626057.exei56848394.exedescription pid process target process PID 2000 wrote to memory of 924 2000 fdf77304628c3ff6a6ac0f12a9b4fe6a6474f7ccc27f7fd6ba6f79e26d393e2e.exe i70627567.exe PID 2000 wrote to memory of 924 2000 fdf77304628c3ff6a6ac0f12a9b4fe6a6474f7ccc27f7fd6ba6f79e26d393e2e.exe i70627567.exe PID 2000 wrote to memory of 924 2000 fdf77304628c3ff6a6ac0f12a9b4fe6a6474f7ccc27f7fd6ba6f79e26d393e2e.exe i70627567.exe PID 2000 wrote to memory of 924 2000 fdf77304628c3ff6a6ac0f12a9b4fe6a6474f7ccc27f7fd6ba6f79e26d393e2e.exe i70627567.exe PID 2000 wrote to memory of 924 2000 fdf77304628c3ff6a6ac0f12a9b4fe6a6474f7ccc27f7fd6ba6f79e26d393e2e.exe i70627567.exe PID 2000 wrote to memory of 924 2000 fdf77304628c3ff6a6ac0f12a9b4fe6a6474f7ccc27f7fd6ba6f79e26d393e2e.exe i70627567.exe PID 2000 wrote to memory of 924 2000 fdf77304628c3ff6a6ac0f12a9b4fe6a6474f7ccc27f7fd6ba6f79e26d393e2e.exe i70627567.exe PID 924 wrote to memory of 1304 924 i70627567.exe i38997514.exe PID 924 wrote to memory of 1304 924 i70627567.exe i38997514.exe PID 924 wrote to memory of 1304 924 i70627567.exe i38997514.exe PID 924 wrote to memory of 1304 924 i70627567.exe i38997514.exe PID 924 wrote to memory of 1304 924 i70627567.exe i38997514.exe PID 924 wrote to memory of 1304 924 i70627567.exe i38997514.exe PID 924 wrote to memory of 1304 924 i70627567.exe i38997514.exe PID 1304 wrote to memory of 1864 1304 i38997514.exe i82626057.exe PID 1304 wrote to memory of 1864 1304 i38997514.exe i82626057.exe PID 1304 wrote to memory of 1864 1304 i38997514.exe i82626057.exe PID 1304 wrote to memory of 1864 1304 i38997514.exe i82626057.exe PID 1304 wrote to memory of 1864 1304 i38997514.exe i82626057.exe PID 1304 wrote to memory of 1864 1304 i38997514.exe i82626057.exe PID 1304 wrote to memory of 1864 1304 i38997514.exe i82626057.exe PID 1864 wrote to memory of 1436 1864 i82626057.exe i56848394.exe PID 1864 wrote to memory of 1436 1864 i82626057.exe i56848394.exe PID 1864 wrote to memory of 1436 1864 i82626057.exe i56848394.exe PID 1864 wrote to memory of 1436 1864 i82626057.exe i56848394.exe PID 1864 wrote to memory of 1436 1864 i82626057.exe i56848394.exe PID 1864 wrote to memory of 1436 1864 i82626057.exe i56848394.exe PID 1864 wrote to memory of 1436 1864 i82626057.exe i56848394.exe PID 1436 wrote to memory of 876 1436 i56848394.exe a05879523.exe PID 1436 wrote to memory of 876 1436 i56848394.exe a05879523.exe PID 1436 wrote to memory of 876 1436 i56848394.exe a05879523.exe PID 1436 wrote to memory of 876 1436 i56848394.exe a05879523.exe PID 1436 wrote to memory of 876 1436 i56848394.exe a05879523.exe PID 1436 wrote to memory of 876 1436 i56848394.exe a05879523.exe PID 1436 wrote to memory of 876 1436 i56848394.exe a05879523.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdf77304628c3ff6a6ac0f12a9b4fe6a6474f7ccc27f7fd6ba6f79e26d393e2e.exe"C:\Users\Admin\AppData\Local\Temp\fdf77304628c3ff6a6ac0f12a9b4fe6a6474f7ccc27f7fd6ba6f79e26d393e2e.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i70627567.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i70627567.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i38997514.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i38997514.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i82626057.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i82626057.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i56848394.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i56848394.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a05879523.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a05879523.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i70627567.exeFilesize
1.3MB
MD5e1e1ff2a129c57e0b7b95267af6e5fcc
SHA16fb4741d3ff57d613de19e4c5e8864ca98ade4a3
SHA256841c27259dcf713fbcd3b0158e198b277842d0b51c019ee1f1a0c70426b77534
SHA512832b84403dc53e09775e36be1df19d61ed68d1814a7d3688b5a0109122a8f50b1ccf87b5e8cef304deb09d7e20bdcfe93d07267597aa0e816d4bbbc01973786e
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i70627567.exeFilesize
1.3MB
MD5e1e1ff2a129c57e0b7b95267af6e5fcc
SHA16fb4741d3ff57d613de19e4c5e8864ca98ade4a3
SHA256841c27259dcf713fbcd3b0158e198b277842d0b51c019ee1f1a0c70426b77534
SHA512832b84403dc53e09775e36be1df19d61ed68d1814a7d3688b5a0109122a8f50b1ccf87b5e8cef304deb09d7e20bdcfe93d07267597aa0e816d4bbbc01973786e
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i38997514.exeFilesize
1001KB
MD5cc550caf2b25acbeda0add1ac6b9df6d
SHA1f80923263f7c22beb32fb8dca98f45b1ce6778b9
SHA25660057b0feffd4082be0e6f6fe19959f1947b767ccda65254611f5f0b436c30ab
SHA512fe2884a3127b482f50b208ca4dc38b7aac1b598bc12a11d61ef275d4a62053e46df6b2611114a9bac9c58342cf0178c0db845e911dbf8d725752c7fd9029212a
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i38997514.exeFilesize
1001KB
MD5cc550caf2b25acbeda0add1ac6b9df6d
SHA1f80923263f7c22beb32fb8dca98f45b1ce6778b9
SHA25660057b0feffd4082be0e6f6fe19959f1947b767ccda65254611f5f0b436c30ab
SHA512fe2884a3127b482f50b208ca4dc38b7aac1b598bc12a11d61ef275d4a62053e46df6b2611114a9bac9c58342cf0178c0db845e911dbf8d725752c7fd9029212a
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i82626057.exeFilesize
829KB
MD514fd0c326fd1c1ba9bc03c1a3c42e1c1
SHA10d1e11ddd9f9fb4733d2221c4041423dbeea1812
SHA256e4fa9b5dbb48f4acab52ef3b7e6a4a49d724d34829a8f0fc17a35f55020b8d38
SHA51239820d4b815e15c376c3bbba630b176498e76721882652b2fd5913ea67b117780c414d2a7f80077af76982374e25366844fe976cdb700cfc10ea9ce912da702b
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i82626057.exeFilesize
829KB
MD514fd0c326fd1c1ba9bc03c1a3c42e1c1
SHA10d1e11ddd9f9fb4733d2221c4041423dbeea1812
SHA256e4fa9b5dbb48f4acab52ef3b7e6a4a49d724d34829a8f0fc17a35f55020b8d38
SHA51239820d4b815e15c376c3bbba630b176498e76721882652b2fd5913ea67b117780c414d2a7f80077af76982374e25366844fe976cdb700cfc10ea9ce912da702b
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i56848394.exeFilesize
364KB
MD5e8d880721e82a52815a04c77411bf7d4
SHA14dadfb77301c0a3271b8ecf319dcec39c47db40b
SHA256911c9d01953f053d1a4695448759349dfa93fc5bab4b29d5b0165694f0d40123
SHA512fa9e7f219bfe81c11f81ab4d61299c67dcf644a83b947aa34f162318d09fbea4b7a3ee9446bc0b9742117e9a3f8525b4b18f1822fbffaf3b8f7937d3e8a38575
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i56848394.exeFilesize
364KB
MD5e8d880721e82a52815a04c77411bf7d4
SHA14dadfb77301c0a3271b8ecf319dcec39c47db40b
SHA256911c9d01953f053d1a4695448759349dfa93fc5bab4b29d5b0165694f0d40123
SHA512fa9e7f219bfe81c11f81ab4d61299c67dcf644a83b947aa34f162318d09fbea4b7a3ee9446bc0b9742117e9a3f8525b4b18f1822fbffaf3b8f7937d3e8a38575
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a05879523.exeFilesize
170KB
MD54212a268045343e2c95e67fc01052946
SHA13c7d83f30e9f4136270ca7971e743b017f6aa725
SHA256fe3f09f8628eefd4522a68e20d63cdb8cf3cce9dd1ff68da3059ee9cd1ec43b7
SHA5120a3a147b37edeb0633e83dc14de1058183b6e31c1944dcf4a74d151f7fca31bbf425cbfbd0fd3da8da808f5c4a0381b79e622500b82ee72d371536d6bb5fabf4
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a05879523.exeFilesize
170KB
MD54212a268045343e2c95e67fc01052946
SHA13c7d83f30e9f4136270ca7971e743b017f6aa725
SHA256fe3f09f8628eefd4522a68e20d63cdb8cf3cce9dd1ff68da3059ee9cd1ec43b7
SHA5120a3a147b37edeb0633e83dc14de1058183b6e31c1944dcf4a74d151f7fca31bbf425cbfbd0fd3da8da808f5c4a0381b79e622500b82ee72d371536d6bb5fabf4
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\i70627567.exeFilesize
1.3MB
MD5e1e1ff2a129c57e0b7b95267af6e5fcc
SHA16fb4741d3ff57d613de19e4c5e8864ca98ade4a3
SHA256841c27259dcf713fbcd3b0158e198b277842d0b51c019ee1f1a0c70426b77534
SHA512832b84403dc53e09775e36be1df19d61ed68d1814a7d3688b5a0109122a8f50b1ccf87b5e8cef304deb09d7e20bdcfe93d07267597aa0e816d4bbbc01973786e
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\i70627567.exeFilesize
1.3MB
MD5e1e1ff2a129c57e0b7b95267af6e5fcc
SHA16fb4741d3ff57d613de19e4c5e8864ca98ade4a3
SHA256841c27259dcf713fbcd3b0158e198b277842d0b51c019ee1f1a0c70426b77534
SHA512832b84403dc53e09775e36be1df19d61ed68d1814a7d3688b5a0109122a8f50b1ccf87b5e8cef304deb09d7e20bdcfe93d07267597aa0e816d4bbbc01973786e
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\i38997514.exeFilesize
1001KB
MD5cc550caf2b25acbeda0add1ac6b9df6d
SHA1f80923263f7c22beb32fb8dca98f45b1ce6778b9
SHA25660057b0feffd4082be0e6f6fe19959f1947b767ccda65254611f5f0b436c30ab
SHA512fe2884a3127b482f50b208ca4dc38b7aac1b598bc12a11d61ef275d4a62053e46df6b2611114a9bac9c58342cf0178c0db845e911dbf8d725752c7fd9029212a
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\i38997514.exeFilesize
1001KB
MD5cc550caf2b25acbeda0add1ac6b9df6d
SHA1f80923263f7c22beb32fb8dca98f45b1ce6778b9
SHA25660057b0feffd4082be0e6f6fe19959f1947b767ccda65254611f5f0b436c30ab
SHA512fe2884a3127b482f50b208ca4dc38b7aac1b598bc12a11d61ef275d4a62053e46df6b2611114a9bac9c58342cf0178c0db845e911dbf8d725752c7fd9029212a
-
\Users\Admin\AppData\Local\Temp\IXP002.TMP\i82626057.exeFilesize
829KB
MD514fd0c326fd1c1ba9bc03c1a3c42e1c1
SHA10d1e11ddd9f9fb4733d2221c4041423dbeea1812
SHA256e4fa9b5dbb48f4acab52ef3b7e6a4a49d724d34829a8f0fc17a35f55020b8d38
SHA51239820d4b815e15c376c3bbba630b176498e76721882652b2fd5913ea67b117780c414d2a7f80077af76982374e25366844fe976cdb700cfc10ea9ce912da702b
-
\Users\Admin\AppData\Local\Temp\IXP002.TMP\i82626057.exeFilesize
829KB
MD514fd0c326fd1c1ba9bc03c1a3c42e1c1
SHA10d1e11ddd9f9fb4733d2221c4041423dbeea1812
SHA256e4fa9b5dbb48f4acab52ef3b7e6a4a49d724d34829a8f0fc17a35f55020b8d38
SHA51239820d4b815e15c376c3bbba630b176498e76721882652b2fd5913ea67b117780c414d2a7f80077af76982374e25366844fe976cdb700cfc10ea9ce912da702b
-
\Users\Admin\AppData\Local\Temp\IXP003.TMP\i56848394.exeFilesize
364KB
MD5e8d880721e82a52815a04c77411bf7d4
SHA14dadfb77301c0a3271b8ecf319dcec39c47db40b
SHA256911c9d01953f053d1a4695448759349dfa93fc5bab4b29d5b0165694f0d40123
SHA512fa9e7f219bfe81c11f81ab4d61299c67dcf644a83b947aa34f162318d09fbea4b7a3ee9446bc0b9742117e9a3f8525b4b18f1822fbffaf3b8f7937d3e8a38575
-
\Users\Admin\AppData\Local\Temp\IXP003.TMP\i56848394.exeFilesize
364KB
MD5e8d880721e82a52815a04c77411bf7d4
SHA14dadfb77301c0a3271b8ecf319dcec39c47db40b
SHA256911c9d01953f053d1a4695448759349dfa93fc5bab4b29d5b0165694f0d40123
SHA512fa9e7f219bfe81c11f81ab4d61299c67dcf644a83b947aa34f162318d09fbea4b7a3ee9446bc0b9742117e9a3f8525b4b18f1822fbffaf3b8f7937d3e8a38575
-
\Users\Admin\AppData\Local\Temp\IXP004.TMP\a05879523.exeFilesize
170KB
MD54212a268045343e2c95e67fc01052946
SHA13c7d83f30e9f4136270ca7971e743b017f6aa725
SHA256fe3f09f8628eefd4522a68e20d63cdb8cf3cce9dd1ff68da3059ee9cd1ec43b7
SHA5120a3a147b37edeb0633e83dc14de1058183b6e31c1944dcf4a74d151f7fca31bbf425cbfbd0fd3da8da808f5c4a0381b79e622500b82ee72d371536d6bb5fabf4
-
\Users\Admin\AppData\Local\Temp\IXP004.TMP\a05879523.exeFilesize
170KB
MD54212a268045343e2c95e67fc01052946
SHA13c7d83f30e9f4136270ca7971e743b017f6aa725
SHA256fe3f09f8628eefd4522a68e20d63cdb8cf3cce9dd1ff68da3059ee9cd1ec43b7
SHA5120a3a147b37edeb0633e83dc14de1058183b6e31c1944dcf4a74d151f7fca31bbf425cbfbd0fd3da8da808f5c4a0381b79e622500b82ee72d371536d6bb5fabf4
-
memory/876-104-0x00000000000E0000-0x0000000000110000-memory.dmpFilesize
192KB
-
memory/876-105-0x0000000000250000-0x0000000000256000-memory.dmpFilesize
24KB
-
memory/876-106-0x00000000049F0000-0x0000000004A30000-memory.dmpFilesize
256KB
-
memory/876-107-0x00000000049F0000-0x0000000004A30000-memory.dmpFilesize
256KB