Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
07-05-2023 08:57
Static task
static1
Behavioral task
behavioral1
Sample
fe63c869c0807fafc23bf4a0cbfd0160343fda100e0da8bfcd18e7086e55b89f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
fe63c869c0807fafc23bf4a0cbfd0160343fda100e0da8bfcd18e7086e55b89f.exe
Resource
win10v2004-20230220-en
General
-
Target
fe63c869c0807fafc23bf4a0cbfd0160343fda100e0da8bfcd18e7086e55b89f.exe
-
Size
867KB
-
MD5
ee59c065cf86b630c3d3ad919ab32b25
-
SHA1
9423c23e8c2af3d995dd9dd565fa74fe00c9df38
-
SHA256
fe63c869c0807fafc23bf4a0cbfd0160343fda100e0da8bfcd18e7086e55b89f
-
SHA512
d8127dd43f2c61c927d731e7898a9b99844504146b3b598eba7dfbf793dbfd9a779d1da679dce038489dcf21d55d4dfe60753ad8d4d854d68dccbabbe6276a18
-
SSDEEP
12288:/y90iPQedDt4QB5kxhNrINnSpziYt52S6SyTSBP2LbJayCMVMiYkWFtaYChp:/yfpTMrIFYtk2yTSBPiVCmWFcY+p
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dark
185.161.248.73:4164
-
auth_value
ae85b01f66afe8770afeed560513fc2d
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
Processes:
y71532665.exep81192672.exe1.exer76601504.exepid process 1340 y71532665.exe 1760 p81192672.exe 876 1.exe 672 r76601504.exe -
Loads dropped DLL 9 IoCs
Processes:
fe63c869c0807fafc23bf4a0cbfd0160343fda100e0da8bfcd18e7086e55b89f.exey71532665.exep81192672.exe1.exer76601504.exepid process 1216 fe63c869c0807fafc23bf4a0cbfd0160343fda100e0da8bfcd18e7086e55b89f.exe 1340 y71532665.exe 1340 y71532665.exe 1340 y71532665.exe 1760 p81192672.exe 1760 p81192672.exe 876 1.exe 1340 y71532665.exe 672 r76601504.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
fe63c869c0807fafc23bf4a0cbfd0160343fda100e0da8bfcd18e7086e55b89f.exey71532665.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce fe63c869c0807fafc23bf4a0cbfd0160343fda100e0da8bfcd18e7086e55b89f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fe63c869c0807fafc23bf4a0cbfd0160343fda100e0da8bfcd18e7086e55b89f.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y71532665.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y71532665.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
p81192672.exedescription pid process Token: SeDebugPrivilege 1760 p81192672.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
fe63c869c0807fafc23bf4a0cbfd0160343fda100e0da8bfcd18e7086e55b89f.exey71532665.exep81192672.exedescription pid process target process PID 1216 wrote to memory of 1340 1216 fe63c869c0807fafc23bf4a0cbfd0160343fda100e0da8bfcd18e7086e55b89f.exe y71532665.exe PID 1216 wrote to memory of 1340 1216 fe63c869c0807fafc23bf4a0cbfd0160343fda100e0da8bfcd18e7086e55b89f.exe y71532665.exe PID 1216 wrote to memory of 1340 1216 fe63c869c0807fafc23bf4a0cbfd0160343fda100e0da8bfcd18e7086e55b89f.exe y71532665.exe PID 1216 wrote to memory of 1340 1216 fe63c869c0807fafc23bf4a0cbfd0160343fda100e0da8bfcd18e7086e55b89f.exe y71532665.exe PID 1216 wrote to memory of 1340 1216 fe63c869c0807fafc23bf4a0cbfd0160343fda100e0da8bfcd18e7086e55b89f.exe y71532665.exe PID 1216 wrote to memory of 1340 1216 fe63c869c0807fafc23bf4a0cbfd0160343fda100e0da8bfcd18e7086e55b89f.exe y71532665.exe PID 1216 wrote to memory of 1340 1216 fe63c869c0807fafc23bf4a0cbfd0160343fda100e0da8bfcd18e7086e55b89f.exe y71532665.exe PID 1340 wrote to memory of 1760 1340 y71532665.exe p81192672.exe PID 1340 wrote to memory of 1760 1340 y71532665.exe p81192672.exe PID 1340 wrote to memory of 1760 1340 y71532665.exe p81192672.exe PID 1340 wrote to memory of 1760 1340 y71532665.exe p81192672.exe PID 1340 wrote to memory of 1760 1340 y71532665.exe p81192672.exe PID 1340 wrote to memory of 1760 1340 y71532665.exe p81192672.exe PID 1340 wrote to memory of 1760 1340 y71532665.exe p81192672.exe PID 1760 wrote to memory of 876 1760 p81192672.exe 1.exe PID 1760 wrote to memory of 876 1760 p81192672.exe 1.exe PID 1760 wrote to memory of 876 1760 p81192672.exe 1.exe PID 1760 wrote to memory of 876 1760 p81192672.exe 1.exe PID 1760 wrote to memory of 876 1760 p81192672.exe 1.exe PID 1760 wrote to memory of 876 1760 p81192672.exe 1.exe PID 1760 wrote to memory of 876 1760 p81192672.exe 1.exe PID 1340 wrote to memory of 672 1340 y71532665.exe r76601504.exe PID 1340 wrote to memory of 672 1340 y71532665.exe r76601504.exe PID 1340 wrote to memory of 672 1340 y71532665.exe r76601504.exe PID 1340 wrote to memory of 672 1340 y71532665.exe r76601504.exe PID 1340 wrote to memory of 672 1340 y71532665.exe r76601504.exe PID 1340 wrote to memory of 672 1340 y71532665.exe r76601504.exe PID 1340 wrote to memory of 672 1340 y71532665.exe r76601504.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe63c869c0807fafc23bf4a0cbfd0160343fda100e0da8bfcd18e7086e55b89f.exe"C:\Users\Admin\AppData\Local\Temp\fe63c869c0807fafc23bf4a0cbfd0160343fda100e0da8bfcd18e7086e55b89f.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y71532665.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y71532665.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p81192672.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p81192672.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r76601504.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r76601504.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y71532665.exeFilesize
578KB
MD57cdc8489a93c51f20c468785bcbdce80
SHA108bbb1cbe8efde2bfd599d1123433aa3a7b3059d
SHA256f1d69633fa6ec320edf25da62db752ee7b3616f9eeb917487fa5f419bc8865cb
SHA5125fc16859f701fb71c505bb8e310c3177c75019175e9a9250c2bd2c52ce0de54e0f6d7aaa3b46161c3b6cc8f5783329e32aac22e527c6d08bbe5a6603be1b4f25
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y71532665.exeFilesize
578KB
MD57cdc8489a93c51f20c468785bcbdce80
SHA108bbb1cbe8efde2bfd599d1123433aa3a7b3059d
SHA256f1d69633fa6ec320edf25da62db752ee7b3616f9eeb917487fa5f419bc8865cb
SHA5125fc16859f701fb71c505bb8e310c3177c75019175e9a9250c2bd2c52ce0de54e0f6d7aaa3b46161c3b6cc8f5783329e32aac22e527c6d08bbe5a6603be1b4f25
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p81192672.exeFilesize
580KB
MD5f9a58a71b42ac049022f260e50f8cf3a
SHA1130faa692e5e5548364fc50dee1308bc05aabb39
SHA25688a8fe58341b266639e5ccca6867a9f589dd5e1387e56cf503e43d8040574951
SHA512b2b7b91ba3e21592148e88399dd414c1224e43139eab1230228dabf3d8d15bdd6210ae332c3a336e5f217a085fb5984599db6c21fc40fe4a885a28058c688a9f
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p81192672.exeFilesize
580KB
MD5f9a58a71b42ac049022f260e50f8cf3a
SHA1130faa692e5e5548364fc50dee1308bc05aabb39
SHA25688a8fe58341b266639e5ccca6867a9f589dd5e1387e56cf503e43d8040574951
SHA512b2b7b91ba3e21592148e88399dd414c1224e43139eab1230228dabf3d8d15bdd6210ae332c3a336e5f217a085fb5984599db6c21fc40fe4a885a28058c688a9f
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p81192672.exeFilesize
580KB
MD5f9a58a71b42ac049022f260e50f8cf3a
SHA1130faa692e5e5548364fc50dee1308bc05aabb39
SHA25688a8fe58341b266639e5ccca6867a9f589dd5e1387e56cf503e43d8040574951
SHA512b2b7b91ba3e21592148e88399dd414c1224e43139eab1230228dabf3d8d15bdd6210ae332c3a336e5f217a085fb5984599db6c21fc40fe4a885a28058c688a9f
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r76601504.exeFilesize
172KB
MD5f169f47e1d556b874accd3fb4fafaaef
SHA1837b208d5ecc62c15456280a927d4dd8ae680dde
SHA25683d892a413a70693a7a78f4adeb557ce3735ef03e1c479248abddce4f568dd6d
SHA5122b65aaad4c1f94e898e6fd36af45ae893125a8a3232a6d5b6273ae515eb5cd321b042ff9e2c3bb74b0d2fc31bfb721da5aad57afec8cdfddea6857712f45bbc4
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r76601504.exeFilesize
172KB
MD5f169f47e1d556b874accd3fb4fafaaef
SHA1837b208d5ecc62c15456280a927d4dd8ae680dde
SHA25683d892a413a70693a7a78f4adeb557ce3735ef03e1c479248abddce4f568dd6d
SHA5122b65aaad4c1f94e898e6fd36af45ae893125a8a3232a6d5b6273ae515eb5cd321b042ff9e2c3bb74b0d2fc31bfb721da5aad57afec8cdfddea6857712f45bbc4
-
C:\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
C:\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\y71532665.exeFilesize
578KB
MD57cdc8489a93c51f20c468785bcbdce80
SHA108bbb1cbe8efde2bfd599d1123433aa3a7b3059d
SHA256f1d69633fa6ec320edf25da62db752ee7b3616f9eeb917487fa5f419bc8865cb
SHA5125fc16859f701fb71c505bb8e310c3177c75019175e9a9250c2bd2c52ce0de54e0f6d7aaa3b46161c3b6cc8f5783329e32aac22e527c6d08bbe5a6603be1b4f25
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\y71532665.exeFilesize
578KB
MD57cdc8489a93c51f20c468785bcbdce80
SHA108bbb1cbe8efde2bfd599d1123433aa3a7b3059d
SHA256f1d69633fa6ec320edf25da62db752ee7b3616f9eeb917487fa5f419bc8865cb
SHA5125fc16859f701fb71c505bb8e310c3177c75019175e9a9250c2bd2c52ce0de54e0f6d7aaa3b46161c3b6cc8f5783329e32aac22e527c6d08bbe5a6603be1b4f25
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\p81192672.exeFilesize
580KB
MD5f9a58a71b42ac049022f260e50f8cf3a
SHA1130faa692e5e5548364fc50dee1308bc05aabb39
SHA25688a8fe58341b266639e5ccca6867a9f589dd5e1387e56cf503e43d8040574951
SHA512b2b7b91ba3e21592148e88399dd414c1224e43139eab1230228dabf3d8d15bdd6210ae332c3a336e5f217a085fb5984599db6c21fc40fe4a885a28058c688a9f
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\p81192672.exeFilesize
580KB
MD5f9a58a71b42ac049022f260e50f8cf3a
SHA1130faa692e5e5548364fc50dee1308bc05aabb39
SHA25688a8fe58341b266639e5ccca6867a9f589dd5e1387e56cf503e43d8040574951
SHA512b2b7b91ba3e21592148e88399dd414c1224e43139eab1230228dabf3d8d15bdd6210ae332c3a336e5f217a085fb5984599db6c21fc40fe4a885a28058c688a9f
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\p81192672.exeFilesize
580KB
MD5f9a58a71b42ac049022f260e50f8cf3a
SHA1130faa692e5e5548364fc50dee1308bc05aabb39
SHA25688a8fe58341b266639e5ccca6867a9f589dd5e1387e56cf503e43d8040574951
SHA512b2b7b91ba3e21592148e88399dd414c1224e43139eab1230228dabf3d8d15bdd6210ae332c3a336e5f217a085fb5984599db6c21fc40fe4a885a28058c688a9f
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\r76601504.exeFilesize
172KB
MD5f169f47e1d556b874accd3fb4fafaaef
SHA1837b208d5ecc62c15456280a927d4dd8ae680dde
SHA25683d892a413a70693a7a78f4adeb557ce3735ef03e1c479248abddce4f568dd6d
SHA5122b65aaad4c1f94e898e6fd36af45ae893125a8a3232a6d5b6273ae515eb5cd321b042ff9e2c3bb74b0d2fc31bfb721da5aad57afec8cdfddea6857712f45bbc4
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\r76601504.exeFilesize
172KB
MD5f169f47e1d556b874accd3fb4fafaaef
SHA1837b208d5ecc62c15456280a927d4dd8ae680dde
SHA25683d892a413a70693a7a78f4adeb557ce3735ef03e1c479248abddce4f568dd6d
SHA5122b65aaad4c1f94e898e6fd36af45ae893125a8a3232a6d5b6273ae515eb5cd321b042ff9e2c3bb74b0d2fc31bfb721da5aad57afec8cdfddea6857712f45bbc4
-
\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
memory/672-2246-0x0000000000380000-0x00000000003B0000-memory.dmpFilesize
192KB
-
memory/672-2248-0x00000000003D0000-0x00000000003D6000-memory.dmpFilesize
24KB
-
memory/672-2250-0x0000000004BA0000-0x0000000004BE0000-memory.dmpFilesize
256KB
-
memory/672-2252-0x0000000004BA0000-0x0000000004BE0000-memory.dmpFilesize
256KB
-
memory/876-2247-0x00000000003F0000-0x00000000003F6000-memory.dmpFilesize
24KB
-
memory/876-2239-0x0000000000AF0000-0x0000000000B1E000-memory.dmpFilesize
184KB
-
memory/876-2249-0x00000000009B0000-0x00000000009F0000-memory.dmpFilesize
256KB
-
memory/876-2251-0x00000000009B0000-0x00000000009F0000-memory.dmpFilesize
256KB
-
memory/1760-119-0x0000000000F90000-0x0000000000FF0000-memory.dmpFilesize
384KB
-
memory/1760-142-0x0000000000F90000-0x0000000000FF0000-memory.dmpFilesize
384KB
-
memory/1760-111-0x0000000000F90000-0x0000000000FF0000-memory.dmpFilesize
384KB
-
memory/1760-113-0x0000000000F90000-0x0000000000FF0000-memory.dmpFilesize
384KB
-
memory/1760-115-0x0000000000F90000-0x0000000000FF0000-memory.dmpFilesize
384KB
-
memory/1760-117-0x0000000000F90000-0x0000000000FF0000-memory.dmpFilesize
384KB
-
memory/1760-107-0x0000000000F90000-0x0000000000FF0000-memory.dmpFilesize
384KB
-
memory/1760-123-0x0000000000F90000-0x0000000000FF0000-memory.dmpFilesize
384KB
-
memory/1760-121-0x0000000000F90000-0x0000000000FF0000-memory.dmpFilesize
384KB
-
memory/1760-125-0x0000000000F90000-0x0000000000FF0000-memory.dmpFilesize
384KB
-
memory/1760-129-0x0000000000F90000-0x0000000000FF0000-memory.dmpFilesize
384KB
-
memory/1760-127-0x0000000000F90000-0x0000000000FF0000-memory.dmpFilesize
384KB
-
memory/1760-132-0x0000000000960000-0x00000000009BB000-memory.dmpFilesize
364KB
-
memory/1760-131-0x0000000000F90000-0x0000000000FF0000-memory.dmpFilesize
384KB
-
memory/1760-136-0x0000000000F90000-0x0000000000FF0000-memory.dmpFilesize
384KB
-
memory/1760-135-0x0000000004E30000-0x0000000004E70000-memory.dmpFilesize
256KB
-
memory/1760-134-0x0000000004E30000-0x0000000004E70000-memory.dmpFilesize
256KB
-
memory/1760-140-0x0000000000F90000-0x0000000000FF0000-memory.dmpFilesize
384KB
-
memory/1760-138-0x0000000000F90000-0x0000000000FF0000-memory.dmpFilesize
384KB
-
memory/1760-109-0x0000000000F90000-0x0000000000FF0000-memory.dmpFilesize
384KB
-
memory/1760-146-0x0000000000F90000-0x0000000000FF0000-memory.dmpFilesize
384KB
-
memory/1760-144-0x0000000000F90000-0x0000000000FF0000-memory.dmpFilesize
384KB
-
memory/1760-2229-0x0000000001060000-0x0000000001092000-memory.dmpFilesize
200KB
-
memory/1760-101-0x0000000000F90000-0x0000000000FF0000-memory.dmpFilesize
384KB
-
memory/1760-103-0x0000000000F90000-0x0000000000FF0000-memory.dmpFilesize
384KB
-
memory/1760-105-0x0000000000F90000-0x0000000000FF0000-memory.dmpFilesize
384KB
-
memory/1760-97-0x0000000000F90000-0x0000000000FF0000-memory.dmpFilesize
384KB
-
memory/1760-99-0x0000000000F90000-0x0000000000FF0000-memory.dmpFilesize
384KB
-
memory/1760-93-0x0000000000F90000-0x0000000000FF0000-memory.dmpFilesize
384KB
-
memory/1760-95-0x0000000000F90000-0x0000000000FF0000-memory.dmpFilesize
384KB
-
memory/1760-91-0x0000000000F90000-0x0000000000FF0000-memory.dmpFilesize
384KB
-
memory/1760-89-0x0000000000F90000-0x0000000000FF0000-memory.dmpFilesize
384KB
-
memory/1760-83-0x0000000000F90000-0x0000000000FF0000-memory.dmpFilesize
384KB
-
memory/1760-85-0x0000000000F90000-0x0000000000FF0000-memory.dmpFilesize
384KB
-
memory/1760-87-0x0000000000F90000-0x0000000000FF0000-memory.dmpFilesize
384KB
-
memory/1760-81-0x0000000000F90000-0x0000000000FF0000-memory.dmpFilesize
384KB
-
memory/1760-80-0x0000000000F90000-0x0000000000FF0000-memory.dmpFilesize
384KB
-
memory/1760-79-0x0000000000F90000-0x0000000000FF6000-memory.dmpFilesize
408KB
-
memory/1760-78-0x0000000000EF0000-0x0000000000F58000-memory.dmpFilesize
416KB