Analysis
-
max time kernel
126s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
07-05-2023 09:01
Static task
static1
Behavioral task
behavioral1
Sample
ffb40f7a5f14718677e55c0c77fce7313fffb63d370a6f70fe35ec0c8c1ab5a9.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ffb40f7a5f14718677e55c0c77fce7313fffb63d370a6f70fe35ec0c8c1ab5a9.exe
Resource
win10v2004-20230220-en
General
-
Target
ffb40f7a5f14718677e55c0c77fce7313fffb63d370a6f70fe35ec0c8c1ab5a9.exe
-
Size
892KB
-
MD5
dc895af741705903cb6e591c609c2e05
-
SHA1
743d9551d43db8fd96e24faa782a8cc5265e3d6e
-
SHA256
ffb40f7a5f14718677e55c0c77fce7313fffb63d370a6f70fe35ec0c8c1ab5a9
-
SHA512
0ac696b1533c1b8bdc7f3a7ab1105b1ce52f6712c32f7e59ad8b615b2b6e1bb0ecdde424ed27c80b94b42e4fe64556a306580650adca3eb28fb11bf7659b6f31
-
SSDEEP
24576:Qy4cvDqW1na5ZZECu7aAJ/3x8GM3S1P6:XVfs50Zdl3qGYS1P
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
danko
185.161.248.73:4164
-
auth_value
784d42a6c1eb1a5060b8bcd3696f5f1e
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
Processes:
y04392494.exep46258998.exe1.exer84925850.exepid process 1304 y04392494.exe 1300 p46258998.exe 1676 1.exe 1356 r84925850.exe -
Loads dropped DLL 9 IoCs
Processes:
ffb40f7a5f14718677e55c0c77fce7313fffb63d370a6f70fe35ec0c8c1ab5a9.exey04392494.exep46258998.exe1.exer84925850.exepid process 924 ffb40f7a5f14718677e55c0c77fce7313fffb63d370a6f70fe35ec0c8c1ab5a9.exe 1304 y04392494.exe 1304 y04392494.exe 1304 y04392494.exe 1300 p46258998.exe 1300 p46258998.exe 1676 1.exe 1304 y04392494.exe 1356 r84925850.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
ffb40f7a5f14718677e55c0c77fce7313fffb63d370a6f70fe35ec0c8c1ab5a9.exey04392494.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce ffb40f7a5f14718677e55c0c77fce7313fffb63d370a6f70fe35ec0c8c1ab5a9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ffb40f7a5f14718677e55c0c77fce7313fffb63d370a6f70fe35ec0c8c1ab5a9.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y04392494.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y04392494.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
p46258998.exedescription pid process Token: SeDebugPrivilege 1300 p46258998.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
ffb40f7a5f14718677e55c0c77fce7313fffb63d370a6f70fe35ec0c8c1ab5a9.exey04392494.exep46258998.exedescription pid process target process PID 924 wrote to memory of 1304 924 ffb40f7a5f14718677e55c0c77fce7313fffb63d370a6f70fe35ec0c8c1ab5a9.exe y04392494.exe PID 924 wrote to memory of 1304 924 ffb40f7a5f14718677e55c0c77fce7313fffb63d370a6f70fe35ec0c8c1ab5a9.exe y04392494.exe PID 924 wrote to memory of 1304 924 ffb40f7a5f14718677e55c0c77fce7313fffb63d370a6f70fe35ec0c8c1ab5a9.exe y04392494.exe PID 924 wrote to memory of 1304 924 ffb40f7a5f14718677e55c0c77fce7313fffb63d370a6f70fe35ec0c8c1ab5a9.exe y04392494.exe PID 924 wrote to memory of 1304 924 ffb40f7a5f14718677e55c0c77fce7313fffb63d370a6f70fe35ec0c8c1ab5a9.exe y04392494.exe PID 924 wrote to memory of 1304 924 ffb40f7a5f14718677e55c0c77fce7313fffb63d370a6f70fe35ec0c8c1ab5a9.exe y04392494.exe PID 924 wrote to memory of 1304 924 ffb40f7a5f14718677e55c0c77fce7313fffb63d370a6f70fe35ec0c8c1ab5a9.exe y04392494.exe PID 1304 wrote to memory of 1300 1304 y04392494.exe p46258998.exe PID 1304 wrote to memory of 1300 1304 y04392494.exe p46258998.exe PID 1304 wrote to memory of 1300 1304 y04392494.exe p46258998.exe PID 1304 wrote to memory of 1300 1304 y04392494.exe p46258998.exe PID 1304 wrote to memory of 1300 1304 y04392494.exe p46258998.exe PID 1304 wrote to memory of 1300 1304 y04392494.exe p46258998.exe PID 1304 wrote to memory of 1300 1304 y04392494.exe p46258998.exe PID 1300 wrote to memory of 1676 1300 p46258998.exe 1.exe PID 1300 wrote to memory of 1676 1300 p46258998.exe 1.exe PID 1300 wrote to memory of 1676 1300 p46258998.exe 1.exe PID 1300 wrote to memory of 1676 1300 p46258998.exe 1.exe PID 1300 wrote to memory of 1676 1300 p46258998.exe 1.exe PID 1300 wrote to memory of 1676 1300 p46258998.exe 1.exe PID 1300 wrote to memory of 1676 1300 p46258998.exe 1.exe PID 1304 wrote to memory of 1356 1304 y04392494.exe r84925850.exe PID 1304 wrote to memory of 1356 1304 y04392494.exe r84925850.exe PID 1304 wrote to memory of 1356 1304 y04392494.exe r84925850.exe PID 1304 wrote to memory of 1356 1304 y04392494.exe r84925850.exe PID 1304 wrote to memory of 1356 1304 y04392494.exe r84925850.exe PID 1304 wrote to memory of 1356 1304 y04392494.exe r84925850.exe PID 1304 wrote to memory of 1356 1304 y04392494.exe r84925850.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffb40f7a5f14718677e55c0c77fce7313fffb63d370a6f70fe35ec0c8c1ab5a9.exe"C:\Users\Admin\AppData\Local\Temp\ffb40f7a5f14718677e55c0c77fce7313fffb63d370a6f70fe35ec0c8c1ab5a9.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y04392494.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y04392494.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p46258998.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p46258998.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r84925850.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r84925850.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y04392494.exeFilesize
590KB
MD55d8f70ef850513749ec13d6a4058bafa
SHA15f02edb463e7caead4e123648401742c5444a155
SHA256a00db8643e869bafdbcd3a91fb45066b85140a00787b47304afb4e556c857940
SHA512623c3243cab31fc62d133012e1779f51a17d38f676f85f0b15628517a66b1d6933d4e7a0381e601fe79f53263393e524cd17609379cc05ac6a12103e65fd9dbb
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y04392494.exeFilesize
590KB
MD55d8f70ef850513749ec13d6a4058bafa
SHA15f02edb463e7caead4e123648401742c5444a155
SHA256a00db8643e869bafdbcd3a91fb45066b85140a00787b47304afb4e556c857940
SHA512623c3243cab31fc62d133012e1779f51a17d38f676f85f0b15628517a66b1d6933d4e7a0381e601fe79f53263393e524cd17609379cc05ac6a12103e65fd9dbb
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p46258998.exeFilesize
531KB
MD5f0dcd0418f0b1ab0620a4701769162ed
SHA109dbbb2616290c81075745370b568d3166c35de0
SHA256c0a1e26fc6029c4107f3e4b598bd36aace5a5a7b66bb40656942743e8645f010
SHA512a6835db38d640b217b4ae13f729907b381f4cbfa09544474e5243fb1ebfc6ae8e753c458037a2c613a49a8435e436ecdcc942be00babc10395692d87fe08652a
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p46258998.exeFilesize
531KB
MD5f0dcd0418f0b1ab0620a4701769162ed
SHA109dbbb2616290c81075745370b568d3166c35de0
SHA256c0a1e26fc6029c4107f3e4b598bd36aace5a5a7b66bb40656942743e8645f010
SHA512a6835db38d640b217b4ae13f729907b381f4cbfa09544474e5243fb1ebfc6ae8e753c458037a2c613a49a8435e436ecdcc942be00babc10395692d87fe08652a
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p46258998.exeFilesize
531KB
MD5f0dcd0418f0b1ab0620a4701769162ed
SHA109dbbb2616290c81075745370b568d3166c35de0
SHA256c0a1e26fc6029c4107f3e4b598bd36aace5a5a7b66bb40656942743e8645f010
SHA512a6835db38d640b217b4ae13f729907b381f4cbfa09544474e5243fb1ebfc6ae8e753c458037a2c613a49a8435e436ecdcc942be00babc10395692d87fe08652a
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r84925850.exeFilesize
169KB
MD5a281c7639dec161470a9bb0da7ac37ed
SHA138a9618314f6a97e99f7518f6fe50fb5e1940337
SHA256c8d28821989d26cf9b0435077facdb43720bdecb71543096beb18896bdbf23cf
SHA5120242f54538b07bfd045169a71623121bc26557945f29ef4b60241de2c0869c5c6a2d6142b211c5d36f8f7390b452774381275a73f9e420cf69a66cc868a3c0b0
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r84925850.exeFilesize
169KB
MD5a281c7639dec161470a9bb0da7ac37ed
SHA138a9618314f6a97e99f7518f6fe50fb5e1940337
SHA256c8d28821989d26cf9b0435077facdb43720bdecb71543096beb18896bdbf23cf
SHA5120242f54538b07bfd045169a71623121bc26557945f29ef4b60241de2c0869c5c6a2d6142b211c5d36f8f7390b452774381275a73f9e420cf69a66cc868a3c0b0
-
C:\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
C:\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\y04392494.exeFilesize
590KB
MD55d8f70ef850513749ec13d6a4058bafa
SHA15f02edb463e7caead4e123648401742c5444a155
SHA256a00db8643e869bafdbcd3a91fb45066b85140a00787b47304afb4e556c857940
SHA512623c3243cab31fc62d133012e1779f51a17d38f676f85f0b15628517a66b1d6933d4e7a0381e601fe79f53263393e524cd17609379cc05ac6a12103e65fd9dbb
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\y04392494.exeFilesize
590KB
MD55d8f70ef850513749ec13d6a4058bafa
SHA15f02edb463e7caead4e123648401742c5444a155
SHA256a00db8643e869bafdbcd3a91fb45066b85140a00787b47304afb4e556c857940
SHA512623c3243cab31fc62d133012e1779f51a17d38f676f85f0b15628517a66b1d6933d4e7a0381e601fe79f53263393e524cd17609379cc05ac6a12103e65fd9dbb
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\p46258998.exeFilesize
531KB
MD5f0dcd0418f0b1ab0620a4701769162ed
SHA109dbbb2616290c81075745370b568d3166c35de0
SHA256c0a1e26fc6029c4107f3e4b598bd36aace5a5a7b66bb40656942743e8645f010
SHA512a6835db38d640b217b4ae13f729907b381f4cbfa09544474e5243fb1ebfc6ae8e753c458037a2c613a49a8435e436ecdcc942be00babc10395692d87fe08652a
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\p46258998.exeFilesize
531KB
MD5f0dcd0418f0b1ab0620a4701769162ed
SHA109dbbb2616290c81075745370b568d3166c35de0
SHA256c0a1e26fc6029c4107f3e4b598bd36aace5a5a7b66bb40656942743e8645f010
SHA512a6835db38d640b217b4ae13f729907b381f4cbfa09544474e5243fb1ebfc6ae8e753c458037a2c613a49a8435e436ecdcc942be00babc10395692d87fe08652a
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\p46258998.exeFilesize
531KB
MD5f0dcd0418f0b1ab0620a4701769162ed
SHA109dbbb2616290c81075745370b568d3166c35de0
SHA256c0a1e26fc6029c4107f3e4b598bd36aace5a5a7b66bb40656942743e8645f010
SHA512a6835db38d640b217b4ae13f729907b381f4cbfa09544474e5243fb1ebfc6ae8e753c458037a2c613a49a8435e436ecdcc942be00babc10395692d87fe08652a
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\r84925850.exeFilesize
169KB
MD5a281c7639dec161470a9bb0da7ac37ed
SHA138a9618314f6a97e99f7518f6fe50fb5e1940337
SHA256c8d28821989d26cf9b0435077facdb43720bdecb71543096beb18896bdbf23cf
SHA5120242f54538b07bfd045169a71623121bc26557945f29ef4b60241de2c0869c5c6a2d6142b211c5d36f8f7390b452774381275a73f9e420cf69a66cc868a3c0b0
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\r84925850.exeFilesize
169KB
MD5a281c7639dec161470a9bb0da7ac37ed
SHA138a9618314f6a97e99f7518f6fe50fb5e1940337
SHA256c8d28821989d26cf9b0435077facdb43720bdecb71543096beb18896bdbf23cf
SHA5120242f54538b07bfd045169a71623121bc26557945f29ef4b60241de2c0869c5c6a2d6142b211c5d36f8f7390b452774381275a73f9e420cf69a66cc868a3c0b0
-
\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
memory/1300-116-0x0000000002B30000-0x0000000002B90000-memory.dmpFilesize
384KB
-
memory/1300-134-0x0000000002B30000-0x0000000002B90000-memory.dmpFilesize
384KB
-
memory/1300-90-0x0000000002B30000-0x0000000002B90000-memory.dmpFilesize
384KB
-
memory/1300-94-0x0000000002B30000-0x0000000002B90000-memory.dmpFilesize
384KB
-
memory/1300-96-0x0000000002B30000-0x0000000002B90000-memory.dmpFilesize
384KB
-
memory/1300-98-0x0000000002B30000-0x0000000002B90000-memory.dmpFilesize
384KB
-
memory/1300-102-0x0000000002B30000-0x0000000002B90000-memory.dmpFilesize
384KB
-
memory/1300-100-0x0000000002B30000-0x0000000002B90000-memory.dmpFilesize
384KB
-
memory/1300-108-0x0000000002B30000-0x0000000002B90000-memory.dmpFilesize
384KB
-
memory/1300-106-0x0000000002B30000-0x0000000002B90000-memory.dmpFilesize
384KB
-
memory/1300-104-0x0000000002B30000-0x0000000002B90000-memory.dmpFilesize
384KB
-
memory/1300-112-0x0000000002B30000-0x0000000002B90000-memory.dmpFilesize
384KB
-
memory/1300-110-0x0000000002B30000-0x0000000002B90000-memory.dmpFilesize
384KB
-
memory/1300-114-0x0000000002B30000-0x0000000002B90000-memory.dmpFilesize
384KB
-
memory/1300-88-0x0000000002B30000-0x0000000002B90000-memory.dmpFilesize
384KB
-
memory/1300-118-0x0000000002B30000-0x0000000002B90000-memory.dmpFilesize
384KB
-
memory/1300-122-0x0000000002B30000-0x0000000002B90000-memory.dmpFilesize
384KB
-
memory/1300-120-0x0000000002B30000-0x0000000002B90000-memory.dmpFilesize
384KB
-
memory/1300-124-0x0000000002B30000-0x0000000002B90000-memory.dmpFilesize
384KB
-
memory/1300-128-0x0000000002B30000-0x0000000002B90000-memory.dmpFilesize
384KB
-
memory/1300-126-0x0000000002B30000-0x0000000002B90000-memory.dmpFilesize
384KB
-
memory/1300-132-0x0000000002B30000-0x0000000002B90000-memory.dmpFilesize
384KB
-
memory/1300-130-0x0000000002B30000-0x0000000002B90000-memory.dmpFilesize
384KB
-
memory/1300-92-0x0000000002B30000-0x0000000002B90000-memory.dmpFilesize
384KB
-
memory/1300-136-0x0000000002B30000-0x0000000002B90000-memory.dmpFilesize
384KB
-
memory/1300-138-0x0000000002B30000-0x0000000002B90000-memory.dmpFilesize
384KB
-
memory/1300-140-0x0000000002B30000-0x0000000002B90000-memory.dmpFilesize
384KB
-
memory/1300-142-0x0000000002B30000-0x0000000002B90000-memory.dmpFilesize
384KB
-
memory/1300-144-0x0000000002B30000-0x0000000002B90000-memory.dmpFilesize
384KB
-
memory/1300-290-0x00000000012C0000-0x0000000001300000-memory.dmpFilesize
256KB
-
memory/1300-292-0x00000000012C0000-0x0000000001300000-memory.dmpFilesize
256KB
-
memory/1300-294-0x00000000012C0000-0x0000000001300000-memory.dmpFilesize
256KB
-
memory/1300-86-0x0000000002B30000-0x0000000002B90000-memory.dmpFilesize
384KB
-
memory/1300-84-0x0000000002B30000-0x0000000002B90000-memory.dmpFilesize
384KB
-
memory/1300-82-0x0000000002B30000-0x0000000002B90000-memory.dmpFilesize
384KB
-
memory/1300-2230-0x0000000001440000-0x0000000001472000-memory.dmpFilesize
200KB
-
memory/1300-78-0x0000000000240000-0x000000000029B000-memory.dmpFilesize
364KB
-
memory/1300-81-0x0000000002B30000-0x0000000002B90000-memory.dmpFilesize
384KB
-
memory/1300-80-0x0000000002B30000-0x0000000002B96000-memory.dmpFilesize
408KB
-
memory/1300-79-0x0000000005100000-0x0000000005168000-memory.dmpFilesize
416KB
-
memory/1356-2247-0x0000000000BE0000-0x0000000000C10000-memory.dmpFilesize
192KB
-
memory/1356-2249-0x0000000000320000-0x0000000000326000-memory.dmpFilesize
24KB
-
memory/1356-2251-0x0000000002640000-0x0000000002680000-memory.dmpFilesize
256KB
-
memory/1356-2253-0x0000000002640000-0x0000000002680000-memory.dmpFilesize
256KB
-
memory/1676-2240-0x00000000012B0000-0x00000000012DE000-memory.dmpFilesize
184KB
-
memory/1676-2248-0x00000000002C0000-0x00000000002C6000-memory.dmpFilesize
24KB
-
memory/1676-2250-0x0000000000B90000-0x0000000000BD0000-memory.dmpFilesize
256KB
-
memory/1676-2252-0x0000000000B90000-0x0000000000BD0000-memory.dmpFilesize
256KB