Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
20-05-2023 08:38
Static task
static1
Behavioral task
behavioral1
Sample
42345.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
42345.exe
Resource
win10v2004-20230220-en
General
-
Target
42345.exe
-
Size
1.0MB
-
MD5
15c0d4b500ecdb0536b7af315d9be0bf
-
SHA1
2eb39fdf2e3cf66765e021e26890dc493623c21b
-
SHA256
e53bd8d9458c25d81bfcfd7a9a03572429e86d80d7829ec1e3c24556dfff3f1b
-
SHA512
3ca185cf616210c51e06eac12984509922c8971126c58f187c9e189089a3ea2085b0f2c15e07e43896c25a02e0ff5761ce28a3dd91acdc6d131985ee144f7515
-
SSDEEP
24576:tyhHVPtyp93KZrj94MdDHkCTzGJLnnE8I:I3Ptw93KDLDgJLnE8
Malware Config
Extracted
redline
deren
77.91.68.253:19065
-
auth_value
04a169f1fb198bfbeca74d0e06ea2d54
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2016 x6435173.exe 1464 x4049756.exe 976 f1039246.exe -
Loads dropped DLL 6 IoCs
pid Process 1088 42345.exe 2016 x6435173.exe 2016 x6435173.exe 1464 x4049756.exe 1464 x4049756.exe 976 f1039246.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 42345.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 42345.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce x6435173.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x6435173.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce x4049756.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x4049756.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1088 wrote to memory of 2016 1088 42345.exe 28 PID 1088 wrote to memory of 2016 1088 42345.exe 28 PID 1088 wrote to memory of 2016 1088 42345.exe 28 PID 1088 wrote to memory of 2016 1088 42345.exe 28 PID 1088 wrote to memory of 2016 1088 42345.exe 28 PID 1088 wrote to memory of 2016 1088 42345.exe 28 PID 1088 wrote to memory of 2016 1088 42345.exe 28 PID 2016 wrote to memory of 1464 2016 x6435173.exe 29 PID 2016 wrote to memory of 1464 2016 x6435173.exe 29 PID 2016 wrote to memory of 1464 2016 x6435173.exe 29 PID 2016 wrote to memory of 1464 2016 x6435173.exe 29 PID 2016 wrote to memory of 1464 2016 x6435173.exe 29 PID 2016 wrote to memory of 1464 2016 x6435173.exe 29 PID 2016 wrote to memory of 1464 2016 x6435173.exe 29 PID 1464 wrote to memory of 976 1464 x4049756.exe 30 PID 1464 wrote to memory of 976 1464 x4049756.exe 30 PID 1464 wrote to memory of 976 1464 x4049756.exe 30 PID 1464 wrote to memory of 976 1464 x4049756.exe 30 PID 1464 wrote to memory of 976 1464 x4049756.exe 30 PID 1464 wrote to memory of 976 1464 x4049756.exe 30 PID 1464 wrote to memory of 976 1464 x4049756.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\42345.exe"C:\Users\Admin\AppData\Local\Temp\42345.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6435173.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6435173.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4049756.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4049756.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1039246.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1039246.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:976
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
750KB
MD590fc01bdd645c5f7f82bc5b8bc39e29f
SHA16d418c369fa8dcc0a8da5076280f15a61691a679
SHA256ce84dc20226727aa4090951977dfa2da19cb6d0a3aa0128df58bfb06a1fb2258
SHA5128f274c9812f28629a16e747c3845e81632eef0b3418318d5981ebcc6554f9b539e7adc8327eac8990de0326c23a5f950f4bec910e0a0c5e1f2761ce26abd5baf
-
Filesize
750KB
MD590fc01bdd645c5f7f82bc5b8bc39e29f
SHA16d418c369fa8dcc0a8da5076280f15a61691a679
SHA256ce84dc20226727aa4090951977dfa2da19cb6d0a3aa0128df58bfb06a1fb2258
SHA5128f274c9812f28629a16e747c3845e81632eef0b3418318d5981ebcc6554f9b539e7adc8327eac8990de0326c23a5f950f4bec910e0a0c5e1f2761ce26abd5baf
-
Filesize
305KB
MD59de479606736d49466229ec51b9fc523
SHA1d9b574bb9032a29998d9245c6118fda579d6ae1e
SHA2561a5c3c70c1d2dc38822fa10c6829efaaa8a2ba7e481d208b92170276eba607b6
SHA5123128e51c18ef3510768f13f8ec299b530ef53d1fc244b1a258e9123b96771ceb53269fe60d4fe4ab846e67aa6f37cd4853a0173f0f22d004774c086cd5f64441
-
Filesize
305KB
MD59de479606736d49466229ec51b9fc523
SHA1d9b574bb9032a29998d9245c6118fda579d6ae1e
SHA2561a5c3c70c1d2dc38822fa10c6829efaaa8a2ba7e481d208b92170276eba607b6
SHA5123128e51c18ef3510768f13f8ec299b530ef53d1fc244b1a258e9123b96771ceb53269fe60d4fe4ab846e67aa6f37cd4853a0173f0f22d004774c086cd5f64441
-
Filesize
145KB
MD57148cc54fcd017f53284620c64210e57
SHA1cc60f88150eb26541931c783184676da30e630c9
SHA256bb3e4e3486921a9fee3b92dac969bc51b1bf2f292ecd088ba590e08c80912fde
SHA512999376fc0d70df5a4fbabd7a56fc6be6e0f81b22b0ca1a1498764fa146baf72111b02b562192c02fdd47091e48b6857f0f6c1e3ce9e5fd0e12cafd50fbf11312
-
Filesize
145KB
MD57148cc54fcd017f53284620c64210e57
SHA1cc60f88150eb26541931c783184676da30e630c9
SHA256bb3e4e3486921a9fee3b92dac969bc51b1bf2f292ecd088ba590e08c80912fde
SHA512999376fc0d70df5a4fbabd7a56fc6be6e0f81b22b0ca1a1498764fa146baf72111b02b562192c02fdd47091e48b6857f0f6c1e3ce9e5fd0e12cafd50fbf11312
-
Filesize
750KB
MD590fc01bdd645c5f7f82bc5b8bc39e29f
SHA16d418c369fa8dcc0a8da5076280f15a61691a679
SHA256ce84dc20226727aa4090951977dfa2da19cb6d0a3aa0128df58bfb06a1fb2258
SHA5128f274c9812f28629a16e747c3845e81632eef0b3418318d5981ebcc6554f9b539e7adc8327eac8990de0326c23a5f950f4bec910e0a0c5e1f2761ce26abd5baf
-
Filesize
750KB
MD590fc01bdd645c5f7f82bc5b8bc39e29f
SHA16d418c369fa8dcc0a8da5076280f15a61691a679
SHA256ce84dc20226727aa4090951977dfa2da19cb6d0a3aa0128df58bfb06a1fb2258
SHA5128f274c9812f28629a16e747c3845e81632eef0b3418318d5981ebcc6554f9b539e7adc8327eac8990de0326c23a5f950f4bec910e0a0c5e1f2761ce26abd5baf
-
Filesize
305KB
MD59de479606736d49466229ec51b9fc523
SHA1d9b574bb9032a29998d9245c6118fda579d6ae1e
SHA2561a5c3c70c1d2dc38822fa10c6829efaaa8a2ba7e481d208b92170276eba607b6
SHA5123128e51c18ef3510768f13f8ec299b530ef53d1fc244b1a258e9123b96771ceb53269fe60d4fe4ab846e67aa6f37cd4853a0173f0f22d004774c086cd5f64441
-
Filesize
305KB
MD59de479606736d49466229ec51b9fc523
SHA1d9b574bb9032a29998d9245c6118fda579d6ae1e
SHA2561a5c3c70c1d2dc38822fa10c6829efaaa8a2ba7e481d208b92170276eba607b6
SHA5123128e51c18ef3510768f13f8ec299b530ef53d1fc244b1a258e9123b96771ceb53269fe60d4fe4ab846e67aa6f37cd4853a0173f0f22d004774c086cd5f64441
-
Filesize
145KB
MD57148cc54fcd017f53284620c64210e57
SHA1cc60f88150eb26541931c783184676da30e630c9
SHA256bb3e4e3486921a9fee3b92dac969bc51b1bf2f292ecd088ba590e08c80912fde
SHA512999376fc0d70df5a4fbabd7a56fc6be6e0f81b22b0ca1a1498764fa146baf72111b02b562192c02fdd47091e48b6857f0f6c1e3ce9e5fd0e12cafd50fbf11312
-
Filesize
145KB
MD57148cc54fcd017f53284620c64210e57
SHA1cc60f88150eb26541931c783184676da30e630c9
SHA256bb3e4e3486921a9fee3b92dac969bc51b1bf2f292ecd088ba590e08c80912fde
SHA512999376fc0d70df5a4fbabd7a56fc6be6e0f81b22b0ca1a1498764fa146baf72111b02b562192c02fdd47091e48b6857f0f6c1e3ce9e5fd0e12cafd50fbf11312