Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2023 18:12
Static task
static1
Behavioral task
behavioral1
Sample
73394305fc8f5a428bd67442d9b4c23d8c35e707efca250f463c09e3dd184b78.exe
Resource
win10v2004-20230220-en
General
-
Target
73394305fc8f5a428bd67442d9b4c23d8c35e707efca250f463c09e3dd184b78.exe
-
Size
580KB
-
MD5
fd1cabf04c59c65e0e1e413097a89348
-
SHA1
73731f977c631ac2b2a53356ff18ef10f82b5221
-
SHA256
73394305fc8f5a428bd67442d9b4c23d8c35e707efca250f463c09e3dd184b78
-
SHA512
a2254ffe633b88e0223bb45f723b67088fe615eeff3cb52916835c18358b0b401f0cf62e041208127286fef8ddb1c30aa1f0b662b70f27e00867f6ebfbef8d47
-
SSDEEP
12288:mMrvy901/V8OJ0dam87njXlMuZdurIxw4KLTM+m:1yWPJnmzuYjRL4d
Malware Config
Extracted
redline
diza
83.97.73.126:19046
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4632 x2264813.exe 3228 x8442963.exe 3236 f4016641.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 73394305fc8f5a428bd67442d9b4c23d8c35e707efca250f463c09e3dd184b78.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x2264813.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x2264813.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x8442963.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x8442963.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 73394305fc8f5a428bd67442d9b4c23d8c35e707efca250f463c09e3dd184b78.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 3236 f4016641.exe 3236 f4016641.exe 3236 f4016641.exe 3236 f4016641.exe 3236 f4016641.exe 3236 f4016641.exe 3236 f4016641.exe 3236 f4016641.exe 3236 f4016641.exe 3236 f4016641.exe 3236 f4016641.exe 3236 f4016641.exe 3236 f4016641.exe 3236 f4016641.exe 3236 f4016641.exe 3236 f4016641.exe 3236 f4016641.exe 3236 f4016641.exe 3236 f4016641.exe 3236 f4016641.exe 3236 f4016641.exe 3236 f4016641.exe 3236 f4016641.exe 3236 f4016641.exe 3236 f4016641.exe 3236 f4016641.exe 3236 f4016641.exe 3236 f4016641.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3236 f4016641.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4264 wrote to memory of 4632 4264 73394305fc8f5a428bd67442d9b4c23d8c35e707efca250f463c09e3dd184b78.exe 85 PID 4264 wrote to memory of 4632 4264 73394305fc8f5a428bd67442d9b4c23d8c35e707efca250f463c09e3dd184b78.exe 85 PID 4264 wrote to memory of 4632 4264 73394305fc8f5a428bd67442d9b4c23d8c35e707efca250f463c09e3dd184b78.exe 85 PID 4632 wrote to memory of 3228 4632 x2264813.exe 86 PID 4632 wrote to memory of 3228 4632 x2264813.exe 86 PID 4632 wrote to memory of 3228 4632 x2264813.exe 86 PID 3228 wrote to memory of 3236 3228 x8442963.exe 87 PID 3228 wrote to memory of 3236 3228 x8442963.exe 87 PID 3228 wrote to memory of 3236 3228 x8442963.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\73394305fc8f5a428bd67442d9b4c23d8c35e707efca250f463c09e3dd184b78.exe"C:\Users\Admin\AppData\Local\Temp\73394305fc8f5a428bd67442d9b4c23d8c35e707efca250f463c09e3dd184b78.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2264813.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2264813.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8442963.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8442963.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f4016641.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f4016641.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3236
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD5d20d0db4a574a4ca387b5957b0e3da71
SHA145e1efb39fcc402cda15a41e0c745c9ffddb7014
SHA2563ee4b5b7edfe33b089431012ab8487d0acd213bc7e65947102c11a70fdd6b56d
SHA512b0efb316e91f17dee6fcfb041a0a0fa6b009a80491b3fb5839fbb8d76ac40ebbf0e6dd597d289c7497c016b178d3537507c07bcb45f2ad6fa3dee484e1a639e3
-
Filesize
377KB
MD5d20d0db4a574a4ca387b5957b0e3da71
SHA145e1efb39fcc402cda15a41e0c745c9ffddb7014
SHA2563ee4b5b7edfe33b089431012ab8487d0acd213bc7e65947102c11a70fdd6b56d
SHA512b0efb316e91f17dee6fcfb041a0a0fa6b009a80491b3fb5839fbb8d76ac40ebbf0e6dd597d289c7497c016b178d3537507c07bcb45f2ad6fa3dee484e1a639e3
-
Filesize
206KB
MD53e6706cd1d1ca8cd71a160975f530808
SHA1fb1b58080ece44b0b66073bd936e5e3b0272482f
SHA25659eadcefd391518cf1797f0cca6ecbb248d8eca6595153771652b02d9f3d550d
SHA5125cc5d08aa9f9b1af0ad515d584181834ab0b94c139377b5ec9eeeac5004d7bf2da40eaadeac4b98e850a725f9605101a77dbc0634e4a0d710d59e4e27e416aa7
-
Filesize
206KB
MD53e6706cd1d1ca8cd71a160975f530808
SHA1fb1b58080ece44b0b66073bd936e5e3b0272482f
SHA25659eadcefd391518cf1797f0cca6ecbb248d8eca6595153771652b02d9f3d550d
SHA5125cc5d08aa9f9b1af0ad515d584181834ab0b94c139377b5ec9eeeac5004d7bf2da40eaadeac4b98e850a725f9605101a77dbc0634e4a0d710d59e4e27e416aa7
-
Filesize
172KB
MD5920b0d07b072f4bc9620d8174ea88da8
SHA1970199edd595bd9f188fb293e0f15ff7e72c00ff
SHA256d21b42113ad7d9da527ad045a082416f43013321974cf23c71e60cd7e542b554
SHA51255d82d6427cb37aef3a9b3cbf0f1d2ea0f832f1d423aab4709686c0a7aff46524b3c0acf9bfd9e4c67f0b14a6002f61d2ab970d96c9bdbaaa1685b6dc5c6bf20
-
Filesize
172KB
MD5920b0d07b072f4bc9620d8174ea88da8
SHA1970199edd595bd9f188fb293e0f15ff7e72c00ff
SHA256d21b42113ad7d9da527ad045a082416f43013321974cf23c71e60cd7e542b554
SHA51255d82d6427cb37aef3a9b3cbf0f1d2ea0f832f1d423aab4709686c0a7aff46524b3c0acf9bfd9e4c67f0b14a6002f61d2ab970d96c9bdbaaa1685b6dc5c6bf20