Analysis
-
max time kernel
135s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
04/06/2023, 18:57
Static task
static1
Behavioral task
behavioral1
Sample
07270499.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
07270499.exe
Resource
win10v2004-20230220-en
General
-
Target
07270499.exe
-
Size
580KB
-
MD5
2f04ac814a59dafca189e603d18d196d
-
SHA1
29148efe87f9303a07a05b45afeec232139243b0
-
SHA256
0dd0400b4e1b03d8dddfa68961843b2312ccf6bc7ffa8162567b56d3762e8d0a
-
SHA512
aafc6953a4d136c4e0c0de728e6481bc733cd07bdbc4f14c8839f38caf53c7e6f1db8bc7d21397cf61dca0fe73c724ebf6b803da8ee567a319935aed9d6bb77a
-
SSDEEP
12288:fMrNy90f5MI+IauHzi0A2Ok3k4uzkAxKtP9GzFzeIEG:GyqCVYS2Q4uzPxKWzFeIb
Malware Config
Extracted
redline
diza
83.97.73.126:19046
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1584 x0476388.exe 520 x2634231.exe 792 f1006954.exe -
Loads dropped DLL 6 IoCs
pid Process 1580 07270499.exe 1584 x0476388.exe 1584 x0476388.exe 520 x2634231.exe 520 x2634231.exe 792 f1006954.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce x2634231.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x2634231.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 07270499.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 07270499.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce x0476388.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x0476388.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 792 f1006954.exe 792 f1006954.exe 792 f1006954.exe 792 f1006954.exe 792 f1006954.exe 792 f1006954.exe 792 f1006954.exe 792 f1006954.exe 792 f1006954.exe 792 f1006954.exe 792 f1006954.exe 792 f1006954.exe 792 f1006954.exe 792 f1006954.exe 792 f1006954.exe 792 f1006954.exe 792 f1006954.exe 792 f1006954.exe 792 f1006954.exe 792 f1006954.exe 792 f1006954.exe 792 f1006954.exe 792 f1006954.exe 792 f1006954.exe 792 f1006954.exe 792 f1006954.exe 792 f1006954.exe 792 f1006954.exe 792 f1006954.exe 792 f1006954.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 792 f1006954.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1580 wrote to memory of 1584 1580 07270499.exe 27 PID 1580 wrote to memory of 1584 1580 07270499.exe 27 PID 1580 wrote to memory of 1584 1580 07270499.exe 27 PID 1580 wrote to memory of 1584 1580 07270499.exe 27 PID 1580 wrote to memory of 1584 1580 07270499.exe 27 PID 1580 wrote to memory of 1584 1580 07270499.exe 27 PID 1580 wrote to memory of 1584 1580 07270499.exe 27 PID 1584 wrote to memory of 520 1584 x0476388.exe 28 PID 1584 wrote to memory of 520 1584 x0476388.exe 28 PID 1584 wrote to memory of 520 1584 x0476388.exe 28 PID 1584 wrote to memory of 520 1584 x0476388.exe 28 PID 1584 wrote to memory of 520 1584 x0476388.exe 28 PID 1584 wrote to memory of 520 1584 x0476388.exe 28 PID 1584 wrote to memory of 520 1584 x0476388.exe 28 PID 520 wrote to memory of 792 520 x2634231.exe 29 PID 520 wrote to memory of 792 520 x2634231.exe 29 PID 520 wrote to memory of 792 520 x2634231.exe 29 PID 520 wrote to memory of 792 520 x2634231.exe 29 PID 520 wrote to memory of 792 520 x2634231.exe 29 PID 520 wrote to memory of 792 520 x2634231.exe 29 PID 520 wrote to memory of 792 520 x2634231.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\07270499.exe"C:\Users\Admin\AppData\Local\Temp\07270499.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0476388.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0476388.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2634231.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2634231.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1006954.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1006954.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:792
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD56346502ea9b0242fb32b62da5a0e856f
SHA1c1211b9b1fc8d9f7197a7d1727a741370eb83c0d
SHA256d1d5c5e389152c9d208f98abd0edca1f452d2b364bb4435218a02abcef77f113
SHA5124dbac0562509b115ae33a2b49e39f9f76f6a2328c541d4fc90f54195a191327eb55c5a39f46811f28bac68e2be7921b67409b52ca0ee9818bfe7399a26c989a8
-
Filesize
377KB
MD56346502ea9b0242fb32b62da5a0e856f
SHA1c1211b9b1fc8d9f7197a7d1727a741370eb83c0d
SHA256d1d5c5e389152c9d208f98abd0edca1f452d2b364bb4435218a02abcef77f113
SHA5124dbac0562509b115ae33a2b49e39f9f76f6a2328c541d4fc90f54195a191327eb55c5a39f46811f28bac68e2be7921b67409b52ca0ee9818bfe7399a26c989a8
-
Filesize
206KB
MD58cedee880088fe68f3c4c585069bc3ba
SHA1780d2090d7379a9eeb6d0d99babd572c1fc5f6bf
SHA256aa56cf399b17f61588283ab834fc2d2be5bfaee6a64eea2b027d4a5e2522bc89
SHA5124f27ee5a22ba8a5c4bf45c78823f002dc724b3c58ad9485e0b090b162fee779fc501593f02e4ae431dfbc089fa5ddc0825d475412df1326812bafcb61366761b
-
Filesize
206KB
MD58cedee880088fe68f3c4c585069bc3ba
SHA1780d2090d7379a9eeb6d0d99babd572c1fc5f6bf
SHA256aa56cf399b17f61588283ab834fc2d2be5bfaee6a64eea2b027d4a5e2522bc89
SHA5124f27ee5a22ba8a5c4bf45c78823f002dc724b3c58ad9485e0b090b162fee779fc501593f02e4ae431dfbc089fa5ddc0825d475412df1326812bafcb61366761b
-
Filesize
172KB
MD548000a3f8eda69e5d8e2dbec2658dfce
SHA10b30d4e0a4279c813fdb973c9eb8d363d2f9bae0
SHA25629e3016d2036cfffbd86161c5dc777c06b11fca77c32bcddb14b8cbc21c11915
SHA51269be2602fa2ec2f123bebcee5f8bf983e5f7646424e4dccc76808ff1ac04b99ecbb4087baf26c58420b37c088563fdf96fbd57c1fc96f42227a50bc3318f3bb1
-
Filesize
172KB
MD548000a3f8eda69e5d8e2dbec2658dfce
SHA10b30d4e0a4279c813fdb973c9eb8d363d2f9bae0
SHA25629e3016d2036cfffbd86161c5dc777c06b11fca77c32bcddb14b8cbc21c11915
SHA51269be2602fa2ec2f123bebcee5f8bf983e5f7646424e4dccc76808ff1ac04b99ecbb4087baf26c58420b37c088563fdf96fbd57c1fc96f42227a50bc3318f3bb1
-
Filesize
377KB
MD56346502ea9b0242fb32b62da5a0e856f
SHA1c1211b9b1fc8d9f7197a7d1727a741370eb83c0d
SHA256d1d5c5e389152c9d208f98abd0edca1f452d2b364bb4435218a02abcef77f113
SHA5124dbac0562509b115ae33a2b49e39f9f76f6a2328c541d4fc90f54195a191327eb55c5a39f46811f28bac68e2be7921b67409b52ca0ee9818bfe7399a26c989a8
-
Filesize
377KB
MD56346502ea9b0242fb32b62da5a0e856f
SHA1c1211b9b1fc8d9f7197a7d1727a741370eb83c0d
SHA256d1d5c5e389152c9d208f98abd0edca1f452d2b364bb4435218a02abcef77f113
SHA5124dbac0562509b115ae33a2b49e39f9f76f6a2328c541d4fc90f54195a191327eb55c5a39f46811f28bac68e2be7921b67409b52ca0ee9818bfe7399a26c989a8
-
Filesize
206KB
MD58cedee880088fe68f3c4c585069bc3ba
SHA1780d2090d7379a9eeb6d0d99babd572c1fc5f6bf
SHA256aa56cf399b17f61588283ab834fc2d2be5bfaee6a64eea2b027d4a5e2522bc89
SHA5124f27ee5a22ba8a5c4bf45c78823f002dc724b3c58ad9485e0b090b162fee779fc501593f02e4ae431dfbc089fa5ddc0825d475412df1326812bafcb61366761b
-
Filesize
206KB
MD58cedee880088fe68f3c4c585069bc3ba
SHA1780d2090d7379a9eeb6d0d99babd572c1fc5f6bf
SHA256aa56cf399b17f61588283ab834fc2d2be5bfaee6a64eea2b027d4a5e2522bc89
SHA5124f27ee5a22ba8a5c4bf45c78823f002dc724b3c58ad9485e0b090b162fee779fc501593f02e4ae431dfbc089fa5ddc0825d475412df1326812bafcb61366761b
-
Filesize
172KB
MD548000a3f8eda69e5d8e2dbec2658dfce
SHA10b30d4e0a4279c813fdb973c9eb8d363d2f9bae0
SHA25629e3016d2036cfffbd86161c5dc777c06b11fca77c32bcddb14b8cbc21c11915
SHA51269be2602fa2ec2f123bebcee5f8bf983e5f7646424e4dccc76808ff1ac04b99ecbb4087baf26c58420b37c088563fdf96fbd57c1fc96f42227a50bc3318f3bb1
-
Filesize
172KB
MD548000a3f8eda69e5d8e2dbec2658dfce
SHA10b30d4e0a4279c813fdb973c9eb8d363d2f9bae0
SHA25629e3016d2036cfffbd86161c5dc777c06b11fca77c32bcddb14b8cbc21c11915
SHA51269be2602fa2ec2f123bebcee5f8bf983e5f7646424e4dccc76808ff1ac04b99ecbb4087baf26c58420b37c088563fdf96fbd57c1fc96f42227a50bc3318f3bb1