Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2023, 07:43
Static task
static1
Behavioral task
behavioral1
Sample
ab6cc155436b69ca35f8fb413658f8c68e31f069a62119f6ad96af6b57211e01.exe
Resource
win10v2004-20230221-en
General
-
Target
ab6cc155436b69ca35f8fb413658f8c68e31f069a62119f6ad96af6b57211e01.exe
-
Size
579KB
-
MD5
b39818dac1620ea6639210d6a03a0102
-
SHA1
5dcfc0bcc148174d811cf43a2e4671c4d8f72385
-
SHA256
ab6cc155436b69ca35f8fb413658f8c68e31f069a62119f6ad96af6b57211e01
-
SHA512
8bc5e31be36e264474a5777f00ccd8f0b4618e880a0ff2ba56c8093d57b28678236abdf322016b9a362426e0440b7c19c7c52a0f80c17e33b359831abd0b59e8
-
SSDEEP
12288:XMrWy90cWjjCQn4O/kiKcxKagsoGrgGSNXG6+W57y2l5:RyoJ5dYtsHrgGSFGOdJ5
Malware Config
Extracted
redline
diza
83.97.73.126:19046
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4600 x4587378.exe 4908 x3130606.exe 2296 f7706223.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ab6cc155436b69ca35f8fb413658f8c68e31f069a62119f6ad96af6b57211e01.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x4587378.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x4587378.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x3130606.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x3130606.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ab6cc155436b69ca35f8fb413658f8c68e31f069a62119f6ad96af6b57211e01.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4656 wrote to memory of 4600 4656 ab6cc155436b69ca35f8fb413658f8c68e31f069a62119f6ad96af6b57211e01.exe 84 PID 4656 wrote to memory of 4600 4656 ab6cc155436b69ca35f8fb413658f8c68e31f069a62119f6ad96af6b57211e01.exe 84 PID 4656 wrote to memory of 4600 4656 ab6cc155436b69ca35f8fb413658f8c68e31f069a62119f6ad96af6b57211e01.exe 84 PID 4600 wrote to memory of 4908 4600 x4587378.exe 85 PID 4600 wrote to memory of 4908 4600 x4587378.exe 85 PID 4600 wrote to memory of 4908 4600 x4587378.exe 85 PID 4908 wrote to memory of 2296 4908 x3130606.exe 86 PID 4908 wrote to memory of 2296 4908 x3130606.exe 86 PID 4908 wrote to memory of 2296 4908 x3130606.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab6cc155436b69ca35f8fb413658f8c68e31f069a62119f6ad96af6b57211e01.exe"C:\Users\Admin\AppData\Local\Temp\ab6cc155436b69ca35f8fb413658f8c68e31f069a62119f6ad96af6b57211e01.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4587378.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4587378.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3130606.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3130606.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f7706223.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f7706223.exe4⤵
- Executes dropped EXE
PID:2296
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD53ce5e6955c07e8e28830355f8a511fd5
SHA19d261668b7e3d05f1e5c762f2c2057d495eaa724
SHA256098b3950f36417dda328a9ec9a55c367f6cab5e345c3e06a2bba90586910419c
SHA5126971441d7c6f46d25a16789b5c21e9ecf6639a0c9b07bae648bb3db83394b1dc06994ade1ab877eddfd45c52c595fab6815dcf1145cc3c739e9e3b75a4813499
-
Filesize
377KB
MD53ce5e6955c07e8e28830355f8a511fd5
SHA19d261668b7e3d05f1e5c762f2c2057d495eaa724
SHA256098b3950f36417dda328a9ec9a55c367f6cab5e345c3e06a2bba90586910419c
SHA5126971441d7c6f46d25a16789b5c21e9ecf6639a0c9b07bae648bb3db83394b1dc06994ade1ab877eddfd45c52c595fab6815dcf1145cc3c739e9e3b75a4813499
-
Filesize
206KB
MD5275105e12e3a86cce76929fc770e3dec
SHA158a1c8fb518f54b97fa9896832ef5e87c9816c63
SHA2561ff83dd5cf8c73cb323546a089f93373f34d3c9feb8053b388980a8ae8e07e3b
SHA5128a91a32a99c48d52408c702ec327052d826146c850ede28aef688403b0e79b5e41edc52b387a12bae93b02987d3b192e152a7e837e35fe7d22863bcf343785c5
-
Filesize
206KB
MD5275105e12e3a86cce76929fc770e3dec
SHA158a1c8fb518f54b97fa9896832ef5e87c9816c63
SHA2561ff83dd5cf8c73cb323546a089f93373f34d3c9feb8053b388980a8ae8e07e3b
SHA5128a91a32a99c48d52408c702ec327052d826146c850ede28aef688403b0e79b5e41edc52b387a12bae93b02987d3b192e152a7e837e35fe7d22863bcf343785c5
-
Filesize
173KB
MD5eece1e3b2a22960e040342b0aad2bfc5
SHA128403a6808ca1ddcdf246f7a3ede7bc28c5a5acc
SHA25657400918b8f85777b2e735df26c4c9da898364a4e6b4ef58c377e0ee28ed43b9
SHA5124df9bdcc8c3eb98fbdd12c4eec611da73c4902ffa779f3def828c9aeeeed3b20c227e1c4c1223927f955eb65de7f1560740404304af8698f7bffcead838d7c52
-
Filesize
173KB
MD5eece1e3b2a22960e040342b0aad2bfc5
SHA128403a6808ca1ddcdf246f7a3ede7bc28c5a5acc
SHA25657400918b8f85777b2e735df26c4c9da898364a4e6b4ef58c377e0ee28ed43b9
SHA5124df9bdcc8c3eb98fbdd12c4eec611da73c4902ffa779f3def828c9aeeeed3b20c227e1c4c1223927f955eb65de7f1560740404304af8698f7bffcead838d7c52