Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
06/06/2023, 02:25
Static task
static1
Behavioral task
behavioral1
Sample
f920a6d6270e6df2ba3848343583afa75ab9e106407788fdacc0f3c5c77dd434.exe
Resource
win10-20230220-en
General
-
Target
f920a6d6270e6df2ba3848343583afa75ab9e106407788fdacc0f3c5c77dd434.exe
-
Size
584KB
-
MD5
3f41a156e6b9b0ecb55175e07ceea99e
-
SHA1
60baa30c8fa5fb3cb4c8c15df721cf0729bfdc99
-
SHA256
f920a6d6270e6df2ba3848343583afa75ab9e106407788fdacc0f3c5c77dd434
-
SHA512
a9f6682d2460629a7eade3ef08da7d699ce90a408e8f2814fe4435714a609ef31e76c96d6b66cc92811797cfd8bed6397792d836c0d0cb8643dbfe1567b7332e
-
SSDEEP
12288:VMr3y90NarzwdE3MR4VHwm2go+eBgmhysRV540T9hw0pn:OyaUeEF8oe+4BVVs0n
Malware Config
Extracted
redline
diza
83.97.73.126:19048
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2240 x3767638.exe 4596 x9797702.exe 5024 f3139248.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x3767638.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3767638.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x9797702.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x9797702.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f920a6d6270e6df2ba3848343583afa75ab9e106407788fdacc0f3c5c77dd434.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f920a6d6270e6df2ba3848343583afa75ab9e106407788fdacc0f3c5c77dd434.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 5024 f3139248.exe 5024 f3139248.exe 5024 f3139248.exe 5024 f3139248.exe 5024 f3139248.exe 5024 f3139248.exe 5024 f3139248.exe 5024 f3139248.exe 5024 f3139248.exe 5024 f3139248.exe 5024 f3139248.exe 5024 f3139248.exe 5024 f3139248.exe 5024 f3139248.exe 5024 f3139248.exe 5024 f3139248.exe 5024 f3139248.exe 5024 f3139248.exe 5024 f3139248.exe 5024 f3139248.exe 5024 f3139248.exe 5024 f3139248.exe 5024 f3139248.exe 5024 f3139248.exe 5024 f3139248.exe 5024 f3139248.exe 5024 f3139248.exe 5024 f3139248.exe 5024 f3139248.exe 5024 f3139248.exe 5024 f3139248.exe 5024 f3139248.exe 5024 f3139248.exe 5024 f3139248.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5024 f3139248.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3144 wrote to memory of 2240 3144 f920a6d6270e6df2ba3848343583afa75ab9e106407788fdacc0f3c5c77dd434.exe 66 PID 3144 wrote to memory of 2240 3144 f920a6d6270e6df2ba3848343583afa75ab9e106407788fdacc0f3c5c77dd434.exe 66 PID 3144 wrote to memory of 2240 3144 f920a6d6270e6df2ba3848343583afa75ab9e106407788fdacc0f3c5c77dd434.exe 66 PID 2240 wrote to memory of 4596 2240 x3767638.exe 67 PID 2240 wrote to memory of 4596 2240 x3767638.exe 67 PID 2240 wrote to memory of 4596 2240 x3767638.exe 67 PID 4596 wrote to memory of 5024 4596 x9797702.exe 68 PID 4596 wrote to memory of 5024 4596 x9797702.exe 68 PID 4596 wrote to memory of 5024 4596 x9797702.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\f920a6d6270e6df2ba3848343583afa75ab9e106407788fdacc0f3c5c77dd434.exe"C:\Users\Admin\AppData\Local\Temp\f920a6d6270e6df2ba3848343583afa75ab9e106407788fdacc0f3c5c77dd434.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3767638.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3767638.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9797702.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9797702.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3139248.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3139248.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5024
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
378KB
MD5ae96108b021211ca4f1f8c9faddf5708
SHA1fdfd8dc683bd089242bab2924e04175b31640d56
SHA256e7f0da741c373f1ece6e1bd8bfe4d3b240fad7d3a8ea7029c3b11123cf8b99ae
SHA512355222882c93dc0532e29590174c751502ee04acb6e87069f0afb4a6be51602a0d076bb2594e591f650f6d2e86c126713c985e6ebf99adbd7ae10f774fb58c40
-
Filesize
378KB
MD5ae96108b021211ca4f1f8c9faddf5708
SHA1fdfd8dc683bd089242bab2924e04175b31640d56
SHA256e7f0da741c373f1ece6e1bd8bfe4d3b240fad7d3a8ea7029c3b11123cf8b99ae
SHA512355222882c93dc0532e29590174c751502ee04acb6e87069f0afb4a6be51602a0d076bb2594e591f650f6d2e86c126713c985e6ebf99adbd7ae10f774fb58c40
-
Filesize
206KB
MD500dd8b95a12f9d1ccf06f2bcf292f265
SHA1f031c084e47eaaa10ffb96bc6a3766c73f805ff6
SHA25697fe37632600d6868bbddc1245db1553ea2e5f12a66a86275c20bce0a6319999
SHA5127fd057094459a2dc9f55793d881ad91458050288de898afe718acf0439276c754f9e40cf50faabebf96169c8c890cecfe1a711b8926854a7b13b88fc6bbbd81e
-
Filesize
206KB
MD500dd8b95a12f9d1ccf06f2bcf292f265
SHA1f031c084e47eaaa10ffb96bc6a3766c73f805ff6
SHA25697fe37632600d6868bbddc1245db1553ea2e5f12a66a86275c20bce0a6319999
SHA5127fd057094459a2dc9f55793d881ad91458050288de898afe718acf0439276c754f9e40cf50faabebf96169c8c890cecfe1a711b8926854a7b13b88fc6bbbd81e
-
Filesize
172KB
MD5157caac4ed1adf2f535a6c333d17ce68
SHA1c8986210d3264c44e209adc3a6bd822756b65392
SHA25685dc77cf8fb129202d908c8b9148bd608f37a25d8dcb179c91ccdeb98b22f1c3
SHA512c26da799e36c002c6896e2add714e894bd9bcb8616c6150bff32f1d7f5a44fba2155708ad3c8fd8eeeb0128b5be79c926a4518d990d8b168c1ad08e5662c59db
-
Filesize
172KB
MD5157caac4ed1adf2f535a6c333d17ce68
SHA1c8986210d3264c44e209adc3a6bd822756b65392
SHA25685dc77cf8fb129202d908c8b9148bd608f37a25d8dcb179c91ccdeb98b22f1c3
SHA512c26da799e36c002c6896e2add714e894bd9bcb8616c6150bff32f1d7f5a44fba2155708ad3c8fd8eeeb0128b5be79c926a4518d990d8b168c1ad08e5662c59db