Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06-06-2023 02:51
Static task
static1
Behavioral task
behavioral1
Sample
63aff83d91305d59d98f5e251f143456.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
63aff83d91305d59d98f5e251f143456.exe
Resource
win10v2004-20230220-en
General
-
Target
63aff83d91305d59d98f5e251f143456.exe
-
Size
584KB
-
MD5
63aff83d91305d59d98f5e251f143456
-
SHA1
4b546039570c29e6080345427defead0453cd875
-
SHA256
e788ec61549dfb2a7e09ee105e86cd1fe6e62a514597aee43918c97353b5758b
-
SHA512
8c8a1d836aa29af61818204505a7975932f03193a8d3c57fca243102d6c59407252a8309cb72995181c742539dc20b541a29ed43854b3a59e052812d4cd02889
-
SSDEEP
12288:QMr6y90W1tqx0pfJZmeAmMXI6vpFxwn9F/+1brJIs0x:6y/5vmeAmMXI0pPw9N+brOs0x
Malware Config
Extracted
redline
diza
83.97.73.126:19048
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1140 x5550945.exe 472 x6580525.exe 672 f3540635.exe -
Loads dropped DLL 6 IoCs
pid Process 1196 63aff83d91305d59d98f5e251f143456.exe 1140 x5550945.exe 1140 x5550945.exe 472 x6580525.exe 472 x6580525.exe 672 f3540635.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce x6580525.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x6580525.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 63aff83d91305d59d98f5e251f143456.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 63aff83d91305d59d98f5e251f143456.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce x5550945.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x5550945.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 672 f3540635.exe 672 f3540635.exe 672 f3540635.exe 672 f3540635.exe 672 f3540635.exe 672 f3540635.exe 672 f3540635.exe 672 f3540635.exe 672 f3540635.exe 672 f3540635.exe 672 f3540635.exe 672 f3540635.exe 672 f3540635.exe 672 f3540635.exe 672 f3540635.exe 672 f3540635.exe 672 f3540635.exe 672 f3540635.exe 672 f3540635.exe 672 f3540635.exe 672 f3540635.exe 672 f3540635.exe 672 f3540635.exe 672 f3540635.exe 672 f3540635.exe 672 f3540635.exe 672 f3540635.exe 672 f3540635.exe 672 f3540635.exe 672 f3540635.exe 672 f3540635.exe 672 f3540635.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 672 f3540635.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1196 wrote to memory of 1140 1196 63aff83d91305d59d98f5e251f143456.exe 28 PID 1196 wrote to memory of 1140 1196 63aff83d91305d59d98f5e251f143456.exe 28 PID 1196 wrote to memory of 1140 1196 63aff83d91305d59d98f5e251f143456.exe 28 PID 1196 wrote to memory of 1140 1196 63aff83d91305d59d98f5e251f143456.exe 28 PID 1196 wrote to memory of 1140 1196 63aff83d91305d59d98f5e251f143456.exe 28 PID 1196 wrote to memory of 1140 1196 63aff83d91305d59d98f5e251f143456.exe 28 PID 1196 wrote to memory of 1140 1196 63aff83d91305d59d98f5e251f143456.exe 28 PID 1140 wrote to memory of 472 1140 x5550945.exe 29 PID 1140 wrote to memory of 472 1140 x5550945.exe 29 PID 1140 wrote to memory of 472 1140 x5550945.exe 29 PID 1140 wrote to memory of 472 1140 x5550945.exe 29 PID 1140 wrote to memory of 472 1140 x5550945.exe 29 PID 1140 wrote to memory of 472 1140 x5550945.exe 29 PID 1140 wrote to memory of 472 1140 x5550945.exe 29 PID 472 wrote to memory of 672 472 x6580525.exe 30 PID 472 wrote to memory of 672 472 x6580525.exe 30 PID 472 wrote to memory of 672 472 x6580525.exe 30 PID 472 wrote to memory of 672 472 x6580525.exe 30 PID 472 wrote to memory of 672 472 x6580525.exe 30 PID 472 wrote to memory of 672 472 x6580525.exe 30 PID 472 wrote to memory of 672 472 x6580525.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\63aff83d91305d59d98f5e251f143456.exe"C:\Users\Admin\AppData\Local\Temp\63aff83d91305d59d98f5e251f143456.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5550945.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5550945.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6580525.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6580525.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3540635.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3540635.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:672
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD5d9542b0559cb92d2c8251012ee4a466f
SHA1bc88e3c95d467cb6a9366997aba30fb007724a4b
SHA2565439b097e5a61c8017810278ca3e14ccf64fe79594d4f27890b09a0cd44d5432
SHA512651ee05d60624f34cc0aa7cb08a3557976429c52df549f095ce31313708b84ae5a9da51fd6753b14534a938dc828895a673ae898aa072ba7f27bed21435289fe
-
Filesize
377KB
MD5d9542b0559cb92d2c8251012ee4a466f
SHA1bc88e3c95d467cb6a9366997aba30fb007724a4b
SHA2565439b097e5a61c8017810278ca3e14ccf64fe79594d4f27890b09a0cd44d5432
SHA512651ee05d60624f34cc0aa7cb08a3557976429c52df549f095ce31313708b84ae5a9da51fd6753b14534a938dc828895a673ae898aa072ba7f27bed21435289fe
-
Filesize
206KB
MD5422c1ac20ced1882c3b3e0b305d177b7
SHA10963a625dca3e997dbfc68428d3439d4f453df72
SHA256d9e5fb374ac50cabd3258f4d63e54fc6413084c08c7e9a614177f7c49e4ffa4b
SHA512eed2d95c779748fa382a88faebbc8b3f982a65a39fe323bcbb9a1c92ac687dc882b9db6c1a76cdbab3c26272c659082402a5195753afb05f787893bf04e14eee
-
Filesize
206KB
MD5422c1ac20ced1882c3b3e0b305d177b7
SHA10963a625dca3e997dbfc68428d3439d4f453df72
SHA256d9e5fb374ac50cabd3258f4d63e54fc6413084c08c7e9a614177f7c49e4ffa4b
SHA512eed2d95c779748fa382a88faebbc8b3f982a65a39fe323bcbb9a1c92ac687dc882b9db6c1a76cdbab3c26272c659082402a5195753afb05f787893bf04e14eee
-
Filesize
172KB
MD5cb38cca0b90578b4bf2c461fecf90e5c
SHA1fb32960bbbb47be6cced724b3c3916ef95e4d345
SHA25673813b7a113a4ccbed20a4535ddb72a2dff9110487ecf584a6a5219e79650bcb
SHA512820662d65e4c2414d5e69c746071e551b2948c262a96b0dad7c88703e7b750a3a73d579c5076582e994869b53a3ee451ac3c8f84e8aea558c54827dfbd58d3e3
-
Filesize
172KB
MD5cb38cca0b90578b4bf2c461fecf90e5c
SHA1fb32960bbbb47be6cced724b3c3916ef95e4d345
SHA25673813b7a113a4ccbed20a4535ddb72a2dff9110487ecf584a6a5219e79650bcb
SHA512820662d65e4c2414d5e69c746071e551b2948c262a96b0dad7c88703e7b750a3a73d579c5076582e994869b53a3ee451ac3c8f84e8aea558c54827dfbd58d3e3
-
Filesize
377KB
MD5d9542b0559cb92d2c8251012ee4a466f
SHA1bc88e3c95d467cb6a9366997aba30fb007724a4b
SHA2565439b097e5a61c8017810278ca3e14ccf64fe79594d4f27890b09a0cd44d5432
SHA512651ee05d60624f34cc0aa7cb08a3557976429c52df549f095ce31313708b84ae5a9da51fd6753b14534a938dc828895a673ae898aa072ba7f27bed21435289fe
-
Filesize
377KB
MD5d9542b0559cb92d2c8251012ee4a466f
SHA1bc88e3c95d467cb6a9366997aba30fb007724a4b
SHA2565439b097e5a61c8017810278ca3e14ccf64fe79594d4f27890b09a0cd44d5432
SHA512651ee05d60624f34cc0aa7cb08a3557976429c52df549f095ce31313708b84ae5a9da51fd6753b14534a938dc828895a673ae898aa072ba7f27bed21435289fe
-
Filesize
206KB
MD5422c1ac20ced1882c3b3e0b305d177b7
SHA10963a625dca3e997dbfc68428d3439d4f453df72
SHA256d9e5fb374ac50cabd3258f4d63e54fc6413084c08c7e9a614177f7c49e4ffa4b
SHA512eed2d95c779748fa382a88faebbc8b3f982a65a39fe323bcbb9a1c92ac687dc882b9db6c1a76cdbab3c26272c659082402a5195753afb05f787893bf04e14eee
-
Filesize
206KB
MD5422c1ac20ced1882c3b3e0b305d177b7
SHA10963a625dca3e997dbfc68428d3439d4f453df72
SHA256d9e5fb374ac50cabd3258f4d63e54fc6413084c08c7e9a614177f7c49e4ffa4b
SHA512eed2d95c779748fa382a88faebbc8b3f982a65a39fe323bcbb9a1c92ac687dc882b9db6c1a76cdbab3c26272c659082402a5195753afb05f787893bf04e14eee
-
Filesize
172KB
MD5cb38cca0b90578b4bf2c461fecf90e5c
SHA1fb32960bbbb47be6cced724b3c3916ef95e4d345
SHA25673813b7a113a4ccbed20a4535ddb72a2dff9110487ecf584a6a5219e79650bcb
SHA512820662d65e4c2414d5e69c746071e551b2948c262a96b0dad7c88703e7b750a3a73d579c5076582e994869b53a3ee451ac3c8f84e8aea558c54827dfbd58d3e3
-
Filesize
172KB
MD5cb38cca0b90578b4bf2c461fecf90e5c
SHA1fb32960bbbb47be6cced724b3c3916ef95e4d345
SHA25673813b7a113a4ccbed20a4535ddb72a2dff9110487ecf584a6a5219e79650bcb
SHA512820662d65e4c2414d5e69c746071e551b2948c262a96b0dad7c88703e7b750a3a73d579c5076582e994869b53a3ee451ac3c8f84e8aea558c54827dfbd58d3e3