Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2023 10:35
Static task
static1
Behavioral task
behavioral1
Sample
d5a93e1e0c463a406b2c08ff3ef6154ec13aa65ef12852334694955c31b5f263.exe
Resource
win10v2004-20230221-en
General
-
Target
d5a93e1e0c463a406b2c08ff3ef6154ec13aa65ef12852334694955c31b5f263.exe
-
Size
585KB
-
MD5
d2c76b7d5df38dfec2982a73a22fceec
-
SHA1
8e79e94d4b241135b39c40e7ce5684d687078c07
-
SHA256
d5a93e1e0c463a406b2c08ff3ef6154ec13aa65ef12852334694955c31b5f263
-
SHA512
979028166afa2ff8fba01a76a975d8a61bd2f5f339d7fd49c97888d87af3b860bce0903a7161f6a8f3f08693356cff2608360c81351a86682789c34e00958fdf
-
SSDEEP
12288:0Mryy90WG92hPULn1EI4FmqXvqnwPqE2CuDyvWnQJ47p4Jc2:+yfG9nj1EcqXvqg2bDWu/4a2
Malware Config
Extracted
redline
diza
83.97.73.126:19048
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4584 x0187324.exe 2724 x1357259.exe 2020 f3791320.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d5a93e1e0c463a406b2c08ff3ef6154ec13aa65ef12852334694955c31b5f263.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x0187324.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x0187324.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x1357259.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x1357259.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d5a93e1e0c463a406b2c08ff3ef6154ec13aa65ef12852334694955c31b5f263.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 2020 f3791320.exe 2020 f3791320.exe 2020 f3791320.exe 2020 f3791320.exe 2020 f3791320.exe 2020 f3791320.exe 2020 f3791320.exe 2020 f3791320.exe 2020 f3791320.exe 2020 f3791320.exe 2020 f3791320.exe 2020 f3791320.exe 2020 f3791320.exe 2020 f3791320.exe 2020 f3791320.exe 2020 f3791320.exe 2020 f3791320.exe 2020 f3791320.exe 2020 f3791320.exe 2020 f3791320.exe 2020 f3791320.exe 2020 f3791320.exe 2020 f3791320.exe 2020 f3791320.exe 2020 f3791320.exe 2020 f3791320.exe 2020 f3791320.exe 2020 f3791320.exe 2020 f3791320.exe 2020 f3791320.exe 2020 f3791320.exe 2020 f3791320.exe 2020 f3791320.exe 2020 f3791320.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2020 f3791320.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4632 wrote to memory of 4584 4632 d5a93e1e0c463a406b2c08ff3ef6154ec13aa65ef12852334694955c31b5f263.exe 81 PID 4632 wrote to memory of 4584 4632 d5a93e1e0c463a406b2c08ff3ef6154ec13aa65ef12852334694955c31b5f263.exe 81 PID 4632 wrote to memory of 4584 4632 d5a93e1e0c463a406b2c08ff3ef6154ec13aa65ef12852334694955c31b5f263.exe 81 PID 4584 wrote to memory of 2724 4584 x0187324.exe 82 PID 4584 wrote to memory of 2724 4584 x0187324.exe 82 PID 4584 wrote to memory of 2724 4584 x0187324.exe 82 PID 2724 wrote to memory of 2020 2724 x1357259.exe 83 PID 2724 wrote to memory of 2020 2724 x1357259.exe 83 PID 2724 wrote to memory of 2020 2724 x1357259.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5a93e1e0c463a406b2c08ff3ef6154ec13aa65ef12852334694955c31b5f263.exe"C:\Users\Admin\AppData\Local\Temp\d5a93e1e0c463a406b2c08ff3ef6154ec13aa65ef12852334694955c31b5f263.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0187324.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0187324.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1357259.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1357259.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3791320.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3791320.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2020
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
378KB
MD5922efff3675484fe6c1a5069ec8cc7d2
SHA1441b5df184cd8ebb598ee5e0baf0b6eed3430e89
SHA256d0c0f389a0c17a4426efe58cfea98a404c5507f06978e9fb81467ff9e9c8f6aa
SHA51242fdde023aff59956b3d3b1af0895a1ff5119c0b993489a8632e5fbae2198003c17f071dfd53f9b0d06c54f1d354580e2b790111bd1d5aba0166850952fbd059
-
Filesize
378KB
MD5922efff3675484fe6c1a5069ec8cc7d2
SHA1441b5df184cd8ebb598ee5e0baf0b6eed3430e89
SHA256d0c0f389a0c17a4426efe58cfea98a404c5507f06978e9fb81467ff9e9c8f6aa
SHA51242fdde023aff59956b3d3b1af0895a1ff5119c0b993489a8632e5fbae2198003c17f071dfd53f9b0d06c54f1d354580e2b790111bd1d5aba0166850952fbd059
-
Filesize
206KB
MD5cac3fa3a8a5a14cdf2998ccd3f6a01b4
SHA18d41d07feb35495b296b8e320a4daca9bf4689ee
SHA2562656c725e7566d3d36e44b95e46836cc84dd6f0c00faa5f90a8f0d1fa58d4b9f
SHA51227807c98e27d9c32957146ed9ab80eedb5067d4b3c3f650f25ce9626a0ad71be07138f388811562f654eca7d779b56bc8f340fe8171363d5d6ed32554f46e1d5
-
Filesize
206KB
MD5cac3fa3a8a5a14cdf2998ccd3f6a01b4
SHA18d41d07feb35495b296b8e320a4daca9bf4689ee
SHA2562656c725e7566d3d36e44b95e46836cc84dd6f0c00faa5f90a8f0d1fa58d4b9f
SHA51227807c98e27d9c32957146ed9ab80eedb5067d4b3c3f650f25ce9626a0ad71be07138f388811562f654eca7d779b56bc8f340fe8171363d5d6ed32554f46e1d5
-
Filesize
172KB
MD51c14f96a35661722c08e45c5ac02eb83
SHA179a2903152420f16bba75f654ac7d421c003ffd2
SHA256d5e5601425b97fb9432b837964f60efe559822fc817e1211ba5ebe239d1d07da
SHA5123239eef5b7ac3eac5360c467bc2667b211e532fec4cb453d328a670d499001659b166b2b13849e29162d399e0f27c989d74535beb2dd41611cb42bb13eb0611f
-
Filesize
172KB
MD51c14f96a35661722c08e45c5ac02eb83
SHA179a2903152420f16bba75f654ac7d421c003ffd2
SHA256d5e5601425b97fb9432b837964f60efe559822fc817e1211ba5ebe239d1d07da
SHA5123239eef5b7ac3eac5360c467bc2667b211e532fec4cb453d328a670d499001659b166b2b13849e29162d399e0f27c989d74535beb2dd41611cb42bb13eb0611f