Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2023 13:40
Static task
static1
Behavioral task
behavioral1
Sample
d3d4367e0898d76c5cf63b42ac58f5b01d7e9ca27c633db40c0c11dfbf021ae5.exe
Resource
win10v2004-20230220-en
General
-
Target
d3d4367e0898d76c5cf63b42ac58f5b01d7e9ca27c633db40c0c11dfbf021ae5.exe
-
Size
585KB
-
MD5
dc5972da725fe843ad2eaf140737b5f7
-
SHA1
ad224caac6e9a01f737ea1c8a8ede66e8863cec1
-
SHA256
d3d4367e0898d76c5cf63b42ac58f5b01d7e9ca27c633db40c0c11dfbf021ae5
-
SHA512
28ce0a2e5c75e420254860d55ffbd77f1952dc48d0215eeeb701f7d8c37fb0275a9ea2f51dee5d5080a71769d789b809810f358be88992d6ae69c57a5b9856ec
-
SSDEEP
12288:ZMroy90GDdDNG3FFS8uEiZGOuhb0nIh94orH43:lyZDdw3vsZ+1vj0
Malware Config
Extracted
redline
diza
83.97.73.126:19048
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4696 x9151023.exe 4820 x2074397.exe 4300 f4233048.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d3d4367e0898d76c5cf63b42ac58f5b01d7e9ca27c633db40c0c11dfbf021ae5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d3d4367e0898d76c5cf63b42ac58f5b01d7e9ca27c633db40c0c11dfbf021ae5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x9151023.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x9151023.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x2074397.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x2074397.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 4300 f4233048.exe 4300 f4233048.exe 4300 f4233048.exe 4300 f4233048.exe 4300 f4233048.exe 4300 f4233048.exe 4300 f4233048.exe 4300 f4233048.exe 4300 f4233048.exe 4300 f4233048.exe 4300 f4233048.exe 4300 f4233048.exe 4300 f4233048.exe 4300 f4233048.exe 4300 f4233048.exe 4300 f4233048.exe 4300 f4233048.exe 4300 f4233048.exe 4300 f4233048.exe 4300 f4233048.exe 4300 f4233048.exe 4300 f4233048.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4300 f4233048.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3340 wrote to memory of 4696 3340 d3d4367e0898d76c5cf63b42ac58f5b01d7e9ca27c633db40c0c11dfbf021ae5.exe 85 PID 3340 wrote to memory of 4696 3340 d3d4367e0898d76c5cf63b42ac58f5b01d7e9ca27c633db40c0c11dfbf021ae5.exe 85 PID 3340 wrote to memory of 4696 3340 d3d4367e0898d76c5cf63b42ac58f5b01d7e9ca27c633db40c0c11dfbf021ae5.exe 85 PID 4696 wrote to memory of 4820 4696 x9151023.exe 86 PID 4696 wrote to memory of 4820 4696 x9151023.exe 86 PID 4696 wrote to memory of 4820 4696 x9151023.exe 86 PID 4820 wrote to memory of 4300 4820 x2074397.exe 87 PID 4820 wrote to memory of 4300 4820 x2074397.exe 87 PID 4820 wrote to memory of 4300 4820 x2074397.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3d4367e0898d76c5cf63b42ac58f5b01d7e9ca27c633db40c0c11dfbf021ae5.exe"C:\Users\Admin\AppData\Local\Temp\d3d4367e0898d76c5cf63b42ac58f5b01d7e9ca27c633db40c0c11dfbf021ae5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9151023.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9151023.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2074397.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2074397.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f4233048.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f4233048.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4300
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
378KB
MD50d763aad0caaa00fffacb2da4cf8e9e0
SHA130b903a7401489b4ccedb3350646cf23c3cdd9d1
SHA256461724ac8e6db4b47f8f4fedfde1f853d9c1557604187b1559eb29837cebf14e
SHA5128e50789ffbbb590d524856e726eacd992df9f107d32fa3ec61c63e33eb866cf5ea17e07b922db2b603096559b1fbb246db3e9383dce1feb3377c7069cbeb17eb
-
Filesize
378KB
MD50d763aad0caaa00fffacb2da4cf8e9e0
SHA130b903a7401489b4ccedb3350646cf23c3cdd9d1
SHA256461724ac8e6db4b47f8f4fedfde1f853d9c1557604187b1559eb29837cebf14e
SHA5128e50789ffbbb590d524856e726eacd992df9f107d32fa3ec61c63e33eb866cf5ea17e07b922db2b603096559b1fbb246db3e9383dce1feb3377c7069cbeb17eb
-
Filesize
206KB
MD5fba335af6182561ca7981a9cd4d5f156
SHA1e6e3edffa28a4d76fa23cb29f7aae59d7bb57734
SHA256b5d2fdc5bc8ab20d5a69b81e977eab05b85c255cf998c7d4304f8a5c63c05d8d
SHA512948b6cbb8584a3054a9388d65cfc1ba94df07496ad5c3a00fea7ede8fa0d99cbac1714fee4d0c1e809bf5f76b1c4152be66cef9fcc28a5f06149c39fe5ac5485
-
Filesize
206KB
MD5fba335af6182561ca7981a9cd4d5f156
SHA1e6e3edffa28a4d76fa23cb29f7aae59d7bb57734
SHA256b5d2fdc5bc8ab20d5a69b81e977eab05b85c255cf998c7d4304f8a5c63c05d8d
SHA512948b6cbb8584a3054a9388d65cfc1ba94df07496ad5c3a00fea7ede8fa0d99cbac1714fee4d0c1e809bf5f76b1c4152be66cef9fcc28a5f06149c39fe5ac5485
-
Filesize
172KB
MD54f68ed429cb7c600d364dcc8e24316e2
SHA1c44674c73a180ed78ccc22dd2c7ecd26714840de
SHA256cba3ca22dd1abbc22aee215e9474e84b9b54e147993bbb689b79734d4fa3eaeb
SHA5128e3094047ada8349b8b639c5252c7887884058df97eed4e694f99a95c545e48f1b7e4a495a1662901f85b2ef79fdafff49f8b24a0c53a25124520ad6a1a2559a
-
Filesize
172KB
MD54f68ed429cb7c600d364dcc8e24316e2
SHA1c44674c73a180ed78ccc22dd2c7ecd26714840de
SHA256cba3ca22dd1abbc22aee215e9474e84b9b54e147993bbb689b79734d4fa3eaeb
SHA5128e3094047ada8349b8b639c5252c7887884058df97eed4e694f99a95c545e48f1b7e4a495a1662901f85b2ef79fdafff49f8b24a0c53a25124520ad6a1a2559a