Analysis
-
max time kernel
156s -
max time network
160s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
06-06-2023 18:27
Static task
static1
Behavioral task
behavioral1
Sample
b39e87b6113fd5c3561cac2303a1ef9848986595c7bd944f888e93860ed239d8.exe
Resource
win10-20230220-en
General
-
Target
b39e87b6113fd5c3561cac2303a1ef9848986595c7bd944f888e93860ed239d8.exe
-
Size
585KB
-
MD5
207f0ab5dfa655be03a64cc9f60a481e
-
SHA1
4425f4a223b79deb99db48687ac8dfe61469d473
-
SHA256
b39e87b6113fd5c3561cac2303a1ef9848986595c7bd944f888e93860ed239d8
-
SHA512
8f1cef00cb5b38697f4458239e56854a3ea35fd32c563013827fc6775b76488f9e2addbc8e01f4b55bde30ea7bff6d62eaf6548054dbd718c30d5e054c067926
-
SSDEEP
12288:bMr6y9089YlQLdIxIjL4t4GykSY4Q1QzU+1ytVbTQIaGQuB8KEbQmR:hyklKYtt/j1QzPOVbTQBpKEbQC
Malware Config
Extracted
redline
diza
83.97.73.126:19048
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 64 x9222541.exe 4320 x5051857.exe 4384 f2933640.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x5051857.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b39e87b6113fd5c3561cac2303a1ef9848986595c7bd944f888e93860ed239d8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b39e87b6113fd5c3561cac2303a1ef9848986595c7bd944f888e93860ed239d8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x9222541.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x9222541.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x5051857.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 4384 f2933640.exe 4384 f2933640.exe 4384 f2933640.exe 4384 f2933640.exe 4384 f2933640.exe 4384 f2933640.exe 4384 f2933640.exe 4384 f2933640.exe 4384 f2933640.exe 4384 f2933640.exe 4384 f2933640.exe 4384 f2933640.exe 4384 f2933640.exe 4384 f2933640.exe 4384 f2933640.exe 4384 f2933640.exe 4384 f2933640.exe 4384 f2933640.exe 4384 f2933640.exe 4384 f2933640.exe 4384 f2933640.exe 4384 f2933640.exe 4384 f2933640.exe 4384 f2933640.exe 4384 f2933640.exe 4384 f2933640.exe 4384 f2933640.exe 4384 f2933640.exe 4384 f2933640.exe 4384 f2933640.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4384 f2933640.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3680 wrote to memory of 64 3680 b39e87b6113fd5c3561cac2303a1ef9848986595c7bd944f888e93860ed239d8.exe 66 PID 3680 wrote to memory of 64 3680 b39e87b6113fd5c3561cac2303a1ef9848986595c7bd944f888e93860ed239d8.exe 66 PID 3680 wrote to memory of 64 3680 b39e87b6113fd5c3561cac2303a1ef9848986595c7bd944f888e93860ed239d8.exe 66 PID 64 wrote to memory of 4320 64 x9222541.exe 67 PID 64 wrote to memory of 4320 64 x9222541.exe 67 PID 64 wrote to memory of 4320 64 x9222541.exe 67 PID 4320 wrote to memory of 4384 4320 x5051857.exe 68 PID 4320 wrote to memory of 4384 4320 x5051857.exe 68 PID 4320 wrote to memory of 4384 4320 x5051857.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\b39e87b6113fd5c3561cac2303a1ef9848986595c7bd944f888e93860ed239d8.exe"C:\Users\Admin\AppData\Local\Temp\b39e87b6113fd5c3561cac2303a1ef9848986595c7bd944f888e93860ed239d8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9222541.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9222541.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5051857.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5051857.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2933640.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2933640.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4384
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD59b6911cd324492c24c09abc507a54bf8
SHA18ddd493edaef985f591d635171ab37d66cab8182
SHA25677c4d48af26328f69223b50bf7647ac82d5a2eee61b46e529c86aa0872ce42b6
SHA51278e02b40ad30c7befd743e418c838a1d59a299d4bd01ce40aef27d3258033fe0655da3cbf81b56ba87b2c5ae11dd38de5f993bd8b3f5eeba5f1587cc8fe15693
-
Filesize
377KB
MD59b6911cd324492c24c09abc507a54bf8
SHA18ddd493edaef985f591d635171ab37d66cab8182
SHA25677c4d48af26328f69223b50bf7647ac82d5a2eee61b46e529c86aa0872ce42b6
SHA51278e02b40ad30c7befd743e418c838a1d59a299d4bd01ce40aef27d3258033fe0655da3cbf81b56ba87b2c5ae11dd38de5f993bd8b3f5eeba5f1587cc8fe15693
-
Filesize
206KB
MD549844732267f498bb417500f2dcfbb89
SHA12f2aa5f3eb02d582739852c299071f8ad8400cf2
SHA256ad76168b4290c677f67f3ad5079b2beae83534f2b333e832be0a914be17aae37
SHA512e4222e22d1afd1cc27b8e90d51db63f135158e3cecd8eec3535433217e8e2015c110f1d0369e22c1320b609eabea07ae21d4efddebd373be7928ce403979f1de
-
Filesize
206KB
MD549844732267f498bb417500f2dcfbb89
SHA12f2aa5f3eb02d582739852c299071f8ad8400cf2
SHA256ad76168b4290c677f67f3ad5079b2beae83534f2b333e832be0a914be17aae37
SHA512e4222e22d1afd1cc27b8e90d51db63f135158e3cecd8eec3535433217e8e2015c110f1d0369e22c1320b609eabea07ae21d4efddebd373be7928ce403979f1de
-
Filesize
172KB
MD52606d78f69c1a88cce88e40ad999eed5
SHA1956cfa20f35a58e0faba94bc826cd55fccb144de
SHA256e141ed4bd5b31ff349c04aea5196a1397678e3e061eb8daa7c3cf2d4cfbca529
SHA51241a80c2000cadaef35d95f3534f5033a7762c8800769ada3bc94ecb04b46aa3431079085e9d4462c9a0d11e0d5b048b15b19ab7ce8286053999d994987d54019
-
Filesize
172KB
MD52606d78f69c1a88cce88e40ad999eed5
SHA1956cfa20f35a58e0faba94bc826cd55fccb144de
SHA256e141ed4bd5b31ff349c04aea5196a1397678e3e061eb8daa7c3cf2d4cfbca529
SHA51241a80c2000cadaef35d95f3534f5033a7762c8800769ada3bc94ecb04b46aa3431079085e9d4462c9a0d11e0d5b048b15b19ab7ce8286053999d994987d54019