Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
07-06-2023 03:35
Static task
static1
Behavioral task
behavioral1
Sample
c1f65623fc190ad87b1486da20ff852fe0332a355e8c6444ac3ceac6bda8719f.exe
Resource
win10-20230220-en
General
-
Target
c1f65623fc190ad87b1486da20ff852fe0332a355e8c6444ac3ceac6bda8719f.exe
-
Size
578KB
-
MD5
432b19f49dd991ebb1feffa31cda8e31
-
SHA1
6f2b316d662bdd9598294370d786fa0d4af65c18
-
SHA256
c1f65623fc190ad87b1486da20ff852fe0332a355e8c6444ac3ceac6bda8719f
-
SHA512
7bef6cc3418fa9e4253fac30ff0839bd9edb662a0a94b9809db50f63071549f0670b969ca05af991d0cfae7b14036eb02a8c33aadbe151e6e6525119238250a2
-
SSDEEP
12288:2Mr2y90TeUQjYTXahstEC3CI5BoA0OUelnbxzBCBNVdpjp:kyiQjhh+Pb5Botu99AV3p
Malware Config
Extracted
redline
dasa
83.97.73.126:19048
-
auth_value
7eca6ed540c2dcd359aed5b67c4eda07
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4036 x0594220.exe 2088 x4538667.exe 4256 f5826419.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x0594220.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x4538667.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x4538667.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c1f65623fc190ad87b1486da20ff852fe0332a355e8c6444ac3ceac6bda8719f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c1f65623fc190ad87b1486da20ff852fe0332a355e8c6444ac3ceac6bda8719f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x0594220.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 4256 f5826419.exe 4256 f5826419.exe 4256 f5826419.exe 4256 f5826419.exe 4256 f5826419.exe 4256 f5826419.exe 4256 f5826419.exe 4256 f5826419.exe 4256 f5826419.exe 4256 f5826419.exe 4256 f5826419.exe 4256 f5826419.exe 4256 f5826419.exe 4256 f5826419.exe 4256 f5826419.exe 4256 f5826419.exe 4256 f5826419.exe 4256 f5826419.exe 4256 f5826419.exe 4256 f5826419.exe 4256 f5826419.exe 4256 f5826419.exe 4256 f5826419.exe 4256 f5826419.exe 4256 f5826419.exe 4256 f5826419.exe 4256 f5826419.exe 4256 f5826419.exe 4256 f5826419.exe 4256 f5826419.exe 4256 f5826419.exe 4256 f5826419.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4256 f5826419.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4116 wrote to memory of 4036 4116 c1f65623fc190ad87b1486da20ff852fe0332a355e8c6444ac3ceac6bda8719f.exe 66 PID 4116 wrote to memory of 4036 4116 c1f65623fc190ad87b1486da20ff852fe0332a355e8c6444ac3ceac6bda8719f.exe 66 PID 4116 wrote to memory of 4036 4116 c1f65623fc190ad87b1486da20ff852fe0332a355e8c6444ac3ceac6bda8719f.exe 66 PID 4036 wrote to memory of 2088 4036 x0594220.exe 67 PID 4036 wrote to memory of 2088 4036 x0594220.exe 67 PID 4036 wrote to memory of 2088 4036 x0594220.exe 67 PID 2088 wrote to memory of 4256 2088 x4538667.exe 68 PID 2088 wrote to memory of 4256 2088 x4538667.exe 68 PID 2088 wrote to memory of 4256 2088 x4538667.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1f65623fc190ad87b1486da20ff852fe0332a355e8c6444ac3ceac6bda8719f.exe"C:\Users\Admin\AppData\Local\Temp\c1f65623fc190ad87b1486da20ff852fe0332a355e8c6444ac3ceac6bda8719f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0594220.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0594220.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4538667.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4538667.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f5826419.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f5826419.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4256
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
378KB
MD57d11e11898170145eea0b8b03423b8cb
SHA1a75b10734953c7d318b75096b20f8f364f0c7ce3
SHA2566b5d5d3065e13dbbf97350307a2c8d87e5befa5629d830b046eb565e8b7600db
SHA5126aa415cc17c3537b9ff4e1078d07fe71558f522c73a41e5ff495fc24529873b643ca918c87a4e89fd4b3902dbfb8b6ab222572b7c6f03ebd77acfc3129945910
-
Filesize
378KB
MD57d11e11898170145eea0b8b03423b8cb
SHA1a75b10734953c7d318b75096b20f8f364f0c7ce3
SHA2566b5d5d3065e13dbbf97350307a2c8d87e5befa5629d830b046eb565e8b7600db
SHA5126aa415cc17c3537b9ff4e1078d07fe71558f522c73a41e5ff495fc24529873b643ca918c87a4e89fd4b3902dbfb8b6ab222572b7c6f03ebd77acfc3129945910
-
Filesize
206KB
MD579620ad447d11aae3ae0a885b72a997d
SHA1348e3792482403a89ddac15f789ca3a613c43fb4
SHA256aa5fb12f90dee17d34a16920337ee79bf00690c0698eab9339091d97da554d2f
SHA512080f5f18329d6594b5a72deea6b2ff9df5c7b95e2b0f96bb953d0878987132f73ab588eb361d1c990aed1633ab0341b5db34ed636525ba5a78cb7486ad666ed2
-
Filesize
206KB
MD579620ad447d11aae3ae0a885b72a997d
SHA1348e3792482403a89ddac15f789ca3a613c43fb4
SHA256aa5fb12f90dee17d34a16920337ee79bf00690c0698eab9339091d97da554d2f
SHA512080f5f18329d6594b5a72deea6b2ff9df5c7b95e2b0f96bb953d0878987132f73ab588eb361d1c990aed1633ab0341b5db34ed636525ba5a78cb7486ad666ed2
-
Filesize
172KB
MD5c24ed690fb860e97bcfe1ebfd1ccd964
SHA11d6954cd6f28e407783ca863f20176945240f20c
SHA256f893458a5769867766e46ae886d672f0b1cf58ec042330ddead309a3385490c4
SHA512527f5c1f2e6d6d3184f8c2c9e65e61b8995ca435cc10da39ff26a4a4a06c52e0a3b179960fe8375a4fe2622311f01bc743c3180ede78b9785720271d732f8eb9
-
Filesize
172KB
MD5c24ed690fb860e97bcfe1ebfd1ccd964
SHA11d6954cd6f28e407783ca863f20176945240f20c
SHA256f893458a5769867766e46ae886d672f0b1cf58ec042330ddead309a3385490c4
SHA512527f5c1f2e6d6d3184f8c2c9e65e61b8995ca435cc10da39ff26a4a4a06c52e0a3b179960fe8375a4fe2622311f01bc743c3180ede78b9785720271d732f8eb9