Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
07/06/2023, 02:49
Static task
static1
Behavioral task
behavioral1
Sample
213013de067392f5d37d134a75289d0f9956d82eb3d98eea76b4c4056e57346e.exe
Resource
win10-20230220-en
General
-
Target
213013de067392f5d37d134a75289d0f9956d82eb3d98eea76b4c4056e57346e.exe
-
Size
578KB
-
MD5
86bc8f724840b402efee1fc33931aa41
-
SHA1
8e7c6101167e492650088d285d2f17b0cba970a3
-
SHA256
213013de067392f5d37d134a75289d0f9956d82eb3d98eea76b4c4056e57346e
-
SHA512
3f2805d54afc84929b447b9bcbebbc6e766bfd269e752c2b292f559bebcfafdb385b1040d23f83b00c3f20144a32b88146a51c81518bb9e0724fa5736d8dc4ab
-
SSDEEP
12288:fMr7y90r03JfvestlwfYpT/RjoChHeSEKzs2:kyPf2QlR5RjoKHeu
Malware Config
Extracted
redline
dasa
83.97.73.126:19048
-
auth_value
7eca6ed540c2dcd359aed5b67c4eda07
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4100 x5388702.exe 3532 x5729416.exe 3500 f2731864.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x5729416.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 213013de067392f5d37d134a75289d0f9956d82eb3d98eea76b4c4056e57346e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 213013de067392f5d37d134a75289d0f9956d82eb3d98eea76b4c4056e57346e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x5388702.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x5388702.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x5729416.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 3500 f2731864.exe 3500 f2731864.exe 3500 f2731864.exe 3500 f2731864.exe 3500 f2731864.exe 3500 f2731864.exe 3500 f2731864.exe 3500 f2731864.exe 3500 f2731864.exe 3500 f2731864.exe 3500 f2731864.exe 3500 f2731864.exe 3500 f2731864.exe 3500 f2731864.exe 3500 f2731864.exe 3500 f2731864.exe 3500 f2731864.exe 3500 f2731864.exe 3500 f2731864.exe 3500 f2731864.exe 3500 f2731864.exe 3500 f2731864.exe 3500 f2731864.exe 3500 f2731864.exe 3500 f2731864.exe 3500 f2731864.exe 3500 f2731864.exe 3500 f2731864.exe 3500 f2731864.exe 3500 f2731864.exe 3500 f2731864.exe 3500 f2731864.exe 3500 f2731864.exe 3500 f2731864.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3500 f2731864.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 996 wrote to memory of 4100 996 213013de067392f5d37d134a75289d0f9956d82eb3d98eea76b4c4056e57346e.exe 66 PID 996 wrote to memory of 4100 996 213013de067392f5d37d134a75289d0f9956d82eb3d98eea76b4c4056e57346e.exe 66 PID 996 wrote to memory of 4100 996 213013de067392f5d37d134a75289d0f9956d82eb3d98eea76b4c4056e57346e.exe 66 PID 4100 wrote to memory of 3532 4100 x5388702.exe 67 PID 4100 wrote to memory of 3532 4100 x5388702.exe 67 PID 4100 wrote to memory of 3532 4100 x5388702.exe 67 PID 3532 wrote to memory of 3500 3532 x5729416.exe 68 PID 3532 wrote to memory of 3500 3532 x5729416.exe 68 PID 3532 wrote to memory of 3500 3532 x5729416.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\213013de067392f5d37d134a75289d0f9956d82eb3d98eea76b4c4056e57346e.exe"C:\Users\Admin\AppData\Local\Temp\213013de067392f5d37d134a75289d0f9956d82eb3d98eea76b4c4056e57346e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5388702.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5388702.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5729416.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5729416.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2731864.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2731864.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3500
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
378KB
MD5bd5261f7fd5ac5aa357e60a87cb5a7ee
SHA1322b34f6e4e327ed714148b5bf38b01513b8fb27
SHA25622593a81909dcf5e0a81ce500216cbf24c3b4e8eeba9786a3049da0003b3b42a
SHA5127365cc8b68b346e59542a45197c86b317b06a40048274619deff54f673b2e8d0769697fc6b187633718edb0564cae881f39f5e3718b7c0409f7a199505606dba
-
Filesize
378KB
MD5bd5261f7fd5ac5aa357e60a87cb5a7ee
SHA1322b34f6e4e327ed714148b5bf38b01513b8fb27
SHA25622593a81909dcf5e0a81ce500216cbf24c3b4e8eeba9786a3049da0003b3b42a
SHA5127365cc8b68b346e59542a45197c86b317b06a40048274619deff54f673b2e8d0769697fc6b187633718edb0564cae881f39f5e3718b7c0409f7a199505606dba
-
Filesize
206KB
MD5381a88fc13aa055a55e05bdbce96dc3c
SHA11d0149576295f20cc8d8d3fe18c2cad378bbdf61
SHA2569bfe84db54063e87b0f6f5c6d7ea2a54e5b3e0f06eca94eab8c5366f845b0315
SHA51214608034c70d97666c798361120d9ed862326fe76c2bb7da221cd974420b1ea23a35b920f4136717a4c58418c3088e91f5c578dd41418bed9739cc2dfa9cc09a
-
Filesize
206KB
MD5381a88fc13aa055a55e05bdbce96dc3c
SHA11d0149576295f20cc8d8d3fe18c2cad378bbdf61
SHA2569bfe84db54063e87b0f6f5c6d7ea2a54e5b3e0f06eca94eab8c5366f845b0315
SHA51214608034c70d97666c798361120d9ed862326fe76c2bb7da221cd974420b1ea23a35b920f4136717a4c58418c3088e91f5c578dd41418bed9739cc2dfa9cc09a
-
Filesize
172KB
MD564dc188223c46f48febe2530a4c6f115
SHA1010cdf18f5b107595fbd1009202f28b4e952c4e0
SHA256bff50f9aa40653088d78e99ca92f318f0d33785f4fb5666fa46b7c4e156631cd
SHA5122be09159b08b37e48e21d9903a27a1f1b655c5982e4aa794c8cee6f08b69cc34f315b04832da63a9de013dad1dd5cbf35ec99de28e1711f758a8968c09161c08
-
Filesize
172KB
MD564dc188223c46f48febe2530a4c6f115
SHA1010cdf18f5b107595fbd1009202f28b4e952c4e0
SHA256bff50f9aa40653088d78e99ca92f318f0d33785f4fb5666fa46b7c4e156631cd
SHA5122be09159b08b37e48e21d9903a27a1f1b655c5982e4aa794c8cee6f08b69cc34f315b04832da63a9de013dad1dd5cbf35ec99de28e1711f758a8968c09161c08