Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
14-06-2023 01:01
Static task
static1
Behavioral task
behavioral1
Sample
4fe304e1ceef6b6a6cd174669f74707f5d832911fc7cbc6a07e50c84d1703c4f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4fe304e1ceef6b6a6cd174669f74707f5d832911fc7cbc6a07e50c84d1703c4f.exe
Resource
win10v2004-20230220-en
General
-
Target
4fe304e1ceef6b6a6cd174669f74707f5d832911fc7cbc6a07e50c84d1703c4f.exe
-
Size
575KB
-
MD5
09b8353ba30da7abd836ea8b2bce535e
-
SHA1
ee3a106546f8e19477b91463685b75a4c161de56
-
SHA256
4fe304e1ceef6b6a6cd174669f74707f5d832911fc7cbc6a07e50c84d1703c4f
-
SHA512
82fbe09471c47202062ecc3c1a746612fbea5b6f6ab9a07273812bfff5839fb1d008f2f08d42731710f6045981834e5297099804df684c24cce99a294fe3bc58
-
SSDEEP
12288:SMrUy905YmSPZYR0J0UkAswi8fOm1UrEBIITGxwbT5tC5QG4W:Syj7xgI0U5hWu2E/TGk3ha
Malware Config
Extracted
redline
doro
83.97.73.129:19068
-
auth_value
03f411441fb3fa233179c2cc8ffbce27
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
Processes:
x7997052.exex2775179.exef4448096.exepid process 1180 x7997052.exe 1108 x2775179.exe 972 f4448096.exe -
Loads dropped DLL 6 IoCs
Processes:
4fe304e1ceef6b6a6cd174669f74707f5d832911fc7cbc6a07e50c84d1703c4f.exex7997052.exex2775179.exef4448096.exepid process 1416 4fe304e1ceef6b6a6cd174669f74707f5d832911fc7cbc6a07e50c84d1703c4f.exe 1180 x7997052.exe 1180 x7997052.exe 1108 x2775179.exe 1108 x2775179.exe 972 f4448096.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
x7997052.exex2775179.exe4fe304e1ceef6b6a6cd174669f74707f5d832911fc7cbc6a07e50c84d1703c4f.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7997052.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce x2775179.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x2775179.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4fe304e1ceef6b6a6cd174669f74707f5d832911fc7cbc6a07e50c84d1703c4f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4fe304e1ceef6b6a6cd174669f74707f5d832911fc7cbc6a07e50c84d1703c4f.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce x7997052.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
4fe304e1ceef6b6a6cd174669f74707f5d832911fc7cbc6a07e50c84d1703c4f.exex7997052.exex2775179.exedescription pid process target process PID 1416 wrote to memory of 1180 1416 4fe304e1ceef6b6a6cd174669f74707f5d832911fc7cbc6a07e50c84d1703c4f.exe x7997052.exe PID 1416 wrote to memory of 1180 1416 4fe304e1ceef6b6a6cd174669f74707f5d832911fc7cbc6a07e50c84d1703c4f.exe x7997052.exe PID 1416 wrote to memory of 1180 1416 4fe304e1ceef6b6a6cd174669f74707f5d832911fc7cbc6a07e50c84d1703c4f.exe x7997052.exe PID 1416 wrote to memory of 1180 1416 4fe304e1ceef6b6a6cd174669f74707f5d832911fc7cbc6a07e50c84d1703c4f.exe x7997052.exe PID 1416 wrote to memory of 1180 1416 4fe304e1ceef6b6a6cd174669f74707f5d832911fc7cbc6a07e50c84d1703c4f.exe x7997052.exe PID 1416 wrote to memory of 1180 1416 4fe304e1ceef6b6a6cd174669f74707f5d832911fc7cbc6a07e50c84d1703c4f.exe x7997052.exe PID 1416 wrote to memory of 1180 1416 4fe304e1ceef6b6a6cd174669f74707f5d832911fc7cbc6a07e50c84d1703c4f.exe x7997052.exe PID 1180 wrote to memory of 1108 1180 x7997052.exe x2775179.exe PID 1180 wrote to memory of 1108 1180 x7997052.exe x2775179.exe PID 1180 wrote to memory of 1108 1180 x7997052.exe x2775179.exe PID 1180 wrote to memory of 1108 1180 x7997052.exe x2775179.exe PID 1180 wrote to memory of 1108 1180 x7997052.exe x2775179.exe PID 1180 wrote to memory of 1108 1180 x7997052.exe x2775179.exe PID 1180 wrote to memory of 1108 1180 x7997052.exe x2775179.exe PID 1108 wrote to memory of 972 1108 x2775179.exe f4448096.exe PID 1108 wrote to memory of 972 1108 x2775179.exe f4448096.exe PID 1108 wrote to memory of 972 1108 x2775179.exe f4448096.exe PID 1108 wrote to memory of 972 1108 x2775179.exe f4448096.exe PID 1108 wrote to memory of 972 1108 x2775179.exe f4448096.exe PID 1108 wrote to memory of 972 1108 x2775179.exe f4448096.exe PID 1108 wrote to memory of 972 1108 x2775179.exe f4448096.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fe304e1ceef6b6a6cd174669f74707f5d832911fc7cbc6a07e50c84d1703c4f.exe"C:\Users\Admin\AppData\Local\Temp\4fe304e1ceef6b6a6cd174669f74707f5d832911fc7cbc6a07e50c84d1703c4f.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7997052.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7997052.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2775179.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2775179.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f4448096.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f4448096.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7997052.exeFilesize
378KB
MD50110e17345722275a79b33512fd08a1e
SHA119569530e6cf2352262bbfc58a8753d8994268e2
SHA256d31e9242158b73e8a0d26938f1a53291ed6c4d5f8e6584e2ba42675da719661c
SHA51228163b22d15df29afe843b980256c23f188762dd1e4ba3520389dd5b9fbbf5621693039af0ed56b2c597f11a7c1b0cd8be76012cfc8d06068b48bdf6bb42b3f1
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7997052.exeFilesize
378KB
MD50110e17345722275a79b33512fd08a1e
SHA119569530e6cf2352262bbfc58a8753d8994268e2
SHA256d31e9242158b73e8a0d26938f1a53291ed6c4d5f8e6584e2ba42675da719661c
SHA51228163b22d15df29afe843b980256c23f188762dd1e4ba3520389dd5b9fbbf5621693039af0ed56b2c597f11a7c1b0cd8be76012cfc8d06068b48bdf6bb42b3f1
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2775179.exeFilesize
206KB
MD59790e9cd65fac7da0725729f28dd28c7
SHA15b4238ad69f7091ccb81d111287c75eb9a47d707
SHA2565883e38109d428172bd6f3b8d6dbd54af720ceed905169fca3e27ba49cb6512f
SHA51244bbace7d4f5a539e5b9a6b3dba93d2d163b88ebdd1a10eb39fcee73c0d281eb4ba22cf538b5617494839d85309dec5e15b8c5647c1cd48c8132a03966cabebe
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2775179.exeFilesize
206KB
MD59790e9cd65fac7da0725729f28dd28c7
SHA15b4238ad69f7091ccb81d111287c75eb9a47d707
SHA2565883e38109d428172bd6f3b8d6dbd54af720ceed905169fca3e27ba49cb6512f
SHA51244bbace7d4f5a539e5b9a6b3dba93d2d163b88ebdd1a10eb39fcee73c0d281eb4ba22cf538b5617494839d85309dec5e15b8c5647c1cd48c8132a03966cabebe
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f4448096.exeFilesize
173KB
MD5803fa534497b7e04bdb37bd1aa947ba0
SHA1ed45a9a9e35576fdb8e77bf8a97e2c53cea29910
SHA25674da9f8644d4b8c20321b15dae05dc52b9fc78e451127174633b253cf55bc36d
SHA51263338f6c19b6a7b452bc6e9caf2123005025fe5432a5c491b506e4d7c0894220730d279a559b7e64d65d47583c7c9c0fdb6d90fcb859d62fe3d62c9368d91db8
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f4448096.exeFilesize
173KB
MD5803fa534497b7e04bdb37bd1aa947ba0
SHA1ed45a9a9e35576fdb8e77bf8a97e2c53cea29910
SHA25674da9f8644d4b8c20321b15dae05dc52b9fc78e451127174633b253cf55bc36d
SHA51263338f6c19b6a7b452bc6e9caf2123005025fe5432a5c491b506e4d7c0894220730d279a559b7e64d65d47583c7c9c0fdb6d90fcb859d62fe3d62c9368d91db8
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7997052.exeFilesize
378KB
MD50110e17345722275a79b33512fd08a1e
SHA119569530e6cf2352262bbfc58a8753d8994268e2
SHA256d31e9242158b73e8a0d26938f1a53291ed6c4d5f8e6584e2ba42675da719661c
SHA51228163b22d15df29afe843b980256c23f188762dd1e4ba3520389dd5b9fbbf5621693039af0ed56b2c597f11a7c1b0cd8be76012cfc8d06068b48bdf6bb42b3f1
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7997052.exeFilesize
378KB
MD50110e17345722275a79b33512fd08a1e
SHA119569530e6cf2352262bbfc58a8753d8994268e2
SHA256d31e9242158b73e8a0d26938f1a53291ed6c4d5f8e6584e2ba42675da719661c
SHA51228163b22d15df29afe843b980256c23f188762dd1e4ba3520389dd5b9fbbf5621693039af0ed56b2c597f11a7c1b0cd8be76012cfc8d06068b48bdf6bb42b3f1
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2775179.exeFilesize
206KB
MD59790e9cd65fac7da0725729f28dd28c7
SHA15b4238ad69f7091ccb81d111287c75eb9a47d707
SHA2565883e38109d428172bd6f3b8d6dbd54af720ceed905169fca3e27ba49cb6512f
SHA51244bbace7d4f5a539e5b9a6b3dba93d2d163b88ebdd1a10eb39fcee73c0d281eb4ba22cf538b5617494839d85309dec5e15b8c5647c1cd48c8132a03966cabebe
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2775179.exeFilesize
206KB
MD59790e9cd65fac7da0725729f28dd28c7
SHA15b4238ad69f7091ccb81d111287c75eb9a47d707
SHA2565883e38109d428172bd6f3b8d6dbd54af720ceed905169fca3e27ba49cb6512f
SHA51244bbace7d4f5a539e5b9a6b3dba93d2d163b88ebdd1a10eb39fcee73c0d281eb4ba22cf538b5617494839d85309dec5e15b8c5647c1cd48c8132a03966cabebe
-
\Users\Admin\AppData\Local\Temp\IXP002.TMP\f4448096.exeFilesize
173KB
MD5803fa534497b7e04bdb37bd1aa947ba0
SHA1ed45a9a9e35576fdb8e77bf8a97e2c53cea29910
SHA25674da9f8644d4b8c20321b15dae05dc52b9fc78e451127174633b253cf55bc36d
SHA51263338f6c19b6a7b452bc6e9caf2123005025fe5432a5c491b506e4d7c0894220730d279a559b7e64d65d47583c7c9c0fdb6d90fcb859d62fe3d62c9368d91db8
-
\Users\Admin\AppData\Local\Temp\IXP002.TMP\f4448096.exeFilesize
173KB
MD5803fa534497b7e04bdb37bd1aa947ba0
SHA1ed45a9a9e35576fdb8e77bf8a97e2c53cea29910
SHA25674da9f8644d4b8c20321b15dae05dc52b9fc78e451127174633b253cf55bc36d
SHA51263338f6c19b6a7b452bc6e9caf2123005025fe5432a5c491b506e4d7c0894220730d279a559b7e64d65d47583c7c9c0fdb6d90fcb859d62fe3d62c9368d91db8
-
memory/972-84-0x0000000000A90000-0x0000000000AC0000-memory.dmpFilesize
192KB
-
memory/972-85-0x00000000003E0000-0x00000000003E6000-memory.dmpFilesize
24KB
-
memory/972-86-0x0000000000420000-0x0000000000460000-memory.dmpFilesize
256KB
-
memory/972-87-0x0000000000420000-0x0000000000460000-memory.dmpFilesize
256KB