Analysis
-
max time kernel
137s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2023, 17:30
Static task
static1
Behavioral task
behavioral1
Sample
2c52c514ed30a21dbfc181f9a56e756d.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
2c52c514ed30a21dbfc181f9a56e756d.exe
Resource
win10v2004-20230703-en
General
-
Target
2c52c514ed30a21dbfc181f9a56e756d.exe
-
Size
864KB
-
MD5
2c52c514ed30a21dbfc181f9a56e756d
-
SHA1
251cf6719d43e1fd2c52df211e76b8644c3cd2b0
-
SHA256
ce9f75c073171b1315c869b550348e6d8c48a986b262a068b33f0833b7a24716
-
SHA512
e59f6f72001fbfb87dfbdf3ac73832f17ba334a5877f395f3c3173d18ba41c3a962714d6f91ce92d484ffe5368bf3ff90b388be4175032dc20a2bee0005c000b
-
SSDEEP
24576:5yQ6k1XlUuV6gbsDRA/vTXLp3qiwikDLDJtgYBNSu+KpEFMe:sQ6knTs2XTXLpFusYKu+yQ
Malware Config
Extracted
redline
kira
77.91.68.48:19071
-
auth_value
1677a40fd8997eb89377e1681911e9c6
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1884 y6497315.exe 1772 k0077088.exe 3108 l7490768.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2c52c514ed30a21dbfc181f9a56e756d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2c52c514ed30a21dbfc181f9a56e756d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y6497315.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y6497315.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1400 1772 WerFault.exe 85 -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2156 wrote to memory of 1884 2156 2c52c514ed30a21dbfc181f9a56e756d.exe 84 PID 2156 wrote to memory of 1884 2156 2c52c514ed30a21dbfc181f9a56e756d.exe 84 PID 2156 wrote to memory of 1884 2156 2c52c514ed30a21dbfc181f9a56e756d.exe 84 PID 1884 wrote to memory of 1772 1884 y6497315.exe 85 PID 1884 wrote to memory of 1772 1884 y6497315.exe 85 PID 1884 wrote to memory of 1772 1884 y6497315.exe 85 PID 1884 wrote to memory of 3108 1884 y6497315.exe 91 PID 1884 wrote to memory of 3108 1884 y6497315.exe 91 PID 1884 wrote to memory of 3108 1884 y6497315.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c52c514ed30a21dbfc181f9a56e756d.exe"C:\Users\Admin\AppData\Local\Temp\2c52c514ed30a21dbfc181f9a56e756d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6497315.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6497315.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0077088.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0077088.exe3⤵
- Executes dropped EXE
PID:1772 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1772 -s 1404⤵
- Program crash
PID:1400
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7490768.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7490768.exe3⤵
- Executes dropped EXE
PID:3108
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1772 -ip 17721⤵PID:2316
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
681KB
MD5347fa3300c887f6ed7b1a13377bb28bd
SHA1f7290c370763737aa41f0bc92d66b2423647815c
SHA2568ecc876c0ce1dc9774cb4ee93fbcd638c9182cd5c33e4a7aee74bbc39bd75cc4
SHA512e17a78db324fd6bd80872c92fd6c03f0308b20c256d9a42cec304f21f13df2f0c6069ba95998d525e39b6e99040d07baaabf60015ab4ff88344e5d222c0cc341
-
Filesize
681KB
MD5347fa3300c887f6ed7b1a13377bb28bd
SHA1f7290c370763737aa41f0bc92d66b2423647815c
SHA2568ecc876c0ce1dc9774cb4ee93fbcd638c9182cd5c33e4a7aee74bbc39bd75cc4
SHA512e17a78db324fd6bd80872c92fd6c03f0308b20c256d9a42cec304f21f13df2f0c6069ba95998d525e39b6e99040d07baaabf60015ab4ff88344e5d222c0cc341
-
Filesize
530KB
MD53afbc821636e1e7951821231f0cdc4bc
SHA1d962f7454a83bdeb81b16476055773c65090c068
SHA256b05287fda0d66708df3d5a927caeb62a87e8809fb992871a5615a3c62ce1eeff
SHA5124b74ca6740b4a8cf7d6bf4a54e64cbf564f42443d4b23d824feb661a8945a7a1a08fb6428afb8a8af7646607b5edc1af9d4c7aea8aac341965dbbf220db86eba
-
Filesize
530KB
MD53afbc821636e1e7951821231f0cdc4bc
SHA1d962f7454a83bdeb81b16476055773c65090c068
SHA256b05287fda0d66708df3d5a927caeb62a87e8809fb992871a5615a3c62ce1eeff
SHA5124b74ca6740b4a8cf7d6bf4a54e64cbf564f42443d4b23d824feb661a8945a7a1a08fb6428afb8a8af7646607b5edc1af9d4c7aea8aac341965dbbf220db86eba
-
Filesize
692KB
MD5ed78531c3da44f95b5e5f7aa280bf586
SHA1a9e403fcbf3a8020cb51d8f3a406c74775936c2d
SHA256d996d9ed8e0931fe6f414b91b0d4f52fc6b80a8493829f63fdd44cbf9afea60e
SHA5127649d4ceb7cf0771ed8905dbff16e74b117b0ced16f94026d457a6534a10f39c91da18bd986fd66ded33d9c2c4ef501e7c895760418b39361089f196bbdb6970
-
Filesize
692KB
MD5ed78531c3da44f95b5e5f7aa280bf586
SHA1a9e403fcbf3a8020cb51d8f3a406c74775936c2d
SHA256d996d9ed8e0931fe6f414b91b0d4f52fc6b80a8493829f63fdd44cbf9afea60e
SHA5127649d4ceb7cf0771ed8905dbff16e74b117b0ced16f94026d457a6534a10f39c91da18bd986fd66ded33d9c2c4ef501e7c895760418b39361089f196bbdb6970