Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
11/07/2023, 15:13
Static task
static1
Behavioral task
behavioral1
Sample
foto0195.bin.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
foto0195.bin.exe
Resource
win10v2004-20230703-en
General
-
Target
foto0195.bin.exe
-
Size
1.0MB
-
MD5
fcec5bd6e991dabef70f77e08e42bccd
-
SHA1
3ae3b13a9757d327ed4227102d5b0b54712f19d4
-
SHA256
b21367ffaa0009b30055944fc1052857ec46336d5bfe2efd3dab109667a56fef
-
SHA512
59a2d1cc2576e55beff18f52573b6ac7baae8839dbbf536d5126f88d873375ebb9bb287606021e9c3c14533b004bde6bc3e28511fa646ef65cafabe6fdd4573b
-
SSDEEP
24576:PyvzwYJvJY4834KiT25Y/fUlpyY4yWvHIPnpAOD6FA7dZJ7Rj:arwamDIn2i38WPIpDzR
Malware Config
Extracted
redline
diza
185.161.248.37:4138
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2156 x1101592.exe 1636 x5310347.exe 2948 f6752633.exe -
Loads dropped DLL 6 IoCs
pid Process 2324 foto0195.bin.exe 2156 x1101592.exe 2156 x1101592.exe 1636 x5310347.exe 1636 x5310347.exe 2948 f6752633.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce foto0195.bin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" foto0195.bin.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce x1101592.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x1101592.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce x5310347.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x5310347.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2156 2324 foto0195.bin.exe 28 PID 2324 wrote to memory of 2156 2324 foto0195.bin.exe 28 PID 2324 wrote to memory of 2156 2324 foto0195.bin.exe 28 PID 2324 wrote to memory of 2156 2324 foto0195.bin.exe 28 PID 2324 wrote to memory of 2156 2324 foto0195.bin.exe 28 PID 2324 wrote to memory of 2156 2324 foto0195.bin.exe 28 PID 2324 wrote to memory of 2156 2324 foto0195.bin.exe 28 PID 2156 wrote to memory of 1636 2156 x1101592.exe 29 PID 2156 wrote to memory of 1636 2156 x1101592.exe 29 PID 2156 wrote to memory of 1636 2156 x1101592.exe 29 PID 2156 wrote to memory of 1636 2156 x1101592.exe 29 PID 2156 wrote to memory of 1636 2156 x1101592.exe 29 PID 2156 wrote to memory of 1636 2156 x1101592.exe 29 PID 2156 wrote to memory of 1636 2156 x1101592.exe 29 PID 1636 wrote to memory of 2948 1636 x5310347.exe 30 PID 1636 wrote to memory of 2948 1636 x5310347.exe 30 PID 1636 wrote to memory of 2948 1636 x5310347.exe 30 PID 1636 wrote to memory of 2948 1636 x5310347.exe 30 PID 1636 wrote to memory of 2948 1636 x5310347.exe 30 PID 1636 wrote to memory of 2948 1636 x5310347.exe 30 PID 1636 wrote to memory of 2948 1636 x5310347.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\foto0195.bin.exe"C:\Users\Admin\AppData\Local\Temp\foto0195.bin.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1101592.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1101592.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5310347.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5310347.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f6752633.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f6752633.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2948
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
750KB
MD5a71d1485c6def63e3a12a56cef3df216
SHA16356ae641fe06783171f255072b3f06c3e53fe5a
SHA256f71aeabbf5f3f4fa0a150bad2b24cd2db183e723cecd2296815fdc1582b31297
SHA512b7f7ab9fada5915189862df412f319de2f1958606d40c24bb31060352d07f94c4300c849aa9e61efb3a0e30a458c17afad573a145a326ee56c02c5e19fb19393
-
Filesize
750KB
MD5a71d1485c6def63e3a12a56cef3df216
SHA16356ae641fe06783171f255072b3f06c3e53fe5a
SHA256f71aeabbf5f3f4fa0a150bad2b24cd2db183e723cecd2296815fdc1582b31297
SHA512b7f7ab9fada5915189862df412f319de2f1958606d40c24bb31060352d07f94c4300c849aa9e61efb3a0e30a458c17afad573a145a326ee56c02c5e19fb19393
-
Filesize
306KB
MD559758d08e26d80f2b560b43915a196e7
SHA1191e46484309a701c87f826cfeca3c5590f41c75
SHA2562b21dfe635c66e24e5cbba2203c09083e228789c3bed18a1dde42d38b19ee924
SHA512548c92ed1205a43648fa218af44b77811a149e4c82a48943a164e3464f035b2ef56a89aa1270311a7410aaf8c98e1b7383290a796a53dc3da450edd6f77f618d
-
Filesize
306KB
MD559758d08e26d80f2b560b43915a196e7
SHA1191e46484309a701c87f826cfeca3c5590f41c75
SHA2562b21dfe635c66e24e5cbba2203c09083e228789c3bed18a1dde42d38b19ee924
SHA512548c92ed1205a43648fa218af44b77811a149e4c82a48943a164e3464f035b2ef56a89aa1270311a7410aaf8c98e1b7383290a796a53dc3da450edd6f77f618d
-
Filesize
145KB
MD5fc89ffae6d5ecc9374ef6b75d0d09edb
SHA18440ad5c070d5bb75d10308525777a70d42d18fc
SHA2565d2c14e89b6b1b95fead94182a17aebfeaca900df36f4eb7cb87cd52829196da
SHA512558f2e2b7ed661b8f486c980483d04148f09e1c692469d978e6efc98425f5cd32393351684f90cc3ba6611193a4ac58724e31310f358055e75dca30ced3d8752
-
Filesize
145KB
MD5fc89ffae6d5ecc9374ef6b75d0d09edb
SHA18440ad5c070d5bb75d10308525777a70d42d18fc
SHA2565d2c14e89b6b1b95fead94182a17aebfeaca900df36f4eb7cb87cd52829196da
SHA512558f2e2b7ed661b8f486c980483d04148f09e1c692469d978e6efc98425f5cd32393351684f90cc3ba6611193a4ac58724e31310f358055e75dca30ced3d8752
-
Filesize
750KB
MD5a71d1485c6def63e3a12a56cef3df216
SHA16356ae641fe06783171f255072b3f06c3e53fe5a
SHA256f71aeabbf5f3f4fa0a150bad2b24cd2db183e723cecd2296815fdc1582b31297
SHA512b7f7ab9fada5915189862df412f319de2f1958606d40c24bb31060352d07f94c4300c849aa9e61efb3a0e30a458c17afad573a145a326ee56c02c5e19fb19393
-
Filesize
750KB
MD5a71d1485c6def63e3a12a56cef3df216
SHA16356ae641fe06783171f255072b3f06c3e53fe5a
SHA256f71aeabbf5f3f4fa0a150bad2b24cd2db183e723cecd2296815fdc1582b31297
SHA512b7f7ab9fada5915189862df412f319de2f1958606d40c24bb31060352d07f94c4300c849aa9e61efb3a0e30a458c17afad573a145a326ee56c02c5e19fb19393
-
Filesize
306KB
MD559758d08e26d80f2b560b43915a196e7
SHA1191e46484309a701c87f826cfeca3c5590f41c75
SHA2562b21dfe635c66e24e5cbba2203c09083e228789c3bed18a1dde42d38b19ee924
SHA512548c92ed1205a43648fa218af44b77811a149e4c82a48943a164e3464f035b2ef56a89aa1270311a7410aaf8c98e1b7383290a796a53dc3da450edd6f77f618d
-
Filesize
306KB
MD559758d08e26d80f2b560b43915a196e7
SHA1191e46484309a701c87f826cfeca3c5590f41c75
SHA2562b21dfe635c66e24e5cbba2203c09083e228789c3bed18a1dde42d38b19ee924
SHA512548c92ed1205a43648fa218af44b77811a149e4c82a48943a164e3464f035b2ef56a89aa1270311a7410aaf8c98e1b7383290a796a53dc3da450edd6f77f618d
-
Filesize
145KB
MD5fc89ffae6d5ecc9374ef6b75d0d09edb
SHA18440ad5c070d5bb75d10308525777a70d42d18fc
SHA2565d2c14e89b6b1b95fead94182a17aebfeaca900df36f4eb7cb87cd52829196da
SHA512558f2e2b7ed661b8f486c980483d04148f09e1c692469d978e6efc98425f5cd32393351684f90cc3ba6611193a4ac58724e31310f358055e75dca30ced3d8752
-
Filesize
145KB
MD5fc89ffae6d5ecc9374ef6b75d0d09edb
SHA18440ad5c070d5bb75d10308525777a70d42d18fc
SHA2565d2c14e89b6b1b95fead94182a17aebfeaca900df36f4eb7cb87cd52829196da
SHA512558f2e2b7ed661b8f486c980483d04148f09e1c692469d978e6efc98425f5cd32393351684f90cc3ba6611193a4ac58724e31310f358055e75dca30ced3d8752