Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2023, 15:13
Static task
static1
Behavioral task
behavioral1
Sample
foto0195.bin.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
foto0195.bin.exe
Resource
win10v2004-20230703-en
General
-
Target
foto0195.bin.exe
-
Size
1.0MB
-
MD5
fcec5bd6e991dabef70f77e08e42bccd
-
SHA1
3ae3b13a9757d327ed4227102d5b0b54712f19d4
-
SHA256
b21367ffaa0009b30055944fc1052857ec46336d5bfe2efd3dab109667a56fef
-
SHA512
59a2d1cc2576e55beff18f52573b6ac7baae8839dbbf536d5126f88d873375ebb9bb287606021e9c3c14533b004bde6bc3e28511fa646ef65cafabe6fdd4573b
-
SSDEEP
24576:PyvzwYJvJY4834KiT25Y/fUlpyY4yWvHIPnpAOD6FA7dZJ7Rj:arwamDIn2i38WPIpDzR
Malware Config
Extracted
redline
diza
185.161.248.37:4138
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 3980 x1101592.exe 2412 x5310347.exe 3632 f6752633.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce foto0195.bin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" foto0195.bin.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x1101592.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x1101592.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x5310347.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x5310347.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1148 wrote to memory of 3980 1148 foto0195.bin.exe 84 PID 1148 wrote to memory of 3980 1148 foto0195.bin.exe 84 PID 1148 wrote to memory of 3980 1148 foto0195.bin.exe 84 PID 3980 wrote to memory of 2412 3980 x1101592.exe 85 PID 3980 wrote to memory of 2412 3980 x1101592.exe 85 PID 3980 wrote to memory of 2412 3980 x1101592.exe 85 PID 2412 wrote to memory of 3632 2412 x5310347.exe 87 PID 2412 wrote to memory of 3632 2412 x5310347.exe 87 PID 2412 wrote to memory of 3632 2412 x5310347.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\foto0195.bin.exe"C:\Users\Admin\AppData\Local\Temp\foto0195.bin.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1101592.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1101592.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5310347.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5310347.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f6752633.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f6752633.exe4⤵
- Executes dropped EXE
PID:3632
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
750KB
MD5a71d1485c6def63e3a12a56cef3df216
SHA16356ae641fe06783171f255072b3f06c3e53fe5a
SHA256f71aeabbf5f3f4fa0a150bad2b24cd2db183e723cecd2296815fdc1582b31297
SHA512b7f7ab9fada5915189862df412f319de2f1958606d40c24bb31060352d07f94c4300c849aa9e61efb3a0e30a458c17afad573a145a326ee56c02c5e19fb19393
-
Filesize
750KB
MD5a71d1485c6def63e3a12a56cef3df216
SHA16356ae641fe06783171f255072b3f06c3e53fe5a
SHA256f71aeabbf5f3f4fa0a150bad2b24cd2db183e723cecd2296815fdc1582b31297
SHA512b7f7ab9fada5915189862df412f319de2f1958606d40c24bb31060352d07f94c4300c849aa9e61efb3a0e30a458c17afad573a145a326ee56c02c5e19fb19393
-
Filesize
306KB
MD559758d08e26d80f2b560b43915a196e7
SHA1191e46484309a701c87f826cfeca3c5590f41c75
SHA2562b21dfe635c66e24e5cbba2203c09083e228789c3bed18a1dde42d38b19ee924
SHA512548c92ed1205a43648fa218af44b77811a149e4c82a48943a164e3464f035b2ef56a89aa1270311a7410aaf8c98e1b7383290a796a53dc3da450edd6f77f618d
-
Filesize
306KB
MD559758d08e26d80f2b560b43915a196e7
SHA1191e46484309a701c87f826cfeca3c5590f41c75
SHA2562b21dfe635c66e24e5cbba2203c09083e228789c3bed18a1dde42d38b19ee924
SHA512548c92ed1205a43648fa218af44b77811a149e4c82a48943a164e3464f035b2ef56a89aa1270311a7410aaf8c98e1b7383290a796a53dc3da450edd6f77f618d
-
Filesize
145KB
MD5fc89ffae6d5ecc9374ef6b75d0d09edb
SHA18440ad5c070d5bb75d10308525777a70d42d18fc
SHA2565d2c14e89b6b1b95fead94182a17aebfeaca900df36f4eb7cb87cd52829196da
SHA512558f2e2b7ed661b8f486c980483d04148f09e1c692469d978e6efc98425f5cd32393351684f90cc3ba6611193a4ac58724e31310f358055e75dca30ced3d8752
-
Filesize
145KB
MD5fc89ffae6d5ecc9374ef6b75d0d09edb
SHA18440ad5c070d5bb75d10308525777a70d42d18fc
SHA2565d2c14e89b6b1b95fead94182a17aebfeaca900df36f4eb7cb87cd52829196da
SHA512558f2e2b7ed661b8f486c980483d04148f09e1c692469d978e6efc98425f5cd32393351684f90cc3ba6611193a4ac58724e31310f358055e75dca30ced3d8752