Analysis
-
max time kernel
140s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
16/07/2023, 07:14
Static task
static1
Behavioral task
behavioral1
Sample
0c2914c3acfb44bba4cfd496be1fc45ebdb0dc198825a2ad8c71286419ae28d6.exe
Resource
win10v2004-20230703-en
General
-
Target
0c2914c3acfb44bba4cfd496be1fc45ebdb0dc198825a2ad8c71286419ae28d6.exe
-
Size
771KB
-
MD5
6c30bb3dec0e82a861ebcf1c5fed4975
-
SHA1
976c2e28b88c3d2ae9b64dc24705bc765a79cc25
-
SHA256
0c2914c3acfb44bba4cfd496be1fc45ebdb0dc198825a2ad8c71286419ae28d6
-
SHA512
cbb8c9263ed3de3b00440a2b48823c478646884734d126a3c811a3c55b2c44f3b2d343e460e8e9a96c6e93836f083266e2eacef6bad23700756d9e2a5d567c37
-
SSDEEP
12288:zMrwy90bv/isnRFvl9yOE40xmOLbErHJBUlW8Ajy7ZF5/ulW1YuDadz:TyhsRxl9y04xbsHJBUdAW1rNGz
Malware Config
Extracted
redline
lamp
77.91.68.56:19071
-
auth_value
ee1df63bcdbe3de70f52810d94eaff7d
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2436 x1562783.exe 960 x0012399.exe 2312 g1939442.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x1562783.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x0012399.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x0012399.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0c2914c3acfb44bba4cfd496be1fc45ebdb0dc198825a2ad8c71286419ae28d6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0c2914c3acfb44bba4cfd496be1fc45ebdb0dc198825a2ad8c71286419ae28d6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x1562783.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2436 2044 0c2914c3acfb44bba4cfd496be1fc45ebdb0dc198825a2ad8c71286419ae28d6.exe 86 PID 2044 wrote to memory of 2436 2044 0c2914c3acfb44bba4cfd496be1fc45ebdb0dc198825a2ad8c71286419ae28d6.exe 86 PID 2044 wrote to memory of 2436 2044 0c2914c3acfb44bba4cfd496be1fc45ebdb0dc198825a2ad8c71286419ae28d6.exe 86 PID 2436 wrote to memory of 960 2436 x1562783.exe 87 PID 2436 wrote to memory of 960 2436 x1562783.exe 87 PID 2436 wrote to memory of 960 2436 x1562783.exe 87 PID 960 wrote to memory of 2312 960 x0012399.exe 88 PID 960 wrote to memory of 2312 960 x0012399.exe 88 PID 960 wrote to memory of 2312 960 x0012399.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c2914c3acfb44bba4cfd496be1fc45ebdb0dc198825a2ad8c71286419ae28d6.exe"C:\Users\Admin\AppData\Local\Temp\0c2914c3acfb44bba4cfd496be1fc45ebdb0dc198825a2ad8c71286419ae28d6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1562783.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1562783.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0012399.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0012399.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g1939442.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g1939442.exe4⤵
- Executes dropped EXE
PID:2312
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
615KB
MD5cf15523cd2a73c4c4248a38e7eea0d22
SHA1b1b24047e4d8e060bf808c9d4e9b25b4565663e9
SHA2564a9c321032371a33f501e2de202e776c0303bf144c54eba9ff1e4a196df30fe0
SHA51244466849cb4abfd6d401c176629236994f3699a77cbe264cf70b274782cfc08e0c6e6f8682594590e46a970c2dd203ba521a50613f971540c4545264d75ab67c
-
Filesize
615KB
MD5cf15523cd2a73c4c4248a38e7eea0d22
SHA1b1b24047e4d8e060bf808c9d4e9b25b4565663e9
SHA2564a9c321032371a33f501e2de202e776c0303bf144c54eba9ff1e4a196df30fe0
SHA51244466849cb4abfd6d401c176629236994f3699a77cbe264cf70b274782cfc08e0c6e6f8682594590e46a970c2dd203ba521a50613f971540c4545264d75ab67c
-
Filesize
514KB
MD595fe311ccbb6ce747ae9970ebe084302
SHA1dd5f8ea126dc0226f22ec2a1cefc594934ae1251
SHA2566f1b69a4981f0b44c12e6d5b20d2d058c122a18136bae097852b4f98ae789193
SHA5128152f82ac7de4cd90eb055247662a47e5cec8ea2592ebd6053f708f673fa2c956bb2f5d366cf382a18272bcc2d95b2973aa4ce491ae84f3953dce8642d7aa1bf
-
Filesize
514KB
MD595fe311ccbb6ce747ae9970ebe084302
SHA1dd5f8ea126dc0226f22ec2a1cefc594934ae1251
SHA2566f1b69a4981f0b44c12e6d5b20d2d058c122a18136bae097852b4f98ae789193
SHA5128152f82ac7de4cd90eb055247662a47e5cec8ea2592ebd6053f708f673fa2c956bb2f5d366cf382a18272bcc2d95b2973aa4ce491ae84f3953dce8642d7aa1bf
-
Filesize
492KB
MD5e52911bc1933eb3cac93d97fd9cd9634
SHA1ddd957a746281b351e4b4172762730ada4b3e5d2
SHA256eec7e6ff5212af652abd5afd062000557f211d334bd7f184617dd65cab4982ac
SHA512f643fdf1d5b60ddd79b948d25639966a7b5c3e97779021f7979db10628f2935bcdfadcbe6b5927a13552ca4ac49ff6c710c6785bbad65c3672b5e7df162e8187
-
Filesize
492KB
MD5e52911bc1933eb3cac93d97fd9cd9634
SHA1ddd957a746281b351e4b4172762730ada4b3e5d2
SHA256eec7e6ff5212af652abd5afd062000557f211d334bd7f184617dd65cab4982ac
SHA512f643fdf1d5b60ddd79b948d25639966a7b5c3e97779021f7979db10628f2935bcdfadcbe6b5927a13552ca4ac49ff6c710c6785bbad65c3672b5e7df162e8187