Analysis
-
max time kernel
142s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2023, 20:43
Static task
static1
Behavioral task
behavioral1
Sample
532f0bd98bfb3b495280a2296274b7f34791f73ee973205373309ae690490fa5.exe
Resource
win10v2004-20230703-en
General
-
Target
532f0bd98bfb3b495280a2296274b7f34791f73ee973205373309ae690490fa5.exe
-
Size
714KB
-
MD5
be3b966665a999e5a9a222e45bae6e2d
-
SHA1
d0dc05c8489dee4f4d35abc1b24646840307cca1
-
SHA256
532f0bd98bfb3b495280a2296274b7f34791f73ee973205373309ae690490fa5
-
SHA512
ee6f80ed8a86dfb04298a0c06de48786e3ef0534577024f9777a0e251f56b4611d1ad9a079c42310b477521d49bed89d0c8bcc59eb1c30a553499710626c4f9d
-
SSDEEP
12288:2Mr0y90DnX+jkJPOCBveWbSo3ZUGNHQ58kAz6K661gIdd1Tqyi+Pvm0Q5t5lm:SyPj2BLQZrK6JI3w4200tm
Malware Config
Extracted
redline
dugin
77.91.124.73:19071
-
auth_value
7c3e46e091100fd26a6076996d374c28
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 3912 z2688426.exe 3840 z3149867.exe 4492 z8132656.exe 4880 r2718238.exe 220 s9642775.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 532f0bd98bfb3b495280a2296274b7f34791f73ee973205373309ae690490fa5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z2688426.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z3149867.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z8132656.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 540 wrote to memory of 3912 540 532f0bd98bfb3b495280a2296274b7f34791f73ee973205373309ae690490fa5.exe 81 PID 540 wrote to memory of 3912 540 532f0bd98bfb3b495280a2296274b7f34791f73ee973205373309ae690490fa5.exe 81 PID 540 wrote to memory of 3912 540 532f0bd98bfb3b495280a2296274b7f34791f73ee973205373309ae690490fa5.exe 81 PID 3912 wrote to memory of 3840 3912 z2688426.exe 82 PID 3912 wrote to memory of 3840 3912 z2688426.exe 82 PID 3912 wrote to memory of 3840 3912 z2688426.exe 82 PID 3840 wrote to memory of 4492 3840 z3149867.exe 83 PID 3840 wrote to memory of 4492 3840 z3149867.exe 83 PID 3840 wrote to memory of 4492 3840 z3149867.exe 83 PID 4492 wrote to memory of 4880 4492 z8132656.exe 84 PID 4492 wrote to memory of 4880 4492 z8132656.exe 84 PID 4492 wrote to memory of 4880 4492 z8132656.exe 84 PID 4492 wrote to memory of 220 4492 z8132656.exe 85 PID 4492 wrote to memory of 220 4492 z8132656.exe 85 PID 4492 wrote to memory of 220 4492 z8132656.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\532f0bd98bfb3b495280a2296274b7f34791f73ee973205373309ae690490fa5.exe"C:\Users\Admin\AppData\Local\Temp\532f0bd98bfb3b495280a2296274b7f34791f73ee973205373309ae690490fa5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2688426.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2688426.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3149867.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3149867.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8132656.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8132656.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r2718238.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r2718238.exe5⤵
- Executes dropped EXE
PID:4880
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s9642775.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s9642775.exe5⤵
- Executes dropped EXE
PID:220
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
598KB
MD576b039951290f0b5ace107b0e3e7b9e2
SHA1278ec09551e0636df7dd3a9bcb5030d212acbd26
SHA256fe7fba6fd20a38ceced411e0738ffd10daab7e47fb42a504bfcf47258346918c
SHA512e5c0b8e1ad6b7e74aff42408cfe033d076316db63b9515772cba53473b0132e315dabead00f0ba708e37f1d489f803bc884826507c379f907f06e85921f88d22
-
Filesize
598KB
MD576b039951290f0b5ace107b0e3e7b9e2
SHA1278ec09551e0636df7dd3a9bcb5030d212acbd26
SHA256fe7fba6fd20a38ceced411e0738ffd10daab7e47fb42a504bfcf47258346918c
SHA512e5c0b8e1ad6b7e74aff42408cfe033d076316db63b9515772cba53473b0132e315dabead00f0ba708e37f1d489f803bc884826507c379f907f06e85921f88d22
-
Filesize
372KB
MD525e64c198343b31994813a41cb79bd56
SHA1d0314ff4d5f0a715338c67bdfc9a058d78bddcee
SHA2567712b6bedda184f4ac1458db0bfe7cf13664eda8dc7317e95c7b8c0cb4dfc20e
SHA512e462758968b0a1b435a0c564a75559a59b782f9bf0752b944ca6892e351cc10621244882c784c2e9bc6f3daddead63bab7817561b4e03149397c40178cbadf95
-
Filesize
372KB
MD525e64c198343b31994813a41cb79bd56
SHA1d0314ff4d5f0a715338c67bdfc9a058d78bddcee
SHA2567712b6bedda184f4ac1458db0bfe7cf13664eda8dc7317e95c7b8c0cb4dfc20e
SHA512e462758968b0a1b435a0c564a75559a59b782f9bf0752b944ca6892e351cc10621244882c784c2e9bc6f3daddead63bab7817561b4e03149397c40178cbadf95
-
Filesize
271KB
MD5d5b72c3843df86dea4332d8eaa833c45
SHA1425bb6606fe48c51312602c58e8bdf712b326124
SHA25639cf9a7ccf1d62c81e7546157bc2715e36ccf9c3d9bd7d537a134a4cf9cbf74d
SHA512476e37179173adf1170a10e2f3be00491c18e20c72f1aa395cd03f93fee16b16d385ce9140b04ff80aad56e2032cc4edd569d22b31f99d7327a3f1360cd173b4
-
Filesize
271KB
MD5d5b72c3843df86dea4332d8eaa833c45
SHA1425bb6606fe48c51312602c58e8bdf712b326124
SHA25639cf9a7ccf1d62c81e7546157bc2715e36ccf9c3d9bd7d537a134a4cf9cbf74d
SHA512476e37179173adf1170a10e2f3be00491c18e20c72f1aa395cd03f93fee16b16d385ce9140b04ff80aad56e2032cc4edd569d22b31f99d7327a3f1360cd173b4
-
Filesize
140KB
MD577a93a6afb1d7fa81c674cbecbee8531
SHA1fbd5275cea45278e48c3306c5e069619cdf038b3
SHA2560fcb9c3965ee7f2c36d232a624e0769542916f207ab4118a1e6d56fabffb3675
SHA512dc09b69e4ba62ccbb61310d39d185ad06e3e74759cfeb193a0d626ee36f35f27dd51f22425985884dd88143c5c24cbbb1da74e105c0adcc33a3a53e9b898d40e
-
Filesize
140KB
MD577a93a6afb1d7fa81c674cbecbee8531
SHA1fbd5275cea45278e48c3306c5e069619cdf038b3
SHA2560fcb9c3965ee7f2c36d232a624e0769542916f207ab4118a1e6d56fabffb3675
SHA512dc09b69e4ba62ccbb61310d39d185ad06e3e74759cfeb193a0d626ee36f35f27dd51f22425985884dd88143c5c24cbbb1da74e105c0adcc33a3a53e9b898d40e
-
Filesize
173KB
MD5d5f3785f09b0b4ddb516cb1bba85a36d
SHA1978b0c33233c9ab63a596cbb282473f1e99b07d4
SHA25664b6558c24af070e047262ad247dc64b968f8d919a5c9bb2b5c279931ef38db0
SHA51240f87989963ef21438f1378eb4b8f4d736bf7de67d2a12670faa6f94ab221dfb475eed8cec99208539e0a06e61ef987f8a7a5cb759442fc79583200b393611fb
-
Filesize
173KB
MD5d5f3785f09b0b4ddb516cb1bba85a36d
SHA1978b0c33233c9ab63a596cbb282473f1e99b07d4
SHA25664b6558c24af070e047262ad247dc64b968f8d919a5c9bb2b5c279931ef38db0
SHA51240f87989963ef21438f1378eb4b8f4d736bf7de67d2a12670faa6f94ab221dfb475eed8cec99208539e0a06e61ef987f8a7a5cb759442fc79583200b393611fb