Analysis
-
max time kernel
142s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2023 04:09
Static task
static1
Behavioral task
behavioral1
Sample
7d0baead8a10ebcf04a21f3b25c0baaa593f3ebd3eae14fbe42277dd7b157f4b.exe
Resource
win10v2004-20230703-en
General
-
Target
7d0baead8a10ebcf04a21f3b25c0baaa593f3ebd3eae14fbe42277dd7b157f4b.exe
-
Size
956KB
-
MD5
6faf4c7caaf08d52f80818c863945711
-
SHA1
488fdeed0b6840cc4ef7b9090b0cfe801a3e1432
-
SHA256
7d0baead8a10ebcf04a21f3b25c0baaa593f3ebd3eae14fbe42277dd7b157f4b
-
SHA512
cdc357dc067c6946686430a37f39d8ac456b6f6a138df6fac393ca4b4f67d461bedac0d239647e6d51b450fdd7eaa35b8bc362a3545fdeae97107a0de1b77f98
-
SSDEEP
24576:KypyzTXzf4vX95Y3asQiBjKObSpKDermPo3:RCTLD37QiBj72cSgo
Malware Config
Extracted
redline
dugin
77.91.124.73:19071
-
auth_value
7c3e46e091100fd26a6076996d374c28
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 3284 v3479285.exe 3080 v0546535.exe 1200 v1019440.exe 3216 v1787052.exe 3800 a1675763.exe 3428 b3377622.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7d0baead8a10ebcf04a21f3b25c0baaa593f3ebd3eae14fbe42277dd7b157f4b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v3479285.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v0546535.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v1019440.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v1787052.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3984 wrote to memory of 3284 3984 7d0baead8a10ebcf04a21f3b25c0baaa593f3ebd3eae14fbe42277dd7b157f4b.exe 83 PID 3984 wrote to memory of 3284 3984 7d0baead8a10ebcf04a21f3b25c0baaa593f3ebd3eae14fbe42277dd7b157f4b.exe 83 PID 3984 wrote to memory of 3284 3984 7d0baead8a10ebcf04a21f3b25c0baaa593f3ebd3eae14fbe42277dd7b157f4b.exe 83 PID 3284 wrote to memory of 3080 3284 v3479285.exe 84 PID 3284 wrote to memory of 3080 3284 v3479285.exe 84 PID 3284 wrote to memory of 3080 3284 v3479285.exe 84 PID 3080 wrote to memory of 1200 3080 v0546535.exe 85 PID 3080 wrote to memory of 1200 3080 v0546535.exe 85 PID 3080 wrote to memory of 1200 3080 v0546535.exe 85 PID 1200 wrote to memory of 3216 1200 v1019440.exe 86 PID 1200 wrote to memory of 3216 1200 v1019440.exe 86 PID 1200 wrote to memory of 3216 1200 v1019440.exe 86 PID 3216 wrote to memory of 3800 3216 v1787052.exe 87 PID 3216 wrote to memory of 3800 3216 v1787052.exe 87 PID 3216 wrote to memory of 3800 3216 v1787052.exe 87 PID 3216 wrote to memory of 3428 3216 v1787052.exe 88 PID 3216 wrote to memory of 3428 3216 v1787052.exe 88 PID 3216 wrote to memory of 3428 3216 v1787052.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d0baead8a10ebcf04a21f3b25c0baaa593f3ebd3eae14fbe42277dd7b157f4b.exe"C:\Users\Admin\AppData\Local\Temp\7d0baead8a10ebcf04a21f3b25c0baaa593f3ebd3eae14fbe42277dd7b157f4b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3479285.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3479285.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0546535.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0546535.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1019440.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1019440.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1787052.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1787052.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a1675763.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a1675763.exe6⤵
- Executes dropped EXE
PID:3800
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3377622.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3377622.exe6⤵
- Executes dropped EXE
PID:3428
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722KB
MD526e86bd4564ceff8caafb9d2f164a579
SHA123ee18b66c46433d7402202959a5ca24b87b2f78
SHA2567dd64336eed3f435d321b84b0167faf5c2f1e8582843f3a9b63ad8e6fcbef4d8
SHA512824b721a4e33c27f736410982004ad62a6602f581cb1f268c1849b9189abfd078f5f56bccb0731aa8322b157f0ab749312f46cd5adc6f30686150cc56d30da44
-
Filesize
722KB
MD526e86bd4564ceff8caafb9d2f164a579
SHA123ee18b66c46433d7402202959a5ca24b87b2f78
SHA2567dd64336eed3f435d321b84b0167faf5c2f1e8582843f3a9b63ad8e6fcbef4d8
SHA512824b721a4e33c27f736410982004ad62a6602f581cb1f268c1849b9189abfd078f5f56bccb0731aa8322b157f0ab749312f46cd5adc6f30686150cc56d30da44
-
Filesize
598KB
MD56797ba6bb183ae1d8c6eb0d6d437c2f7
SHA123f066c9cec8ed89b47d8bf75c39c5fec0c551a4
SHA256d738237b1b864f4421cc0184734cfa3bbe6fee3b2f832696284d61a42b8c560c
SHA512fb7c33be7d3fea1e0f6dc199c2c2ea230584b581aea12ddd7f91869ee2baa5b0d74f7544e1e0c4d601f064b6eac391c2f69a8a95ba142b9ff461d89edeb93c4d
-
Filesize
598KB
MD56797ba6bb183ae1d8c6eb0d6d437c2f7
SHA123f066c9cec8ed89b47d8bf75c39c5fec0c551a4
SHA256d738237b1b864f4421cc0184734cfa3bbe6fee3b2f832696284d61a42b8c560c
SHA512fb7c33be7d3fea1e0f6dc199c2c2ea230584b581aea12ddd7f91869ee2baa5b0d74f7544e1e0c4d601f064b6eac391c2f69a8a95ba142b9ff461d89edeb93c4d
-
Filesize
372KB
MD539de27ad39847d967686633a506f2f1a
SHA16bc221e8e99a1f336a9fe5f8e7eaa84eccb01ea6
SHA256fb3f3a33c69469e5f1ca6d2a5cbd3068d2b67b08ac3995007cc0bd710ca196b2
SHA512c9543c5f223b9eaf020626e60cf6396e569d27d0d50dd9c5ced7a7ab13e4bb909603b79da07c970c79b1c6d95a69a4c7989d7fc932107b1f45282a86335146b8
-
Filesize
372KB
MD539de27ad39847d967686633a506f2f1a
SHA16bc221e8e99a1f336a9fe5f8e7eaa84eccb01ea6
SHA256fb3f3a33c69469e5f1ca6d2a5cbd3068d2b67b08ac3995007cc0bd710ca196b2
SHA512c9543c5f223b9eaf020626e60cf6396e569d27d0d50dd9c5ced7a7ab13e4bb909603b79da07c970c79b1c6d95a69a4c7989d7fc932107b1f45282a86335146b8
-
Filesize
271KB
MD52eacbecf6d1b17ce99a52a94661b6476
SHA1e7001cb599706bd46d0f5a16bccbb018d6dc85af
SHA2564283e285e59272b555ec2f2611740a09f5f7f945161cd2af319a1d2702ca2e95
SHA5128d3ad0ab37f2b7e805d23b466742491e021e7c3960f9cf56b54917ce9391c5487ef1bd2fd94d5df63ff9721faedaa4671f1aa235b497030a817620f8708554b6
-
Filesize
271KB
MD52eacbecf6d1b17ce99a52a94661b6476
SHA1e7001cb599706bd46d0f5a16bccbb018d6dc85af
SHA2564283e285e59272b555ec2f2611740a09f5f7f945161cd2af319a1d2702ca2e95
SHA5128d3ad0ab37f2b7e805d23b466742491e021e7c3960f9cf56b54917ce9391c5487ef1bd2fd94d5df63ff9721faedaa4671f1aa235b497030a817620f8708554b6
-
Filesize
140KB
MD577a93a6afb1d7fa81c674cbecbee8531
SHA1fbd5275cea45278e48c3306c5e069619cdf038b3
SHA2560fcb9c3965ee7f2c36d232a624e0769542916f207ab4118a1e6d56fabffb3675
SHA512dc09b69e4ba62ccbb61310d39d185ad06e3e74759cfeb193a0d626ee36f35f27dd51f22425985884dd88143c5c24cbbb1da74e105c0adcc33a3a53e9b898d40e
-
Filesize
140KB
MD577a93a6afb1d7fa81c674cbecbee8531
SHA1fbd5275cea45278e48c3306c5e069619cdf038b3
SHA2560fcb9c3965ee7f2c36d232a624e0769542916f207ab4118a1e6d56fabffb3675
SHA512dc09b69e4ba62ccbb61310d39d185ad06e3e74759cfeb193a0d626ee36f35f27dd51f22425985884dd88143c5c24cbbb1da74e105c0adcc33a3a53e9b898d40e
-
Filesize
173KB
MD5d5f3785f09b0b4ddb516cb1bba85a36d
SHA1978b0c33233c9ab63a596cbb282473f1e99b07d4
SHA25664b6558c24af070e047262ad247dc64b968f8d919a5c9bb2b5c279931ef38db0
SHA51240f87989963ef21438f1378eb4b8f4d736bf7de67d2a12670faa6f94ab221dfb475eed8cec99208539e0a06e61ef987f8a7a5cb759442fc79583200b393611fb
-
Filesize
173KB
MD5d5f3785f09b0b4ddb516cb1bba85a36d
SHA1978b0c33233c9ab63a596cbb282473f1e99b07d4
SHA25664b6558c24af070e047262ad247dc64b968f8d919a5c9bb2b5c279931ef38db0
SHA51240f87989963ef21438f1378eb4b8f4d736bf7de67d2a12670faa6f94ab221dfb475eed8cec99208539e0a06e61ef987f8a7a5cb759442fc79583200b393611fb