Analysis
-
max time kernel
137s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
19/08/2023, 05:18
Static task
static1
Behavioral task
behavioral1
Sample
b634c051b3b9ecaaad577370b1cdaf93.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
b634c051b3b9ecaaad577370b1cdaf93.exe
Resource
win10v2004-20230703-en
General
-
Target
b634c051b3b9ecaaad577370b1cdaf93.exe
-
Size
956KB
-
MD5
b634c051b3b9ecaaad577370b1cdaf93
-
SHA1
e723ecc59dc9fd480cc107018a723a0b8f7bd770
-
SHA256
6d62e33f50b6b4e4d8ca4b549a5a71075e907ebed10bef5849b5c3427e331c7a
-
SHA512
3975706a7149ac042b04d7318e41e4960539f1b9d17778974912b6c244fead85cbf58fbba1aae989873e35f4b36ab7a15778e0e5b78bf3867d9143bcc1cbbe93
-
SSDEEP
12288:UMrpy90dytiPYTBX9uZ54cQiCgc8lvNHzvj0FTC7Ht1nFySIftSPRBZh4fxnbA9c:Fy0wTBXco6xZ6FTgt1ISI6tE42ai1
Malware Config
Extracted
redline
dugin
77.91.124.73:19071
-
auth_value
7c3e46e091100fd26a6076996d374c28
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 2064 v1569448.exe 2216 v1192274.exe 2976 v0792882.exe 2184 v0398685.exe 2320 a1019067.exe 2968 b9007000.exe -
Loads dropped DLL 12 IoCs
pid Process 2108 b634c051b3b9ecaaad577370b1cdaf93.exe 2064 v1569448.exe 2064 v1569448.exe 2216 v1192274.exe 2216 v1192274.exe 2976 v0792882.exe 2976 v0792882.exe 2184 v0398685.exe 2184 v0398685.exe 2320 a1019067.exe 2184 v0398685.exe 2968 b9007000.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b634c051b3b9ecaaad577370b1cdaf93.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v1569448.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v1192274.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v0792882.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v0398685.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2064 2108 b634c051b3b9ecaaad577370b1cdaf93.exe 28 PID 2108 wrote to memory of 2064 2108 b634c051b3b9ecaaad577370b1cdaf93.exe 28 PID 2108 wrote to memory of 2064 2108 b634c051b3b9ecaaad577370b1cdaf93.exe 28 PID 2108 wrote to memory of 2064 2108 b634c051b3b9ecaaad577370b1cdaf93.exe 28 PID 2108 wrote to memory of 2064 2108 b634c051b3b9ecaaad577370b1cdaf93.exe 28 PID 2108 wrote to memory of 2064 2108 b634c051b3b9ecaaad577370b1cdaf93.exe 28 PID 2108 wrote to memory of 2064 2108 b634c051b3b9ecaaad577370b1cdaf93.exe 28 PID 2064 wrote to memory of 2216 2064 v1569448.exe 29 PID 2064 wrote to memory of 2216 2064 v1569448.exe 29 PID 2064 wrote to memory of 2216 2064 v1569448.exe 29 PID 2064 wrote to memory of 2216 2064 v1569448.exe 29 PID 2064 wrote to memory of 2216 2064 v1569448.exe 29 PID 2064 wrote to memory of 2216 2064 v1569448.exe 29 PID 2064 wrote to memory of 2216 2064 v1569448.exe 29 PID 2216 wrote to memory of 2976 2216 v1192274.exe 30 PID 2216 wrote to memory of 2976 2216 v1192274.exe 30 PID 2216 wrote to memory of 2976 2216 v1192274.exe 30 PID 2216 wrote to memory of 2976 2216 v1192274.exe 30 PID 2216 wrote to memory of 2976 2216 v1192274.exe 30 PID 2216 wrote to memory of 2976 2216 v1192274.exe 30 PID 2216 wrote to memory of 2976 2216 v1192274.exe 30 PID 2976 wrote to memory of 2184 2976 v0792882.exe 31 PID 2976 wrote to memory of 2184 2976 v0792882.exe 31 PID 2976 wrote to memory of 2184 2976 v0792882.exe 31 PID 2976 wrote to memory of 2184 2976 v0792882.exe 31 PID 2976 wrote to memory of 2184 2976 v0792882.exe 31 PID 2976 wrote to memory of 2184 2976 v0792882.exe 31 PID 2976 wrote to memory of 2184 2976 v0792882.exe 31 PID 2184 wrote to memory of 2320 2184 v0398685.exe 32 PID 2184 wrote to memory of 2320 2184 v0398685.exe 32 PID 2184 wrote to memory of 2320 2184 v0398685.exe 32 PID 2184 wrote to memory of 2320 2184 v0398685.exe 32 PID 2184 wrote to memory of 2320 2184 v0398685.exe 32 PID 2184 wrote to memory of 2320 2184 v0398685.exe 32 PID 2184 wrote to memory of 2320 2184 v0398685.exe 32 PID 2184 wrote to memory of 2968 2184 v0398685.exe 34 PID 2184 wrote to memory of 2968 2184 v0398685.exe 34 PID 2184 wrote to memory of 2968 2184 v0398685.exe 34 PID 2184 wrote to memory of 2968 2184 v0398685.exe 34 PID 2184 wrote to memory of 2968 2184 v0398685.exe 34 PID 2184 wrote to memory of 2968 2184 v0398685.exe 34 PID 2184 wrote to memory of 2968 2184 v0398685.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\b634c051b3b9ecaaad577370b1cdaf93.exe"C:\Users\Admin\AppData\Local\Temp\b634c051b3b9ecaaad577370b1cdaf93.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1569448.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1569448.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1192274.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1192274.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0792882.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0792882.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0398685.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0398685.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a1019067.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a1019067.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2320
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9007000.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9007000.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2968
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
723KB
MD5c0ebbcb2fd528e0e095fc7e86bcff68d
SHA1835948d4715e64ab760edcb5bba78243286edfa3
SHA2567294bbe6b8d4a04a5394d7d12169dfc19b406a0960be0dfddb11307bdcc6f204
SHA5122a36ad4b165eeb355b980670c15b685259e64ba477de3802484847c87926fabac4451e320b04fc027e3c00401aaceabe418445d4b96d10141ba0172a76128b1f
-
Filesize
723KB
MD5c0ebbcb2fd528e0e095fc7e86bcff68d
SHA1835948d4715e64ab760edcb5bba78243286edfa3
SHA2567294bbe6b8d4a04a5394d7d12169dfc19b406a0960be0dfddb11307bdcc6f204
SHA5122a36ad4b165eeb355b980670c15b685259e64ba477de3802484847c87926fabac4451e320b04fc027e3c00401aaceabe418445d4b96d10141ba0172a76128b1f
-
Filesize
598KB
MD534c3799271f592523c6d68f08da5f4c7
SHA141957d6027ed4cdc9b63c0d50d96bfbd6d77fa6d
SHA25646ad02fca5f6bece859dc0fff93a7542bc22921145950bb8966779a099e0e0c1
SHA512d7dc3ba86573a3fbd8387ffd9dc48b60846fb538b84adf14e1e8c0c87f238017227edeed17df02e7b548086400e6d3ab9a023bf2345fd60d8812e080fd3c0564
-
Filesize
598KB
MD534c3799271f592523c6d68f08da5f4c7
SHA141957d6027ed4cdc9b63c0d50d96bfbd6d77fa6d
SHA25646ad02fca5f6bece859dc0fff93a7542bc22921145950bb8966779a099e0e0c1
SHA512d7dc3ba86573a3fbd8387ffd9dc48b60846fb538b84adf14e1e8c0c87f238017227edeed17df02e7b548086400e6d3ab9a023bf2345fd60d8812e080fd3c0564
-
Filesize
372KB
MD51f894e3227953c58ded70a5436d7b710
SHA19d62979db62d42aaf73dc88548d638703b8ca903
SHA25628a190dbec14ea187fcafc61bdc34e3de204835199cd23c43578c2d1db2160b7
SHA512d65f47ab90f7416bd956135b087d2460c63c16d3bf2d65193a4d13145fa8a2847b030a57ec509f50448e03221108f19a3a27255595e0c1965057e8fd778bc7e9
-
Filesize
372KB
MD51f894e3227953c58ded70a5436d7b710
SHA19d62979db62d42aaf73dc88548d638703b8ca903
SHA25628a190dbec14ea187fcafc61bdc34e3de204835199cd23c43578c2d1db2160b7
SHA512d65f47ab90f7416bd956135b087d2460c63c16d3bf2d65193a4d13145fa8a2847b030a57ec509f50448e03221108f19a3a27255595e0c1965057e8fd778bc7e9
-
Filesize
271KB
MD5a9388dc912e3b6bb642356f1992ffb19
SHA149efbf8d162b62130f0e093979bcee3b774f2057
SHA2565d7b7580a3d853dba6c82d1793c89d1ef6a8361eb05c5b7fdcd62fb2d8476739
SHA51295075fbb7aa1e4b75e84548e2b4aa1c96cd0601a437624b061a8a09337bd4145a906c5aa77481d16f49dcafd7ec4d2f8faf986802a4363a27638047bd4f99a1d
-
Filesize
271KB
MD5a9388dc912e3b6bb642356f1992ffb19
SHA149efbf8d162b62130f0e093979bcee3b774f2057
SHA2565d7b7580a3d853dba6c82d1793c89d1ef6a8361eb05c5b7fdcd62fb2d8476739
SHA51295075fbb7aa1e4b75e84548e2b4aa1c96cd0601a437624b061a8a09337bd4145a906c5aa77481d16f49dcafd7ec4d2f8faf986802a4363a27638047bd4f99a1d
-
Filesize
140KB
MD577a93a6afb1d7fa81c674cbecbee8531
SHA1fbd5275cea45278e48c3306c5e069619cdf038b3
SHA2560fcb9c3965ee7f2c36d232a624e0769542916f207ab4118a1e6d56fabffb3675
SHA512dc09b69e4ba62ccbb61310d39d185ad06e3e74759cfeb193a0d626ee36f35f27dd51f22425985884dd88143c5c24cbbb1da74e105c0adcc33a3a53e9b898d40e
-
Filesize
140KB
MD577a93a6afb1d7fa81c674cbecbee8531
SHA1fbd5275cea45278e48c3306c5e069619cdf038b3
SHA2560fcb9c3965ee7f2c36d232a624e0769542916f207ab4118a1e6d56fabffb3675
SHA512dc09b69e4ba62ccbb61310d39d185ad06e3e74759cfeb193a0d626ee36f35f27dd51f22425985884dd88143c5c24cbbb1da74e105c0adcc33a3a53e9b898d40e
-
Filesize
173KB
MD5d5f3785f09b0b4ddb516cb1bba85a36d
SHA1978b0c33233c9ab63a596cbb282473f1e99b07d4
SHA25664b6558c24af070e047262ad247dc64b968f8d919a5c9bb2b5c279931ef38db0
SHA51240f87989963ef21438f1378eb4b8f4d736bf7de67d2a12670faa6f94ab221dfb475eed8cec99208539e0a06e61ef987f8a7a5cb759442fc79583200b393611fb
-
Filesize
173KB
MD5d5f3785f09b0b4ddb516cb1bba85a36d
SHA1978b0c33233c9ab63a596cbb282473f1e99b07d4
SHA25664b6558c24af070e047262ad247dc64b968f8d919a5c9bb2b5c279931ef38db0
SHA51240f87989963ef21438f1378eb4b8f4d736bf7de67d2a12670faa6f94ab221dfb475eed8cec99208539e0a06e61ef987f8a7a5cb759442fc79583200b393611fb
-
Filesize
723KB
MD5c0ebbcb2fd528e0e095fc7e86bcff68d
SHA1835948d4715e64ab760edcb5bba78243286edfa3
SHA2567294bbe6b8d4a04a5394d7d12169dfc19b406a0960be0dfddb11307bdcc6f204
SHA5122a36ad4b165eeb355b980670c15b685259e64ba477de3802484847c87926fabac4451e320b04fc027e3c00401aaceabe418445d4b96d10141ba0172a76128b1f
-
Filesize
723KB
MD5c0ebbcb2fd528e0e095fc7e86bcff68d
SHA1835948d4715e64ab760edcb5bba78243286edfa3
SHA2567294bbe6b8d4a04a5394d7d12169dfc19b406a0960be0dfddb11307bdcc6f204
SHA5122a36ad4b165eeb355b980670c15b685259e64ba477de3802484847c87926fabac4451e320b04fc027e3c00401aaceabe418445d4b96d10141ba0172a76128b1f
-
Filesize
598KB
MD534c3799271f592523c6d68f08da5f4c7
SHA141957d6027ed4cdc9b63c0d50d96bfbd6d77fa6d
SHA25646ad02fca5f6bece859dc0fff93a7542bc22921145950bb8966779a099e0e0c1
SHA512d7dc3ba86573a3fbd8387ffd9dc48b60846fb538b84adf14e1e8c0c87f238017227edeed17df02e7b548086400e6d3ab9a023bf2345fd60d8812e080fd3c0564
-
Filesize
598KB
MD534c3799271f592523c6d68f08da5f4c7
SHA141957d6027ed4cdc9b63c0d50d96bfbd6d77fa6d
SHA25646ad02fca5f6bece859dc0fff93a7542bc22921145950bb8966779a099e0e0c1
SHA512d7dc3ba86573a3fbd8387ffd9dc48b60846fb538b84adf14e1e8c0c87f238017227edeed17df02e7b548086400e6d3ab9a023bf2345fd60d8812e080fd3c0564
-
Filesize
372KB
MD51f894e3227953c58ded70a5436d7b710
SHA19d62979db62d42aaf73dc88548d638703b8ca903
SHA25628a190dbec14ea187fcafc61bdc34e3de204835199cd23c43578c2d1db2160b7
SHA512d65f47ab90f7416bd956135b087d2460c63c16d3bf2d65193a4d13145fa8a2847b030a57ec509f50448e03221108f19a3a27255595e0c1965057e8fd778bc7e9
-
Filesize
372KB
MD51f894e3227953c58ded70a5436d7b710
SHA19d62979db62d42aaf73dc88548d638703b8ca903
SHA25628a190dbec14ea187fcafc61bdc34e3de204835199cd23c43578c2d1db2160b7
SHA512d65f47ab90f7416bd956135b087d2460c63c16d3bf2d65193a4d13145fa8a2847b030a57ec509f50448e03221108f19a3a27255595e0c1965057e8fd778bc7e9
-
Filesize
271KB
MD5a9388dc912e3b6bb642356f1992ffb19
SHA149efbf8d162b62130f0e093979bcee3b774f2057
SHA2565d7b7580a3d853dba6c82d1793c89d1ef6a8361eb05c5b7fdcd62fb2d8476739
SHA51295075fbb7aa1e4b75e84548e2b4aa1c96cd0601a437624b061a8a09337bd4145a906c5aa77481d16f49dcafd7ec4d2f8faf986802a4363a27638047bd4f99a1d
-
Filesize
271KB
MD5a9388dc912e3b6bb642356f1992ffb19
SHA149efbf8d162b62130f0e093979bcee3b774f2057
SHA2565d7b7580a3d853dba6c82d1793c89d1ef6a8361eb05c5b7fdcd62fb2d8476739
SHA51295075fbb7aa1e4b75e84548e2b4aa1c96cd0601a437624b061a8a09337bd4145a906c5aa77481d16f49dcafd7ec4d2f8faf986802a4363a27638047bd4f99a1d
-
Filesize
140KB
MD577a93a6afb1d7fa81c674cbecbee8531
SHA1fbd5275cea45278e48c3306c5e069619cdf038b3
SHA2560fcb9c3965ee7f2c36d232a624e0769542916f207ab4118a1e6d56fabffb3675
SHA512dc09b69e4ba62ccbb61310d39d185ad06e3e74759cfeb193a0d626ee36f35f27dd51f22425985884dd88143c5c24cbbb1da74e105c0adcc33a3a53e9b898d40e
-
Filesize
140KB
MD577a93a6afb1d7fa81c674cbecbee8531
SHA1fbd5275cea45278e48c3306c5e069619cdf038b3
SHA2560fcb9c3965ee7f2c36d232a624e0769542916f207ab4118a1e6d56fabffb3675
SHA512dc09b69e4ba62ccbb61310d39d185ad06e3e74759cfeb193a0d626ee36f35f27dd51f22425985884dd88143c5c24cbbb1da74e105c0adcc33a3a53e9b898d40e
-
Filesize
173KB
MD5d5f3785f09b0b4ddb516cb1bba85a36d
SHA1978b0c33233c9ab63a596cbb282473f1e99b07d4
SHA25664b6558c24af070e047262ad247dc64b968f8d919a5c9bb2b5c279931ef38db0
SHA51240f87989963ef21438f1378eb4b8f4d736bf7de67d2a12670faa6f94ab221dfb475eed8cec99208539e0a06e61ef987f8a7a5cb759442fc79583200b393611fb
-
Filesize
173KB
MD5d5f3785f09b0b4ddb516cb1bba85a36d
SHA1978b0c33233c9ab63a596cbb282473f1e99b07d4
SHA25664b6558c24af070e047262ad247dc64b968f8d919a5c9bb2b5c279931ef38db0
SHA51240f87989963ef21438f1378eb4b8f4d736bf7de67d2a12670faa6f94ab221dfb475eed8cec99208539e0a06e61ef987f8a7a5cb759442fc79583200b393611fb