Analysis
-
max time kernel
140s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2023, 06:39
Static task
static1
Behavioral task
behavioral1
Sample
a5be1fddb167e40e5bc924a6f2d52d6d.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
a5be1fddb167e40e5bc924a6f2d52d6d.exe
Resource
win10v2004-20230703-en
General
-
Target
a5be1fddb167e40e5bc924a6f2d52d6d.exe
-
Size
831KB
-
MD5
a5be1fddb167e40e5bc924a6f2d52d6d
-
SHA1
70f8bc3d2773766bad9bc03f4832c8d47e14cd9d
-
SHA256
39974f6796095f842c2a6f254aaa50447c9dea3c16ccb24c7fc86afe0b9d8df9
-
SHA512
ce93826704f460294850bd77f5bcc6c6876e156b97b92e373379f35cf7811124a0b0333eb632e2f724770a96e98dba054ed6fc2848ddb791143a8561052f5d04
-
SSDEEP
24576:ayBfCX9CDTsU/Y11JF9fnAmH+MEcy0/I:hB1DT9/YP9/ACQG
Malware Config
Extracted
redline
dugin
77.91.124.73:19071
-
auth_value
7c3e46e091100fd26a6076996d374c28
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 3668 z1220246.exe 3992 z3291237.exe 2804 z7713020.exe 2220 r6860294.exe 3272 s8181829.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z7713020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a5be1fddb167e40e5bc924a6f2d52d6d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z1220246.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z3291237.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4732 wrote to memory of 3668 4732 a5be1fddb167e40e5bc924a6f2d52d6d.exe 82 PID 4732 wrote to memory of 3668 4732 a5be1fddb167e40e5bc924a6f2d52d6d.exe 82 PID 4732 wrote to memory of 3668 4732 a5be1fddb167e40e5bc924a6f2d52d6d.exe 82 PID 3668 wrote to memory of 3992 3668 z1220246.exe 83 PID 3668 wrote to memory of 3992 3668 z1220246.exe 83 PID 3668 wrote to memory of 3992 3668 z1220246.exe 83 PID 3992 wrote to memory of 2804 3992 z3291237.exe 84 PID 3992 wrote to memory of 2804 3992 z3291237.exe 84 PID 3992 wrote to memory of 2804 3992 z3291237.exe 84 PID 2804 wrote to memory of 2220 2804 z7713020.exe 85 PID 2804 wrote to memory of 2220 2804 z7713020.exe 85 PID 2804 wrote to memory of 2220 2804 z7713020.exe 85 PID 2804 wrote to memory of 3272 2804 z7713020.exe 86 PID 2804 wrote to memory of 3272 2804 z7713020.exe 86 PID 2804 wrote to memory of 3272 2804 z7713020.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5be1fddb167e40e5bc924a6f2d52d6d.exe"C:\Users\Admin\AppData\Local\Temp\a5be1fddb167e40e5bc924a6f2d52d6d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1220246.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1220246.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3291237.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3291237.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7713020.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7713020.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r6860294.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r6860294.exe5⤵
- Executes dropped EXE
PID:2220
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s8181829.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s8181829.exe5⤵
- Executes dropped EXE
PID:3272
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
598KB
MD59bd9fba9c521df263909accf3f32da77
SHA112aeddeb7d12a3ab3e29b64177d950ffa5495393
SHA2569ae26bf1ef7e72514fc00ec9a7f7b043a861bdc163346db1723c95cee1f483fa
SHA51235e8f37cf2140ac608e5b08412b6f4cb403259dbfd7146e277decc47652f176d761783bd83e5b97fbc5949804523890aa876aa7dd928bf5ee22bdd892af4a30b
-
Filesize
598KB
MD59bd9fba9c521df263909accf3f32da77
SHA112aeddeb7d12a3ab3e29b64177d950ffa5495393
SHA2569ae26bf1ef7e72514fc00ec9a7f7b043a861bdc163346db1723c95cee1f483fa
SHA51235e8f37cf2140ac608e5b08412b6f4cb403259dbfd7146e277decc47652f176d761783bd83e5b97fbc5949804523890aa876aa7dd928bf5ee22bdd892af4a30b
-
Filesize
372KB
MD510d0dc0621a930f737cbea3b349188e6
SHA13a68cbecb6e389178234b08ba867ae40b692b4e0
SHA25644725d39b9e11955ba660b2d0cf6b5e8a4040ebcb3ccdfe1d8ae6796dd35e6f4
SHA512a327950aa858d79e31e075d7eec7f441461c207a6573ee409d42f151f65a190c3c85affe6afb344d9b06b7858be8e4a72aa91cdd512ae7c2b1e3a4d45083d155
-
Filesize
372KB
MD510d0dc0621a930f737cbea3b349188e6
SHA13a68cbecb6e389178234b08ba867ae40b692b4e0
SHA25644725d39b9e11955ba660b2d0cf6b5e8a4040ebcb3ccdfe1d8ae6796dd35e6f4
SHA512a327950aa858d79e31e075d7eec7f441461c207a6573ee409d42f151f65a190c3c85affe6afb344d9b06b7858be8e4a72aa91cdd512ae7c2b1e3a4d45083d155
-
Filesize
271KB
MD524af7615fe7e516267f0286e93899058
SHA1bfa272ff7a338300f93ee4a2416ef30e24c2b9ec
SHA256566e383609c85f57642232a5e94150fd3fb9c2d8e9e56a27964f7a3e3c42b02f
SHA512f255b16680c09539391e61bd2416a5ada3b2704327baecb9c34ecbc2f5f648331b3f06ea8c83a277edee78a3deb38087e883ee7d8c3012aebd8e34fa52cec64e
-
Filesize
271KB
MD524af7615fe7e516267f0286e93899058
SHA1bfa272ff7a338300f93ee4a2416ef30e24c2b9ec
SHA256566e383609c85f57642232a5e94150fd3fb9c2d8e9e56a27964f7a3e3c42b02f
SHA512f255b16680c09539391e61bd2416a5ada3b2704327baecb9c34ecbc2f5f648331b3f06ea8c83a277edee78a3deb38087e883ee7d8c3012aebd8e34fa52cec64e
-
Filesize
140KB
MD577a93a6afb1d7fa81c674cbecbee8531
SHA1fbd5275cea45278e48c3306c5e069619cdf038b3
SHA2560fcb9c3965ee7f2c36d232a624e0769542916f207ab4118a1e6d56fabffb3675
SHA512dc09b69e4ba62ccbb61310d39d185ad06e3e74759cfeb193a0d626ee36f35f27dd51f22425985884dd88143c5c24cbbb1da74e105c0adcc33a3a53e9b898d40e
-
Filesize
140KB
MD577a93a6afb1d7fa81c674cbecbee8531
SHA1fbd5275cea45278e48c3306c5e069619cdf038b3
SHA2560fcb9c3965ee7f2c36d232a624e0769542916f207ab4118a1e6d56fabffb3675
SHA512dc09b69e4ba62ccbb61310d39d185ad06e3e74759cfeb193a0d626ee36f35f27dd51f22425985884dd88143c5c24cbbb1da74e105c0adcc33a3a53e9b898d40e
-
Filesize
173KB
MD5d5f3785f09b0b4ddb516cb1bba85a36d
SHA1978b0c33233c9ab63a596cbb282473f1e99b07d4
SHA25664b6558c24af070e047262ad247dc64b968f8d919a5c9bb2b5c279931ef38db0
SHA51240f87989963ef21438f1378eb4b8f4d736bf7de67d2a12670faa6f94ab221dfb475eed8cec99208539e0a06e61ef987f8a7a5cb759442fc79583200b393611fb
-
Filesize
173KB
MD5d5f3785f09b0b4ddb516cb1bba85a36d
SHA1978b0c33233c9ab63a596cbb282473f1e99b07d4
SHA25664b6558c24af070e047262ad247dc64b968f8d919a5c9bb2b5c279931ef38db0
SHA51240f87989963ef21438f1378eb4b8f4d736bf7de67d2a12670faa6f94ab221dfb475eed8cec99208539e0a06e61ef987f8a7a5cb759442fc79583200b393611fb