Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2023, 09:14
Static task
static1
Behavioral task
behavioral1
Sample
c4abe6f8506a8f156c97d37ad06c37aa68520f7c3481a02251508eb43e8e6ce2.exe
Resource
win10v2004-20230915-en
General
-
Target
c4abe6f8506a8f156c97d37ad06c37aa68520f7c3481a02251508eb43e8e6ce2.exe
-
Size
785KB
-
MD5
c012953d7a8d9aa39337e0e88f056747
-
SHA1
f3482f68b8210d4807ff2aff3f38ef4303d4ae3e
-
SHA256
c4abe6f8506a8f156c97d37ad06c37aa68520f7c3481a02251508eb43e8e6ce2
-
SHA512
21f33515653d617879e76986594c3208192e6d0717be7cb12d5a86b3935dec211dc270efa6b8515b0da6f1727b9b3e3c54931c1e5db86e49045f2262c9a37b1c
-
SSDEEP
12288:cMr6y90WeDHKSk5XIpv+J8pbfLLPq6oBADYnRqUYjOFWmFaxZubSM4azU1MH:GyVRXIRrfHSFA8Rff+TFaBH
Malware Config
Extracted
redline
buben
77.91.124.82:19071
-
auth_value
c62fa04aa45f5b78f62d2c21fcbefdec
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2132 x0963719.exe 3520 x8886218.exe 1556 h6586906.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x8886218.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c4abe6f8506a8f156c97d37ad06c37aa68520f7c3481a02251508eb43e8e6ce2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x0963719.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4916 wrote to memory of 2132 4916 c4abe6f8506a8f156c97d37ad06c37aa68520f7c3481a02251508eb43e8e6ce2.exe 85 PID 4916 wrote to memory of 2132 4916 c4abe6f8506a8f156c97d37ad06c37aa68520f7c3481a02251508eb43e8e6ce2.exe 85 PID 4916 wrote to memory of 2132 4916 c4abe6f8506a8f156c97d37ad06c37aa68520f7c3481a02251508eb43e8e6ce2.exe 85 PID 2132 wrote to memory of 3520 2132 x0963719.exe 86 PID 2132 wrote to memory of 3520 2132 x0963719.exe 86 PID 2132 wrote to memory of 3520 2132 x0963719.exe 86 PID 3520 wrote to memory of 1556 3520 x8886218.exe 87 PID 3520 wrote to memory of 1556 3520 x8886218.exe 87 PID 3520 wrote to memory of 1556 3520 x8886218.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4abe6f8506a8f156c97d37ad06c37aa68520f7c3481a02251508eb43e8e6ce2.exe"C:\Users\Admin\AppData\Local\Temp\c4abe6f8506a8f156c97d37ad06c37aa68520f7c3481a02251508eb43e8e6ce2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0963719.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0963719.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8886218.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8886218.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h6586906.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h6586906.exe4⤵
- Executes dropped EXE
PID:1556
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
683KB
MD5bb0141fd36e25ce2dc6d5f566a794454
SHA1af822af9bc387337a950f5e72dcab6678cd45bd0
SHA2563c56fd35c60d2803a4f398a2afdba4737237bd8daeb4bd6bd75e72d36cdbb892
SHA5124bb597620573eb824308bb2569cdce95be2bca949b239141e8d599d8043c4eac55629046a321da62d0562e4b6055cf1b1c4f8da7ac66434d897bc28b38b67fec
-
Filesize
683KB
MD5bb0141fd36e25ce2dc6d5f566a794454
SHA1af822af9bc387337a950f5e72dcab6678cd45bd0
SHA2563c56fd35c60d2803a4f398a2afdba4737237bd8daeb4bd6bd75e72d36cdbb892
SHA5124bb597620573eb824308bb2569cdce95be2bca949b239141e8d599d8043c4eac55629046a321da62d0562e4b6055cf1b1c4f8da7ac66434d897bc28b38b67fec
-
Filesize
292KB
MD55a64de40c77207593476981f4ea710ac
SHA1985e6cf047ed41a48a8800f1ed748fed509b2320
SHA256a034ce2992ad5332c687ddcd11b570130fd5efa61c6342b3e9e3694f12bc2463
SHA512caf35ae47d771063b94bb4406ab27b13d34c04f77095eeffe95c9a0f2a84d759620d4e906a0a801d9f4cfb7c88fe757e87c1b9ffa9779e4be0fe9d13646aa96c
-
Filesize
292KB
MD55a64de40c77207593476981f4ea710ac
SHA1985e6cf047ed41a48a8800f1ed748fed509b2320
SHA256a034ce2992ad5332c687ddcd11b570130fd5efa61c6342b3e9e3694f12bc2463
SHA512caf35ae47d771063b94bb4406ab27b13d34c04f77095eeffe95c9a0f2a84d759620d4e906a0a801d9f4cfb7c88fe757e87c1b9ffa9779e4be0fe9d13646aa96c
-
Filesize
174KB
MD58d2136bdcb8a0d82cb6d5c3ab1021931
SHA1f7b6bc4c46b22575fa6d68beaa7c7fe58dbd23bc
SHA25660781d06a360ae9f08d91ee6b98bf750f4c70074470eb00a8a2732116ee7ddce
SHA5122eefdd513adc6a68ccede13b8d316ed6b5319e9f653d3c60537b90b5977e87f3df188697d92a773bc414d06e7a23e211320d882b6868eedfccd510e61078d415
-
Filesize
174KB
MD58d2136bdcb8a0d82cb6d5c3ab1021931
SHA1f7b6bc4c46b22575fa6d68beaa7c7fe58dbd23bc
SHA25660781d06a360ae9f08d91ee6b98bf750f4c70074470eb00a8a2732116ee7ddce
SHA5122eefdd513adc6a68ccede13b8d316ed6b5319e9f653d3c60537b90b5977e87f3df188697d92a773bc414d06e7a23e211320d882b6868eedfccd510e61078d415