Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
24/09/2023, 01:08
Static task
static1
Behavioral task
behavioral1
Sample
efbe6e47229a646410652946a5a792e8c3414bb244061a219aea650d068c7e1c.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
efbe6e47229a646410652946a5a792e8c3414bb244061a219aea650d068c7e1c.exe
Resource
win10v2004-20230915-en
General
-
Target
efbe6e47229a646410652946a5a792e8c3414bb244061a219aea650d068c7e1c.exe
-
Size
956KB
-
MD5
2a1ef00edfe378d2136ad96afa8a46ec
-
SHA1
6224f1a957ced73577e73f76ae648280ef8f0ba2
-
SHA256
efbe6e47229a646410652946a5a792e8c3414bb244061a219aea650d068c7e1c
-
SHA512
8eda290935a6bb4e38219c10593db4512548f6a7654045c03bb5e743efac8aa665d8a48caa2490a9aabd6ee6619c39f951ab7f2d59e516b572b2a36c7b77a26c
-
SSDEEP
24576:Ly16H9E4xqF5oAmNK4T02sBP/NpvucZb3Q9TN0U0D4uP:+18EvHoAerTVsBPlpWa3QUD
Malware Config
Extracted
redline
tuxiu
77.91.124.82:19071
-
auth_value
29610cdad07e7187eec70685a04b89fe
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral2/files/0x00070000000231b9-33.dat family_redline behavioral2/files/0x00070000000231b9-35.dat family_redline behavioral2/memory/4848-36-0x0000000000610000-0x0000000000640000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
pid Process 4900 x6190423.exe 3656 x8543495.exe 1864 x7941102.exe 3540 g7788597.exe 4848 h8639604.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" efbe6e47229a646410652946a5a792e8c3414bb244061a219aea650d068c7e1c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x6190423.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x8543495.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x7941102.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3540 set thread context of 796 3540 g7788597.exe 96 -
Program crash 2 IoCs
pid pid_target Process procid_target 4140 3540 WerFault.exe 89 1940 796 WerFault.exe 96 -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1752 wrote to memory of 4900 1752 efbe6e47229a646410652946a5a792e8c3414bb244061a219aea650d068c7e1c.exe 85 PID 1752 wrote to memory of 4900 1752 efbe6e47229a646410652946a5a792e8c3414bb244061a219aea650d068c7e1c.exe 85 PID 1752 wrote to memory of 4900 1752 efbe6e47229a646410652946a5a792e8c3414bb244061a219aea650d068c7e1c.exe 85 PID 4900 wrote to memory of 3656 4900 x6190423.exe 87 PID 4900 wrote to memory of 3656 4900 x6190423.exe 87 PID 4900 wrote to memory of 3656 4900 x6190423.exe 87 PID 3656 wrote to memory of 1864 3656 x8543495.exe 88 PID 3656 wrote to memory of 1864 3656 x8543495.exe 88 PID 3656 wrote to memory of 1864 3656 x8543495.exe 88 PID 1864 wrote to memory of 3540 1864 x7941102.exe 89 PID 1864 wrote to memory of 3540 1864 x7941102.exe 89 PID 1864 wrote to memory of 3540 1864 x7941102.exe 89 PID 3540 wrote to memory of 796 3540 g7788597.exe 96 PID 3540 wrote to memory of 796 3540 g7788597.exe 96 PID 3540 wrote to memory of 796 3540 g7788597.exe 96 PID 3540 wrote to memory of 796 3540 g7788597.exe 96 PID 3540 wrote to memory of 796 3540 g7788597.exe 96 PID 3540 wrote to memory of 796 3540 g7788597.exe 96 PID 3540 wrote to memory of 796 3540 g7788597.exe 96 PID 3540 wrote to memory of 796 3540 g7788597.exe 96 PID 3540 wrote to memory of 796 3540 g7788597.exe 96 PID 3540 wrote to memory of 796 3540 g7788597.exe 96 PID 1864 wrote to memory of 4848 1864 x7941102.exe 101 PID 1864 wrote to memory of 4848 1864 x7941102.exe 101 PID 1864 wrote to memory of 4848 1864 x7941102.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\efbe6e47229a646410652946a5a792e8c3414bb244061a219aea650d068c7e1c.exe"C:\Users\Admin\AppData\Local\Temp\efbe6e47229a646410652946a5a792e8c3414bb244061a219aea650d068c7e1c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6190423.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6190423.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8543495.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8543495.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7941102.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7941102.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7788597.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7788597.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 796 -s 5407⤵
- Program crash
PID:1940
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3540 -s 5526⤵
- Program crash
PID:4140
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8639604.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8639604.exe5⤵
- Executes dropped EXE
PID:4848
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3540 -ip 35401⤵PID:556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 796 -ip 7961⤵PID:3828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854KB
MD51e3ad421833a4dc86652b692c3182f48
SHA1b2d2f3f37c585b4ce806c1f6863e90d733e6a302
SHA256f54f5008a7084449be7ba395fb6a9ea088f11e69df40accc7979b575f37ea82a
SHA5120c8b919e10c6044e0fd5bc45d1023c1f822ac8de40d75044dd234b03034f480999976c865817586cc18e656f93acd28698f27ec12c080c8348ef54a269582c14
-
Filesize
854KB
MD51e3ad421833a4dc86652b692c3182f48
SHA1b2d2f3f37c585b4ce806c1f6863e90d733e6a302
SHA256f54f5008a7084449be7ba395fb6a9ea088f11e69df40accc7979b575f37ea82a
SHA5120c8b919e10c6044e0fd5bc45d1023c1f822ac8de40d75044dd234b03034f480999976c865817586cc18e656f93acd28698f27ec12c080c8348ef54a269582c14
-
Filesize
589KB
MD5eb2285e63b7e0846d35751cc69933500
SHA15c95cc8f90a7388125ea8c656f477c02e4480aad
SHA2563482b16666c3155ea3d5e3d7b649915ad46ab6c19c47364a2a7538d1907511e1
SHA5124ab1c9726164f1624c3e3d69556a88cf31adddc6991e2c696274703b2305b180234a66e5562df2aee13f458fb4f11c893f170ebf3e8ea0b11609a23e050dacd3
-
Filesize
589KB
MD5eb2285e63b7e0846d35751cc69933500
SHA15c95cc8f90a7388125ea8c656f477c02e4480aad
SHA2563482b16666c3155ea3d5e3d7b649915ad46ab6c19c47364a2a7538d1907511e1
SHA5124ab1c9726164f1624c3e3d69556a88cf31adddc6991e2c696274703b2305b180234a66e5562df2aee13f458fb4f11c893f170ebf3e8ea0b11609a23e050dacd3
-
Filesize
403KB
MD5fe51894671f3158b4b6ae2340019153d
SHA157fcd217863dff7d20476d16423cfa9e903c2d89
SHA256a07eec9b6e6c62cc6114c74ef44e4ea825b0d673d52433f0348fffa8e5456754
SHA51233714b1bafcdb173c69faeefeb3e328ca16477da96fdda4b0c3714b09fb8509bb07548c87418455c126651d8f64545b0f98d9ceff4d79e6cf5c069256182fd5e
-
Filesize
403KB
MD5fe51894671f3158b4b6ae2340019153d
SHA157fcd217863dff7d20476d16423cfa9e903c2d89
SHA256a07eec9b6e6c62cc6114c74ef44e4ea825b0d673d52433f0348fffa8e5456754
SHA51233714b1bafcdb173c69faeefeb3e328ca16477da96fdda4b0c3714b09fb8509bb07548c87418455c126651d8f64545b0f98d9ceff4d79e6cf5c069256182fd5e
-
Filesize
378KB
MD5e2610018194265cf1b14e537f0ff70d5
SHA1a5b558d0e511c48ae968216d111fc74ba22b2b37
SHA25694f32b6c819663247619ada1608db85219617a9c859a63356474198289ee2b6d
SHA512dc9964a9cd729e8506698664a2260d39ce85463e1e57aca843c55ffd74b816e5e3605b77e32ff5a0e533adfe157323d4849f3eb7f825b65fda2b95e004725bd4
-
Filesize
378KB
MD5e2610018194265cf1b14e537f0ff70d5
SHA1a5b558d0e511c48ae968216d111fc74ba22b2b37
SHA25694f32b6c819663247619ada1608db85219617a9c859a63356474198289ee2b6d
SHA512dc9964a9cd729e8506698664a2260d39ce85463e1e57aca843c55ffd74b816e5e3605b77e32ff5a0e533adfe157323d4849f3eb7f825b65fda2b95e004725bd4
-
Filesize
174KB
MD569eed1a4cf1620166a630ca76e7aa413
SHA16ee4a651feba691c41607f81db58f4f11788dcf1
SHA256a11dd4025a00dc2848ee683dae526a28fa08f3ec67b85cac47dab282da81b37d
SHA512fc35d12625292373a73ae73d63ced14ce696afcfb9d865987ab6e97cbe6af4cd7e6fe28d7e16e1654f0e16ee3c71769b03ba4fb460e0d9e58d622b3a134b423e
-
Filesize
174KB
MD569eed1a4cf1620166a630ca76e7aa413
SHA16ee4a651feba691c41607f81db58f4f11788dcf1
SHA256a11dd4025a00dc2848ee683dae526a28fa08f3ec67b85cac47dab282da81b37d
SHA512fc35d12625292373a73ae73d63ced14ce696afcfb9d865987ab6e97cbe6af4cd7e6fe28d7e16e1654f0e16ee3c71769b03ba4fb460e0d9e58d622b3a134b423e