Analysis
-
max time kernel
151s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
24/09/2023, 01:29
Static task
static1
Behavioral task
behavioral1
Sample
61eeef84d6840da73d35812ecfeab833182466d80518fcbc936bbc1613b05160.exe
Resource
win10v2004-20230915-en
General
-
Target
61eeef84d6840da73d35812ecfeab833182466d80518fcbc936bbc1613b05160.exe
-
Size
928KB
-
MD5
dd64ab94f8346177503476fbf3e12acf
-
SHA1
5b761019e1b95298f399d7c79dca0046fc56045b
-
SHA256
61eeef84d6840da73d35812ecfeab833182466d80518fcbc936bbc1613b05160
-
SHA512
85905bcb4ff0ce78971b976b3077d087b0c36440a9cdcd778998948378ea92e8467a38e599580e148cf5b51cb67f3f0580885bf0539cc36bffb999fe24c28671
-
SSDEEP
24576:kyuzfr8P5/P921qVqtkKCzsoKFggc/8c01mY/kQYk8Xbo:zuPo/PhwtkKhJe7nCmQRp4
Malware Config
Extracted
redline
tuxiu
77.91.124.82:19071
-
auth_value
29610cdad07e7187eec70685a04b89fe
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/files/0x0006000000023073-34.dat family_redline behavioral1/files/0x0006000000023073-35.dat family_redline behavioral1/memory/3712-37-0x0000000000260000-0x0000000000290000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
pid Process 1812 x6324592.exe 3048 x2686995.exe 4844 x9628487.exe 4980 g8370361.exe 3712 h5702073.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 61eeef84d6840da73d35812ecfeab833182466d80518fcbc936bbc1613b05160.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x6324592.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x2686995.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x9628487.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4980 set thread context of 428 4980 g8370361.exe 95 -
Program crash 2 IoCs
pid pid_target Process procid_target 3672 4980 WerFault.exe 93 4804 428 WerFault.exe 95 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2240 wrote to memory of 1812 2240 61eeef84d6840da73d35812ecfeab833182466d80518fcbc936bbc1613b05160.exe 90 PID 2240 wrote to memory of 1812 2240 61eeef84d6840da73d35812ecfeab833182466d80518fcbc936bbc1613b05160.exe 90 PID 2240 wrote to memory of 1812 2240 61eeef84d6840da73d35812ecfeab833182466d80518fcbc936bbc1613b05160.exe 90 PID 1812 wrote to memory of 3048 1812 x6324592.exe 91 PID 1812 wrote to memory of 3048 1812 x6324592.exe 91 PID 1812 wrote to memory of 3048 1812 x6324592.exe 91 PID 3048 wrote to memory of 4844 3048 x2686995.exe 92 PID 3048 wrote to memory of 4844 3048 x2686995.exe 92 PID 3048 wrote to memory of 4844 3048 x2686995.exe 92 PID 4844 wrote to memory of 4980 4844 x9628487.exe 93 PID 4844 wrote to memory of 4980 4844 x9628487.exe 93 PID 4844 wrote to memory of 4980 4844 x9628487.exe 93 PID 4980 wrote to memory of 1328 4980 g8370361.exe 94 PID 4980 wrote to memory of 1328 4980 g8370361.exe 94 PID 4980 wrote to memory of 1328 4980 g8370361.exe 94 PID 4980 wrote to memory of 428 4980 g8370361.exe 95 PID 4980 wrote to memory of 428 4980 g8370361.exe 95 PID 4980 wrote to memory of 428 4980 g8370361.exe 95 PID 4980 wrote to memory of 428 4980 g8370361.exe 95 PID 4980 wrote to memory of 428 4980 g8370361.exe 95 PID 4980 wrote to memory of 428 4980 g8370361.exe 95 PID 4980 wrote to memory of 428 4980 g8370361.exe 95 PID 4980 wrote to memory of 428 4980 g8370361.exe 95 PID 4980 wrote to memory of 428 4980 g8370361.exe 95 PID 4980 wrote to memory of 428 4980 g8370361.exe 95 PID 4844 wrote to memory of 3712 4844 x9628487.exe 103 PID 4844 wrote to memory of 3712 4844 x9628487.exe 103 PID 4844 wrote to memory of 3712 4844 x9628487.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\61eeef84d6840da73d35812ecfeab833182466d80518fcbc936bbc1613b05160.exe"C:\Users\Admin\AppData\Local\Temp\61eeef84d6840da73d35812ecfeab833182466d80518fcbc936bbc1613b05160.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6324592.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6324592.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2686995.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2686995.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9628487.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9628487.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8370361.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8370361.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:1328
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 428 -s 5407⤵
- Program crash
PID:4804
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4980 -s 1966⤵
- Program crash
PID:3672
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h5702073.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h5702073.exe5⤵
- Executes dropped EXE
PID:3712
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4980 -ip 49801⤵PID:5004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 428 -ip 4281⤵PID:4224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
826KB
MD539d43b2d95e326bc08c342335fe69e2e
SHA13c3a375d791ae8d8fd17e4d367ca27ffef13b940
SHA2568ef7876e12bc333751e50bf5dc7f29a73a376d2d962ba46f3278c0327bdbb25f
SHA512b617bc5f10ad9518ccef64754374299e5e4187de3f87fcd9bcd25ca9431269a21bb057fed2815f761f33b134523e0ae14ceb170c47ee2b2068fafde333874582
-
Filesize
826KB
MD539d43b2d95e326bc08c342335fe69e2e
SHA13c3a375d791ae8d8fd17e4d367ca27ffef13b940
SHA2568ef7876e12bc333751e50bf5dc7f29a73a376d2d962ba46f3278c0327bdbb25f
SHA512b617bc5f10ad9518ccef64754374299e5e4187de3f87fcd9bcd25ca9431269a21bb057fed2815f761f33b134523e0ae14ceb170c47ee2b2068fafde333874582
-
Filesize
566KB
MD55baee5e2beaab466fb2381e60c40b615
SHA1c9997665dceda7d5a600e50ecab7ee4a682d71bf
SHA256979f2d783d795831bd48233857a297a9b0c7089a24f4d850dad0c14268d582bc
SHA512157b192c1762a91819c31c6113f20b6b218283db7d4223e604249e5f5fb16020c97e184eb761dccc284c54b0217818bc84e01b17eb68473f4dc4fad1a67e30e3
-
Filesize
566KB
MD55baee5e2beaab466fb2381e60c40b615
SHA1c9997665dceda7d5a600e50ecab7ee4a682d71bf
SHA256979f2d783d795831bd48233857a297a9b0c7089a24f4d850dad0c14268d582bc
SHA512157b192c1762a91819c31c6113f20b6b218283db7d4223e604249e5f5fb16020c97e184eb761dccc284c54b0217818bc84e01b17eb68473f4dc4fad1a67e30e3
-
Filesize
389KB
MD526157586361035fcb3b21ac8239fc644
SHA1a7d09e3f98d9e63f4636616698f53d9b9e4ecf56
SHA256b49daf13c9289712f57252ec7aa507c3a8b9970933126e345240319e19ac9252
SHA512c6be9cef6f379d277fd1ea60d0d25c4bf810f24e6001dece436f312be5add45ccd87ec1b2b35f1e8fd8c1215033a57ee658e24f3415ed7b12467982b21f0de58
-
Filesize
389KB
MD526157586361035fcb3b21ac8239fc644
SHA1a7d09e3f98d9e63f4636616698f53d9b9e4ecf56
SHA256b49daf13c9289712f57252ec7aa507c3a8b9970933126e345240319e19ac9252
SHA512c6be9cef6f379d277fd1ea60d0d25c4bf810f24e6001dece436f312be5add45ccd87ec1b2b35f1e8fd8c1215033a57ee658e24f3415ed7b12467982b21f0de58
-
Filesize
364KB
MD5c3be2d1a63e8f8d0849b47a6cf2705e5
SHA15b9e6ec272612af2523fa98d45e4e792fffcadc8
SHA256aeeb108d01335ecdbbbfe58b9b947c47ea7b09e03f1daca2fbc69a55aebe0d52
SHA512e431a21edc075e4f7438dff7dec46c423c816f2886ae77258ae466d2af70ab3a8fa3ddb7c276200ab28ec4a11da94b512067bead2eccabd1bd883cc8bc5ba78b
-
Filesize
364KB
MD5c3be2d1a63e8f8d0849b47a6cf2705e5
SHA15b9e6ec272612af2523fa98d45e4e792fffcadc8
SHA256aeeb108d01335ecdbbbfe58b9b947c47ea7b09e03f1daca2fbc69a55aebe0d52
SHA512e431a21edc075e4f7438dff7dec46c423c816f2886ae77258ae466d2af70ab3a8fa3ddb7c276200ab28ec4a11da94b512067bead2eccabd1bd883cc8bc5ba78b
-
Filesize
174KB
MD526361d1adbe9b055dbb2883f7de2e464
SHA1374ee9f27e476c0e0b6f29732ff7614b43cdc14b
SHA256c4198263a1a08ee75855169aee802011164d1ff35702451892d432fe8488510e
SHA512f971089ffe162b8ac8d1ad8fb51ad1e7b50477ebf28ae53e89743d190c47e143f85445ed662f6f6da5575aeb90a9718272876c7cff0109f191d6b9b758fa4410
-
Filesize
174KB
MD526361d1adbe9b055dbb2883f7de2e464
SHA1374ee9f27e476c0e0b6f29732ff7614b43cdc14b
SHA256c4198263a1a08ee75855169aee802011164d1ff35702451892d432fe8488510e
SHA512f971089ffe162b8ac8d1ad8fb51ad1e7b50477ebf28ae53e89743d190c47e143f85445ed662f6f6da5575aeb90a9718272876c7cff0109f191d6b9b758fa4410