Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2023, 21:57
Static task
static1
Behavioral task
behavioral1
Sample
273750a0e7c7e9165f692d7ce00a8c05030df3d09e7bd5b0ee06bc3fb1862e87.exe
Resource
win10v2004-20230915-en
General
-
Target
273750a0e7c7e9165f692d7ce00a8c05030df3d09e7bd5b0ee06bc3fb1862e87.exe
-
Size
644KB
-
MD5
c048782f34d7bd432cec853de8b0da1f
-
SHA1
386e08520b29b955d670b18355925c05923fe6a7
-
SHA256
273750a0e7c7e9165f692d7ce00a8c05030df3d09e7bd5b0ee06bc3fb1862e87
-
SHA512
e86c5fd65b7bf3cca9c3ca3514aa9ba6efe3f5e46cf5dab30368166a0ce43844660dd4b9dc64c58d54b90a60336fc1cc6026ed70d20f989c57ff381d3fd65c69
-
SSDEEP
12288:uMrGy90CDg2K0kuiMJFKhpOjTQHm3mILzPMOPvYXHhC/vszwW4:4y1E2KhAFKhkjkm2ILVYHQ/vs74
Malware Config
Extracted
redline
luska
77.91.124.55:19071
-
auth_value
a6797888f51a88afbfd8854a79ac9357
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1840 x5714449.exe 4520 x2979457.exe 4168 h8541043.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 273750a0e7c7e9165f692d7ce00a8c05030df3d09e7bd5b0ee06bc3fb1862e87.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x5714449.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x2979457.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4448 wrote to memory of 1840 4448 273750a0e7c7e9165f692d7ce00a8c05030df3d09e7bd5b0ee06bc3fb1862e87.exe 89 PID 4448 wrote to memory of 1840 4448 273750a0e7c7e9165f692d7ce00a8c05030df3d09e7bd5b0ee06bc3fb1862e87.exe 89 PID 4448 wrote to memory of 1840 4448 273750a0e7c7e9165f692d7ce00a8c05030df3d09e7bd5b0ee06bc3fb1862e87.exe 89 PID 1840 wrote to memory of 4520 1840 x5714449.exe 90 PID 1840 wrote to memory of 4520 1840 x5714449.exe 90 PID 1840 wrote to memory of 4520 1840 x5714449.exe 90 PID 4520 wrote to memory of 4168 4520 x2979457.exe 91 PID 4520 wrote to memory of 4168 4520 x2979457.exe 91 PID 4520 wrote to memory of 4168 4520 x2979457.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\273750a0e7c7e9165f692d7ce00a8c05030df3d09e7bd5b0ee06bc3fb1862e87.exe"C:\Users\Admin\AppData\Local\Temp\273750a0e7c7e9165f692d7ce00a8c05030df3d09e7bd5b0ee06bc3fb1862e87.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5714449.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5714449.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2979457.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2979457.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h8541043.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h8541043.exe4⤵
- Executes dropped EXE
PID:4168
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
543KB
MD51f59e4a367d9fda8fa37735665227de7
SHA1fd95ad073dbff7cb676060bb7bf77f87ec8069a9
SHA2564b20f92caf2f6dbe45eafcdff3caca4cd24bdba5472122c5b9f4ccc206f80967
SHA5128ccbc850cd26ad1c078d05486b1b8070c737ee61fb7eae200b3233e894d951b9441ac0437090eeee23f13dee69e60c5bb1462961e15232d2f6c1e4e941b5e75e
-
Filesize
543KB
MD51f59e4a367d9fda8fa37735665227de7
SHA1fd95ad073dbff7cb676060bb7bf77f87ec8069a9
SHA2564b20f92caf2f6dbe45eafcdff3caca4cd24bdba5472122c5b9f4ccc206f80967
SHA5128ccbc850cd26ad1c078d05486b1b8070c737ee61fb7eae200b3233e894d951b9441ac0437090eeee23f13dee69e60c5bb1462961e15232d2f6c1e4e941b5e75e
-
Filesize
271KB
MD57582a5b65cb64e5085b1779c85bc2ca2
SHA1978323bd9b4ab4db1a8cf09db1b1081c458ff481
SHA2569b90f41154b343cfc8959383e8fbfae6d83c6d7df209ba544b697858e56c9f61
SHA512eedad60f5425418f6b162ffa4d22bf9315f3c65b878166826e968efe1cc26b06269543d1818d2fcf19b7d2cbeb0c0463c370401a359b01c226fdd67ac2593411
-
Filesize
271KB
MD57582a5b65cb64e5085b1779c85bc2ca2
SHA1978323bd9b4ab4db1a8cf09db1b1081c458ff481
SHA2569b90f41154b343cfc8959383e8fbfae6d83c6d7df209ba544b697858e56c9f61
SHA512eedad60f5425418f6b162ffa4d22bf9315f3c65b878166826e968efe1cc26b06269543d1818d2fcf19b7d2cbeb0c0463c370401a359b01c226fdd67ac2593411
-
Filesize
174KB
MD5c1d86e06a03fe618d956250d753bc050
SHA1843cdb50481c12405f7101475a51fa5249e88057
SHA2563575588aeb0d49edfe9433a87fa499541c5737f6afc6e1115a264757240a15b7
SHA512a70f0547400e0491deddae21882dbf1d376b21d3fedfdbdc185a313c48008a100b06168567dfc3482227fc162a8cd857f6cab2be2b2a789596861d86823dacb9
-
Filesize
174KB
MD5c1d86e06a03fe618d956250d753bc050
SHA1843cdb50481c12405f7101475a51fa5249e88057
SHA2563575588aeb0d49edfe9433a87fa499541c5737f6afc6e1115a264757240a15b7
SHA512a70f0547400e0491deddae21882dbf1d376b21d3fedfdbdc185a313c48008a100b06168567dfc3482227fc162a8cd857f6cab2be2b2a789596861d86823dacb9