Analysis
-
max time kernel
153s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2023, 16:26
Static task
static1
Behavioral task
behavioral1
Sample
722361794fdc529e30455b686796ab9e29bc3dd4934459609e60c83f29e9dd03.exe
Resource
win10v2004-20230915-en
General
-
Target
722361794fdc529e30455b686796ab9e29bc3dd4934459609e60c83f29e9dd03.exe
-
Size
1.1MB
-
MD5
4243ac36afceebbd88d322261ce65c50
-
SHA1
165c546df2b82d9ab33ae652471457e24447eced
-
SHA256
722361794fdc529e30455b686796ab9e29bc3dd4934459609e60c83f29e9dd03
-
SHA512
b4fa38b5efc9caa9019dfabd64ab138e0a741507b43d7c8977a4169a1ce4271832090d4d179e8f2ee2ddd1021dd1da7e6a2286db94e6425526db6dd1573a7464
-
SSDEEP
24576:6yI4d2n+1n95Mf/8uMtDlTkKKlvf5Rr7Vu:Bj2n+1YENtDlk5R
Malware Config
Extracted
redline
larek
77.91.124.55:19071
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/files/0x00060000000231d6-41.dat family_redline behavioral1/files/0x00060000000231d6-42.dat family_redline behavioral1/memory/2324-43-0x0000000000E70000-0x0000000000EAE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 4164 kW4NJ5fV.exe 1832 ho3Xv5yR.exe 2840 pW9qb1aS.exe 1732 tU5oq0vY.exe 2352 1gL99Vb7.exe 2324 2mF174Rd.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 722361794fdc529e30455b686796ab9e29bc3dd4934459609e60c83f29e9dd03.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" kW4NJ5fV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ho3Xv5yR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" pW9qb1aS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" tU5oq0vY.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2352 set thread context of 2088 2352 1gL99Vb7.exe 94 -
Program crash 2 IoCs
pid pid_target Process procid_target 2948 2352 WerFault.exe 91 1936 2088 WerFault.exe 94 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3940 wrote to memory of 4164 3940 722361794fdc529e30455b686796ab9e29bc3dd4934459609e60c83f29e9dd03.exe 86 PID 3940 wrote to memory of 4164 3940 722361794fdc529e30455b686796ab9e29bc3dd4934459609e60c83f29e9dd03.exe 86 PID 3940 wrote to memory of 4164 3940 722361794fdc529e30455b686796ab9e29bc3dd4934459609e60c83f29e9dd03.exe 86 PID 4164 wrote to memory of 1832 4164 kW4NJ5fV.exe 88 PID 4164 wrote to memory of 1832 4164 kW4NJ5fV.exe 88 PID 4164 wrote to memory of 1832 4164 kW4NJ5fV.exe 88 PID 1832 wrote to memory of 2840 1832 ho3Xv5yR.exe 89 PID 1832 wrote to memory of 2840 1832 ho3Xv5yR.exe 89 PID 1832 wrote to memory of 2840 1832 ho3Xv5yR.exe 89 PID 2840 wrote to memory of 1732 2840 pW9qb1aS.exe 90 PID 2840 wrote to memory of 1732 2840 pW9qb1aS.exe 90 PID 2840 wrote to memory of 1732 2840 pW9qb1aS.exe 90 PID 1732 wrote to memory of 2352 1732 tU5oq0vY.exe 91 PID 1732 wrote to memory of 2352 1732 tU5oq0vY.exe 91 PID 1732 wrote to memory of 2352 1732 tU5oq0vY.exe 91 PID 2352 wrote to memory of 2088 2352 1gL99Vb7.exe 94 PID 2352 wrote to memory of 2088 2352 1gL99Vb7.exe 94 PID 2352 wrote to memory of 2088 2352 1gL99Vb7.exe 94 PID 2352 wrote to memory of 2088 2352 1gL99Vb7.exe 94 PID 2352 wrote to memory of 2088 2352 1gL99Vb7.exe 94 PID 2352 wrote to memory of 2088 2352 1gL99Vb7.exe 94 PID 2352 wrote to memory of 2088 2352 1gL99Vb7.exe 94 PID 2352 wrote to memory of 2088 2352 1gL99Vb7.exe 94 PID 2352 wrote to memory of 2088 2352 1gL99Vb7.exe 94 PID 2352 wrote to memory of 2088 2352 1gL99Vb7.exe 94 PID 1732 wrote to memory of 2324 1732 tU5oq0vY.exe 103 PID 1732 wrote to memory of 2324 1732 tU5oq0vY.exe 103 PID 1732 wrote to memory of 2324 1732 tU5oq0vY.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\722361794fdc529e30455b686796ab9e29bc3dd4934459609e60c83f29e9dd03.exe"C:\Users\Admin\AppData\Local\Temp\722361794fdc529e30455b686796ab9e29bc3dd4934459609e60c83f29e9dd03.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kW4NJ5fV.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kW4NJ5fV.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ho3Xv5yR.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ho3Xv5yR.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pW9qb1aS.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pW9qb1aS.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tU5oq0vY.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tU5oq0vY.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1gL99Vb7.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1gL99Vb7.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2088 -s 5408⤵
- Program crash
PID:1936
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2352 -s 6127⤵
- Program crash
PID:2948
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2mF174Rd.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2mF174Rd.exe6⤵
- Executes dropped EXE
PID:2324
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2088 -ip 20881⤵PID:1892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2352 -ip 23521⤵PID:3996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
960KB
MD53ccc70083f6980ac64ad1e7b111fe93a
SHA184094f4020a986752dd3670a34645dc587b0bdd6
SHA256ef5fd32742b62a366442d6786524b22d2fdfcd3939a9943721839c593707c5ec
SHA51295ed67aaa3166e7ebfe9dfdd37f0963772fa886a11a68163356d6fbb88bae15be08c5ad8fb331ea92b355392a81734a117bcd157a2df4bf71532efb62d6f2ecc
-
Filesize
960KB
MD53ccc70083f6980ac64ad1e7b111fe93a
SHA184094f4020a986752dd3670a34645dc587b0bdd6
SHA256ef5fd32742b62a366442d6786524b22d2fdfcd3939a9943721839c593707c5ec
SHA51295ed67aaa3166e7ebfe9dfdd37f0963772fa886a11a68163356d6fbb88bae15be08c5ad8fb331ea92b355392a81734a117bcd157a2df4bf71532efb62d6f2ecc
-
Filesize
777KB
MD505579c65ead2fc17abb28026ab32fb76
SHA172858fdd1bf6b3f9b011268eb95f7cdbf2061bcb
SHA2561be1a4f137c9b2cde16ab5e02e04d34b6fc5c3168eec1097c0d98533d40686a2
SHA51210b830446944be0852cfcd571d89671df0aada0d11a64d414cbec560e0e1c61d3a06a9f3488cfa07896476f94dc1ccc73d79093e974888b1d91a8e9ca8a10c6d
-
Filesize
777KB
MD505579c65ead2fc17abb28026ab32fb76
SHA172858fdd1bf6b3f9b011268eb95f7cdbf2061bcb
SHA2561be1a4f137c9b2cde16ab5e02e04d34b6fc5c3168eec1097c0d98533d40686a2
SHA51210b830446944be0852cfcd571d89671df0aada0d11a64d414cbec560e0e1c61d3a06a9f3488cfa07896476f94dc1ccc73d79093e974888b1d91a8e9ca8a10c6d
-
Filesize
531KB
MD5d2cc0174393be66f87f97737419efb0a
SHA118df0ed935d13b69fd1533c7555129ee44e4df63
SHA256ce61d63e3cf023c7ed289edbb65f503aa75ce2fc8c44e8b7c6fd0f0e0f574c9b
SHA512bfb52b3ce2780a9916804dc198a91e67fb780f63bcc8ffa53911a85f0c88dea7548827cb0010b6ffd54987ab8f31477051d29e09bfb3108f2195a6cb864f030e
-
Filesize
531KB
MD5d2cc0174393be66f87f97737419efb0a
SHA118df0ed935d13b69fd1533c7555129ee44e4df63
SHA256ce61d63e3cf023c7ed289edbb65f503aa75ce2fc8c44e8b7c6fd0f0e0f574c9b
SHA512bfb52b3ce2780a9916804dc198a91e67fb780f63bcc8ffa53911a85f0c88dea7548827cb0010b6ffd54987ab8f31477051d29e09bfb3108f2195a6cb864f030e
-
Filesize
365KB
MD50e6bbf8be253a222fad676c83f396ce5
SHA118411a8c11eda02ba6a873fc55131b7d4d47bb97
SHA2564b21b50e7614ac3b1e5cc592d2f6a2829c7fe666e2f75e1727bd41d556a525f1
SHA5122d649231e11fbf2b6326904def3148c0a8f2e6644a741d05ce76fd3bf5cc23d2c14d7fd308ab5fa44018f69f40600aced9fe808ca5c10580e174b753ecc9d9e9
-
Filesize
365KB
MD50e6bbf8be253a222fad676c83f396ce5
SHA118411a8c11eda02ba6a873fc55131b7d4d47bb97
SHA2564b21b50e7614ac3b1e5cc592d2f6a2829c7fe666e2f75e1727bd41d556a525f1
SHA5122d649231e11fbf2b6326904def3148c0a8f2e6644a741d05ce76fd3bf5cc23d2c14d7fd308ab5fa44018f69f40600aced9fe808ca5c10580e174b753ecc9d9e9
-
Filesize
285KB
MD5c34ca44ce50fb36b96ce8e9c3690adc3
SHA17a39be3d5481f40b61499f7395ee20304fc445d0
SHA256364b78a4fd553bb4d17ab3872d6861be00b8b83de161112110630eefd0a82e41
SHA5129e3f5d57ac51777ebcb514f500bee95bafab81b82990bb0dd0ad41509b1b671822aefed1c387eb0ca76ddc982c2917af793ce29330a7f61918893f20021b0175
-
Filesize
285KB
MD5c34ca44ce50fb36b96ce8e9c3690adc3
SHA17a39be3d5481f40b61499f7395ee20304fc445d0
SHA256364b78a4fd553bb4d17ab3872d6861be00b8b83de161112110630eefd0a82e41
SHA5129e3f5d57ac51777ebcb514f500bee95bafab81b82990bb0dd0ad41509b1b671822aefed1c387eb0ca76ddc982c2917af793ce29330a7f61918893f20021b0175
-
Filesize
221KB
MD550b23a52c943f47cbd684ab4de7e8aad
SHA13e35f5166629a65458072ca2b8c71fe0d2e9207c
SHA25683b6e776b638ecd5d4d8fb4cbc390c13079615f25465b08cb67243bb9e0b9d61
SHA512562ea1fff3f10bbd666070b8cd6bc57cf03ebdfd1e19b4ff7e5f33fa10617321bbcba49b385a00d7ad0493635f485944b87490fed19a3952d68404b1e10cfc9f
-
Filesize
221KB
MD550b23a52c943f47cbd684ab4de7e8aad
SHA13e35f5166629a65458072ca2b8c71fe0d2e9207c
SHA25683b6e776b638ecd5d4d8fb4cbc390c13079615f25465b08cb67243bb9e0b9d61
SHA512562ea1fff3f10bbd666070b8cd6bc57cf03ebdfd1e19b4ff7e5f33fa10617321bbcba49b385a00d7ad0493635f485944b87490fed19a3952d68404b1e10cfc9f