Analysis
-
max time kernel
147s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 22:48
Static task
static1
Behavioral task
behavioral1
Sample
43c2dc4d1595eae803346e406606bca2dac820fda89af1917d7762fb66cb2453.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
43c2dc4d1595eae803346e406606bca2dac820fda89af1917d7762fb66cb2453.exe
Resource
win10v2004-20230915-en
General
-
Target
43c2dc4d1595eae803346e406606bca2dac820fda89af1917d7762fb66cb2453.exe
-
Size
956KB
-
MD5
bc553eff5b4b8567f6691b3f345e890b
-
SHA1
f3dfb7d6a0689549b9d924ec1972f79c49b9a96c
-
SHA256
43c2dc4d1595eae803346e406606bca2dac820fda89af1917d7762fb66cb2453
-
SHA512
99019020e34df2ee3b7fc32cdd4db53e8eda933d653d2a02933bb52bf1627a63be789abe914159331d41eb6e14b83286aac4ac9de2c1fddef1073cafc617186b
-
SSDEEP
24576:KyolDkDv+9yI4KGT6QImxABsPh1xS0vWQwaOAIPfMS:RYkYyIFwR1TxBE
Malware Config
Extracted
redline
tuxiu
77.91.124.82:19071
-
auth_value
29610cdad07e7187eec70685a04b89fe
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral2/files/0x0009000000023123-34.dat family_redline behavioral2/files/0x0009000000023123-35.dat family_redline behavioral2/memory/3932-36-0x0000000000EC0000-0x0000000000EF0000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
pid Process 404 x9643145.exe 1776 x3806825.exe 5084 x9683513.exe 3644 g3053198.exe 3932 h8820298.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 43c2dc4d1595eae803346e406606bca2dac820fda89af1917d7762fb66cb2453.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x9643145.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x3806825.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x9683513.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3644 set thread context of 4296 3644 g3053198.exe 90 -
Program crash 2 IoCs
pid pid_target Process procid_target 1736 4296 WerFault.exe 90 852 3644 WerFault.exe 89 -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 3640 wrote to memory of 404 3640 43c2dc4d1595eae803346e406606bca2dac820fda89af1917d7762fb66cb2453.exe 86 PID 3640 wrote to memory of 404 3640 43c2dc4d1595eae803346e406606bca2dac820fda89af1917d7762fb66cb2453.exe 86 PID 3640 wrote to memory of 404 3640 43c2dc4d1595eae803346e406606bca2dac820fda89af1917d7762fb66cb2453.exe 86 PID 404 wrote to memory of 1776 404 x9643145.exe 87 PID 404 wrote to memory of 1776 404 x9643145.exe 87 PID 404 wrote to memory of 1776 404 x9643145.exe 87 PID 1776 wrote to memory of 5084 1776 x3806825.exe 88 PID 1776 wrote to memory of 5084 1776 x3806825.exe 88 PID 1776 wrote to memory of 5084 1776 x3806825.exe 88 PID 5084 wrote to memory of 3644 5084 x9683513.exe 89 PID 5084 wrote to memory of 3644 5084 x9683513.exe 89 PID 5084 wrote to memory of 3644 5084 x9683513.exe 89 PID 3644 wrote to memory of 4296 3644 g3053198.exe 90 PID 3644 wrote to memory of 4296 3644 g3053198.exe 90 PID 3644 wrote to memory of 4296 3644 g3053198.exe 90 PID 3644 wrote to memory of 4296 3644 g3053198.exe 90 PID 3644 wrote to memory of 4296 3644 g3053198.exe 90 PID 3644 wrote to memory of 4296 3644 g3053198.exe 90 PID 3644 wrote to memory of 4296 3644 g3053198.exe 90 PID 3644 wrote to memory of 4296 3644 g3053198.exe 90 PID 3644 wrote to memory of 4296 3644 g3053198.exe 90 PID 3644 wrote to memory of 4296 3644 g3053198.exe 90 PID 5084 wrote to memory of 3932 5084 x9683513.exe 97 PID 5084 wrote to memory of 3932 5084 x9683513.exe 97 PID 5084 wrote to memory of 3932 5084 x9683513.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\43c2dc4d1595eae803346e406606bca2dac820fda89af1917d7762fb66cb2453.exe"C:\Users\Admin\AppData\Local\Temp\43c2dc4d1595eae803346e406606bca2dac820fda89af1917d7762fb66cb2453.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9643145.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9643145.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3806825.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3806825.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9683513.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9683513.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3053198.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3053198.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4296 -s 5407⤵
- Program crash
PID:1736
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 5566⤵
- Program crash
PID:852
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8820298.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8820298.exe5⤵
- Executes dropped EXE
PID:3932
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3644 -ip 36441⤵PID:1952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4296 -ip 42961⤵PID:1716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854KB
MD5890333ca9002375508504fcb648ac858
SHA1a38e843e37293f159e855b08a23efa19d3a80272
SHA2560d4035174eac18016c596518166c080019dc4ca4d6431517d4eba610366630fa
SHA51297965d7a1f455441b1c6334fff5bf42769bf0743e33020c6d1702b9887442f8f53f924543e7f727488b55cea70f09fd82e645040f8a9715111cf92da3d66016c
-
Filesize
854KB
MD5890333ca9002375508504fcb648ac858
SHA1a38e843e37293f159e855b08a23efa19d3a80272
SHA2560d4035174eac18016c596518166c080019dc4ca4d6431517d4eba610366630fa
SHA51297965d7a1f455441b1c6334fff5bf42769bf0743e33020c6d1702b9887442f8f53f924543e7f727488b55cea70f09fd82e645040f8a9715111cf92da3d66016c
-
Filesize
580KB
MD5693c13b73b88d3a0b0700b46e9968354
SHA1bee93506fd55ef121a60de7f54ea56b1564c70d0
SHA25616a4f73018248b3856e5b57f6257b3c947c35f640b74841cd05c6e20638cf74c
SHA51298b650f26aa0e5eb6a8d22e65a5d6a6d48202b72cb050f70d337f4e8ca9c131736bf936a5a257632bd3eee01c45b160c0f0a61aa6b98271d95e44257d0aba75d
-
Filesize
580KB
MD5693c13b73b88d3a0b0700b46e9968354
SHA1bee93506fd55ef121a60de7f54ea56b1564c70d0
SHA25616a4f73018248b3856e5b57f6257b3c947c35f640b74841cd05c6e20638cf74c
SHA51298b650f26aa0e5eb6a8d22e65a5d6a6d48202b72cb050f70d337f4e8ca9c131736bf936a5a257632bd3eee01c45b160c0f0a61aa6b98271d95e44257d0aba75d
-
Filesize
404KB
MD55fc9ce5165093ee758aab5555afd5ad0
SHA1c4057c14f8ac5df3f4c6d3a1445bf641ba4dfed1
SHA25657b841463b196aea4b9a71597786cd94847c0f6c945e404d418e5582c432316b
SHA512900a9f64c2d30dd687ec680551e874dcc08127246ef72965a4599009e6c31e3134bb67e1ead669869d0f353d59c45acd6e48784432ab624783f371994fe9f733
-
Filesize
404KB
MD55fc9ce5165093ee758aab5555afd5ad0
SHA1c4057c14f8ac5df3f4c6d3a1445bf641ba4dfed1
SHA25657b841463b196aea4b9a71597786cd94847c0f6c945e404d418e5582c432316b
SHA512900a9f64c2d30dd687ec680551e874dcc08127246ef72965a4599009e6c31e3134bb67e1ead669869d0f353d59c45acd6e48784432ab624783f371994fe9f733
-
Filesize
396KB
MD5990f876fb678a1a40e7278c90be60411
SHA1f193c3018da9e115ed2d122de9f7dd8f4d053437
SHA2563da8b3174db326b473f2674d6e2776dbbc2b33d5ec003d152be9ae407f73738b
SHA512ece7dcf156f1926d7fc64af33ea0fe70a99d9552165f6bf451622310b70a51b1022d58252dfec0aef4bd10062f895f21639c21bd5a33d1a2c9f709b9f0941084
-
Filesize
396KB
MD5990f876fb678a1a40e7278c90be60411
SHA1f193c3018da9e115ed2d122de9f7dd8f4d053437
SHA2563da8b3174db326b473f2674d6e2776dbbc2b33d5ec003d152be9ae407f73738b
SHA512ece7dcf156f1926d7fc64af33ea0fe70a99d9552165f6bf451622310b70a51b1022d58252dfec0aef4bd10062f895f21639c21bd5a33d1a2c9f709b9f0941084
-
Filesize
175KB
MD526214ea3d65522bbcfe9f4e660dd71b4
SHA1c61d10e5011fbd52f10488c7fed1cdad4f8fc8bf
SHA256f9c100765a20a02cdc05d6f5651279bd261d7156c55840f49cdc2daa577a7be0
SHA512cf64daed825033f7fb145ef6452e217d8c7bb3c8a13b85173445e240608c5fe07fcac35a4ed6819158fbdde9633267bae59292b920a99645b52068ced55e7799
-
Filesize
175KB
MD526214ea3d65522bbcfe9f4e660dd71b4
SHA1c61d10e5011fbd52f10488c7fed1cdad4f8fc8bf
SHA256f9c100765a20a02cdc05d6f5651279bd261d7156c55840f49cdc2daa577a7be0
SHA512cf64daed825033f7fb145ef6452e217d8c7bb3c8a13b85173445e240608c5fe07fcac35a4ed6819158fbdde9633267bae59292b920a99645b52068ced55e7799