Analysis

  • max time kernel
    166s
  • max time network
    213s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 04:07

General

  • Target

    719ce53ae8f59243cf658e0503344034fc34bb55c93c0b274aebcc1e2a04ea31.exe

  • Size

    514KB

  • MD5

    11f045680800970ca3dd16dfb37e5f1d

  • SHA1

    4b9969886c5d4e371004f4bbc3d183d5c28c7699

  • SHA256

    719ce53ae8f59243cf658e0503344034fc34bb55c93c0b274aebcc1e2a04ea31

  • SHA512

    942f921448aa6a29565b2350293e886a624ab878930fe96f456daf95801a4087f8193b145144d74d57e08a33f2e71009ffb99da649044746c180b7eb38452b1e

  • SSDEEP

    12288:WMrOy90TJJ204VJ5otYhixnw6O8EbJ27um8tMeiOce+q:MyKJ2fX6Og+6ODbJs58tRisJ

Malware Config

Extracted

Family

redline

Botnet

trush

C2

77.91.124.82:19071

Attributes
  • auth_value

    c13814867cde8193679cd0cad2d774be

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\719ce53ae8f59243cf658e0503344034fc34bb55c93c0b274aebcc1e2a04ea31.exe
    "C:\Users\Admin\AppData\Local\Temp\719ce53ae8f59243cf658e0503344034fc34bb55c93c0b274aebcc1e2a04ea31.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2632
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8649320.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8649320.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2344
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a0187137.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a0187137.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2576
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
            PID:2536
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 272
            4⤵
            • Loads dropped DLL
            • Program crash
            PID:2144

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8649320.exe

      Filesize

      412KB

      MD5

      07829f13f11a598efa17a8356430cc09

      SHA1

      46efb61d78432554e617bb9abc9ae4487d5318ab

      SHA256

      2f30c99ad745a8c7eccaa284bacef3df95339338302d9a36be5ce4988fcc9603

      SHA512

      69f52d635386e7d72819262678ce5c68618fa408a71b2d16c6ec5486ecc4132aa1bdd33c82ebc0e95a911c690b44ee725854101540208d3a4dd3abf37861445b

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8649320.exe

      Filesize

      412KB

      MD5

      07829f13f11a598efa17a8356430cc09

      SHA1

      46efb61d78432554e617bb9abc9ae4487d5318ab

      SHA256

      2f30c99ad745a8c7eccaa284bacef3df95339338302d9a36be5ce4988fcc9603

      SHA512

      69f52d635386e7d72819262678ce5c68618fa408a71b2d16c6ec5486ecc4132aa1bdd33c82ebc0e95a911c690b44ee725854101540208d3a4dd3abf37861445b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a0187137.exe

      Filesize

      384KB

      MD5

      2b419b3eea8654cd1402c683653ff6ad

      SHA1

      d59bcde3bb513deee8360d593673b1212b082d66

      SHA256

      0828a5e5252351ffb0c2038ea471e252766dab3df7f40d5e79fc46e35e4d0dac

      SHA512

      f3ae9e24b37012ce6685b6f87fa5a63125a46e84839c56d49b328987ef381d802c0d0d1797d2e60d18a341a1938694b501568fa60606053df2af1bb98d55a5aa

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a0187137.exe

      Filesize

      384KB

      MD5

      2b419b3eea8654cd1402c683653ff6ad

      SHA1

      d59bcde3bb513deee8360d593673b1212b082d66

      SHA256

      0828a5e5252351ffb0c2038ea471e252766dab3df7f40d5e79fc46e35e4d0dac

      SHA512

      f3ae9e24b37012ce6685b6f87fa5a63125a46e84839c56d49b328987ef381d802c0d0d1797d2e60d18a341a1938694b501568fa60606053df2af1bb98d55a5aa

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v8649320.exe

      Filesize

      412KB

      MD5

      07829f13f11a598efa17a8356430cc09

      SHA1

      46efb61d78432554e617bb9abc9ae4487d5318ab

      SHA256

      2f30c99ad745a8c7eccaa284bacef3df95339338302d9a36be5ce4988fcc9603

      SHA512

      69f52d635386e7d72819262678ce5c68618fa408a71b2d16c6ec5486ecc4132aa1bdd33c82ebc0e95a911c690b44ee725854101540208d3a4dd3abf37861445b

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v8649320.exe

      Filesize

      412KB

      MD5

      07829f13f11a598efa17a8356430cc09

      SHA1

      46efb61d78432554e617bb9abc9ae4487d5318ab

      SHA256

      2f30c99ad745a8c7eccaa284bacef3df95339338302d9a36be5ce4988fcc9603

      SHA512

      69f52d635386e7d72819262678ce5c68618fa408a71b2d16c6ec5486ecc4132aa1bdd33c82ebc0e95a911c690b44ee725854101540208d3a4dd3abf37861445b

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\a0187137.exe

      Filesize

      384KB

      MD5

      2b419b3eea8654cd1402c683653ff6ad

      SHA1

      d59bcde3bb513deee8360d593673b1212b082d66

      SHA256

      0828a5e5252351ffb0c2038ea471e252766dab3df7f40d5e79fc46e35e4d0dac

      SHA512

      f3ae9e24b37012ce6685b6f87fa5a63125a46e84839c56d49b328987ef381d802c0d0d1797d2e60d18a341a1938694b501568fa60606053df2af1bb98d55a5aa

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\a0187137.exe

      Filesize

      384KB

      MD5

      2b419b3eea8654cd1402c683653ff6ad

      SHA1

      d59bcde3bb513deee8360d593673b1212b082d66

      SHA256

      0828a5e5252351ffb0c2038ea471e252766dab3df7f40d5e79fc46e35e4d0dac

      SHA512

      f3ae9e24b37012ce6685b6f87fa5a63125a46e84839c56d49b328987ef381d802c0d0d1797d2e60d18a341a1938694b501568fa60606053df2af1bb98d55a5aa

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\a0187137.exe

      Filesize

      384KB

      MD5

      2b419b3eea8654cd1402c683653ff6ad

      SHA1

      d59bcde3bb513deee8360d593673b1212b082d66

      SHA256

      0828a5e5252351ffb0c2038ea471e252766dab3df7f40d5e79fc46e35e4d0dac

      SHA512

      f3ae9e24b37012ce6685b6f87fa5a63125a46e84839c56d49b328987ef381d802c0d0d1797d2e60d18a341a1938694b501568fa60606053df2af1bb98d55a5aa

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\a0187137.exe

      Filesize

      384KB

      MD5

      2b419b3eea8654cd1402c683653ff6ad

      SHA1

      d59bcde3bb513deee8360d593673b1212b082d66

      SHA256

      0828a5e5252351ffb0c2038ea471e252766dab3df7f40d5e79fc46e35e4d0dac

      SHA512

      f3ae9e24b37012ce6685b6f87fa5a63125a46e84839c56d49b328987ef381d802c0d0d1797d2e60d18a341a1938694b501568fa60606053df2af1bb98d55a5aa

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\a0187137.exe

      Filesize

      384KB

      MD5

      2b419b3eea8654cd1402c683653ff6ad

      SHA1

      d59bcde3bb513deee8360d593673b1212b082d66

      SHA256

      0828a5e5252351ffb0c2038ea471e252766dab3df7f40d5e79fc46e35e4d0dac

      SHA512

      f3ae9e24b37012ce6685b6f87fa5a63125a46e84839c56d49b328987ef381d802c0d0d1797d2e60d18a341a1938694b501568fa60606053df2af1bb98d55a5aa

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\a0187137.exe

      Filesize

      384KB

      MD5

      2b419b3eea8654cd1402c683653ff6ad

      SHA1

      d59bcde3bb513deee8360d593673b1212b082d66

      SHA256

      0828a5e5252351ffb0c2038ea471e252766dab3df7f40d5e79fc46e35e4d0dac

      SHA512

      f3ae9e24b37012ce6685b6f87fa5a63125a46e84839c56d49b328987ef381d802c0d0d1797d2e60d18a341a1938694b501568fa60606053df2af1bb98d55a5aa

    • memory/2536-22-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2536-25-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2536-29-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2536-27-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2536-24-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/2536-23-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2536-21-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2536-33-0x0000000000230000-0x0000000000236000-memory.dmp

      Filesize

      24KB

    • memory/2536-20-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB