Analysis
-
max time kernel
137s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 04:54
Static task
static1
Behavioral task
behavioral1
Sample
486d802e6f6ffd2647f18868f7841ae7f1ff018adba25344a82a08acfbc7e0a8.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
486d802e6f6ffd2647f18868f7841ae7f1ff018adba25344a82a08acfbc7e0a8.exe
Resource
win10v2004-20230915-en
General
-
Target
486d802e6f6ffd2647f18868f7841ae7f1ff018adba25344a82a08acfbc7e0a8.exe
-
Size
1.0MB
-
MD5
4c77a170f32fd3bdbd05377a1e17bd82
-
SHA1
36b4c1c8bd3014d92884e6f8e0c7de55cd63c5ec
-
SHA256
486d802e6f6ffd2647f18868f7841ae7f1ff018adba25344a82a08acfbc7e0a8
-
SHA512
5331f8c1c0c1161575f265444b5acb685af5d4d0af485eb059ae2d2426ebabbded68f40c7a1548116533754c4b5d77e991c849f02b87ada77a1d4a60001bb36a
-
SSDEEP
24576:/yB+ePuQ/7S4Z17W5YtICxhXHaRuGaXQf:Kke9zC5iIMH+Eg
Malware Config
Extracted
redline
tuxiu
77.91.124.82:19071
-
auth_value
29610cdad07e7187eec70685a04b89fe
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral2/files/0x000700000002304e-34.dat family_redline behavioral2/files/0x000700000002304e-35.dat family_redline behavioral2/memory/2392-37-0x0000000000F00000-0x0000000000F30000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
pid Process 1328 x4541201.exe 4464 x6482044.exe 2848 x7197008.exe 5056 g2159128.exe 2392 h6175226.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 486d802e6f6ffd2647f18868f7841ae7f1ff018adba25344a82a08acfbc7e0a8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x4541201.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x6482044.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x7197008.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5056 set thread context of 1628 5056 g2159128.exe 93 -
Program crash 2 IoCs
pid pid_target Process procid_target 3252 1628 WerFault.exe 93 4884 5056 WerFault.exe 91 -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 676 wrote to memory of 1328 676 486d802e6f6ffd2647f18868f7841ae7f1ff018adba25344a82a08acfbc7e0a8.exe 87 PID 676 wrote to memory of 1328 676 486d802e6f6ffd2647f18868f7841ae7f1ff018adba25344a82a08acfbc7e0a8.exe 87 PID 676 wrote to memory of 1328 676 486d802e6f6ffd2647f18868f7841ae7f1ff018adba25344a82a08acfbc7e0a8.exe 87 PID 1328 wrote to memory of 4464 1328 x4541201.exe 89 PID 1328 wrote to memory of 4464 1328 x4541201.exe 89 PID 1328 wrote to memory of 4464 1328 x4541201.exe 89 PID 4464 wrote to memory of 2848 4464 x6482044.exe 90 PID 4464 wrote to memory of 2848 4464 x6482044.exe 90 PID 4464 wrote to memory of 2848 4464 x6482044.exe 90 PID 2848 wrote to memory of 5056 2848 x7197008.exe 91 PID 2848 wrote to memory of 5056 2848 x7197008.exe 91 PID 2848 wrote to memory of 5056 2848 x7197008.exe 91 PID 5056 wrote to memory of 1628 5056 g2159128.exe 93 PID 5056 wrote to memory of 1628 5056 g2159128.exe 93 PID 5056 wrote to memory of 1628 5056 g2159128.exe 93 PID 5056 wrote to memory of 1628 5056 g2159128.exe 93 PID 5056 wrote to memory of 1628 5056 g2159128.exe 93 PID 5056 wrote to memory of 1628 5056 g2159128.exe 93 PID 5056 wrote to memory of 1628 5056 g2159128.exe 93 PID 5056 wrote to memory of 1628 5056 g2159128.exe 93 PID 5056 wrote to memory of 1628 5056 g2159128.exe 93 PID 5056 wrote to memory of 1628 5056 g2159128.exe 93 PID 2848 wrote to memory of 2392 2848 x7197008.exe 100 PID 2848 wrote to memory of 2392 2848 x7197008.exe 100 PID 2848 wrote to memory of 2392 2848 x7197008.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\486d802e6f6ffd2647f18868f7841ae7f1ff018adba25344a82a08acfbc7e0a8.exe"C:\Users\Admin\AppData\Local\Temp\486d802e6f6ffd2647f18868f7841ae7f1ff018adba25344a82a08acfbc7e0a8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4541201.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4541201.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6482044.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6482044.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7197008.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7197008.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2159128.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2159128.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:1628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 5407⤵
- Program crash
PID:3252
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 1366⤵
- Program crash
PID:4884
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h6175226.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h6175226.exe5⤵
- Executes dropped EXE
PID:2392
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 5056 -ip 50561⤵PID:2328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1628 -ip 16281⤵PID:4952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
932KB
MD51f8cb501734a3c4b435833bddd8c047a
SHA1b36cfa6d3060d5f27e55c6a893841acc6c6ee0d1
SHA256d403acfb9efa6f07e0de2b7141da3b7b0123bfff89bc9c9a3ad1c5dfa41e7031
SHA5120ecaffbee321d132d04a5e0bd53c3f08244f513cc7c4629bf53b6f54054bb6548e42ddee943ff4b368951d6d83c9e1c953c9c4f434e560b4e6bb70e9fb0dba0f
-
Filesize
932KB
MD51f8cb501734a3c4b435833bddd8c047a
SHA1b36cfa6d3060d5f27e55c6a893841acc6c6ee0d1
SHA256d403acfb9efa6f07e0de2b7141da3b7b0123bfff89bc9c9a3ad1c5dfa41e7031
SHA5120ecaffbee321d132d04a5e0bd53c3f08244f513cc7c4629bf53b6f54054bb6548e42ddee943ff4b368951d6d83c9e1c953c9c4f434e560b4e6bb70e9fb0dba0f
-
Filesize
628KB
MD55a52cd501bd5949ed07943e5bba9eacb
SHA1872dd0e48ed629c25b7dfd7024e9947cb6618887
SHA256408dc9c90ccd7f73b54240c85de2948c3b5684d4e594b49cbd5b87ccd303d36b
SHA51219cc6680233cbca2184b5494a921b63c27d3600543286c73cee4d723d626f7a71a1a82fdcc727872b734b02016148904d8ae3daf32edad15ef63dba4d9fece14
-
Filesize
628KB
MD55a52cd501bd5949ed07943e5bba9eacb
SHA1872dd0e48ed629c25b7dfd7024e9947cb6618887
SHA256408dc9c90ccd7f73b54240c85de2948c3b5684d4e594b49cbd5b87ccd303d36b
SHA51219cc6680233cbca2184b5494a921b63c27d3600543286c73cee4d723d626f7a71a1a82fdcc727872b734b02016148904d8ae3daf32edad15ef63dba4d9fece14
-
Filesize
443KB
MD5033bf0754723e9bfcafede0fa2a6940c
SHA1404488e3b9fd71036ee29d81d93d8f8ce4a6ca2a
SHA256c27f7be4cadd24a35393a22f8d4f2640bbed6ce8130d792e183d0ad119b238d6
SHA512811c3c8af438ab39410c83176715ba6fab756595675d89f4527e1e0e83c50e69fc674e6c072535e9045e5333b02f9d65ab5a5f6dc800ac6e8bdd074d7273b40a
-
Filesize
443KB
MD5033bf0754723e9bfcafede0fa2a6940c
SHA1404488e3b9fd71036ee29d81d93d8f8ce4a6ca2a
SHA256c27f7be4cadd24a35393a22f8d4f2640bbed6ce8130d792e183d0ad119b238d6
SHA512811c3c8af438ab39410c83176715ba6fab756595675d89f4527e1e0e83c50e69fc674e6c072535e9045e5333b02f9d65ab5a5f6dc800ac6e8bdd074d7273b40a
-
Filesize
700KB
MD5c691e82760eac0752db2d5dbf44179c1
SHA18c404e7c09d23990c0982c43691e1b4af6531034
SHA256adb8b86aee4a26be5c24703643a903da0b0a7215273f3cefc34a5191ab02b1ae
SHA512d77230e701a1bc8fc9167b36b98011ff09384e66f79c270bb4255fa1a919eccf5ffd925dc65488ecb2d70cdc5460f1ca31ba5a8cf84ce0704228b76a550a85b5
-
Filesize
700KB
MD5c691e82760eac0752db2d5dbf44179c1
SHA18c404e7c09d23990c0982c43691e1b4af6531034
SHA256adb8b86aee4a26be5c24703643a903da0b0a7215273f3cefc34a5191ab02b1ae
SHA512d77230e701a1bc8fc9167b36b98011ff09384e66f79c270bb4255fa1a919eccf5ffd925dc65488ecb2d70cdc5460f1ca31ba5a8cf84ce0704228b76a550a85b5
-
Filesize
174KB
MD5e8c7e2f06bf01cbffc4f902c8c38842b
SHA1a3be335591da911731fbaf0b57207ebc5b46f5d4
SHA256a010feff465fffb1824d2d4b18edbbabbc2b0718eb8d921c02e3b5fb2f02500c
SHA5127b6794f6ee4fe4a73b235ef83f586769084d3e5d3c0ef117b810e48e9be02d28f7434e210265f3e1c34dbb75160584e3bf6a1f58e36e71b46dfa972c591ee109
-
Filesize
174KB
MD5e8c7e2f06bf01cbffc4f902c8c38842b
SHA1a3be335591da911731fbaf0b57207ebc5b46f5d4
SHA256a010feff465fffb1824d2d4b18edbbabbc2b0718eb8d921c02e3b5fb2f02500c
SHA5127b6794f6ee4fe4a73b235ef83f586769084d3e5d3c0ef117b810e48e9be02d28f7434e210265f3e1c34dbb75160584e3bf6a1f58e36e71b46dfa972c591ee109