Analysis
-
max time kernel
146s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 05:01
Static task
static1
Behavioral task
behavioral1
Sample
cbd401468253a8b9e9f335b9f23c251c05c3a47eaa229a157559a16d33d2e93a.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
cbd401468253a8b9e9f335b9f23c251c05c3a47eaa229a157559a16d33d2e93a.exe
Resource
win10v2004-20230915-en
General
-
Target
cbd401468253a8b9e9f335b9f23c251c05c3a47eaa229a157559a16d33d2e93a.exe
-
Size
1.0MB
-
MD5
5bea432079dad8cfe031acf040e7a995
-
SHA1
179c49408b68c57b7f8b3e394aedb25238ab1533
-
SHA256
cbd401468253a8b9e9f335b9f23c251c05c3a47eaa229a157559a16d33d2e93a
-
SHA512
bcd8cccc91a517b8647625f95a50576864cac30d91f9d359422ec800aad833ec242d419c6827ccc17a9d26b85a0bd2db9b8eab17a5b00520a4a65f564be0a71a
-
SSDEEP
24576:HyuSR54Fwj6xtr6vqpVHvno2rtMRb/bj5H/TtzrY8:Sus5Ewj6xwvUVHvyBZ/Tt3Y
Malware Config
Extracted
redline
tuxiu
77.91.124.82:19071
-
auth_value
29610cdad07e7187eec70685a04b89fe
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral2/files/0x00070000000231e0-34.dat family_redline behavioral2/files/0x00070000000231e0-35.dat family_redline behavioral2/memory/632-36-0x0000000000200000-0x0000000000230000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
pid Process 5064 x7232108.exe 3400 x6112915.exe 2916 x6846176.exe 4668 g8921218.exe 632 h6842287.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x6846176.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cbd401468253a8b9e9f335b9f23c251c05c3a47eaa229a157559a16d33d2e93a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7232108.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x6112915.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4668 set thread context of 2000 4668 g8921218.exe 90 -
Program crash 2 IoCs
pid pid_target Process procid_target 3388 2000 WerFault.exe 90 2768 4668 WerFault.exe 88 -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 4328 wrote to memory of 5064 4328 cbd401468253a8b9e9f335b9f23c251c05c3a47eaa229a157559a16d33d2e93a.exe 84 PID 4328 wrote to memory of 5064 4328 cbd401468253a8b9e9f335b9f23c251c05c3a47eaa229a157559a16d33d2e93a.exe 84 PID 4328 wrote to memory of 5064 4328 cbd401468253a8b9e9f335b9f23c251c05c3a47eaa229a157559a16d33d2e93a.exe 84 PID 5064 wrote to memory of 3400 5064 x7232108.exe 86 PID 5064 wrote to memory of 3400 5064 x7232108.exe 86 PID 5064 wrote to memory of 3400 5064 x7232108.exe 86 PID 3400 wrote to memory of 2916 3400 x6112915.exe 87 PID 3400 wrote to memory of 2916 3400 x6112915.exe 87 PID 3400 wrote to memory of 2916 3400 x6112915.exe 87 PID 2916 wrote to memory of 4668 2916 x6846176.exe 88 PID 2916 wrote to memory of 4668 2916 x6846176.exe 88 PID 2916 wrote to memory of 4668 2916 x6846176.exe 88 PID 4668 wrote to memory of 2000 4668 g8921218.exe 90 PID 4668 wrote to memory of 2000 4668 g8921218.exe 90 PID 4668 wrote to memory of 2000 4668 g8921218.exe 90 PID 4668 wrote to memory of 2000 4668 g8921218.exe 90 PID 4668 wrote to memory of 2000 4668 g8921218.exe 90 PID 4668 wrote to memory of 2000 4668 g8921218.exe 90 PID 4668 wrote to memory of 2000 4668 g8921218.exe 90 PID 4668 wrote to memory of 2000 4668 g8921218.exe 90 PID 4668 wrote to memory of 2000 4668 g8921218.exe 90 PID 4668 wrote to memory of 2000 4668 g8921218.exe 90 PID 2916 wrote to memory of 632 2916 x6846176.exe 100 PID 2916 wrote to memory of 632 2916 x6846176.exe 100 PID 2916 wrote to memory of 632 2916 x6846176.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbd401468253a8b9e9f335b9f23c251c05c3a47eaa229a157559a16d33d2e93a.exe"C:\Users\Admin\AppData\Local\Temp\cbd401468253a8b9e9f335b9f23c251c05c3a47eaa229a157559a16d33d2e93a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7232108.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7232108.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6112915.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6112915.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6846176.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6846176.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8921218.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8921218.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 5407⤵
- Program crash
PID:3388
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4668 -s 5806⤵
- Program crash
PID:2768
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h6842287.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h6842287.exe5⤵
- Executes dropped EXE
PID:632
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4668 -ip 46681⤵PID:848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2000 -ip 20001⤵PID:3736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
933KB
MD547daf0f76da62686a01ad5d45937f50b
SHA1c532c56eba3cd18e7f9c2d06467033873c3772d1
SHA256b4e71cc5c18f9df4e158da19c7ec8fd131988399586adb5b1a26a0aca0a21c36
SHA512bf931134e6db3bd30793bcba92d01c3e8c16eb22bba1b842951847bcb35c706d15218e3835761d6242d20619c6c484dddc6d78526b9fa77c414869c19b2317bd
-
Filesize
933KB
MD547daf0f76da62686a01ad5d45937f50b
SHA1c532c56eba3cd18e7f9c2d06467033873c3772d1
SHA256b4e71cc5c18f9df4e158da19c7ec8fd131988399586adb5b1a26a0aca0a21c36
SHA512bf931134e6db3bd30793bcba92d01c3e8c16eb22bba1b842951847bcb35c706d15218e3835761d6242d20619c6c484dddc6d78526b9fa77c414869c19b2317bd
-
Filesize
629KB
MD506f7b87e2a344b07ea8ba74425f4f077
SHA11746cc165cdfe6a1f5b364c2d7ed5ff5f245b3ff
SHA2565b09f5971e7a59b64d398c770cea5983faef8120107f2c13d966056435d939ea
SHA51284cc2dd5df2b5b16ca6174904dd8c07ee1cd63fb37a618dd36f2f90a1173eed397d5e4fed9ffae19550b756e82d1c4f4f3e589892f11e9f406f36ee920fcf13a
-
Filesize
629KB
MD506f7b87e2a344b07ea8ba74425f4f077
SHA11746cc165cdfe6a1f5b364c2d7ed5ff5f245b3ff
SHA2565b09f5971e7a59b64d398c770cea5983faef8120107f2c13d966056435d939ea
SHA51284cc2dd5df2b5b16ca6174904dd8c07ee1cd63fb37a618dd36f2f90a1173eed397d5e4fed9ffae19550b756e82d1c4f4f3e589892f11e9f406f36ee920fcf13a
-
Filesize
443KB
MD576349ec5228153f1a64bf179aed3872b
SHA1eb1a97515e102a431b3f7c788bead674585c8d06
SHA256e2b126c330ecebad60abc81aa12ec4f3522b4f857a086cc7bc228fcd66503d5c
SHA51288f151a3390eed509efede84e86a4684baa1a3ef21537596a985bc4e1fa7eedf09e13679284606a6dd7d4a50029f0ef6ec7a5a7fb117d5bc3d8fe86f66ca7056
-
Filesize
443KB
MD576349ec5228153f1a64bf179aed3872b
SHA1eb1a97515e102a431b3f7c788bead674585c8d06
SHA256e2b126c330ecebad60abc81aa12ec4f3522b4f857a086cc7bc228fcd66503d5c
SHA51288f151a3390eed509efede84e86a4684baa1a3ef21537596a985bc4e1fa7eedf09e13679284606a6dd7d4a50029f0ef6ec7a5a7fb117d5bc3d8fe86f66ca7056
-
Filesize
700KB
MD5ad11342d70792eab10dbb7d14afefb95
SHA1958f5cfae062a5015307d100b7c0fab8c88f89ac
SHA256c38b8655ddbfeb902939f58d5e79114f7e5091d56227373c55f0fc2ba438cfda
SHA512bdd27c4630a10d4f8eba1f1856fb90bfdc0c1d2dae3060fb3419e7e4e0d3553e17679382c2b50518e4b481ab9e3b50cfa84cdbe139f82c8a220881fce75bdf25
-
Filesize
700KB
MD5ad11342d70792eab10dbb7d14afefb95
SHA1958f5cfae062a5015307d100b7c0fab8c88f89ac
SHA256c38b8655ddbfeb902939f58d5e79114f7e5091d56227373c55f0fc2ba438cfda
SHA512bdd27c4630a10d4f8eba1f1856fb90bfdc0c1d2dae3060fb3419e7e4e0d3553e17679382c2b50518e4b481ab9e3b50cfa84cdbe139f82c8a220881fce75bdf25
-
Filesize
174KB
MD53e9139392697dcae26c7f98ecace0547
SHA142e1a28bc44064f270df6f8bbe8ce936355545b3
SHA256dc5d0eb022d56d0fe9eea5b3e5b4fcff7d49295ec67df93aef4f2a767c81bebd
SHA512076e6b16809b3ffaeaee1022e937f248db8f9dda792c0963ab334bc70c29556e4e666d3cac8e32ebbd448092e398336a0c4212d0fd0f5935de0214d65e162748
-
Filesize
174KB
MD53e9139392697dcae26c7f98ecace0547
SHA142e1a28bc44064f270df6f8bbe8ce936355545b3
SHA256dc5d0eb022d56d0fe9eea5b3e5b4fcff7d49295ec67df93aef4f2a767c81bebd
SHA512076e6b16809b3ffaeaee1022e937f248db8f9dda792c0963ab334bc70c29556e4e666d3cac8e32ebbd448092e398336a0c4212d0fd0f5935de0214d65e162748