Analysis
-
max time kernel
131s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 12:31
Static task
static1
Behavioral task
behavioral1
Sample
214a1cc8f5959cc200cc9f2f4edb63509bd07c8d7d0163e416cb0866e224f849.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
214a1cc8f5959cc200cc9f2f4edb63509bd07c8d7d0163e416cb0866e224f849.exe
Resource
win10v2004-20230915-en
General
-
Target
214a1cc8f5959cc200cc9f2f4edb63509bd07c8d7d0163e416cb0866e224f849.exe
-
Size
1.2MB
-
MD5
c1012f4ae35b997bcb09b2f23a0a859f
-
SHA1
ec535af23c61a0d94c226420023802108746987f
-
SHA256
214a1cc8f5959cc200cc9f2f4edb63509bd07c8d7d0163e416cb0866e224f849
-
SHA512
6e357be39e575b779f6b4a166cd1d9f5475fe6686a7b73ad64f96f00b0e79c02da32a0a8433f5d43d435d51b45a180a551ee50c008fe5d9ebd5b9254e40dd71d
-
SSDEEP
24576:nyAacfrkPSr62KyBJ0KMpQIU+gEp7sjudHxc5bYK3YrTxp94pjj:yZcQPSr60sY+lQ2bK3YvP9aj
Malware Config
Extracted
redline
kukish
77.91.124.55:19071
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/files/0x0006000000015d20-50.dat family_redline behavioral1/files/0x0006000000015d20-53.dat family_redline behavioral1/files/0x0006000000015d20-55.dat family_redline behavioral1/files/0x0006000000015d20-54.dat family_redline behavioral1/memory/2568-56-0x0000000000FD0000-0x000000000100E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 2220 Iz8Gg2gw.exe 2376 XL0Yj2kZ.exe 2728 bh7Mp6ou.exe 2648 jf5ws5Or.exe 2656 1xa67AW3.exe 2568 2Xy980RK.exe -
Loads dropped DLL 12 IoCs
pid Process 2204 214a1cc8f5959cc200cc9f2f4edb63509bd07c8d7d0163e416cb0866e224f849.exe 2220 Iz8Gg2gw.exe 2220 Iz8Gg2gw.exe 2376 XL0Yj2kZ.exe 2376 XL0Yj2kZ.exe 2728 bh7Mp6ou.exe 2728 bh7Mp6ou.exe 2648 jf5ws5Or.exe 2648 jf5ws5Or.exe 2656 1xa67AW3.exe 2648 jf5ws5Or.exe 2568 2Xy980RK.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 214a1cc8f5959cc200cc9f2f4edb63509bd07c8d7d0163e416cb0866e224f849.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Iz8Gg2gw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" XL0Yj2kZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" bh7Mp6ou.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" jf5ws5Or.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2220 2204 214a1cc8f5959cc200cc9f2f4edb63509bd07c8d7d0163e416cb0866e224f849.exe 28 PID 2204 wrote to memory of 2220 2204 214a1cc8f5959cc200cc9f2f4edb63509bd07c8d7d0163e416cb0866e224f849.exe 28 PID 2204 wrote to memory of 2220 2204 214a1cc8f5959cc200cc9f2f4edb63509bd07c8d7d0163e416cb0866e224f849.exe 28 PID 2204 wrote to memory of 2220 2204 214a1cc8f5959cc200cc9f2f4edb63509bd07c8d7d0163e416cb0866e224f849.exe 28 PID 2204 wrote to memory of 2220 2204 214a1cc8f5959cc200cc9f2f4edb63509bd07c8d7d0163e416cb0866e224f849.exe 28 PID 2204 wrote to memory of 2220 2204 214a1cc8f5959cc200cc9f2f4edb63509bd07c8d7d0163e416cb0866e224f849.exe 28 PID 2204 wrote to memory of 2220 2204 214a1cc8f5959cc200cc9f2f4edb63509bd07c8d7d0163e416cb0866e224f849.exe 28 PID 2220 wrote to memory of 2376 2220 Iz8Gg2gw.exe 29 PID 2220 wrote to memory of 2376 2220 Iz8Gg2gw.exe 29 PID 2220 wrote to memory of 2376 2220 Iz8Gg2gw.exe 29 PID 2220 wrote to memory of 2376 2220 Iz8Gg2gw.exe 29 PID 2220 wrote to memory of 2376 2220 Iz8Gg2gw.exe 29 PID 2220 wrote to memory of 2376 2220 Iz8Gg2gw.exe 29 PID 2220 wrote to memory of 2376 2220 Iz8Gg2gw.exe 29 PID 2376 wrote to memory of 2728 2376 XL0Yj2kZ.exe 30 PID 2376 wrote to memory of 2728 2376 XL0Yj2kZ.exe 30 PID 2376 wrote to memory of 2728 2376 XL0Yj2kZ.exe 30 PID 2376 wrote to memory of 2728 2376 XL0Yj2kZ.exe 30 PID 2376 wrote to memory of 2728 2376 XL0Yj2kZ.exe 30 PID 2376 wrote to memory of 2728 2376 XL0Yj2kZ.exe 30 PID 2376 wrote to memory of 2728 2376 XL0Yj2kZ.exe 30 PID 2728 wrote to memory of 2648 2728 bh7Mp6ou.exe 31 PID 2728 wrote to memory of 2648 2728 bh7Mp6ou.exe 31 PID 2728 wrote to memory of 2648 2728 bh7Mp6ou.exe 31 PID 2728 wrote to memory of 2648 2728 bh7Mp6ou.exe 31 PID 2728 wrote to memory of 2648 2728 bh7Mp6ou.exe 31 PID 2728 wrote to memory of 2648 2728 bh7Mp6ou.exe 31 PID 2728 wrote to memory of 2648 2728 bh7Mp6ou.exe 31 PID 2648 wrote to memory of 2656 2648 jf5ws5Or.exe 32 PID 2648 wrote to memory of 2656 2648 jf5ws5Or.exe 32 PID 2648 wrote to memory of 2656 2648 jf5ws5Or.exe 32 PID 2648 wrote to memory of 2656 2648 jf5ws5Or.exe 32 PID 2648 wrote to memory of 2656 2648 jf5ws5Or.exe 32 PID 2648 wrote to memory of 2656 2648 jf5ws5Or.exe 32 PID 2648 wrote to memory of 2656 2648 jf5ws5Or.exe 32 PID 2648 wrote to memory of 2568 2648 jf5ws5Or.exe 33 PID 2648 wrote to memory of 2568 2648 jf5ws5Or.exe 33 PID 2648 wrote to memory of 2568 2648 jf5ws5Or.exe 33 PID 2648 wrote to memory of 2568 2648 jf5ws5Or.exe 33 PID 2648 wrote to memory of 2568 2648 jf5ws5Or.exe 33 PID 2648 wrote to memory of 2568 2648 jf5ws5Or.exe 33 PID 2648 wrote to memory of 2568 2648 jf5ws5Or.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\214a1cc8f5959cc200cc9f2f4edb63509bd07c8d7d0163e416cb0866e224f849.exe"C:\Users\Admin\AppData\Local\Temp\214a1cc8f5959cc200cc9f2f4edb63509bd07c8d7d0163e416cb0866e224f849.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Iz8Gg2gw.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Iz8Gg2gw.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\XL0Yj2kZ.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\XL0Yj2kZ.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bh7Mp6ou.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bh7Mp6ou.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\jf5ws5Or.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\jf5ws5Or.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1xa67AW3.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1xa67AW3.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2656
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Xy980RK.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Xy980RK.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2568
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD553a65465a0b5e5810d22b0e60cb6b2e2
SHA10570cf7fb406f3749dacd77f7e24540c752c191d
SHA256316148d301953ae030b0ef50004a7e0436d1e01846a506117ed46489cad26e58
SHA51259d69e997ea2a6f00094586cc69f8edd54765944ad5349eb9f1817803a426ba17610c05ee2d8e9d8e67c618052fea86d004d6a52b7fd817dbc9da8a248c6a8e8
-
Filesize
1.1MB
MD553a65465a0b5e5810d22b0e60cb6b2e2
SHA10570cf7fb406f3749dacd77f7e24540c752c191d
SHA256316148d301953ae030b0ef50004a7e0436d1e01846a506117ed46489cad26e58
SHA51259d69e997ea2a6f00094586cc69f8edd54765944ad5349eb9f1817803a426ba17610c05ee2d8e9d8e67c618052fea86d004d6a52b7fd817dbc9da8a248c6a8e8
-
Filesize
925KB
MD5bd25c811d4384c4a2dc341565be15eda
SHA15631cf539d9baac273db8e0d72f75b04e136d51a
SHA2561da7b5207df5cb3454dfce0d139f865f3f9fd185a3a03c4522acc7da8e7e7e6d
SHA512169b9cd49b7318fefa85381a8403d6632d2e175250749ff79f270eaaf53ed21a43e1d14722ec8a42cfc33cbd322fdcb37d4551e944d624293b84ce56fc749d40
-
Filesize
925KB
MD5bd25c811d4384c4a2dc341565be15eda
SHA15631cf539d9baac273db8e0d72f75b04e136d51a
SHA2561da7b5207df5cb3454dfce0d139f865f3f9fd185a3a03c4522acc7da8e7e7e6d
SHA512169b9cd49b7318fefa85381a8403d6632d2e175250749ff79f270eaaf53ed21a43e1d14722ec8a42cfc33cbd322fdcb37d4551e944d624293b84ce56fc749d40
-
Filesize
514KB
MD5e44f5bd7decb363d5fad6022b4137eda
SHA163e15742c7f75397cf62a916da5598f924725572
SHA2567a5943d94f31c9ba20c299eca390426c86f4739a2f48d22b7db739376b7f3da8
SHA5124480b3a25db660405db8e614b2bd138ca74696905164404aba7c3ce37bd539a46b377f50001f593e8856e6d8d2a46e8a1e6f93c156320998a087e10b3bb624f8
-
Filesize
514KB
MD5e44f5bd7decb363d5fad6022b4137eda
SHA163e15742c7f75397cf62a916da5598f924725572
SHA2567a5943d94f31c9ba20c299eca390426c86f4739a2f48d22b7db739376b7f3da8
SHA5124480b3a25db660405db8e614b2bd138ca74696905164404aba7c3ce37bd539a46b377f50001f593e8856e6d8d2a46e8a1e6f93c156320998a087e10b3bb624f8
-
Filesize
319KB
MD5d4faa67e48c7aadf68863a3f072520dd
SHA1d676f1c8c2a438cddaf50b3553b145dfb9765076
SHA25671c1703769acab737ce8f484c9f1b50ea16a4fc9d79ca32b7559ec3aeb54c7d6
SHA512af536112a52decbeab789e6674d5578e9150198e3ab0d410883ec0329da3bb4d5eb8378b5c5bf6ee77da4205d2aa34cece203e5e3d0513abe3d1f5b954aa3290
-
Filesize
319KB
MD5d4faa67e48c7aadf68863a3f072520dd
SHA1d676f1c8c2a438cddaf50b3553b145dfb9765076
SHA25671c1703769acab737ce8f484c9f1b50ea16a4fc9d79ca32b7559ec3aeb54c7d6
SHA512af536112a52decbeab789e6674d5578e9150198e3ab0d410883ec0329da3bb4d5eb8378b5c5bf6ee77da4205d2aa34cece203e5e3d0513abe3d1f5b954aa3290
-
Filesize
180KB
MD53f305144feb3040cf41b216841537ec2
SHA1ae9066cc3b40be6250e7e6a90bcc2de160067b84
SHA25689fec546032f1fc58fb08e79ab626d7e2401a5958b81a928ab5e0c1540e180b1
SHA512ca3993ad5d0a376809e304a49eaf81c8ba3ecbe40e7085573698b1870291034f9bbfdec552b640b32d92b2f0b359f33c40f694f401abaf81d70ab7a6484a798e
-
Filesize
180KB
MD53f305144feb3040cf41b216841537ec2
SHA1ae9066cc3b40be6250e7e6a90bcc2de160067b84
SHA25689fec546032f1fc58fb08e79ab626d7e2401a5958b81a928ab5e0c1540e180b1
SHA512ca3993ad5d0a376809e304a49eaf81c8ba3ecbe40e7085573698b1870291034f9bbfdec552b640b32d92b2f0b359f33c40f694f401abaf81d70ab7a6484a798e
-
Filesize
180KB
MD53f305144feb3040cf41b216841537ec2
SHA1ae9066cc3b40be6250e7e6a90bcc2de160067b84
SHA25689fec546032f1fc58fb08e79ab626d7e2401a5958b81a928ab5e0c1540e180b1
SHA512ca3993ad5d0a376809e304a49eaf81c8ba3ecbe40e7085573698b1870291034f9bbfdec552b640b32d92b2f0b359f33c40f694f401abaf81d70ab7a6484a798e
-
Filesize
221KB
MD5a799c8552b3bba8f2cf25a6c58b9fe70
SHA1af644f1de215c2e20cd403c820189f02d9f30192
SHA256e96457d461e91a891c55deaecaa157494184818599b6b140dad83a4c6a5d039e
SHA5128b0a21c80d91093b76310b49fcda3a9fba8a589280020ffbf6204d5b90cee0fd07240ed6cebc29b2a55862ffb747b611f4060189455e13747d81df567d590786
-
Filesize
221KB
MD5a799c8552b3bba8f2cf25a6c58b9fe70
SHA1af644f1de215c2e20cd403c820189f02d9f30192
SHA256e96457d461e91a891c55deaecaa157494184818599b6b140dad83a4c6a5d039e
SHA5128b0a21c80d91093b76310b49fcda3a9fba8a589280020ffbf6204d5b90cee0fd07240ed6cebc29b2a55862ffb747b611f4060189455e13747d81df567d590786
-
Filesize
1.1MB
MD553a65465a0b5e5810d22b0e60cb6b2e2
SHA10570cf7fb406f3749dacd77f7e24540c752c191d
SHA256316148d301953ae030b0ef50004a7e0436d1e01846a506117ed46489cad26e58
SHA51259d69e997ea2a6f00094586cc69f8edd54765944ad5349eb9f1817803a426ba17610c05ee2d8e9d8e67c618052fea86d004d6a52b7fd817dbc9da8a248c6a8e8
-
Filesize
1.1MB
MD553a65465a0b5e5810d22b0e60cb6b2e2
SHA10570cf7fb406f3749dacd77f7e24540c752c191d
SHA256316148d301953ae030b0ef50004a7e0436d1e01846a506117ed46489cad26e58
SHA51259d69e997ea2a6f00094586cc69f8edd54765944ad5349eb9f1817803a426ba17610c05ee2d8e9d8e67c618052fea86d004d6a52b7fd817dbc9da8a248c6a8e8
-
Filesize
925KB
MD5bd25c811d4384c4a2dc341565be15eda
SHA15631cf539d9baac273db8e0d72f75b04e136d51a
SHA2561da7b5207df5cb3454dfce0d139f865f3f9fd185a3a03c4522acc7da8e7e7e6d
SHA512169b9cd49b7318fefa85381a8403d6632d2e175250749ff79f270eaaf53ed21a43e1d14722ec8a42cfc33cbd322fdcb37d4551e944d624293b84ce56fc749d40
-
Filesize
925KB
MD5bd25c811d4384c4a2dc341565be15eda
SHA15631cf539d9baac273db8e0d72f75b04e136d51a
SHA2561da7b5207df5cb3454dfce0d139f865f3f9fd185a3a03c4522acc7da8e7e7e6d
SHA512169b9cd49b7318fefa85381a8403d6632d2e175250749ff79f270eaaf53ed21a43e1d14722ec8a42cfc33cbd322fdcb37d4551e944d624293b84ce56fc749d40
-
Filesize
514KB
MD5e44f5bd7decb363d5fad6022b4137eda
SHA163e15742c7f75397cf62a916da5598f924725572
SHA2567a5943d94f31c9ba20c299eca390426c86f4739a2f48d22b7db739376b7f3da8
SHA5124480b3a25db660405db8e614b2bd138ca74696905164404aba7c3ce37bd539a46b377f50001f593e8856e6d8d2a46e8a1e6f93c156320998a087e10b3bb624f8
-
Filesize
514KB
MD5e44f5bd7decb363d5fad6022b4137eda
SHA163e15742c7f75397cf62a916da5598f924725572
SHA2567a5943d94f31c9ba20c299eca390426c86f4739a2f48d22b7db739376b7f3da8
SHA5124480b3a25db660405db8e614b2bd138ca74696905164404aba7c3ce37bd539a46b377f50001f593e8856e6d8d2a46e8a1e6f93c156320998a087e10b3bb624f8
-
Filesize
319KB
MD5d4faa67e48c7aadf68863a3f072520dd
SHA1d676f1c8c2a438cddaf50b3553b145dfb9765076
SHA25671c1703769acab737ce8f484c9f1b50ea16a4fc9d79ca32b7559ec3aeb54c7d6
SHA512af536112a52decbeab789e6674d5578e9150198e3ab0d410883ec0329da3bb4d5eb8378b5c5bf6ee77da4205d2aa34cece203e5e3d0513abe3d1f5b954aa3290
-
Filesize
319KB
MD5d4faa67e48c7aadf68863a3f072520dd
SHA1d676f1c8c2a438cddaf50b3553b145dfb9765076
SHA25671c1703769acab737ce8f484c9f1b50ea16a4fc9d79ca32b7559ec3aeb54c7d6
SHA512af536112a52decbeab789e6674d5578e9150198e3ab0d410883ec0329da3bb4d5eb8378b5c5bf6ee77da4205d2aa34cece203e5e3d0513abe3d1f5b954aa3290
-
Filesize
180KB
MD53f305144feb3040cf41b216841537ec2
SHA1ae9066cc3b40be6250e7e6a90bcc2de160067b84
SHA25689fec546032f1fc58fb08e79ab626d7e2401a5958b81a928ab5e0c1540e180b1
SHA512ca3993ad5d0a376809e304a49eaf81c8ba3ecbe40e7085573698b1870291034f9bbfdec552b640b32d92b2f0b359f33c40f694f401abaf81d70ab7a6484a798e
-
Filesize
180KB
MD53f305144feb3040cf41b216841537ec2
SHA1ae9066cc3b40be6250e7e6a90bcc2de160067b84
SHA25689fec546032f1fc58fb08e79ab626d7e2401a5958b81a928ab5e0c1540e180b1
SHA512ca3993ad5d0a376809e304a49eaf81c8ba3ecbe40e7085573698b1870291034f9bbfdec552b640b32d92b2f0b359f33c40f694f401abaf81d70ab7a6484a798e
-
Filesize
221KB
MD5a799c8552b3bba8f2cf25a6c58b9fe70
SHA1af644f1de215c2e20cd403c820189f02d9f30192
SHA256e96457d461e91a891c55deaecaa157494184818599b6b140dad83a4c6a5d039e
SHA5128b0a21c80d91093b76310b49fcda3a9fba8a589280020ffbf6204d5b90cee0fd07240ed6cebc29b2a55862ffb747b611f4060189455e13747d81df567d590786
-
Filesize
221KB
MD5a799c8552b3bba8f2cf25a6c58b9fe70
SHA1af644f1de215c2e20cd403c820189f02d9f30192
SHA256e96457d461e91a891c55deaecaa157494184818599b6b140dad83a4c6a5d039e
SHA5128b0a21c80d91093b76310b49fcda3a9fba8a589280020ffbf6204d5b90cee0fd07240ed6cebc29b2a55862ffb747b611f4060189455e13747d81df567d590786