Analysis
-
max time kernel
155s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
16/10/2023, 03:06
Static task
static1
Behavioral task
behavioral1
Sample
16b57a52fbdc94326ec0f9428a6eb35c6e65f297463a23c44d657c4c22591d91.exe
Resource
win10v2004-20230915-en
General
-
Target
16b57a52fbdc94326ec0f9428a6eb35c6e65f297463a23c44d657c4c22591d91.exe
-
Size
1.1MB
-
MD5
0c2bb7640eaf5b885e02b16430ba7ca4
-
SHA1
847f3179118541ac5327d6d3ab3fa7a6a9c0f47e
-
SHA256
16b57a52fbdc94326ec0f9428a6eb35c6e65f297463a23c44d657c4c22591d91
-
SHA512
ea208ed2ecb5d40febe85b24ad8a585080a966254e9cc7a01ac531ff3be6b3d669e7d47da2f70187424252313ded3402c13bc0f64efe97e2a1762f582e12a9a4
-
SSDEEP
24576:ZytqsEO/SrTrP/pobIZoZ4IompQOJoEame6Johpg+VknbTcS13hr:M9KPrpYwoqIompNNJepleHco3
Malware Config
Extracted
redline
kukish
77.91.124.55:19071
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/files/0x00060000000230ac-41.dat family_redline behavioral1/files/0x00060000000230ac-42.dat family_redline behavioral1/memory/3544-44-0x0000000000E50000-0x0000000000E8E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 3672 mA6wN3iA.exe 4744 qf5GC8sd.exe 4452 An1TZ3nl.exe 4380 cl6Iz1BB.exe 3724 1Id14BC5.exe 3544 2Qd538fN.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 16b57a52fbdc94326ec0f9428a6eb35c6e65f297463a23c44d657c4c22591d91.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" mA6wN3iA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" qf5GC8sd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" An1TZ3nl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" cl6Iz1BB.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3724 set thread context of 4964 3724 1Id14BC5.exe 89 -
Program crash 3 IoCs
pid pid_target Process procid_target 872 4964 WerFault.exe 89 4496 3724 WerFault.exe 87 1340 4964 WerFault.exe 89 -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 208 wrote to memory of 3672 208 16b57a52fbdc94326ec0f9428a6eb35c6e65f297463a23c44d657c4c22591d91.exe 83 PID 208 wrote to memory of 3672 208 16b57a52fbdc94326ec0f9428a6eb35c6e65f297463a23c44d657c4c22591d91.exe 83 PID 208 wrote to memory of 3672 208 16b57a52fbdc94326ec0f9428a6eb35c6e65f297463a23c44d657c4c22591d91.exe 83 PID 3672 wrote to memory of 4744 3672 mA6wN3iA.exe 84 PID 3672 wrote to memory of 4744 3672 mA6wN3iA.exe 84 PID 3672 wrote to memory of 4744 3672 mA6wN3iA.exe 84 PID 4744 wrote to memory of 4452 4744 qf5GC8sd.exe 85 PID 4744 wrote to memory of 4452 4744 qf5GC8sd.exe 85 PID 4744 wrote to memory of 4452 4744 qf5GC8sd.exe 85 PID 4452 wrote to memory of 4380 4452 An1TZ3nl.exe 86 PID 4452 wrote to memory of 4380 4452 An1TZ3nl.exe 86 PID 4452 wrote to memory of 4380 4452 An1TZ3nl.exe 86 PID 4380 wrote to memory of 3724 4380 cl6Iz1BB.exe 87 PID 4380 wrote to memory of 3724 4380 cl6Iz1BB.exe 87 PID 4380 wrote to memory of 3724 4380 cl6Iz1BB.exe 87 PID 3724 wrote to memory of 4964 3724 1Id14BC5.exe 89 PID 3724 wrote to memory of 4964 3724 1Id14BC5.exe 89 PID 3724 wrote to memory of 4964 3724 1Id14BC5.exe 89 PID 3724 wrote to memory of 4964 3724 1Id14BC5.exe 89 PID 3724 wrote to memory of 4964 3724 1Id14BC5.exe 89 PID 3724 wrote to memory of 4964 3724 1Id14BC5.exe 89 PID 3724 wrote to memory of 4964 3724 1Id14BC5.exe 89 PID 3724 wrote to memory of 4964 3724 1Id14BC5.exe 89 PID 3724 wrote to memory of 4964 3724 1Id14BC5.exe 89 PID 3724 wrote to memory of 4964 3724 1Id14BC5.exe 89 PID 4964 wrote to memory of 872 4964 AppLaunch.exe 95 PID 4964 wrote to memory of 872 4964 AppLaunch.exe 95 PID 4964 wrote to memory of 872 4964 AppLaunch.exe 95 PID 4380 wrote to memory of 3544 4380 cl6Iz1BB.exe 98 PID 4380 wrote to memory of 3544 4380 cl6Iz1BB.exe 98 PID 4380 wrote to memory of 3544 4380 cl6Iz1BB.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\16b57a52fbdc94326ec0f9428a6eb35c6e65f297463a23c44d657c4c22591d91.exe"C:\Users\Admin\AppData\Local\Temp\16b57a52fbdc94326ec0f9428a6eb35c6e65f297463a23c44d657c4c22591d91.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\mA6wN3iA.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\mA6wN3iA.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qf5GC8sd.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qf5GC8sd.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\An1TZ3nl.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\An1TZ3nl.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cl6Iz1BB.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cl6Iz1BB.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Id14BC5.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Id14BC5.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4964 -s 5408⤵
- Program crash
PID:872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4964 -s 5408⤵
- Program crash
PID:1340
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3724 -s 2247⤵
- Program crash
PID:4496
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Qd538fN.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Qd538fN.exe6⤵
- Executes dropped EXE
PID:3544
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4964 -ip 49641⤵PID:5080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3724 -ip 37241⤵PID:4940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
998KB
MD5510c1963d4196db59a4ec1738b376fb2
SHA1c5569954ce9084f15c16b7ffc0512108dc83c804
SHA256c3c8ff9996150aade51c0384787dbebd280039fd988cac8d24c5dc626a8e69a0
SHA51255e5ec8f782337c9fca9f6ad8dfef517049859e82776aa571585225fccafa893424c0957b9589f783bcbb7f2ad5e73a3fedf4cfc029eaa83d289ec0b54d545d5
-
Filesize
998KB
MD5510c1963d4196db59a4ec1738b376fb2
SHA1c5569954ce9084f15c16b7ffc0512108dc83c804
SHA256c3c8ff9996150aade51c0384787dbebd280039fd988cac8d24c5dc626a8e69a0
SHA51255e5ec8f782337c9fca9f6ad8dfef517049859e82776aa571585225fccafa893424c0957b9589f783bcbb7f2ad5e73a3fedf4cfc029eaa83d289ec0b54d545d5
-
Filesize
811KB
MD598670265e571bbeb0ab3c9c36595f45b
SHA14d3d36d085a763941b67362b785da1b5b4ad0786
SHA2568c07e0843e0a6a7a017d282d87292826e08945430d255d48e9aa5cf0b546719a
SHA51274f230978e81fb5ed3e0e1c5d5688e7b89e5f241c849257be178eac6290d93d7904c51a11ed7e581b401af02fdaed387f703b488e49298ff229c6dc2b2c45d72
-
Filesize
811KB
MD598670265e571bbeb0ab3c9c36595f45b
SHA14d3d36d085a763941b67362b785da1b5b4ad0786
SHA2568c07e0843e0a6a7a017d282d87292826e08945430d255d48e9aa5cf0b546719a
SHA51274f230978e81fb5ed3e0e1c5d5688e7b89e5f241c849257be178eac6290d93d7904c51a11ed7e581b401af02fdaed387f703b488e49298ff229c6dc2b2c45d72
-
Filesize
578KB
MD5cc69be2b3891f0b09dd0c5e1971f53fc
SHA1d431b14caf94b054223b462e58e4ad94b0fc8f6f
SHA25665a393888773350b4444358b355051773647827b13b34105ad177724e566fe51
SHA51241823398e4b40078d0761147fb0f1d4ca624c68d20b1aae01f12b129616babfb7cc9f0e30b1b56a999a8cea47e5551a1c7a2177bf1ae35dab90541c0c4e4e0f7
-
Filesize
578KB
MD5cc69be2b3891f0b09dd0c5e1971f53fc
SHA1d431b14caf94b054223b462e58e4ad94b0fc8f6f
SHA25665a393888773350b4444358b355051773647827b13b34105ad177724e566fe51
SHA51241823398e4b40078d0761147fb0f1d4ca624c68d20b1aae01f12b129616babfb7cc9f0e30b1b56a999a8cea47e5551a1c7a2177bf1ae35dab90541c0c4e4e0f7
-
Filesize
382KB
MD5257688c9df89daad84fefe317ba00987
SHA184e24f1e6f64901ccb4fe580ea024c759c6cd580
SHA256482a706e47a0980b458f0a833392dc6d4bbdb83d5d8cdf385d030a231bcb9ca7
SHA512db9014e487b06067a3681d376e739e863cb01cbea9302bdff335f61de162ad81741b38ba06d1a01572a61ea2ca67a57e82f4d95ccf3fa1a6d465e5327391554e
-
Filesize
382KB
MD5257688c9df89daad84fefe317ba00987
SHA184e24f1e6f64901ccb4fe580ea024c759c6cd580
SHA256482a706e47a0980b458f0a833392dc6d4bbdb83d5d8cdf385d030a231bcb9ca7
SHA512db9014e487b06067a3681d376e739e863cb01cbea9302bdff335f61de162ad81741b38ba06d1a01572a61ea2ca67a57e82f4d95ccf3fa1a6d465e5327391554e
-
Filesize
295KB
MD58b2f4d97ea0ddd24893f02499fc14026
SHA1bca3c20665feab748a01981fcf0aa3e2401f4d34
SHA256542981d80eee0d59a7484cf3ace126654dcd0269125016f052c41abdba4df4a0
SHA5127dcb6fbb373241d85593fb20f072f9c759b3b10771afa45160d94188e6790b22a6b7e6c16bc5aced9e8c7b89c8ae27eb6924989f3fcc1edccc1dc8a000678688
-
Filesize
295KB
MD58b2f4d97ea0ddd24893f02499fc14026
SHA1bca3c20665feab748a01981fcf0aa3e2401f4d34
SHA256542981d80eee0d59a7484cf3ace126654dcd0269125016f052c41abdba4df4a0
SHA5127dcb6fbb373241d85593fb20f072f9c759b3b10771afa45160d94188e6790b22a6b7e6c16bc5aced9e8c7b89c8ae27eb6924989f3fcc1edccc1dc8a000678688
-
Filesize
222KB
MD5f93d3b04017b08357ba247f8e7f053bc
SHA1e199dfd07ec7e45c7c7a99f5129f9f918d63621c
SHA256331c6f845fad699dac352087d3fa60fb0b0d9bc8fa26ab07fc875895c4973e1e
SHA5124c1b8da12691f675c7eeaea51676de90fb86aec588ae96ce9c13ef77bd69c8c28befc807c01ec6f4126a43085c285ca47fc0812452baaf7bc78e47da57ea49b0
-
Filesize
222KB
MD5f93d3b04017b08357ba247f8e7f053bc
SHA1e199dfd07ec7e45c7c7a99f5129f9f918d63621c
SHA256331c6f845fad699dac352087d3fa60fb0b0d9bc8fa26ab07fc875895c4973e1e
SHA5124c1b8da12691f675c7eeaea51676de90fb86aec588ae96ce9c13ef77bd69c8c28befc807c01ec6f4126a43085c285ca47fc0812452baaf7bc78e47da57ea49b0