Analysis
-
max time kernel
129s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
23/10/2023, 12:22
Static task
static1
Behavioral task
behavioral1
Sample
613e735191106de1515ecf0317f1bc32ed151f55826397012ad75b17217167c8.exe
Resource
win10v2004-20231020-en
General
-
Target
613e735191106de1515ecf0317f1bc32ed151f55826397012ad75b17217167c8.exe
-
Size
1.7MB
-
MD5
63358e1da536987d9e9a3fe360359009
-
SHA1
867cf936dcd83c1e08e16492f58a31cc36329977
-
SHA256
613e735191106de1515ecf0317f1bc32ed151f55826397012ad75b17217167c8
-
SHA512
09561aade3f716d7333c0a900fd082ba6ae41079bcbb65ab6f6e1284c73138cbc7a6a41d0b963a246b6d40495932df77cb9a09ce0b75f45cbe0ddcefaa5ff9ee
-
SSDEEP
49152:7EnD7zXyX6qwEFnCdrrg301IGnX6cfXWn1:oyX6lExCJreNGX7+1
Malware Config
Extracted
redline
kinder
109.107.182.133:19084
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/files/0x0006000000022c9a-40.dat family_redline behavioral1/files/0x0006000000022c9a-42.dat family_redline behavioral1/memory/4792-44-0x0000000000C20000-0x0000000000C5E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 3756 IC0QC3sG.exe 1296 rN0ZI3FD.exe 3596 bZ6zF1VZ.exe 4940 ZN5Sr2kV.exe 3892 1Vq62BL6.exe 4792 2Lh729ZF.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 613e735191106de1515ecf0317f1bc32ed151f55826397012ad75b17217167c8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" IC0QC3sG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" rN0ZI3FD.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" bZ6zF1VZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" ZN5Sr2kV.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3892 set thread context of 1500 3892 1Vq62BL6.exe 93 -
Program crash 1 IoCs
pid pid_target Process procid_target 224 1500 WerFault.exe 93 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2616 wrote to memory of 3756 2616 613e735191106de1515ecf0317f1bc32ed151f55826397012ad75b17217167c8.exe 88 PID 2616 wrote to memory of 3756 2616 613e735191106de1515ecf0317f1bc32ed151f55826397012ad75b17217167c8.exe 88 PID 2616 wrote to memory of 3756 2616 613e735191106de1515ecf0317f1bc32ed151f55826397012ad75b17217167c8.exe 88 PID 3756 wrote to memory of 1296 3756 IC0QC3sG.exe 89 PID 3756 wrote to memory of 1296 3756 IC0QC3sG.exe 89 PID 3756 wrote to memory of 1296 3756 IC0QC3sG.exe 89 PID 1296 wrote to memory of 3596 1296 rN0ZI3FD.exe 90 PID 1296 wrote to memory of 3596 1296 rN0ZI3FD.exe 90 PID 1296 wrote to memory of 3596 1296 rN0ZI3FD.exe 90 PID 3596 wrote to memory of 4940 3596 bZ6zF1VZ.exe 91 PID 3596 wrote to memory of 4940 3596 bZ6zF1VZ.exe 91 PID 3596 wrote to memory of 4940 3596 bZ6zF1VZ.exe 91 PID 4940 wrote to memory of 3892 4940 ZN5Sr2kV.exe 92 PID 4940 wrote to memory of 3892 4940 ZN5Sr2kV.exe 92 PID 4940 wrote to memory of 3892 4940 ZN5Sr2kV.exe 92 PID 3892 wrote to memory of 1500 3892 1Vq62BL6.exe 93 PID 3892 wrote to memory of 1500 3892 1Vq62BL6.exe 93 PID 3892 wrote to memory of 1500 3892 1Vq62BL6.exe 93 PID 3892 wrote to memory of 1500 3892 1Vq62BL6.exe 93 PID 3892 wrote to memory of 1500 3892 1Vq62BL6.exe 93 PID 3892 wrote to memory of 1500 3892 1Vq62BL6.exe 93 PID 3892 wrote to memory of 1500 3892 1Vq62BL6.exe 93 PID 3892 wrote to memory of 1500 3892 1Vq62BL6.exe 93 PID 3892 wrote to memory of 1500 3892 1Vq62BL6.exe 93 PID 3892 wrote to memory of 1500 3892 1Vq62BL6.exe 93 PID 4940 wrote to memory of 4792 4940 ZN5Sr2kV.exe 95 PID 4940 wrote to memory of 4792 4940 ZN5Sr2kV.exe 95 PID 4940 wrote to memory of 4792 4940 ZN5Sr2kV.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\613e735191106de1515ecf0317f1bc32ed151f55826397012ad75b17217167c8.exe"C:\Users\Admin\AppData\Local\Temp\613e735191106de1515ecf0317f1bc32ed151f55826397012ad75b17217167c8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\IC0QC3sG.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\IC0QC3sG.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rN0ZI3FD.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rN0ZI3FD.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bZ6zF1VZ.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bZ6zF1VZ.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ZN5Sr2kV.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ZN5Sr2kV.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Vq62BL6.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Vq62BL6.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:1500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 5408⤵
- Program crash
PID:224
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Lh729ZF.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Lh729ZF.exe6⤵
- Executes dropped EXE
PID:4792
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1500 -ip 15001⤵PID:620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD577ecb212b9ba13cb242fbbe62067671a
SHA11aa390c68cd90e62343192afcf7ced0f2474f269
SHA25600cd105fa3282d9d4a57dea85bfab92832883117e81b4b8c56e45ded9ff8aa58
SHA5120b8b9d616b6c89b71aba249457a430b8ad12675fbdf742b4db7655ed6e65134bbf71530ad20df240c7f5210cb3191deed3b27045ba654bfcc868b13d934c54ce
-
Filesize
1.5MB
MD577ecb212b9ba13cb242fbbe62067671a
SHA11aa390c68cd90e62343192afcf7ced0f2474f269
SHA25600cd105fa3282d9d4a57dea85bfab92832883117e81b4b8c56e45ded9ff8aa58
SHA5120b8b9d616b6c89b71aba249457a430b8ad12675fbdf742b4db7655ed6e65134bbf71530ad20df240c7f5210cb3191deed3b27045ba654bfcc868b13d934c54ce
-
Filesize
1.4MB
MD572675dcbb0068b69e31776254f379a7b
SHA1d07ca366ad1437ce987abb926ab85a7529916365
SHA256588b456e00d3c61ca3d47ea4d777672e122f4a9c905b7e40ceaf350177bb0f50
SHA5122fed0b990563dbeb48694e08a7138982ad86cf2c87f8135031afae23d36190b36a7a5a35c9ce92967aa6ca09b026798b1d1b4df71f0d7b7b41fdbf763e725149
-
Filesize
1.4MB
MD572675dcbb0068b69e31776254f379a7b
SHA1d07ca366ad1437ce987abb926ab85a7529916365
SHA256588b456e00d3c61ca3d47ea4d777672e122f4a9c905b7e40ceaf350177bb0f50
SHA5122fed0b990563dbeb48694e08a7138982ad86cf2c87f8135031afae23d36190b36a7a5a35c9ce92967aa6ca09b026798b1d1b4df71f0d7b7b41fdbf763e725149
-
Filesize
870KB
MD55e7ff263cbed8f1a648910d8392c76aa
SHA1c41fd74829f16d72c1be172c427e23ed53a59e3c
SHA2562037acf2b36e0ed68f16e5dca0738724541d179766ad125ee34611e5be41e482
SHA512d17f60486d7290256a2b17017aebf601ce99a723d3ea853e025e282c9b75a37d716a9b62a73b967d19899f6f529a859027ca3a37bbe7bbcee6a7f5e3077c350c
-
Filesize
870KB
MD55e7ff263cbed8f1a648910d8392c76aa
SHA1c41fd74829f16d72c1be172c427e23ed53a59e3c
SHA2562037acf2b36e0ed68f16e5dca0738724541d179766ad125ee34611e5be41e482
SHA512d17f60486d7290256a2b17017aebf601ce99a723d3ea853e025e282c9b75a37d716a9b62a73b967d19899f6f529a859027ca3a37bbe7bbcee6a7f5e3077c350c
-
Filesize
675KB
MD59505de3a20d7def40791b2d2464b727b
SHA1bdd9519ef2e37ee80f70f251454ccd3160ffe95f
SHA2569e883f93d5d2ef9fa27abeb79944f326da87bf0adedb0aca066f6480f930ddc8
SHA51283bb3826d0a080a1d0356ee00405e33557068d338f38716bda4bcc3ccea2fdcbe46ffba966b72943c690739418d3493ea10a679e41c638c9d8ee3fcb5a9d3699
-
Filesize
675KB
MD59505de3a20d7def40791b2d2464b727b
SHA1bdd9519ef2e37ee80f70f251454ccd3160ffe95f
SHA2569e883f93d5d2ef9fa27abeb79944f326da87bf0adedb0aca066f6480f930ddc8
SHA51283bb3826d0a080a1d0356ee00405e33557068d338f38716bda4bcc3ccea2fdcbe46ffba966b72943c690739418d3493ea10a679e41c638c9d8ee3fcb5a9d3699
-
Filesize
1.8MB
MD5902347e5c9abe4c735890f232e32d4f7
SHA1b179c18eec7a558237058f67eefc761f0b504731
SHA2568c73c86989820afdbd6c3a60d9bdc8dcaeb03ced67560124f24b9282650ada36
SHA51296cbe726241d4700a148c32434187dd85272b29bdcb049cec3532b0b1f16a84cd418757ac940aa7b2884c812bbff9107a3876408e6945da2cd71fb7172757dc6
-
Filesize
1.8MB
MD5902347e5c9abe4c735890f232e32d4f7
SHA1b179c18eec7a558237058f67eefc761f0b504731
SHA2568c73c86989820afdbd6c3a60d9bdc8dcaeb03ced67560124f24b9282650ada36
SHA51296cbe726241d4700a148c32434187dd85272b29bdcb049cec3532b0b1f16a84cd418757ac940aa7b2884c812bbff9107a3876408e6945da2cd71fb7172757dc6
-
Filesize
222KB
MD520e83f9a953179abb98d13a57d7d5160
SHA1d93171d75b2faab95dc8ca13aa590eb2260e4577
SHA2562184393a87c4cbf6d02e57efdf3eb21e12aa6b8496202d485ef5ce02c77000d2
SHA51200cab7b80b646f78c7f3fe298316ee2d21806ef98b285dff7aa6f4e1ab39e64fe77b532f38715424d5838f065ac775f33bd02cb70c5efc80776ffdb5d4569d72
-
Filesize
222KB
MD520e83f9a953179abb98d13a57d7d5160
SHA1d93171d75b2faab95dc8ca13aa590eb2260e4577
SHA2562184393a87c4cbf6d02e57efdf3eb21e12aa6b8496202d485ef5ce02c77000d2
SHA51200cab7b80b646f78c7f3fe298316ee2d21806ef98b285dff7aa6f4e1ab39e64fe77b532f38715424d5838f065ac775f33bd02cb70c5efc80776ffdb5d4569d72