Analysis
-
max time kernel
138s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2023, 18:59
Static task
static1
Behavioral task
behavioral1
Sample
1045b3d3154be072bcb121415f0c1096b16d1b0f0e142484a3258b2f44c44da7.exe
Resource
win10v2004-20231023-en
General
-
Target
1045b3d3154be072bcb121415f0c1096b16d1b0f0e142484a3258b2f44c44da7.exe
-
Size
1.5MB
-
MD5
fd977f19978a0e2996d2979c57727b5b
-
SHA1
a9ea4a97babcb6a36a4350d69712b83f67cbdbac
-
SHA256
1045b3d3154be072bcb121415f0c1096b16d1b0f0e142484a3258b2f44c44da7
-
SHA512
50dd2013cf51e5da488bb3fd351133da500b4d0640b9c29bc6d6d1922ed7f48cabb898e85416876fec92917bc1f9059433c519fadb88460ecdef33ea81c03622
-
SSDEEP
24576:nywtGwTZaMd5sT9O+Iu69vT6D0O/yQDsRicKF61doEsf5pzPuYi37ZYo6rg+1Lb0:yOGwFbd5coS69eYO/Psi6/oEIbP2j6re
Malware Config
Extracted
redline
kinza
77.91.124.86:19084
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/files/0x0006000000022cf0-41.dat family_redline behavioral1/files/0x0006000000022cf0-42.dat family_redline behavioral1/memory/3992-44-0x0000000000590000-0x00000000005CE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 2424 gW4Dr0aq.exe 3772 gE3IA9lj.exe 2924 mt8Iz3cW.exe 1016 Kq1ky0wH.exe 1600 1KJ60NI7.exe 3992 2rS094Bi.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" gE3IA9lj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" mt8Iz3cW.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" Kq1ky0wH.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1045b3d3154be072bcb121415f0c1096b16d1b0f0e142484a3258b2f44c44da7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" gW4Dr0aq.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1600 set thread context of 4552 1600 1KJ60NI7.exe 97 -
Program crash 1 IoCs
pid pid_target Process procid_target 1064 4552 WerFault.exe 97 -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 4440 wrote to memory of 2424 4440 1045b3d3154be072bcb121415f0c1096b16d1b0f0e142484a3258b2f44c44da7.exe 88 PID 4440 wrote to memory of 2424 4440 1045b3d3154be072bcb121415f0c1096b16d1b0f0e142484a3258b2f44c44da7.exe 88 PID 4440 wrote to memory of 2424 4440 1045b3d3154be072bcb121415f0c1096b16d1b0f0e142484a3258b2f44c44da7.exe 88 PID 2424 wrote to memory of 3772 2424 gW4Dr0aq.exe 91 PID 2424 wrote to memory of 3772 2424 gW4Dr0aq.exe 91 PID 2424 wrote to memory of 3772 2424 gW4Dr0aq.exe 91 PID 3772 wrote to memory of 2924 3772 gE3IA9lj.exe 92 PID 3772 wrote to memory of 2924 3772 gE3IA9lj.exe 92 PID 3772 wrote to memory of 2924 3772 gE3IA9lj.exe 92 PID 2924 wrote to memory of 1016 2924 mt8Iz3cW.exe 93 PID 2924 wrote to memory of 1016 2924 mt8Iz3cW.exe 93 PID 2924 wrote to memory of 1016 2924 mt8Iz3cW.exe 93 PID 1016 wrote to memory of 1600 1016 Kq1ky0wH.exe 95 PID 1016 wrote to memory of 1600 1016 Kq1ky0wH.exe 95 PID 1016 wrote to memory of 1600 1016 Kq1ky0wH.exe 95 PID 1600 wrote to memory of 4572 1600 1KJ60NI7.exe 96 PID 1600 wrote to memory of 4572 1600 1KJ60NI7.exe 96 PID 1600 wrote to memory of 4572 1600 1KJ60NI7.exe 96 PID 1600 wrote to memory of 4552 1600 1KJ60NI7.exe 97 PID 1600 wrote to memory of 4552 1600 1KJ60NI7.exe 97 PID 1600 wrote to memory of 4552 1600 1KJ60NI7.exe 97 PID 1600 wrote to memory of 4552 1600 1KJ60NI7.exe 97 PID 1600 wrote to memory of 4552 1600 1KJ60NI7.exe 97 PID 1600 wrote to memory of 4552 1600 1KJ60NI7.exe 97 PID 1600 wrote to memory of 4552 1600 1KJ60NI7.exe 97 PID 1600 wrote to memory of 4552 1600 1KJ60NI7.exe 97 PID 1600 wrote to memory of 4552 1600 1KJ60NI7.exe 97 PID 1600 wrote to memory of 4552 1600 1KJ60NI7.exe 97 PID 1016 wrote to memory of 3992 1016 Kq1ky0wH.exe 98 PID 1016 wrote to memory of 3992 1016 Kq1ky0wH.exe 98 PID 1016 wrote to memory of 3992 1016 Kq1ky0wH.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\1045b3d3154be072bcb121415f0c1096b16d1b0f0e142484a3258b2f44c44da7.exe"C:\Users\Admin\AppData\Local\Temp\1045b3d3154be072bcb121415f0c1096b16d1b0f0e142484a3258b2f44c44da7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gW4Dr0aq.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gW4Dr0aq.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gE3IA9lj.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gE3IA9lj.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mt8Iz3cW.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mt8Iz3cW.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Kq1ky0wH.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Kq1ky0wH.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1KJ60NI7.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1KJ60NI7.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4572
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 5408⤵
- Program crash
PID:1064
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2rS094Bi.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2rS094Bi.exe6⤵
- Executes dropped EXE
PID:3992
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4552 -ip 45521⤵PID:936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD50a6860734e7bed12b72ccb15670c9b14
SHA191ea5d5dad8d7da97ebfb41bba6d9f2cf94ef380
SHA2565814e939d0ecce4cda9032d049afcf46ce67a2c97e271c4886019820e27658c8
SHA512f589f39c7cd7e48b78be38c7d76912e9f37e29f5224b16aa0b1fa01a06281f4802de3c60b470809b80c6b83ca2ec2d1603d8f7862fdc0f5fa3dfcb2418bb8709
-
Filesize
1.3MB
MD50a6860734e7bed12b72ccb15670c9b14
SHA191ea5d5dad8d7da97ebfb41bba6d9f2cf94ef380
SHA2565814e939d0ecce4cda9032d049afcf46ce67a2c97e271c4886019820e27658c8
SHA512f589f39c7cd7e48b78be38c7d76912e9f37e29f5224b16aa0b1fa01a06281f4802de3c60b470809b80c6b83ca2ec2d1603d8f7862fdc0f5fa3dfcb2418bb8709
-
Filesize
1.1MB
MD5ef209c47c6c7d8877dd6b0539ea4ceb8
SHA191673ced0a7c6e03ddd23f36ff76b2dffa7a03a4
SHA25648c7b1fe121730a7b4f123d569e75f797d00918e5440235dfb3cf432f0f89e6c
SHA512ce7fecf9a75945443435e46cd87c1d977dd37db6b372019bf6d638e63a10691171f127410a747f86edea6b158bde27292f8954e5a2bd9b4e630fc88b7b10d166
-
Filesize
1.1MB
MD5ef209c47c6c7d8877dd6b0539ea4ceb8
SHA191673ced0a7c6e03ddd23f36ff76b2dffa7a03a4
SHA25648c7b1fe121730a7b4f123d569e75f797d00918e5440235dfb3cf432f0f89e6c
SHA512ce7fecf9a75945443435e46cd87c1d977dd37db6b372019bf6d638e63a10691171f127410a747f86edea6b158bde27292f8954e5a2bd9b4e630fc88b7b10d166
-
Filesize
757KB
MD55dd1ccd74452a77fb96533722282dead
SHA1c04292cd418adff64adce54a8a9e9129d76a2973
SHA2564d339acfb558fbe4e3add552631b352c7831dc766ef436ebb9b348e712b8c5ee
SHA512e0a8cd62bed376863ac90cfdac6da71f5e661faeb5386e0e3bec729c5fdb3637bab64ce02065abba3ffd0d38a07b1fffe520ed20647ca5454b7bea0f89c65da3
-
Filesize
757KB
MD55dd1ccd74452a77fb96533722282dead
SHA1c04292cd418adff64adce54a8a9e9129d76a2973
SHA2564d339acfb558fbe4e3add552631b352c7831dc766ef436ebb9b348e712b8c5ee
SHA512e0a8cd62bed376863ac90cfdac6da71f5e661faeb5386e0e3bec729c5fdb3637bab64ce02065abba3ffd0d38a07b1fffe520ed20647ca5454b7bea0f89c65da3
-
Filesize
561KB
MD558dff667fb884d9354bc615cb5e2415b
SHA19151c71fe9c35df748cf1441850b60b1e1c7bf0e
SHA25664c498df36c8cd857dda0866d7fee08c37b01911ade42c1b616701ed47cb7fc9
SHA512246401ede70d8216e469d8f7cd3181acfdeccd00f496f435cf754af4975eedfdb6f0a007eafdd2f51faa00e7727a44cef2d1cf5fc012a36a7c44bbb69f15d359
-
Filesize
561KB
MD558dff667fb884d9354bc615cb5e2415b
SHA19151c71fe9c35df748cf1441850b60b1e1c7bf0e
SHA25664c498df36c8cd857dda0866d7fee08c37b01911ade42c1b616701ed47cb7fc9
SHA512246401ede70d8216e469d8f7cd3181acfdeccd00f496f435cf754af4975eedfdb6f0a007eafdd2f51faa00e7727a44cef2d1cf5fc012a36a7c44bbb69f15d359
-
Filesize
1.1MB
MD511392bc0ad70b9b88465008d38ab2f8a
SHA18dba41dbae75e7efb5b41b760477b964e9656985
SHA256fa822657d5d3a54e412868335d68d1acb9c00c1013dbbd9930b7138109a1946b
SHA512bc842817ecc56d4898f4d2df230b840f5aec43d42fc8285680aeee2111df8f13c61bcafebb1054766bc21c7d94c686a8520b42c8b49214f094f498b002197091
-
Filesize
1.1MB
MD511392bc0ad70b9b88465008d38ab2f8a
SHA18dba41dbae75e7efb5b41b760477b964e9656985
SHA256fa822657d5d3a54e412868335d68d1acb9c00c1013dbbd9930b7138109a1946b
SHA512bc842817ecc56d4898f4d2df230b840f5aec43d42fc8285680aeee2111df8f13c61bcafebb1054766bc21c7d94c686a8520b42c8b49214f094f498b002197091
-
Filesize
222KB
MD54df49bcaa9fb47350ea85063da52e6fe
SHA168480d8f1acb95a02271a3dd810d3d5891aeb222
SHA256e1ac652dc3cf586f4af8f032d552e71b33a8acf86fc12138e163ea1540db9df1
SHA5125ed93e3881d1f95fb50509c6455da1cf1e0c9f320b5baddab0cfd93774289fdfa4eef69cda60ab9f047c0cae1887e9ff81379ef52817d85fa7275eda2447477e
-
Filesize
222KB
MD54df49bcaa9fb47350ea85063da52e6fe
SHA168480d8f1acb95a02271a3dd810d3d5891aeb222
SHA256e1ac652dc3cf586f4af8f032d552e71b33a8acf86fc12138e163ea1540db9df1
SHA5125ed93e3881d1f95fb50509c6455da1cf1e0c9f320b5baddab0cfd93774289fdfa4eef69cda60ab9f047c0cae1887e9ff81379ef52817d85fa7275eda2447477e