Overview
overview
10Static
static
3100e14f03b...37.exe
windows10-2004-x64
1014e92d7584...fd.exe
windows7-x64
314e92d7584...fd.exe
windows10-2004-x64
10228c350439...1a.exe
windows7-x64
3228c350439...1a.exe
windows10-2004-x64
10236732ce45...d5.exe
windows7-x64
3236732ce45...d5.exe
windows10-2004-x64
102a0ae333a9...1a.exe
windows7-x64
32a0ae333a9...1a.exe
windows10-2004-x64
102b467ee19e...44.exe
windows7-x64
32b467ee19e...44.exe
windows10-2004-x64
10399f6dfec3...0c.exe
windows10-2004-x64
103ddd80ba69...8c.exe
windows7-x64
33ddd80ba69...8c.exe
windows10-2004-x64
104be1f370e8...6b.exe
windows7-x64
34be1f370e8...6b.exe
windows10-2004-x64
1065a31de21f...f0.exe
windows10-2004-x64
10790345d8c0...0a.exe
windows7-x64
3790345d8c0...0a.exe
windows10-2004-x64
107a5164cea0...f7.exe
windows7-x64
37a5164cea0...f7.exe
windows10-2004-x64
109a7761a218...43.exe
windows7-x64
39a7761a218...43.exe
windows10-2004-x64
10a26df59e48...78.exe
windows10-2004-x64
10c0c8fc8c3b...49.exe
windows7-x64
3c0c8fc8c3b...49.exe
windows10-2004-x64
10c4172a7d8d...fa.exe
windows7-x64
3c4172a7d8d...fa.exe
windows10-2004-x64
10d3855d0640...68.exe
windows7-x64
3d3855d0640...68.exe
windows10-2004-x64
10d6c7041aa6...93.exe
windows7-x64
3d6c7041aa6...93.exe
windows10-2004-x64
10Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 05:30
Static task
static1
Behavioral task
behavioral1
Sample
100e14f03bac13fc1c4e178555a3dd9d1c0a021aa089b6b88cb8065f8163e837.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
14e92d75842bf0e1bcae35adc805c07925a4a6d97655b90182b6147b5efbaffd.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
14e92d75842bf0e1bcae35adc805c07925a4a6d97655b90182b6147b5efbaffd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
228c35043919b5a4d810fd11dbb1b9646333aa6e75788617e4cc4ac41ab07a1a.exe
Resource
win7-20240419-en
Behavioral task
behavioral5
Sample
228c35043919b5a4d810fd11dbb1b9646333aa6e75788617e4cc4ac41ab07a1a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
236732ce453b741f26e2fb94d54ade44d3d1ae332c52f6d420a1dcc1c8d05dd5.exe
Resource
win7-20240508-en
Behavioral task
behavioral7
Sample
236732ce453b741f26e2fb94d54ade44d3d1ae332c52f6d420a1dcc1c8d05dd5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
2a0ae333a9b72768e8a05e7ebbfe4b15cf581f8c08129c0639aeed58eaf7901a.exe
Resource
win7-20240221-en
Behavioral task
behavioral9
Sample
2a0ae333a9b72768e8a05e7ebbfe4b15cf581f8c08129c0639aeed58eaf7901a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
2b467ee19e1542f60392c1b29a264ffabce3e9a8da48a4707e8d8f1bea1d1244.exe
Resource
win7-20240221-en
Behavioral task
behavioral11
Sample
2b467ee19e1542f60392c1b29a264ffabce3e9a8da48a4707e8d8f1bea1d1244.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
399f6dfec39b77c21a8b31e45c5c8fb863a8b28a73a4923ff7543886ebfa0c0c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
3ddd80ba692516ca1977cdf6eb25ad59de7b9e87f447a412e2468a77ad1bbd8c.exe
Resource
win7-20240215-en
Behavioral task
behavioral14
Sample
3ddd80ba692516ca1977cdf6eb25ad59de7b9e87f447a412e2468a77ad1bbd8c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
4be1f370e880d06da141a2c9957de478c40592a3abf6312aa8c2ef401a37d36b.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
4be1f370e880d06da141a2c9957de478c40592a3abf6312aa8c2ef401a37d36b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
65a31de21fb11e9ed0db8f58105c54bbfc7953f539d85a946293e38e9065bbf0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
790345d8c07ae982c606f2db111e6ff6a2bae42847c106a6f096f208f1653d0a.exe
Resource
win7-20240508-en
Behavioral task
behavioral19
Sample
790345d8c07ae982c606f2db111e6ff6a2bae42847c106a6f096f208f1653d0a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
7a5164cea09551d97475639ab8fb782d5fff907df5db0ff94ae2cb2a3b40dcf7.exe
Resource
win7-20240508-en
Behavioral task
behavioral21
Sample
7a5164cea09551d97475639ab8fb782d5fff907df5db0ff94ae2cb2a3b40dcf7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral22
Sample
9a7761a218bd7bd89d897848e3eafea1a05f151c3ab44668124ffa35c4d3a743.exe
Resource
win7-20240220-en
Behavioral task
behavioral23
Sample
9a7761a218bd7bd89d897848e3eafea1a05f151c3ab44668124ffa35c4d3a743.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral24
Sample
a26df59e48ff80e63c4ae80b1ca4da56cf0629cdcaaa173b3f510b0b20722f78.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
c0c8fc8c3baf26ce045fa13a8b1bf6d6051171f13321183317fc587bd5217e49.exe
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
c0c8fc8c3baf26ce045fa13a8b1bf6d6051171f13321183317fc587bd5217e49.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
c4172a7d8d27c8367cd7a3b7b3d410e4678ddfd8748e6bf631c21e8f639c7efa.exe
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
c4172a7d8d27c8367cd7a3b7b3d410e4678ddfd8748e6bf631c21e8f639c7efa.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral29
Sample
d3855d0640853387bc0df63e4ddcbc8af40e8cbb259b6be8049d23526e31dd68.exe
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
d3855d0640853387bc0df63e4ddcbc8af40e8cbb259b6be8049d23526e31dd68.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
d6c7041aa6a01fcdc7f6a9f60c8eaf8edcbcc73cb1802bc3623346b3b3219693.exe
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
d6c7041aa6a01fcdc7f6a9f60c8eaf8edcbcc73cb1802bc3623346b3b3219693.exe
Resource
win10v2004-20240508-en
General
-
Target
100e14f03bac13fc1c4e178555a3dd9d1c0a021aa089b6b88cb8065f8163e837.exe
-
Size
876KB
-
MD5
cbb4108b51ced31cee714f2b6ad2379f
-
SHA1
997d33ef7a7c427c7ddf6f6e602e344aa8921049
-
SHA256
100e14f03bac13fc1c4e178555a3dd9d1c0a021aa089b6b88cb8065f8163e837
-
SHA512
ddd69d3b12724a9872433b63f39c7a3dac9c0b0687d5d08bfe04da05d7f89681af1b0ae05e886fb2ce8c89d089b62f145d79aaab4874f08da5525df2a49c1429
-
SSDEEP
12288:bMrMy90R7CQPeL/WMx8cSRmr8fXzw8ZPahvKGf6DMARjFlsMmSIOFMopKDD9VJ5Y:PyrRmU+mvVARJlbIY7pKDd0+Y
Malware Config
Extracted
redline
dimas
185.161.248.75:4132
-
auth_value
a5db9b1c53c704e612bccc93ccdb5539
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f8932618.exe family_redline behavioral1/memory/4588-21-0x0000000000B80000-0x0000000000BAA000-memory.dmp family_redline -
Executes dropped EXE 3 IoCs
Processes:
x7375583.exex7340234.exef8932618.exepid process 4356 x7375583.exe 3556 x7340234.exe 4588 f8932618.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
100e14f03bac13fc1c4e178555a3dd9d1c0a021aa089b6b88cb8065f8163e837.exex7375583.exex7340234.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 100e14f03bac13fc1c4e178555a3dd9d1c0a021aa089b6b88cb8065f8163e837.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7375583.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x7340234.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
100e14f03bac13fc1c4e178555a3dd9d1c0a021aa089b6b88cb8065f8163e837.exex7375583.exex7340234.exedescription pid process target process PID 5036 wrote to memory of 4356 5036 100e14f03bac13fc1c4e178555a3dd9d1c0a021aa089b6b88cb8065f8163e837.exe x7375583.exe PID 5036 wrote to memory of 4356 5036 100e14f03bac13fc1c4e178555a3dd9d1c0a021aa089b6b88cb8065f8163e837.exe x7375583.exe PID 5036 wrote to memory of 4356 5036 100e14f03bac13fc1c4e178555a3dd9d1c0a021aa089b6b88cb8065f8163e837.exe x7375583.exe PID 4356 wrote to memory of 3556 4356 x7375583.exe x7340234.exe PID 4356 wrote to memory of 3556 4356 x7375583.exe x7340234.exe PID 4356 wrote to memory of 3556 4356 x7375583.exe x7340234.exe PID 3556 wrote to memory of 4588 3556 x7340234.exe f8932618.exe PID 3556 wrote to memory of 4588 3556 x7340234.exe f8932618.exe PID 3556 wrote to memory of 4588 3556 x7340234.exe f8932618.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\100e14f03bac13fc1c4e178555a3dd9d1c0a021aa089b6b88cb8065f8163e837.exe"C:\Users\Admin\AppData\Local\Temp\100e14f03bac13fc1c4e178555a3dd9d1c0a021aa089b6b88cb8065f8163e837.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7375583.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7375583.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7340234.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7340234.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f8932618.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f8932618.exe4⤵
- Executes dropped EXE
PID:4588
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
479KB
MD594a16ab1f34ec0f29d397b4a13c83174
SHA1e9edff7ceb571349e8415fc3c990a744aec6e452
SHA25673a59b8a64828ec8569ca9cd3884346712485b90f7147885d526dbe254c3598b
SHA5129f6ad2b381134a18aaaad2ed00811db2c0bb2bf3920a2c0b5a731d7caf723523078f9b962324c8d733bc2da4a4740d258e45ec27bb6d319c9ac0b4f19db32666
-
Filesize
307KB
MD5e6db7c6a8aec0cdb69289d62b956f645
SHA1156a322621137363426a50bc488dc25a9c1635ef
SHA256f4733147534c679eaf1c5fca89abff0bc38ac3d2f29a24a6c2ccc24e0ab466f6
SHA5122190a9ed1403e6300058347f5dd30ac375d3bfabc3656f74b502428307952b92664fb809c22119a5f0f96b288c0a4297a8f96d1f35e24310440c621d9f06afdc
-
Filesize
145KB
MD5864cc39d823d48fe71d282c7316be207
SHA1c1aadd4b1c8e2e788a4799121317e799fc9df9dd
SHA2566f4a056282147bd4ec8a4e8765f0ba6ae4e887e4b5a5426358af0b44e009e1a5
SHA512f64a270bf27c2f9b0a4afec95f6b8b811d635e02b340c0bfcc7de9e28887f592fadc052e0fac2fb7b52067b4eca80b1c8892ef09ce97758cd594b81aaac1c6eb