Overview
overview
10Static
static
312529f4b65...8e.exe
windows10-2004-x64
10177d217638...c9.exe
windows10-2004-x64
102dd3d7aef1...30.exe
windows10-2004-x64
103677484a61...a2.exe
windows10-2004-x64
104682d27822...6e.exe
windows10-2004-x64
10492e1a379a...be.exe
windows10-2004-x64
1050eee0d0ce...b6.exe
windows10-2004-x64
1054a187adfc...90.exe
windows10-2004-x64
10779aae8d26...ea.exe
windows10-2004-x64
107a8a88b0a1...14.exe
windows10-2004-x64
107d862d9155...a1.exe
windows10-2004-x64
10994a6a489b...70.exe
windows10-2004-x64
10b3e77f6d31...38.exe
windows10-2004-x64
10b8349e4fcf...97.exe
windows10-2004-x64
10c4b092b703...86.exe
windows10-2004-x64
10c676d41b0a...68.exe
windows10-2004-x64
10e6003af825...08.exe
windows10-2004-x64
10edc38eb50d...b7.exe
windows10-2004-x64
10ee34d9132f...8c.exe
windows10-2004-x64
10f644369631...3f.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 08:20
Static task
static1
Behavioral task
behavioral1
Sample
12529f4b65aafd82d9020e079a369f24e8f9a5b222765ebfd7fece173373938e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
177d2176387c311fdc72de1156680cf2efd82af4016fdc8a6adcdda4d02b44c9.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
2dd3d7aef156b5db3c5785a7d818ed1c4109c841ee63bb99312915840d12c030.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
3677484a61768095abfe1b2ea7de4cc0fe5fc5bf5cd7e10adb8b2e5024100ca2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
4682d278226e301e51cb7c58cec10030fc6150aa3814efe79eb0a39400e08b6e.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral6
Sample
492e1a379a14cf5b3c974097a7f3e1ff73ed7af7cc48869e72473f84910744be.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
50eee0d0cea3475aaf0d1b967b37fb6abff00bafb4fa6e17a8c948e2ef84aab6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
54a187adfc33710db0fd5acd2d87f491717cf1110b0efa415680e544e43fd590.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
779aae8d260600fca091beb81ca497c21eb41aec31324f8fb00764038f5235ea.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
7a8a88b0a15e4a8745bd118e981c6441287f021628c402661c208c01855d8b14.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
7d862d9155b189b61a61193301acc9e68d4ba8c3fc2687dffba6916219efcaa1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
994a6a489bd088aa19cbaa9f7de2d6b2d95d35431eea33ab9869ec6f43f3ee70.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
b3e77f6d31ee37298332a8155798214c602890ab8954cc30261e7ff78e48f838.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
b8349e4fcf81aaf69399949c00e2b6efa4edf8c68b2d76a88e1139a7a1017897.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
c4b092b703d3b8e7772eaa70361a67341f5b16e479098aacb7a1948595f79486.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c676d41b0a465dc9eb99bf5bb3c392c6a4f9afc8ebf66c4271f1ca36dbf6f168.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
e6003af8259118d585d59c577d4350638e3cbde579b5f4ec0fce9845a97d4f08.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
edc38eb50d5c825ce8f755649e1c6c7fc24bea3b596f693c5932147527f4f1b7.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
ee34d9132ff6f1ea60e43803547dbe294602944fc0ebcf46cae0b6a5b671d28c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f6443696313e66561de8a0606699f87b170317b79b832ec3fa91395d503a3e3f.exe
Resource
win10v2004-20240508-en
General
-
Target
7a8a88b0a15e4a8745bd118e981c6441287f021628c402661c208c01855d8b14.exe
-
Size
900KB
-
MD5
4a9648d4eb38e033a991e4a829fb3e93
-
SHA1
85836d217cb987fe87348137629345e06a2a8993
-
SHA256
7a8a88b0a15e4a8745bd118e981c6441287f021628c402661c208c01855d8b14
-
SHA512
55d564f97226b83e81cb888ba0ee310996e200a9f0d455eb454d9f9760b8b361476c04061d59b4e0bce2252bb905058fab40503bf76b8eebd835193ca2858345
-
SSDEEP
12288:WMr6y90lQmdp8Bbof4EIKdniEMeYP/CynvCNCGGEsqbZZACGKvuMm7hD16RYTlSx:cyvGfXUE5YPq4qRsqbZZAzqaDkR3RHL
Malware Config
Extracted
redline
kukish
77.91.124.55:19071
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral10/files/0x000800000002344e-27.dat family_redline behavioral10/memory/4644-28-0x0000000000900000-0x000000000093E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2988 vu3TL0Hs.exe 1216 zY9dr4eN.exe 2248 lU3px6NV.exe 4644 2jg404Ua.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" lU3px6NV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7a8a88b0a15e4a8745bd118e981c6441287f021628c402661c208c01855d8b14.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vu3TL0Hs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zY9dr4eN.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4724 wrote to memory of 2988 4724 7a8a88b0a15e4a8745bd118e981c6441287f021628c402661c208c01855d8b14.exe 85 PID 4724 wrote to memory of 2988 4724 7a8a88b0a15e4a8745bd118e981c6441287f021628c402661c208c01855d8b14.exe 85 PID 4724 wrote to memory of 2988 4724 7a8a88b0a15e4a8745bd118e981c6441287f021628c402661c208c01855d8b14.exe 85 PID 2988 wrote to memory of 1216 2988 vu3TL0Hs.exe 86 PID 2988 wrote to memory of 1216 2988 vu3TL0Hs.exe 86 PID 2988 wrote to memory of 1216 2988 vu3TL0Hs.exe 86 PID 1216 wrote to memory of 2248 1216 zY9dr4eN.exe 87 PID 1216 wrote to memory of 2248 1216 zY9dr4eN.exe 87 PID 1216 wrote to memory of 2248 1216 zY9dr4eN.exe 87 PID 2248 wrote to memory of 4644 2248 lU3px6NV.exe 88 PID 2248 wrote to memory of 4644 2248 lU3px6NV.exe 88 PID 2248 wrote to memory of 4644 2248 lU3px6NV.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a8a88b0a15e4a8745bd118e981c6441287f021628c402661c208c01855d8b14.exe"C:\Users\Admin\AppData\Local\Temp\7a8a88b0a15e4a8745bd118e981c6441287f021628c402661c208c01855d8b14.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vu3TL0Hs.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vu3TL0Hs.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zY9dr4eN.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zY9dr4eN.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lU3px6NV.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lU3px6NV.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2jg404Ua.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2jg404Ua.exe5⤵
- Executes dropped EXE
PID:4644
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
762KB
MD51ad30cef5c76b81a9d82dd67b0227903
SHA198ab551662b38a0b9b69573bdc5a4f3000a0456b
SHA256e1fe1de92ff0d6209d577e1a66bcd7114f8abaf693e238486a5ebb3791b5a2ae
SHA5121073205310b43371d4ceb144b5546597504bed134ccf08c198ccdacc0a2367277addc33c81a32e517143488e8d650b1b67f3e175405b5578b303bca8f72e59b5
-
Filesize
572KB
MD54d75e6a141f9c4e73b17ce94218ce811
SHA1b52f6f6b4216406034070e037e5086106819d8e7
SHA2564399506548e854c876d5d7d94b3e573d233e9817cb400394f3e140ec764ee129
SHA512d6747ab945a4b07ba8faca5f8dcc50a4f30b6425133bca87e93b2a8c5c41d7760294999f9e5521518d645912c26d719b6b79bae841e9d02115f9ecf192364fbb
-
Filesize
319KB
MD52d429496d81a18af4360c8efc51a945a
SHA1e85dd3a0c052ae719a0888b28af83c77a847bff8
SHA256ac5f7f06b7a73d51ce886c2da418d2cb033cf3450dc6090550a4f1a2521579aa
SHA5121ea65ab5e763e85c5dbf4bd9b9462968a8f9752e7ad1572c200235b3b4862b2f64fafa87f008173d36731d168ccfa3df5c5e82e65fbee9508cb5a0ee46f7adcd
-
Filesize
222KB
MD5049ae0ce153eb5d6319ae68484daa191
SHA17651770111521e43181c748da3cddf96046ec12f
SHA2560ae87eb661e0191c2fe16b40dac6ee5f3a8deaecafdddca0e5bd62362d4b9db6
SHA5126307a7448c416cd7c5d4e9420becde2166a297c26d6a5a535f663cf5843d59b572680888fbe2a9d262dbbc130d1f0c584cf4927dd59820130bbeccb4df914101