Analysis

  • max time kernel
    186s
  • max time network
    201s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-05-2023 16:59

General

  • Target

    711c6ec0df8a75228ea640aa14d259104b78a8e4ca116e178e2609261c145a9d.exe

  • Size

    1.2MB

  • MD5

    d96887d27fddd55b6bc9cca39e8a8c01

  • SHA1

    4f8b0b546788d376cfc3722a365b6125583d4de4

  • SHA256

    711c6ec0df8a75228ea640aa14d259104b78a8e4ca116e178e2609261c145a9d

  • SHA512

    5a42d68742e8f87c4be1a1ceece71426f6cf5b1d8e61edba8d2112e9b10080343ef3ccfa64c7ae1d902fb9800594d1766d7251ebf0e93384f8e25a1ebccea143

  • SSDEEP

    24576:5yxy+kRmJNCJPo9H7dvb6KkyY/TpQ3qK0u7lfdLh9DhRAkSUW93/aUE:sxyvMJNCho9H1bp87u6K5JhTzLo

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

life

C2

185.161.248.73:4164

Attributes
  • auth_value

    8685d11953530b68ad5ec703809d9f91

Signatures

  • Detects Redline Stealer samples 3 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\711c6ec0df8a75228ea640aa14d259104b78a8e4ca116e178e2609261c145a9d.exe
    "C:\Users\Admin\AppData\Local\Temp\711c6ec0df8a75228ea640aa14d259104b78a8e4ca116e178e2609261c145a9d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1384
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z32091292.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z32091292.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2308
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z57610492.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z57610492.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3644
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z25776460.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z25776460.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:5012
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s76867837.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s76867837.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4844
            • C:\Windows\Temp\1.exe
              "C:\Windows\Temp\1.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2468
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4844 -s 1528
              6⤵
              • Program crash
              PID:756
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t31251887.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t31251887.exe
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:808
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4844 -ip 4844
    1⤵
      PID:2956

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z32091292.exe
      Filesize

      1.0MB

      MD5

      b59664c5e03b1201c6a92aea6793aeaa

      SHA1

      41f8e54f097319aa70a6b3816e567cda4094621c

      SHA256

      6dd728d2f5532824dd4dd588ed50af9e35052e971013bf9f72d48f4f0a93cc00

      SHA512

      50033c3aa2d2cb0033ea2794de950d5042c7aa5c831b50f8d034ef57691d96c3afa4302d95d57af5dc45c0cdab0ce8fb1ca1453beeaab5bb7931154f8a5a232c

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z32091292.exe
      Filesize

      1.0MB

      MD5

      b59664c5e03b1201c6a92aea6793aeaa

      SHA1

      41f8e54f097319aa70a6b3816e567cda4094621c

      SHA256

      6dd728d2f5532824dd4dd588ed50af9e35052e971013bf9f72d48f4f0a93cc00

      SHA512

      50033c3aa2d2cb0033ea2794de950d5042c7aa5c831b50f8d034ef57691d96c3afa4302d95d57af5dc45c0cdab0ce8fb1ca1453beeaab5bb7931154f8a5a232c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z57610492.exe
      Filesize

      759KB

      MD5

      2743d3e44eaa34ec2084d6660ae330c3

      SHA1

      197eebae2b65bbc6508a91a002d1e7d45a092c26

      SHA256

      d28f85a09497c9e3932b6e937f4d7811a72576ab7c76daf8bafa4617402e7995

      SHA512

      04802f5fd414a437c9576b29da56b06b1fd30f1a65b1ed61cf82ad5943399dbd5600dfce1e7be409dc2cf26dbdd8912e4f2b847142cbda3a72eb44f1babb03fd

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z57610492.exe
      Filesize

      759KB

      MD5

      2743d3e44eaa34ec2084d6660ae330c3

      SHA1

      197eebae2b65bbc6508a91a002d1e7d45a092c26

      SHA256

      d28f85a09497c9e3932b6e937f4d7811a72576ab7c76daf8bafa4617402e7995

      SHA512

      04802f5fd414a437c9576b29da56b06b1fd30f1a65b1ed61cf82ad5943399dbd5600dfce1e7be409dc2cf26dbdd8912e4f2b847142cbda3a72eb44f1babb03fd

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z25776460.exe
      Filesize

      577KB

      MD5

      39b419f7bd9faf4b3de5b86563b96e6b

      SHA1

      84d57108e4bd894d220565b2e6498d55622d5d51

      SHA256

      1f941a9e317d5a247657313a4e6b8ff2faa50d0d739f700e75d039a176594368

      SHA512

      03441e3786be527728d079f8f10e58d90406f92914456cf74add89372cf67312fa888348911c9453e1200108f0113d9204e83f65f0c1a9683aba9440a33f32ee

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z25776460.exe
      Filesize

      577KB

      MD5

      39b419f7bd9faf4b3de5b86563b96e6b

      SHA1

      84d57108e4bd894d220565b2e6498d55622d5d51

      SHA256

      1f941a9e317d5a247657313a4e6b8ff2faa50d0d739f700e75d039a176594368

      SHA512

      03441e3786be527728d079f8f10e58d90406f92914456cf74add89372cf67312fa888348911c9453e1200108f0113d9204e83f65f0c1a9683aba9440a33f32ee

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s76867837.exe
      Filesize

      574KB

      MD5

      d33a622ccec9deacf85544d3bfdd6d51

      SHA1

      42c841718d25db700dcc2a39c259a49b2712e94d

      SHA256

      aadff0cf486966cfd1b95bac878bb846dbc8a7dcc241ee5a0f7d5a8d28552b56

      SHA512

      2194978bc3b9ec40b122d887250838ae8fcf0643d1ea3ac43170d80e090727ec0dad92d62ee53b82038792ecd6a61ca78c674872534a479ad07510e3c79d1b3d

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s76867837.exe
      Filesize

      574KB

      MD5

      d33a622ccec9deacf85544d3bfdd6d51

      SHA1

      42c841718d25db700dcc2a39c259a49b2712e94d

      SHA256

      aadff0cf486966cfd1b95bac878bb846dbc8a7dcc241ee5a0f7d5a8d28552b56

      SHA512

      2194978bc3b9ec40b122d887250838ae8fcf0643d1ea3ac43170d80e090727ec0dad92d62ee53b82038792ecd6a61ca78c674872534a479ad07510e3c79d1b3d

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t31251887.exe
      Filesize

      169KB

      MD5

      c08c37777f13023b28774720d64b2960

      SHA1

      ca05b214d6f9e13d8461e3fa32b195570aa10ace

      SHA256

      b1ef107d3586167c60e351cb4ca94fb65694fdd7848b44a8ebffe7152fa37cb6

      SHA512

      c208e1802b196d4b1d8d62665b725f25c8183a3934f1a09aa7ef3a266a87d53cefb8972ea900e3bddb5c7ff247b5068835a378286be8b2f5eb53348eae6c2aab

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t31251887.exe
      Filesize

      169KB

      MD5

      c08c37777f13023b28774720d64b2960

      SHA1

      ca05b214d6f9e13d8461e3fa32b195570aa10ace

      SHA256

      b1ef107d3586167c60e351cb4ca94fb65694fdd7848b44a8ebffe7152fa37cb6

      SHA512

      c208e1802b196d4b1d8d62665b725f25c8183a3934f1a09aa7ef3a266a87d53cefb8972ea900e3bddb5c7ff247b5068835a378286be8b2f5eb53348eae6c2aab

    • C:\Windows\Temp\1.exe
      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • C:\Windows\Temp\1.exe
      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • C:\Windows\Temp\1.exe
      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • memory/808-2348-0x0000000004A60000-0x0000000004A70000-memory.dmp
      Filesize

      64KB

    • memory/808-2352-0x0000000005DA0000-0x0000000005F62000-memory.dmp
      Filesize

      1.8MB

    • memory/808-2347-0x0000000004A60000-0x0000000004A70000-memory.dmp
      Filesize

      64KB

    • memory/808-2346-0x00000000000E0000-0x000000000010E000-memory.dmp
      Filesize

      184KB

    • memory/808-2353-0x0000000008320000-0x000000000884C000-memory.dmp
      Filesize

      5.2MB

    • memory/2468-2340-0x0000000004A90000-0x0000000004AA0000-memory.dmp
      Filesize

      64KB

    • memory/2468-2351-0x0000000005050000-0x00000000050B6000-memory.dmp
      Filesize

      408KB

    • memory/2468-2349-0x0000000004F60000-0x0000000004FD6000-memory.dmp
      Filesize

      472KB

    • memory/2468-2338-0x0000000004B20000-0x0000000004B5C000-memory.dmp
      Filesize

      240KB

    • memory/2468-2337-0x0000000004A90000-0x0000000004AA0000-memory.dmp
      Filesize

      64KB

    • memory/2468-2336-0x0000000004AC0000-0x0000000004AD2000-memory.dmp
      Filesize

      72KB

    • memory/2468-2335-0x0000000004BB0000-0x0000000004CBA000-memory.dmp
      Filesize

      1.0MB

    • memory/2468-2334-0x00000000050C0000-0x00000000056D8000-memory.dmp
      Filesize

      6.1MB

    • memory/2468-2331-0x0000000000160000-0x000000000018E000-memory.dmp
      Filesize

      184KB

    • memory/2468-2350-0x00000000056E0000-0x0000000005772000-memory.dmp
      Filesize

      584KB

    • memory/2468-2354-0x0000000005E20000-0x0000000005E70000-memory.dmp
      Filesize

      320KB

    • memory/4844-176-0x0000000002C20000-0x0000000002C80000-memory.dmp
      Filesize

      384KB

    • memory/4844-196-0x0000000002C20000-0x0000000002C80000-memory.dmp
      Filesize

      384KB

    • memory/4844-202-0x0000000002C20000-0x0000000002C80000-memory.dmp
      Filesize

      384KB

    • memory/4844-204-0x0000000002C20000-0x0000000002C80000-memory.dmp
      Filesize

      384KB

    • memory/4844-206-0x0000000002C20000-0x0000000002C80000-memory.dmp
      Filesize

      384KB

    • memory/4844-208-0x0000000002C20000-0x0000000002C80000-memory.dmp
      Filesize

      384KB

    • memory/4844-210-0x0000000002C20000-0x0000000002C80000-memory.dmp
      Filesize

      384KB

    • memory/4844-212-0x0000000002C20000-0x0000000002C80000-memory.dmp
      Filesize

      384KB

    • memory/4844-214-0x0000000002C20000-0x0000000002C80000-memory.dmp
      Filesize

      384KB

    • memory/4844-216-0x0000000002C20000-0x0000000002C80000-memory.dmp
      Filesize

      384KB

    • memory/4844-218-0x0000000002C20000-0x0000000002C80000-memory.dmp
      Filesize

      384KB

    • memory/4844-220-0x0000000002C20000-0x0000000002C80000-memory.dmp
      Filesize

      384KB

    • memory/4844-222-0x0000000002C20000-0x0000000002C80000-memory.dmp
      Filesize

      384KB

    • memory/4844-224-0x0000000002C20000-0x0000000002C80000-memory.dmp
      Filesize

      384KB

    • memory/4844-226-0x0000000002C20000-0x0000000002C80000-memory.dmp
      Filesize

      384KB

    • memory/4844-228-0x0000000002C20000-0x0000000002C80000-memory.dmp
      Filesize

      384KB

    • memory/4844-230-0x0000000002C20000-0x0000000002C80000-memory.dmp
      Filesize

      384KB

    • memory/4844-2315-0x0000000002720000-0x0000000002730000-memory.dmp
      Filesize

      64KB

    • memory/4844-2317-0x0000000002720000-0x0000000002730000-memory.dmp
      Filesize

      64KB

    • memory/4844-2316-0x0000000002720000-0x0000000002730000-memory.dmp
      Filesize

      64KB

    • memory/4844-2318-0x0000000002720000-0x0000000002730000-memory.dmp
      Filesize

      64KB

    • memory/4844-194-0x0000000002C20000-0x0000000002C80000-memory.dmp
      Filesize

      384KB

    • memory/4844-200-0x0000000002C20000-0x0000000002C80000-memory.dmp
      Filesize

      384KB

    • memory/4844-198-0x0000000002C20000-0x0000000002C80000-memory.dmp
      Filesize

      384KB

    • memory/4844-192-0x0000000002C20000-0x0000000002C80000-memory.dmp
      Filesize

      384KB

    • memory/4844-2332-0x0000000002720000-0x0000000002730000-memory.dmp
      Filesize

      64KB

    • memory/4844-186-0x0000000002C20000-0x0000000002C80000-memory.dmp
      Filesize

      384KB

    • memory/4844-188-0x0000000002C20000-0x0000000002C80000-memory.dmp
      Filesize

      384KB

    • memory/4844-190-0x0000000002C20000-0x0000000002C80000-memory.dmp
      Filesize

      384KB

    • memory/4844-184-0x0000000002C20000-0x0000000002C80000-memory.dmp
      Filesize

      384KB

    • memory/4844-182-0x0000000002C20000-0x0000000002C80000-memory.dmp
      Filesize

      384KB

    • memory/4844-180-0x0000000002C20000-0x0000000002C80000-memory.dmp
      Filesize

      384KB

    • memory/4844-178-0x0000000002C20000-0x0000000002C80000-memory.dmp
      Filesize

      384KB

    • memory/4844-173-0x0000000002720000-0x0000000002730000-memory.dmp
      Filesize

      64KB

    • memory/4844-174-0x0000000002C20000-0x0000000002C80000-memory.dmp
      Filesize

      384KB

    • memory/4844-171-0x0000000002720000-0x0000000002730000-memory.dmp
      Filesize

      64KB

    • memory/4844-169-0x0000000002C20000-0x0000000002C80000-memory.dmp
      Filesize

      384KB

    • memory/4844-170-0x0000000002720000-0x0000000002730000-memory.dmp
      Filesize

      64KB

    • memory/4844-167-0x0000000002C20000-0x0000000002C80000-memory.dmp
      Filesize

      384KB

    • memory/4844-164-0x0000000002C20000-0x0000000002C80000-memory.dmp
      Filesize

      384KB

    • memory/4844-165-0x0000000002C20000-0x0000000002C80000-memory.dmp
      Filesize

      384KB

    • memory/4844-163-0x00000000050D0000-0x0000000005674000-memory.dmp
      Filesize

      5.6MB

    • memory/4844-162-0x0000000000910000-0x000000000096B000-memory.dmp
      Filesize

      364KB