Analysis

  • max time kernel
    147s
  • max time network
    189s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-05-2023 18:33

General

  • Target

    d00e1c54ba8238d808564c0a904aced3.exe

  • Size

    1.2MB

  • MD5

    d00e1c54ba8238d808564c0a904aced3

  • SHA1

    c985c37098dbd7ddba0ed32b0aaf5e37b6bf13eb

  • SHA256

    c425f2c5cf5eb638930dcb74d944678438e091bb40f3947924b8a0236181e21b

  • SHA512

    9c4c6a35dec4c448222154de3097a490428c2037db9fe28e61f4edc56ad7cf5f7964dd9f95fa01b60b7eb85a2e7d1728b0ee968e914e28a64c6492e32a624d7f

  • SSDEEP

    24576:0ywznHgPwP5kcbCwN+kUpuwnrSF6dWjvVBIn/9DmW6BKiPwCAcyHf1Z:DCG0/2zkIui5aBIFDmW6BHYbf

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

life

C2

185.161.248.73:4164

Attributes
  • auth_value

    8685d11953530b68ad5ec703809d9f91

Signatures

  • Detects Redline Stealer samples 2 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d00e1c54ba8238d808564c0a904aced3.exe
    "C:\Users\Admin\AppData\Local\Temp\d00e1c54ba8238d808564c0a904aced3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1444
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z57876592.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z57876592.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1304
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z02145668.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z02145668.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:936
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z10730868.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z10730868.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4364
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s31733650.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s31733650.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:236
            • C:\Windows\Temp\1.exe
              "C:\Windows\Temp\1.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4980
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 236 -s 1516
              6⤵
              • Program crash
              PID:4944
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t83191995.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t83191995.exe
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:372
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 236 -ip 236
    1⤵
      PID:268

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z57876592.exe

      Filesize

      1.0MB

      MD5

      9c7e5a05c1245bfbaf2476d34d825cd2

      SHA1

      049de2277f84657feeb4ee755fa3b2f5044c0a4c

      SHA256

      16bffa93433515bb460f409d8d223232f183a7222e9a52ae7fe97a6d9ae45e79

      SHA512

      68d5c5df9cd9c1f9b4efe98b406c3259115fec3d32eb89a00bd60eb5ce0d7d2051c3f6a1215b48276a46067224a84d36fb39efaceb907ba9630e343451bbec8a

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z57876592.exe

      Filesize

      1.0MB

      MD5

      9c7e5a05c1245bfbaf2476d34d825cd2

      SHA1

      049de2277f84657feeb4ee755fa3b2f5044c0a4c

      SHA256

      16bffa93433515bb460f409d8d223232f183a7222e9a52ae7fe97a6d9ae45e79

      SHA512

      68d5c5df9cd9c1f9b4efe98b406c3259115fec3d32eb89a00bd60eb5ce0d7d2051c3f6a1215b48276a46067224a84d36fb39efaceb907ba9630e343451bbec8a

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z02145668.exe

      Filesize

      760KB

      MD5

      6a9b848e424aad470736a72e4fbc1900

      SHA1

      c10c06377bbd1364d8021fb39cf4499af331de7f

      SHA256

      2d3d6c5be397eaeb47380896a666feb5e96cf97f4c181d221bfd30e41a48c902

      SHA512

      e2d5a835685c59ee00c436ae727f2404e3bedb862277be08e763ebde71a048228ca5fb3bc252b3b92aff2a16d8999940dcca1347f38517d47a7ec1b797cddcbd

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z02145668.exe

      Filesize

      760KB

      MD5

      6a9b848e424aad470736a72e4fbc1900

      SHA1

      c10c06377bbd1364d8021fb39cf4499af331de7f

      SHA256

      2d3d6c5be397eaeb47380896a666feb5e96cf97f4c181d221bfd30e41a48c902

      SHA512

      e2d5a835685c59ee00c436ae727f2404e3bedb862277be08e763ebde71a048228ca5fb3bc252b3b92aff2a16d8999940dcca1347f38517d47a7ec1b797cddcbd

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z10730868.exe

      Filesize

      577KB

      MD5

      73b0c02be731819fb5e75836ad4728d2

      SHA1

      62af297bdd78f6e507fa4db8dfcdf4f137badec1

      SHA256

      04d0eff8c8a3319a82030b595ebde59edfb2c9acb453f73b0d2353d562d67306

      SHA512

      4f6d24892a59f296ba24a553ede75f8e0666a3071dc8aee7af6a28ee991ad92e76de015426f8ce0a5ad3b687d22c7d71e37885f873b48750ab86b49fe4a494a4

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z10730868.exe

      Filesize

      577KB

      MD5

      73b0c02be731819fb5e75836ad4728d2

      SHA1

      62af297bdd78f6e507fa4db8dfcdf4f137badec1

      SHA256

      04d0eff8c8a3319a82030b595ebde59edfb2c9acb453f73b0d2353d562d67306

      SHA512

      4f6d24892a59f296ba24a553ede75f8e0666a3071dc8aee7af6a28ee991ad92e76de015426f8ce0a5ad3b687d22c7d71e37885f873b48750ab86b49fe4a494a4

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s31733650.exe

      Filesize

      502KB

      MD5

      cf441db2f9699bbf3b2cefdb12c32240

      SHA1

      8052a2503e4bdb71ed66838c8bed45950eba841f

      SHA256

      a2bffe454e87cf8c31256109d22ff3c2af58bb36eaac6cf1e42645817832ad7a

      SHA512

      f8d03e0f8fb50fb35cf7853b9cc948f7d02287877948f71ecac6d14bb300641645174fa726689c74c64b34a5ffb645f86088640cf0f85cd88cad17a44d816507

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s31733650.exe

      Filesize

      502KB

      MD5

      cf441db2f9699bbf3b2cefdb12c32240

      SHA1

      8052a2503e4bdb71ed66838c8bed45950eba841f

      SHA256

      a2bffe454e87cf8c31256109d22ff3c2af58bb36eaac6cf1e42645817832ad7a

      SHA512

      f8d03e0f8fb50fb35cf7853b9cc948f7d02287877948f71ecac6d14bb300641645174fa726689c74c64b34a5ffb645f86088640cf0f85cd88cad17a44d816507

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t83191995.exe

      Filesize

      169KB

      MD5

      ce7414222bfa40929bbffceda3647dae

      SHA1

      b52fe1753a11354c18778332a9db0f41fdd58d7c

      SHA256

      df979f652fc1c0a265984868d5db3470eabf17e360254c4f9a07f5ed0260d81c

      SHA512

      7d269585679e282e29e50a4cad87a0401a57398211787280236399ffc31ead3625409586aa611ff37098351b8983bf38a714a70bd9ecc4b523b805ace392b756

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t83191995.exe

      Filesize

      169KB

      MD5

      ce7414222bfa40929bbffceda3647dae

      SHA1

      b52fe1753a11354c18778332a9db0f41fdd58d7c

      SHA256

      df979f652fc1c0a265984868d5db3470eabf17e360254c4f9a07f5ed0260d81c

      SHA512

      7d269585679e282e29e50a4cad87a0401a57398211787280236399ffc31ead3625409586aa611ff37098351b8983bf38a714a70bd9ecc4b523b805ace392b756

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • memory/236-173-0x00000000054D0000-0x0000000005530000-memory.dmp

      Filesize

      384KB

    • memory/236-221-0x00000000054D0000-0x0000000005530000-memory.dmp

      Filesize

      384KB

    • memory/236-171-0x00000000054D0000-0x0000000005530000-memory.dmp

      Filesize

      384KB

    • memory/236-168-0x00000000054D0000-0x0000000005530000-memory.dmp

      Filesize

      384KB

    • memory/236-175-0x00000000054D0000-0x0000000005530000-memory.dmp

      Filesize

      384KB

    • memory/236-177-0x00000000054D0000-0x0000000005530000-memory.dmp

      Filesize

      384KB

    • memory/236-179-0x00000000054D0000-0x0000000005530000-memory.dmp

      Filesize

      384KB

    • memory/236-181-0x00000000054D0000-0x0000000005530000-memory.dmp

      Filesize

      384KB

    • memory/236-183-0x00000000054D0000-0x0000000005530000-memory.dmp

      Filesize

      384KB

    • memory/236-185-0x00000000054D0000-0x0000000005530000-memory.dmp

      Filesize

      384KB

    • memory/236-187-0x00000000054D0000-0x0000000005530000-memory.dmp

      Filesize

      384KB

    • memory/236-189-0x00000000054D0000-0x0000000005530000-memory.dmp

      Filesize

      384KB

    • memory/236-191-0x00000000054D0000-0x0000000005530000-memory.dmp

      Filesize

      384KB

    • memory/236-193-0x00000000054D0000-0x0000000005530000-memory.dmp

      Filesize

      384KB

    • memory/236-195-0x00000000054D0000-0x0000000005530000-memory.dmp

      Filesize

      384KB

    • memory/236-197-0x00000000054D0000-0x0000000005530000-memory.dmp

      Filesize

      384KB

    • memory/236-199-0x00000000054D0000-0x0000000005530000-memory.dmp

      Filesize

      384KB

    • memory/236-201-0x00000000054D0000-0x0000000005530000-memory.dmp

      Filesize

      384KB

    • memory/236-203-0x00000000054D0000-0x0000000005530000-memory.dmp

      Filesize

      384KB

    • memory/236-205-0x00000000054D0000-0x0000000005530000-memory.dmp

      Filesize

      384KB

    • memory/236-207-0x00000000054D0000-0x0000000005530000-memory.dmp

      Filesize

      384KB

    • memory/236-209-0x00000000054D0000-0x0000000005530000-memory.dmp

      Filesize

      384KB

    • memory/236-211-0x00000000054D0000-0x0000000005530000-memory.dmp

      Filesize

      384KB

    • memory/236-213-0x00000000054D0000-0x0000000005530000-memory.dmp

      Filesize

      384KB

    • memory/236-215-0x00000000054D0000-0x0000000005530000-memory.dmp

      Filesize

      384KB

    • memory/236-217-0x00000000054D0000-0x0000000005530000-memory.dmp

      Filesize

      384KB

    • memory/236-219-0x00000000054D0000-0x0000000005530000-memory.dmp

      Filesize

      384KB

    • memory/236-169-0x00000000054D0000-0x0000000005530000-memory.dmp

      Filesize

      384KB

    • memory/236-223-0x00000000054D0000-0x0000000005530000-memory.dmp

      Filesize

      384KB

    • memory/236-225-0x00000000054D0000-0x0000000005530000-memory.dmp

      Filesize

      384KB

    • memory/236-227-0x00000000054D0000-0x0000000005530000-memory.dmp

      Filesize

      384KB

    • memory/236-2314-0x0000000000A40000-0x0000000000A9B000-memory.dmp

      Filesize

      364KB

    • memory/236-2315-0x0000000004E10000-0x0000000004E20000-memory.dmp

      Filesize

      64KB

    • memory/236-2318-0x0000000004E10000-0x0000000004E20000-memory.dmp

      Filesize

      64KB

    • memory/236-167-0x0000000000400000-0x0000000000823000-memory.dmp

      Filesize

      4.1MB

    • memory/236-166-0x0000000004F20000-0x00000000054C4000-memory.dmp

      Filesize

      5.6MB

    • memory/236-165-0x0000000004E10000-0x0000000004E20000-memory.dmp

      Filesize

      64KB

    • memory/236-162-0x0000000000400000-0x0000000000823000-memory.dmp

      Filesize

      4.1MB

    • memory/236-163-0x0000000000A40000-0x0000000000A9B000-memory.dmp

      Filesize

      364KB

    • memory/372-2344-0x0000000000A50000-0x0000000000A7E000-memory.dmp

      Filesize

      184KB

    • memory/372-2350-0x00000000066F0000-0x0000000006740000-memory.dmp

      Filesize

      320KB

    • memory/372-2349-0x0000000005400000-0x0000000005410000-memory.dmp

      Filesize

      64KB

    • memory/372-2348-0x0000000005790000-0x00000000057F6000-memory.dmp

      Filesize

      408KB

    • memory/372-2345-0x0000000005400000-0x0000000005410000-memory.dmp

      Filesize

      64KB

    • memory/4980-2330-0x00000000003A0000-0x00000000003CE000-memory.dmp

      Filesize

      184KB

    • memory/4980-2332-0x000000000A1E0000-0x000000000A2EA000-memory.dmp

      Filesize

      1.0MB

    • memory/4980-2331-0x000000000A6F0000-0x000000000AD08000-memory.dmp

      Filesize

      6.1MB

    • memory/4980-2337-0x0000000004D40000-0x0000000004D50000-memory.dmp

      Filesize

      64KB

    • memory/4980-2346-0x000000000A5C0000-0x000000000A636000-memory.dmp

      Filesize

      472KB

    • memory/4980-2347-0x000000000AE10000-0x000000000AEA2000-memory.dmp

      Filesize

      584KB

    • memory/4980-2336-0x000000000A170000-0x000000000A1AC000-memory.dmp

      Filesize

      240KB

    • memory/4980-2334-0x0000000004D40000-0x0000000004D50000-memory.dmp

      Filesize

      64KB

    • memory/4980-2333-0x000000000A110000-0x000000000A122000-memory.dmp

      Filesize

      72KB