Analysis

  • max time kernel
    146s
  • max time network
    188s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-05-2023 18:17

General

  • Target

    c3839b633f21352702166f574f09962974fc30bbae72fb8ec0557c8c89a3342a.exe

  • Size

    1.2MB

  • MD5

    02d03ae36069b971df04ac11550cc22f

  • SHA1

    84ec96b83c2ed70f1277790201d96eb69185bf9d

  • SHA256

    c3839b633f21352702166f574f09962974fc30bbae72fb8ec0557c8c89a3342a

  • SHA512

    ac0c7260fb2ba5e86dd932d9ba51d28c20dad951a21de8f1fab1f5353ec0b6d2309afaf6c7b11afd9912e0cb1cfc0793014dea39a0f807820a9eea70fe473516

  • SSDEEP

    24576:6yfwlNZmka+KvlNbKUd3/eU8BYzbr2Y2GOVH/f:BfANZ2HW82tBwXnXiH/

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

life

C2

185.161.248.73:4164

Attributes
  • auth_value

    8685d11953530b68ad5ec703809d9f91

Signatures

  • Detects Redline Stealer samples 3 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c3839b633f21352702166f574f09962974fc30bbae72fb8ec0557c8c89a3342a.exe
    "C:\Users\Admin\AppData\Local\Temp\c3839b633f21352702166f574f09962974fc30bbae72fb8ec0557c8c89a3342a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:832
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z59424173.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z59424173.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1912
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z34446665.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z34446665.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3836
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z91108685.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z91108685.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1436
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s09543558.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s09543558.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1532
            • C:\Windows\Temp\1.exe
              "C:\Windows\Temp\1.exe"
              6⤵
              • Executes dropped EXE
              PID:3368
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1532 -s 1196
              6⤵
              • Program crash
              PID:4572
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t07759713.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t07759713.exe
            5⤵
            • Executes dropped EXE
            PID:2756
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1532 -ip 1532
    1⤵
      PID:4372

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z59424173.exe

      Filesize

      1.0MB

      MD5

      c2c00a7c9accb61421f2ab9552fd41a0

      SHA1

      cbb44923579d7533d643f7c6038f0c6acd705c98

      SHA256

      482c4049761dae703e22779a6e4bc41c29126e256922dffe7450f47ee73a3726

      SHA512

      bc45fd4e337247264def402b63792da62dc8d9b96b8111d8d1c955d82c1363ce2935a4a4a0d0c0a1c173d145e55d1162f2e6df0e4d7966aec899c0298c92195d

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z59424173.exe

      Filesize

      1.0MB

      MD5

      c2c00a7c9accb61421f2ab9552fd41a0

      SHA1

      cbb44923579d7533d643f7c6038f0c6acd705c98

      SHA256

      482c4049761dae703e22779a6e4bc41c29126e256922dffe7450f47ee73a3726

      SHA512

      bc45fd4e337247264def402b63792da62dc8d9b96b8111d8d1c955d82c1363ce2935a4a4a0d0c0a1c173d145e55d1162f2e6df0e4d7966aec899c0298c92195d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z34446665.exe

      Filesize

      759KB

      MD5

      39ec0614da175b159d66805ba08e4bda

      SHA1

      c3801fb2fe1ba35e1740192e2ec7b2385c50934c

      SHA256

      b5ad6e7d4d75a363ef2cbde6ddbb7f9b2e1928ad0b4fee46cb375b5170dcf130

      SHA512

      55b1d2e037da65eb747328716dd9cdf602c080312989a66ce0de6174ee35aee593dfedb4b8c7e8ed94eab8329373b1a547553108016ee560ca23340fc2a4f110

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z34446665.exe

      Filesize

      759KB

      MD5

      39ec0614da175b159d66805ba08e4bda

      SHA1

      c3801fb2fe1ba35e1740192e2ec7b2385c50934c

      SHA256

      b5ad6e7d4d75a363ef2cbde6ddbb7f9b2e1928ad0b4fee46cb375b5170dcf130

      SHA512

      55b1d2e037da65eb747328716dd9cdf602c080312989a66ce0de6174ee35aee593dfedb4b8c7e8ed94eab8329373b1a547553108016ee560ca23340fc2a4f110

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z91108685.exe

      Filesize

      577KB

      MD5

      f9d79cd098fea81785b6c752f9cf6ebc

      SHA1

      65917605327e9365c6e5b52c0d6da193aee4cb62

      SHA256

      79998aec9813abb428fd4e9b29d41126572f8edac6d6e855e812bae0ae4b2d05

      SHA512

      2d64508844320d50863d124f725fd1ddefa2701a6442fb14fbd80788c9832ca626ab0ae0fc0935319b3b926827b99b5af311a7e0543a30f4dc12e9e86552e668

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z91108685.exe

      Filesize

      577KB

      MD5

      f9d79cd098fea81785b6c752f9cf6ebc

      SHA1

      65917605327e9365c6e5b52c0d6da193aee4cb62

      SHA256

      79998aec9813abb428fd4e9b29d41126572f8edac6d6e855e812bae0ae4b2d05

      SHA512

      2d64508844320d50863d124f725fd1ddefa2701a6442fb14fbd80788c9832ca626ab0ae0fc0935319b3b926827b99b5af311a7e0543a30f4dc12e9e86552e668

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s09543558.exe

      Filesize

      574KB

      MD5

      b187e416287b0666f4fb9037c0a129f3

      SHA1

      87edfba923c3f8eb89390380aa7caa933699cff4

      SHA256

      d093a468655a958fe7e395262e0ff1625b4629b9b73daa475faa3a4d01df6b9f

      SHA512

      f74a0ad3e3d0f5d1ee7f67d3904c707b6ec38ecea68a4ccaf910f0db13a20b0fc923392e3dc100fe00395488f33c805fd9436dc8e91cfbff68b4bf243c59a66e

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s09543558.exe

      Filesize

      574KB

      MD5

      b187e416287b0666f4fb9037c0a129f3

      SHA1

      87edfba923c3f8eb89390380aa7caa933699cff4

      SHA256

      d093a468655a958fe7e395262e0ff1625b4629b9b73daa475faa3a4d01df6b9f

      SHA512

      f74a0ad3e3d0f5d1ee7f67d3904c707b6ec38ecea68a4ccaf910f0db13a20b0fc923392e3dc100fe00395488f33c805fd9436dc8e91cfbff68b4bf243c59a66e

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t07759713.exe

      Filesize

      169KB

      MD5

      df3ea32a62bef18913a5e557b8dfdb06

      SHA1

      2e9e8c332386e069981799515e552d6d780684f4

      SHA256

      138ed3de3a592c71feaf3ebef227948674ce20a4c3aae7ba4a539e8b0a3a444e

      SHA512

      984b826bb7867151afaba229ea76dad757c82d243b67cfba2ce9e69d30fcc08d629cf901ed39c13170a79f72021fe12cc6f0fac9bb566a861d8d0f1366d2044e

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t07759713.exe

      Filesize

      169KB

      MD5

      df3ea32a62bef18913a5e557b8dfdb06

      SHA1

      2e9e8c332386e069981799515e552d6d780684f4

      SHA256

      138ed3de3a592c71feaf3ebef227948674ce20a4c3aae7ba4a539e8b0a3a444e

      SHA512

      984b826bb7867151afaba229ea76dad757c82d243b67cfba2ce9e69d30fcc08d629cf901ed39c13170a79f72021fe12cc6f0fac9bb566a861d8d0f1366d2044e

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • memory/1532-212-0x0000000004F20000-0x0000000004F80000-memory.dmp

      Filesize

      384KB

    • memory/1532-224-0x0000000004F20000-0x0000000004F80000-memory.dmp

      Filesize

      384KB

    • memory/1532-170-0x0000000004F20000-0x0000000004F80000-memory.dmp

      Filesize

      384KB

    • memory/1532-172-0x0000000004F20000-0x0000000004F80000-memory.dmp

      Filesize

      384KB

    • memory/1532-174-0x0000000004F20000-0x0000000004F80000-memory.dmp

      Filesize

      384KB

    • memory/1532-176-0x0000000004F20000-0x0000000004F80000-memory.dmp

      Filesize

      384KB

    • memory/1532-178-0x0000000004F20000-0x0000000004F80000-memory.dmp

      Filesize

      384KB

    • memory/1532-180-0x0000000004F20000-0x0000000004F80000-memory.dmp

      Filesize

      384KB

    • memory/1532-182-0x0000000004F20000-0x0000000004F80000-memory.dmp

      Filesize

      384KB

    • memory/1532-184-0x0000000004F20000-0x0000000004F80000-memory.dmp

      Filesize

      384KB

    • memory/1532-186-0x0000000004F20000-0x0000000004F80000-memory.dmp

      Filesize

      384KB

    • memory/1532-188-0x0000000004F20000-0x0000000004F80000-memory.dmp

      Filesize

      384KB

    • memory/1532-190-0x0000000004F20000-0x0000000004F80000-memory.dmp

      Filesize

      384KB

    • memory/1532-192-0x0000000004F20000-0x0000000004F80000-memory.dmp

      Filesize

      384KB

    • memory/1532-194-0x0000000004F20000-0x0000000004F80000-memory.dmp

      Filesize

      384KB

    • memory/1532-196-0x0000000004F20000-0x0000000004F80000-memory.dmp

      Filesize

      384KB

    • memory/1532-198-0x0000000004F20000-0x0000000004F80000-memory.dmp

      Filesize

      384KB

    • memory/1532-200-0x0000000004F20000-0x0000000004F80000-memory.dmp

      Filesize

      384KB

    • memory/1532-202-0x0000000004F20000-0x0000000004F80000-memory.dmp

      Filesize

      384KB

    • memory/1532-204-0x0000000004F20000-0x0000000004F80000-memory.dmp

      Filesize

      384KB

    • memory/1532-206-0x0000000004F20000-0x0000000004F80000-memory.dmp

      Filesize

      384KB

    • memory/1532-208-0x0000000004F20000-0x0000000004F80000-memory.dmp

      Filesize

      384KB

    • memory/1532-210-0x0000000004F20000-0x0000000004F80000-memory.dmp

      Filesize

      384KB

    • memory/1532-167-0x0000000004F20000-0x0000000004F80000-memory.dmp

      Filesize

      384KB

    • memory/1532-214-0x0000000004F20000-0x0000000004F80000-memory.dmp

      Filesize

      384KB

    • memory/1532-216-0x0000000004F20000-0x0000000004F80000-memory.dmp

      Filesize

      384KB

    • memory/1532-218-0x0000000004F20000-0x0000000004F80000-memory.dmp

      Filesize

      384KB

    • memory/1532-220-0x0000000004F20000-0x0000000004F80000-memory.dmp

      Filesize

      384KB

    • memory/1532-226-0x0000000004F20000-0x0000000004F80000-memory.dmp

      Filesize

      384KB

    • memory/1532-168-0x0000000004F20000-0x0000000004F80000-memory.dmp

      Filesize

      384KB

    • memory/1532-222-0x0000000004F20000-0x0000000004F80000-memory.dmp

      Filesize

      384KB

    • memory/1532-228-0x0000000004F20000-0x0000000004F80000-memory.dmp

      Filesize

      384KB

    • memory/1532-230-0x0000000004F20000-0x0000000004F80000-memory.dmp

      Filesize

      384KB

    • memory/1532-2315-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

      Filesize

      64KB

    • memory/1532-166-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

      Filesize

      64KB

    • memory/1532-2324-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

      Filesize

      64KB

    • memory/1532-2325-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

      Filesize

      64KB

    • memory/1532-2326-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

      Filesize

      64KB

    • memory/1532-165-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

      Filesize

      64KB

    • memory/1532-164-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

      Filesize

      64KB

    • memory/1532-162-0x0000000004FC0000-0x0000000005564000-memory.dmp

      Filesize

      5.6MB

    • memory/1532-163-0x0000000002260000-0x00000000022BB000-memory.dmp

      Filesize

      364KB

    • memory/1532-2334-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

      Filesize

      64KB

    • memory/2756-2344-0x0000000000790000-0x00000000007BE000-memory.dmp

      Filesize

      184KB

    • memory/2756-2351-0x0000000002A60000-0x0000000002A70000-memory.dmp

      Filesize

      64KB

    • memory/2756-2349-0x0000000005610000-0x0000000005676000-memory.dmp

      Filesize

      408KB

    • memory/2756-2348-0x0000000005570000-0x0000000005602000-memory.dmp

      Filesize

      584KB

    • memory/2756-2345-0x0000000002A60000-0x0000000002A70000-memory.dmp

      Filesize

      64KB

    • memory/3368-2346-0x0000000005260000-0x0000000005270000-memory.dmp

      Filesize

      64KB

    • memory/3368-2331-0x00000000008E0000-0x000000000090E000-memory.dmp

      Filesize

      184KB

    • memory/3368-2332-0x000000000AD10000-0x000000000B328000-memory.dmp

      Filesize

      6.1MB

    • memory/3368-2335-0x000000000A860000-0x000000000A96A000-memory.dmp

      Filesize

      1.0MB

    • memory/3368-2347-0x000000000AC90000-0x000000000AD06000-memory.dmp

      Filesize

      472KB

    • memory/3368-2339-0x0000000005260000-0x0000000005270000-memory.dmp

      Filesize

      64KB

    • memory/3368-2338-0x000000000A7F0000-0x000000000A82C000-memory.dmp

      Filesize

      240KB

    • memory/3368-2350-0x000000000B730000-0x000000000B780000-memory.dmp

      Filesize

      320KB

    • memory/3368-2336-0x000000000A790000-0x000000000A7A2000-memory.dmp

      Filesize

      72KB

    • memory/3368-2352-0x000000000BFD0000-0x000000000C192000-memory.dmp

      Filesize

      1.8MB

    • memory/3368-2353-0x000000000C6D0000-0x000000000CBFC000-memory.dmp

      Filesize

      5.2MB