Analysis

  • max time kernel
    297s
  • max time network
    373s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/05/2023, 18:26

General

  • Target

    59e21de36f89244d992b360ec660bd7c7d46ceea8b439bdf09a9182b9c48eb5d.exe

  • Size

    890KB

  • MD5

    18fdd6845e23102b326fcd7512410047

  • SHA1

    f83b6a55b1c8ac0496393ce8cdef65d4d7d0304f

  • SHA256

    59e21de36f89244d992b360ec660bd7c7d46ceea8b439bdf09a9182b9c48eb5d

  • SHA512

    c74fd1dafdacbfbe8f5c9bc4a41127154805ce87239dbb78ea8668b96e3c6f6102ce79134d6fc01a0bcd6c8984e90232129c347b79e49f7d271f10d30777323b

  • SSDEEP

    12288:ty90NSFwsSRik/ju7+H7ErCiHTMf57IM4qusZTPqWdg8iIT6IngP35hUMJRs:tybmRRLju7/e2CnZTiN6wZPs

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\59e21de36f89244d992b360ec660bd7c7d46ceea8b439bdf09a9182b9c48eb5d.exe
    "C:\Users\Admin\AppData\Local\Temp\59e21de36f89244d992b360ec660bd7c7d46ceea8b439bdf09a9182b9c48eb5d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:536
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y73071210.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y73071210.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4348
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p77280234.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p77280234.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4808
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          PID:4352
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 1380
          4⤵
          • Program crash
          PID:1604
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4808 -ip 4808
    1⤵
      PID:2076

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y73071210.exe

            Filesize

            589KB

            MD5

            8dd279b7ba4b658010e48cfc7d8e6cba

            SHA1

            39cecd37b746e48914158a3a388a5a995e1cbd3c

            SHA256

            8ada11c292e1ae1f9c32fd606cf4ff5c712f0b0e9291e94b768e5473b61989d7

            SHA512

            a25a6556846833238455cc2ca0e78e9b255ffe0cd73c78451f53b1ac85da3a0570770be5a1cfd0336beb398b3cd521e6316f76fb07eaac763af7455012aafca5

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y73071210.exe

            Filesize

            589KB

            MD5

            8dd279b7ba4b658010e48cfc7d8e6cba

            SHA1

            39cecd37b746e48914158a3a388a5a995e1cbd3c

            SHA256

            8ada11c292e1ae1f9c32fd606cf4ff5c712f0b0e9291e94b768e5473b61989d7

            SHA512

            a25a6556846833238455cc2ca0e78e9b255ffe0cd73c78451f53b1ac85da3a0570770be5a1cfd0336beb398b3cd521e6316f76fb07eaac763af7455012aafca5

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p77280234.exe

            Filesize

            530KB

            MD5

            d518dbac45f98f91f6dc4814d2e2de8b

            SHA1

            b8f572112278878f763f65d5b2b751b3012b82f4

            SHA256

            e715e92c912630fb699e946697970c4392a124d6866846de3afddafe8d181f79

            SHA512

            9af0c0e1d76b58b9d80edaf3155c702bd70acca6c53f00d0f051fb53ebb16ffd415df562fbe4f59b85fac90b603c503d8c676e92d68e710b3e117ef3b26702ce

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p77280234.exe

            Filesize

            530KB

            MD5

            d518dbac45f98f91f6dc4814d2e2de8b

            SHA1

            b8f572112278878f763f65d5b2b751b3012b82f4

            SHA256

            e715e92c912630fb699e946697970c4392a124d6866846de3afddafe8d181f79

            SHA512

            9af0c0e1d76b58b9d80edaf3155c702bd70acca6c53f00d0f051fb53ebb16ffd415df562fbe4f59b85fac90b603c503d8c676e92d68e710b3e117ef3b26702ce

          • C:\Windows\Temp\1.exe

            Filesize

            168KB

            MD5

            f16fb63d4e551d3808e8f01f2671b57e

            SHA1

            781153ad6235a1152da112de1fb39a6f2d063575

            SHA256

            8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

            SHA512

            fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

          • C:\Windows\Temp\1.exe

            Filesize

            168KB

            MD5

            f16fb63d4e551d3808e8f01f2671b57e

            SHA1

            781153ad6235a1152da112de1fb39a6f2d063575

            SHA256

            8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

            SHA512

            fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

          • C:\Windows\Temp\1.exe

            Filesize

            168KB

            MD5

            f16fb63d4e551d3808e8f01f2671b57e

            SHA1

            781153ad6235a1152da112de1fb39a6f2d063575

            SHA256

            8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

            SHA512

            fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

          • memory/4352-2321-0x0000000000FC0000-0x0000000000FEE000-memory.dmp

            Filesize

            184KB

          • memory/4808-148-0x00000000026C0000-0x000000000271B000-memory.dmp

            Filesize

            364KB

          • memory/4808-149-0x0000000000400000-0x0000000000A95000-memory.dmp

            Filesize

            6.6MB

          • memory/4808-150-0x00000000026C0000-0x000000000271B000-memory.dmp

            Filesize

            364KB

          • memory/4808-151-0x0000000005220000-0x00000000057C4000-memory.dmp

            Filesize

            5.6MB

          • memory/4808-152-0x0000000000400000-0x0000000000A95000-memory.dmp

            Filesize

            6.6MB

          • memory/4808-153-0x0000000002C30000-0x0000000002C90000-memory.dmp

            Filesize

            384KB

          • memory/4808-155-0x0000000002C30000-0x0000000002C90000-memory.dmp

            Filesize

            384KB

          • memory/4808-157-0x0000000005210000-0x0000000005220000-memory.dmp

            Filesize

            64KB

          • memory/4808-156-0x0000000005210000-0x0000000005220000-memory.dmp

            Filesize

            64KB

          • memory/4808-154-0x0000000005210000-0x0000000005220000-memory.dmp

            Filesize

            64KB

          • memory/4808-159-0x0000000002C30000-0x0000000002C90000-memory.dmp

            Filesize

            384KB

          • memory/4808-161-0x0000000002C30000-0x0000000002C90000-memory.dmp

            Filesize

            384KB

          • memory/4808-163-0x0000000002C30000-0x0000000002C90000-memory.dmp

            Filesize

            384KB

          • memory/4808-165-0x0000000002C30000-0x0000000002C90000-memory.dmp

            Filesize

            384KB

          • memory/4808-167-0x0000000002C30000-0x0000000002C90000-memory.dmp

            Filesize

            384KB

          • memory/4808-169-0x0000000002C30000-0x0000000002C90000-memory.dmp

            Filesize

            384KB

          • memory/4808-171-0x0000000002C30000-0x0000000002C90000-memory.dmp

            Filesize

            384KB

          • memory/4808-173-0x0000000002C30000-0x0000000002C90000-memory.dmp

            Filesize

            384KB

          • memory/4808-179-0x0000000002C30000-0x0000000002C90000-memory.dmp

            Filesize

            384KB

          • memory/4808-181-0x0000000002C30000-0x0000000002C90000-memory.dmp

            Filesize

            384KB

          • memory/4808-177-0x0000000002C30000-0x0000000002C90000-memory.dmp

            Filesize

            384KB

          • memory/4808-175-0x0000000002C30000-0x0000000002C90000-memory.dmp

            Filesize

            384KB

          • memory/4808-183-0x0000000002C30000-0x0000000002C90000-memory.dmp

            Filesize

            384KB

          • memory/4808-185-0x0000000002C30000-0x0000000002C90000-memory.dmp

            Filesize

            384KB

          • memory/4808-187-0x0000000002C30000-0x0000000002C90000-memory.dmp

            Filesize

            384KB

          • memory/4808-189-0x0000000002C30000-0x0000000002C90000-memory.dmp

            Filesize

            384KB

          • memory/4808-191-0x0000000002C30000-0x0000000002C90000-memory.dmp

            Filesize

            384KB

          • memory/4808-193-0x0000000002C30000-0x0000000002C90000-memory.dmp

            Filesize

            384KB

          • memory/4808-195-0x0000000002C30000-0x0000000002C90000-memory.dmp

            Filesize

            384KB

          • memory/4808-197-0x0000000002C30000-0x0000000002C90000-memory.dmp

            Filesize

            384KB

          • memory/4808-199-0x0000000002C30000-0x0000000002C90000-memory.dmp

            Filesize

            384KB

          • memory/4808-201-0x0000000002C30000-0x0000000002C90000-memory.dmp

            Filesize

            384KB

          • memory/4808-203-0x0000000002C30000-0x0000000002C90000-memory.dmp

            Filesize

            384KB

          • memory/4808-207-0x0000000002C30000-0x0000000002C90000-memory.dmp

            Filesize

            384KB

          • memory/4808-205-0x0000000002C30000-0x0000000002C90000-memory.dmp

            Filesize

            384KB

          • memory/4808-209-0x0000000002C30000-0x0000000002C90000-memory.dmp

            Filesize

            384KB

          • memory/4808-211-0x0000000002C30000-0x0000000002C90000-memory.dmp

            Filesize

            384KB

          • memory/4808-213-0x0000000002C30000-0x0000000002C90000-memory.dmp

            Filesize

            384KB

          • memory/4808-215-0x0000000002C30000-0x0000000002C90000-memory.dmp

            Filesize

            384KB

          • memory/4808-217-0x0000000002C30000-0x0000000002C90000-memory.dmp

            Filesize

            384KB

          • memory/4808-2303-0x0000000005210000-0x0000000005220000-memory.dmp

            Filesize

            64KB

          • memory/4808-2323-0x0000000005210000-0x0000000005220000-memory.dmp

            Filesize

            64KB