Analysis
-
max time kernel
297s -
max time network
373s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 18:26
Static task
static1
Behavioral task
behavioral1
Sample
59e21de36f89244d992b360ec660bd7c7d46ceea8b439bdf09a9182b9c48eb5d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
59e21de36f89244d992b360ec660bd7c7d46ceea8b439bdf09a9182b9c48eb5d.exe
Resource
win10v2004-20230221-en
General
-
Target
59e21de36f89244d992b360ec660bd7c7d46ceea8b439bdf09a9182b9c48eb5d.exe
-
Size
890KB
-
MD5
18fdd6845e23102b326fcd7512410047
-
SHA1
f83b6a55b1c8ac0496393ce8cdef65d4d7d0304f
-
SHA256
59e21de36f89244d992b360ec660bd7c7d46ceea8b439bdf09a9182b9c48eb5d
-
SHA512
c74fd1dafdacbfbe8f5c9bc4a41127154805ce87239dbb78ea8668b96e3c6f6102ce79134d6fc01a0bcd6c8984e90232129c347b79e49f7d271f10d30777323b
-
SSDEEP
12288:ty90NSFwsSRik/ju7+H7ErCiHTMf57IM4qusZTPqWdg8iIT6IngP35hUMJRs:tybmRRLju7/e2CnZTiN6wZPs
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation p77280234.exe -
Executes dropped EXE 3 IoCs
pid Process 4348 y73071210.exe 4808 p77280234.exe 4352 1.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 59e21de36f89244d992b360ec660bd7c7d46ceea8b439bdf09a9182b9c48eb5d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 59e21de36f89244d992b360ec660bd7c7d46ceea8b439bdf09a9182b9c48eb5d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y73071210.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y73071210.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1604 4808 WerFault.exe 80 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4808 p77280234.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 536 wrote to memory of 4348 536 59e21de36f89244d992b360ec660bd7c7d46ceea8b439bdf09a9182b9c48eb5d.exe 79 PID 536 wrote to memory of 4348 536 59e21de36f89244d992b360ec660bd7c7d46ceea8b439bdf09a9182b9c48eb5d.exe 79 PID 536 wrote to memory of 4348 536 59e21de36f89244d992b360ec660bd7c7d46ceea8b439bdf09a9182b9c48eb5d.exe 79 PID 4348 wrote to memory of 4808 4348 y73071210.exe 80 PID 4348 wrote to memory of 4808 4348 y73071210.exe 80 PID 4348 wrote to memory of 4808 4348 y73071210.exe 80 PID 4808 wrote to memory of 4352 4808 p77280234.exe 81 PID 4808 wrote to memory of 4352 4808 p77280234.exe 81 PID 4808 wrote to memory of 4352 4808 p77280234.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\59e21de36f89244d992b360ec660bd7c7d46ceea8b439bdf09a9182b9c48eb5d.exe"C:\Users\Admin\AppData\Local\Temp\59e21de36f89244d992b360ec660bd7c7d46ceea8b439bdf09a9182b9c48eb5d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y73071210.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y73071210.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p77280234.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p77280234.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
PID:4352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 13804⤵
- Program crash
PID:1604
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4808 -ip 48081⤵PID:2076
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
589KB
MD58dd279b7ba4b658010e48cfc7d8e6cba
SHA139cecd37b746e48914158a3a388a5a995e1cbd3c
SHA2568ada11c292e1ae1f9c32fd606cf4ff5c712f0b0e9291e94b768e5473b61989d7
SHA512a25a6556846833238455cc2ca0e78e9b255ffe0cd73c78451f53b1ac85da3a0570770be5a1cfd0336beb398b3cd521e6316f76fb07eaac763af7455012aafca5
-
Filesize
589KB
MD58dd279b7ba4b658010e48cfc7d8e6cba
SHA139cecd37b746e48914158a3a388a5a995e1cbd3c
SHA2568ada11c292e1ae1f9c32fd606cf4ff5c712f0b0e9291e94b768e5473b61989d7
SHA512a25a6556846833238455cc2ca0e78e9b255ffe0cd73c78451f53b1ac85da3a0570770be5a1cfd0336beb398b3cd521e6316f76fb07eaac763af7455012aafca5
-
Filesize
530KB
MD5d518dbac45f98f91f6dc4814d2e2de8b
SHA1b8f572112278878f763f65d5b2b751b3012b82f4
SHA256e715e92c912630fb699e946697970c4392a124d6866846de3afddafe8d181f79
SHA5129af0c0e1d76b58b9d80edaf3155c702bd70acca6c53f00d0f051fb53ebb16ffd415df562fbe4f59b85fac90b603c503d8c676e92d68e710b3e117ef3b26702ce
-
Filesize
530KB
MD5d518dbac45f98f91f6dc4814d2e2de8b
SHA1b8f572112278878f763f65d5b2b751b3012b82f4
SHA256e715e92c912630fb699e946697970c4392a124d6866846de3afddafe8d181f79
SHA5129af0c0e1d76b58b9d80edaf3155c702bd70acca6c53f00d0f051fb53ebb16ffd415df562fbe4f59b85fac90b603c503d8c676e92d68e710b3e117ef3b26702ce
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf