Analysis

  • max time kernel
    135s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-05-2023 19:28

General

  • Target

    c45e71e8758295b140846afa10ef415ddf002bde42c099ea30963305c70ec194.exe

  • Size

    1.2MB

  • MD5

    76bad33d59af5519ddafe7e318e0a4eb

  • SHA1

    0ff60f26a92334ae4810e96e105b958677166a3a

  • SHA256

    c45e71e8758295b140846afa10ef415ddf002bde42c099ea30963305c70ec194

  • SHA512

    95f3dd298815f8f58462acad266791491e31dea83dfe547625203f181cf04deb201a698d15c3479546a3cef9c1526aaee83bb515d988367520011f4434fbf6ea

  • SSDEEP

    24576:kyfkef/Gbke/zvAwi/11UsjcUz47tjKhTTPvyS6Ttq7k8fdku5:z8CGbke/zvAD/11ljcUcUTP6TtYfdku

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

life

C2

185.161.248.73:4164

Attributes
  • auth_value

    8685d11953530b68ad5ec703809d9f91

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c45e71e8758295b140846afa10ef415ddf002bde42c099ea30963305c70ec194.exe
    "C:\Users\Admin\AppData\Local\Temp\c45e71e8758295b140846afa10ef415ddf002bde42c099ea30963305c70ec194.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z09116953.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z09116953.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1936
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z06566591.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z06566591.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4528
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z69821232.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z69821232.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3008
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s12630133.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s12630133.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1160
            • C:\Windows\Temp\1.exe
              "C:\Windows\Temp\1.exe"
              6⤵
              • Executes dropped EXE
              PID:3968
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1160 -s 236
              6⤵
              • Program crash
              PID:1140
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t32873668.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t32873668.exe
            5⤵
            • Executes dropped EXE
            PID:4876
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1160 -ip 1160
    1⤵
      PID:4380

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z09116953.exe

      Filesize

      1.0MB

      MD5

      8d59a08c1b19298e66c9c1fcbb9f99d0

      SHA1

      57001e7e02b7f00db3d3951aa5e3471b401c3093

      SHA256

      561c6974cbbcfdecae4bcfd884fcfcb5c34b23eb16205be8807ab18379b0be13

      SHA512

      d34664be6ab7ef1ee4def329f1c28429fac56a75ace4435aa125215625e5a3953ec6237b6a2aea6d6998b65da38d105c4ce54ee5bab117a03ce87995fcfa1854

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z09116953.exe

      Filesize

      1.0MB

      MD5

      8d59a08c1b19298e66c9c1fcbb9f99d0

      SHA1

      57001e7e02b7f00db3d3951aa5e3471b401c3093

      SHA256

      561c6974cbbcfdecae4bcfd884fcfcb5c34b23eb16205be8807ab18379b0be13

      SHA512

      d34664be6ab7ef1ee4def329f1c28429fac56a75ace4435aa125215625e5a3953ec6237b6a2aea6d6998b65da38d105c4ce54ee5bab117a03ce87995fcfa1854

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z06566591.exe

      Filesize

      753KB

      MD5

      4d1cb318e25c49ccc36c66318559610c

      SHA1

      3856878d23d9e14623ec1f86cba8af410d11c2e4

      SHA256

      0cd77de21453e1d1626483ada852cdca16043c2bd6a8f31c596c2517efedff39

      SHA512

      7679d5d7f3e8bc67ec2e204ecc37d81d1b5ac48136da40ef61b110cbf6a3836344f36964bd51a4eab1578c3e392c98d9582daf48fcf28ca36f87f9fb1031c1ba

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z06566591.exe

      Filesize

      753KB

      MD5

      4d1cb318e25c49ccc36c66318559610c

      SHA1

      3856878d23d9e14623ec1f86cba8af410d11c2e4

      SHA256

      0cd77de21453e1d1626483ada852cdca16043c2bd6a8f31c596c2517efedff39

      SHA512

      7679d5d7f3e8bc67ec2e204ecc37d81d1b5ac48136da40ef61b110cbf6a3836344f36964bd51a4eab1578c3e392c98d9582daf48fcf28ca36f87f9fb1031c1ba

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z69821232.exe

      Filesize

      570KB

      MD5

      44aceb8eff6860b02de191acb46afe9e

      SHA1

      245969b57fc54d8e1d27afeaf99a0b364d964c41

      SHA256

      570520add68186fbac20ad862e752f3c73a80c900831378d633e962947a5238e

      SHA512

      6922ba6b8f352dcf5a6d99c125db294bb06717b4cf05be5974f2ff7782bb59c127b1a4225a7ed74fb4c836cfd382b0b1439329063f4aaba804b06b54a7c472dc

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z69821232.exe

      Filesize

      570KB

      MD5

      44aceb8eff6860b02de191acb46afe9e

      SHA1

      245969b57fc54d8e1d27afeaf99a0b364d964c41

      SHA256

      570520add68186fbac20ad862e752f3c73a80c900831378d633e962947a5238e

      SHA512

      6922ba6b8f352dcf5a6d99c125db294bb06717b4cf05be5974f2ff7782bb59c127b1a4225a7ed74fb4c836cfd382b0b1439329063f4aaba804b06b54a7c472dc

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s12630133.exe

      Filesize

      488KB

      MD5

      b27f6bafdcf02742497158c34b7f2b1c

      SHA1

      91c3ac3fa3f12df79f39773023b8bddd1ccbaf63

      SHA256

      20c7ece49ee6ad3cde1701ad7a700f9fa9d8a8718de9d8e733ad73417d813e43

      SHA512

      425e846eaa5bd44edd35390848d3c02042dbf87d8061ebaa55de55aea2ff85fcb750096b38a26dd9fd738fc0f24ed2c61ba2d8f59090d142fd170a18d51ce5cf

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s12630133.exe

      Filesize

      488KB

      MD5

      b27f6bafdcf02742497158c34b7f2b1c

      SHA1

      91c3ac3fa3f12df79f39773023b8bddd1ccbaf63

      SHA256

      20c7ece49ee6ad3cde1701ad7a700f9fa9d8a8718de9d8e733ad73417d813e43

      SHA512

      425e846eaa5bd44edd35390848d3c02042dbf87d8061ebaa55de55aea2ff85fcb750096b38a26dd9fd738fc0f24ed2c61ba2d8f59090d142fd170a18d51ce5cf

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t32873668.exe

      Filesize

      169KB

      MD5

      0b43ede4fcb557f6643cf864ce5e82f2

      SHA1

      1f3056ee9d33a8aeb74ae826755721c2e1ff7584

      SHA256

      9ad9d96dde8737ce848493d3f08b2897085eb664695c000ffa2205504b17d63c

      SHA512

      2e88e80524e158ac0fc8ce9bfbba2e77a4f7aa3e9852b1f55bb97f00d78b371cfd4db3ecd37121c9f7fbd2d1c4beacc0bcd25620cc1591e4f8cac1f1cff53f9e

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t32873668.exe

      Filesize

      169KB

      MD5

      0b43ede4fcb557f6643cf864ce5e82f2

      SHA1

      1f3056ee9d33a8aeb74ae826755721c2e1ff7584

      SHA256

      9ad9d96dde8737ce848493d3f08b2897085eb664695c000ffa2205504b17d63c

      SHA512

      2e88e80524e158ac0fc8ce9bfbba2e77a4f7aa3e9852b1f55bb97f00d78b371cfd4db3ecd37121c9f7fbd2d1c4beacc0bcd25620cc1591e4f8cac1f1cff53f9e

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • memory/1160-197-0x00000000056D0000-0x0000000005730000-memory.dmp

      Filesize

      384KB

    • memory/1160-209-0x00000000056D0000-0x0000000005730000-memory.dmp

      Filesize

      384KB

    • memory/1160-165-0x0000000005110000-0x0000000005120000-memory.dmp

      Filesize

      64KB

    • memory/1160-166-0x00000000056D0000-0x0000000005730000-memory.dmp

      Filesize

      384KB

    • memory/1160-167-0x00000000056D0000-0x0000000005730000-memory.dmp

      Filesize

      384KB

    • memory/1160-169-0x00000000056D0000-0x0000000005730000-memory.dmp

      Filesize

      384KB

    • memory/1160-171-0x00000000056D0000-0x0000000005730000-memory.dmp

      Filesize

      384KB

    • memory/1160-173-0x00000000056D0000-0x0000000005730000-memory.dmp

      Filesize

      384KB

    • memory/1160-175-0x00000000056D0000-0x0000000005730000-memory.dmp

      Filesize

      384KB

    • memory/1160-177-0x00000000056D0000-0x0000000005730000-memory.dmp

      Filesize

      384KB

    • memory/1160-179-0x00000000056D0000-0x0000000005730000-memory.dmp

      Filesize

      384KB

    • memory/1160-181-0x00000000056D0000-0x0000000005730000-memory.dmp

      Filesize

      384KB

    • memory/1160-183-0x00000000056D0000-0x0000000005730000-memory.dmp

      Filesize

      384KB

    • memory/1160-185-0x00000000056D0000-0x0000000005730000-memory.dmp

      Filesize

      384KB

    • memory/1160-187-0x00000000056D0000-0x0000000005730000-memory.dmp

      Filesize

      384KB

    • memory/1160-189-0x00000000056D0000-0x0000000005730000-memory.dmp

      Filesize

      384KB

    • memory/1160-191-0x00000000056D0000-0x0000000005730000-memory.dmp

      Filesize

      384KB

    • memory/1160-193-0x00000000056D0000-0x0000000005730000-memory.dmp

      Filesize

      384KB

    • memory/1160-195-0x00000000056D0000-0x0000000005730000-memory.dmp

      Filesize

      384KB

    • memory/1160-163-0x0000000005120000-0x00000000056C4000-memory.dmp

      Filesize

      5.6MB

    • memory/1160-199-0x00000000056D0000-0x0000000005730000-memory.dmp

      Filesize

      384KB

    • memory/1160-201-0x00000000056D0000-0x0000000005730000-memory.dmp

      Filesize

      384KB

    • memory/1160-203-0x00000000056D0000-0x0000000005730000-memory.dmp

      Filesize

      384KB

    • memory/1160-205-0x00000000056D0000-0x0000000005730000-memory.dmp

      Filesize

      384KB

    • memory/1160-207-0x00000000056D0000-0x0000000005730000-memory.dmp

      Filesize

      384KB

    • memory/1160-164-0x0000000005110000-0x0000000005120000-memory.dmp

      Filesize

      64KB

    • memory/1160-213-0x00000000056D0000-0x0000000005730000-memory.dmp

      Filesize

      384KB

    • memory/1160-211-0x00000000056D0000-0x0000000005730000-memory.dmp

      Filesize

      384KB

    • memory/1160-215-0x00000000056D0000-0x0000000005730000-memory.dmp

      Filesize

      384KB

    • memory/1160-217-0x00000000056D0000-0x0000000005730000-memory.dmp

      Filesize

      384KB

    • memory/1160-219-0x00000000056D0000-0x0000000005730000-memory.dmp

      Filesize

      384KB

    • memory/1160-221-0x00000000056D0000-0x0000000005730000-memory.dmp

      Filesize

      384KB

    • memory/1160-223-0x00000000056D0000-0x0000000005730000-memory.dmp

      Filesize

      384KB

    • memory/1160-225-0x00000000056D0000-0x0000000005730000-memory.dmp

      Filesize

      384KB

    • memory/1160-227-0x00000000056D0000-0x0000000005730000-memory.dmp

      Filesize

      384KB

    • memory/1160-229-0x00000000056D0000-0x0000000005730000-memory.dmp

      Filesize

      384KB

    • memory/1160-1482-0x0000000000A70000-0x0000000000ACB000-memory.dmp

      Filesize

      364KB

    • memory/1160-2322-0x0000000005110000-0x0000000005120000-memory.dmp

      Filesize

      64KB

    • memory/1160-2324-0x0000000005110000-0x0000000005120000-memory.dmp

      Filesize

      64KB

    • memory/1160-2323-0x0000000005110000-0x0000000005120000-memory.dmp

      Filesize

      64KB

    • memory/1160-2326-0x0000000005110000-0x0000000005120000-memory.dmp

      Filesize

      64KB

    • memory/1160-162-0x0000000000A70000-0x0000000000ACB000-memory.dmp

      Filesize

      364KB

    • memory/3968-2331-0x0000000005550000-0x0000000005B68000-memory.dmp

      Filesize

      6.1MB

    • memory/3968-2332-0x0000000005040000-0x000000000514A000-memory.dmp

      Filesize

      1.0MB

    • memory/3968-2333-0x0000000004EE0000-0x0000000004EF2000-memory.dmp

      Filesize

      72KB

    • memory/3968-2334-0x0000000004F20000-0x0000000004F30000-memory.dmp

      Filesize

      64KB

    • memory/3968-2330-0x00000000005A0000-0x00000000005CE000-memory.dmp

      Filesize

      184KB

    • memory/3968-2335-0x0000000004F70000-0x0000000004FAC000-memory.dmp

      Filesize

      240KB

    • memory/3968-2342-0x0000000004F20000-0x0000000004F30000-memory.dmp

      Filesize

      64KB

    • memory/4876-2340-0x00000000008E0000-0x000000000090E000-memory.dmp

      Filesize

      184KB

    • memory/4876-2341-0x0000000005270000-0x0000000005280000-memory.dmp

      Filesize

      64KB

    • memory/4876-2343-0x0000000005270000-0x0000000005280000-memory.dmp

      Filesize

      64KB