Analysis
-
max time kernel
135s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 19:28
Static task
static1
Behavioral task
behavioral1
Sample
c45e71e8758295b140846afa10ef415ddf002bde42c099ea30963305c70ec194.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c45e71e8758295b140846afa10ef415ddf002bde42c099ea30963305c70ec194.exe
Resource
win10v2004-20230220-en
General
-
Target
c45e71e8758295b140846afa10ef415ddf002bde42c099ea30963305c70ec194.exe
-
Size
1.2MB
-
MD5
76bad33d59af5519ddafe7e318e0a4eb
-
SHA1
0ff60f26a92334ae4810e96e105b958677166a3a
-
SHA256
c45e71e8758295b140846afa10ef415ddf002bde42c099ea30963305c70ec194
-
SHA512
95f3dd298815f8f58462acad266791491e31dea83dfe547625203f181cf04deb201a698d15c3479546a3cef9c1526aaee83bb515d988367520011f4434fbf6ea
-
SSDEEP
24576:kyfkef/Gbke/zvAwi/11UsjcUz47tjKhTTPvyS6Ttq7k8fdku5:z8CGbke/zvAD/11ljcUcUTP6TtYfdku
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
Processes:
resource yara_rule behavioral2/memory/3968-2331-0x0000000005550000-0x0000000005B68000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
s12630133.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation s12630133.exe -
Executes dropped EXE 6 IoCs
Processes:
z09116953.exez06566591.exez69821232.exes12630133.exe1.exet32873668.exepid process 1936 z09116953.exe 4528 z06566591.exe 3008 z69821232.exe 1160 s12630133.exe 3968 1.exe 4876 t32873668.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
z09116953.exez06566591.exez69821232.exec45e71e8758295b140846afa10ef415ddf002bde42c099ea30963305c70ec194.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z09116953.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z06566591.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z06566591.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z69821232.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z69821232.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c45e71e8758295b140846afa10ef415ddf002bde42c099ea30963305c70ec194.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c45e71e8758295b140846afa10ef415ddf002bde42c099ea30963305c70ec194.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z09116953.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1140 1160 WerFault.exe s12630133.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
s12630133.exedescription pid process Token: SeDebugPrivilege 1160 s12630133.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
c45e71e8758295b140846afa10ef415ddf002bde42c099ea30963305c70ec194.exez09116953.exez06566591.exez69821232.exes12630133.exedescription pid process target process PID 2356 wrote to memory of 1936 2356 c45e71e8758295b140846afa10ef415ddf002bde42c099ea30963305c70ec194.exe z09116953.exe PID 2356 wrote to memory of 1936 2356 c45e71e8758295b140846afa10ef415ddf002bde42c099ea30963305c70ec194.exe z09116953.exe PID 2356 wrote to memory of 1936 2356 c45e71e8758295b140846afa10ef415ddf002bde42c099ea30963305c70ec194.exe z09116953.exe PID 1936 wrote to memory of 4528 1936 z09116953.exe z06566591.exe PID 1936 wrote to memory of 4528 1936 z09116953.exe z06566591.exe PID 1936 wrote to memory of 4528 1936 z09116953.exe z06566591.exe PID 4528 wrote to memory of 3008 4528 z06566591.exe z69821232.exe PID 4528 wrote to memory of 3008 4528 z06566591.exe z69821232.exe PID 4528 wrote to memory of 3008 4528 z06566591.exe z69821232.exe PID 3008 wrote to memory of 1160 3008 z69821232.exe s12630133.exe PID 3008 wrote to memory of 1160 3008 z69821232.exe s12630133.exe PID 3008 wrote to memory of 1160 3008 z69821232.exe s12630133.exe PID 1160 wrote to memory of 3968 1160 s12630133.exe 1.exe PID 1160 wrote to memory of 3968 1160 s12630133.exe 1.exe PID 1160 wrote to memory of 3968 1160 s12630133.exe 1.exe PID 3008 wrote to memory of 4876 3008 z69821232.exe t32873668.exe PID 3008 wrote to memory of 4876 3008 z69821232.exe t32873668.exe PID 3008 wrote to memory of 4876 3008 z69821232.exe t32873668.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c45e71e8758295b140846afa10ef415ddf002bde42c099ea30963305c70ec194.exe"C:\Users\Admin\AppData\Local\Temp\c45e71e8758295b140846afa10ef415ddf002bde42c099ea30963305c70ec194.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z09116953.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z09116953.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z06566591.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z06566591.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z69821232.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z69821232.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s12630133.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s12630133.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
PID:3968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1160 -s 2366⤵
- Program crash
PID:1140
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t32873668.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t32873668.exe5⤵
- Executes dropped EXE
PID:4876
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1160 -ip 11601⤵PID:4380
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD58d59a08c1b19298e66c9c1fcbb9f99d0
SHA157001e7e02b7f00db3d3951aa5e3471b401c3093
SHA256561c6974cbbcfdecae4bcfd884fcfcb5c34b23eb16205be8807ab18379b0be13
SHA512d34664be6ab7ef1ee4def329f1c28429fac56a75ace4435aa125215625e5a3953ec6237b6a2aea6d6998b65da38d105c4ce54ee5bab117a03ce87995fcfa1854
-
Filesize
1.0MB
MD58d59a08c1b19298e66c9c1fcbb9f99d0
SHA157001e7e02b7f00db3d3951aa5e3471b401c3093
SHA256561c6974cbbcfdecae4bcfd884fcfcb5c34b23eb16205be8807ab18379b0be13
SHA512d34664be6ab7ef1ee4def329f1c28429fac56a75ace4435aa125215625e5a3953ec6237b6a2aea6d6998b65da38d105c4ce54ee5bab117a03ce87995fcfa1854
-
Filesize
753KB
MD54d1cb318e25c49ccc36c66318559610c
SHA13856878d23d9e14623ec1f86cba8af410d11c2e4
SHA2560cd77de21453e1d1626483ada852cdca16043c2bd6a8f31c596c2517efedff39
SHA5127679d5d7f3e8bc67ec2e204ecc37d81d1b5ac48136da40ef61b110cbf6a3836344f36964bd51a4eab1578c3e392c98d9582daf48fcf28ca36f87f9fb1031c1ba
-
Filesize
753KB
MD54d1cb318e25c49ccc36c66318559610c
SHA13856878d23d9e14623ec1f86cba8af410d11c2e4
SHA2560cd77de21453e1d1626483ada852cdca16043c2bd6a8f31c596c2517efedff39
SHA5127679d5d7f3e8bc67ec2e204ecc37d81d1b5ac48136da40ef61b110cbf6a3836344f36964bd51a4eab1578c3e392c98d9582daf48fcf28ca36f87f9fb1031c1ba
-
Filesize
570KB
MD544aceb8eff6860b02de191acb46afe9e
SHA1245969b57fc54d8e1d27afeaf99a0b364d964c41
SHA256570520add68186fbac20ad862e752f3c73a80c900831378d633e962947a5238e
SHA5126922ba6b8f352dcf5a6d99c125db294bb06717b4cf05be5974f2ff7782bb59c127b1a4225a7ed74fb4c836cfd382b0b1439329063f4aaba804b06b54a7c472dc
-
Filesize
570KB
MD544aceb8eff6860b02de191acb46afe9e
SHA1245969b57fc54d8e1d27afeaf99a0b364d964c41
SHA256570520add68186fbac20ad862e752f3c73a80c900831378d633e962947a5238e
SHA5126922ba6b8f352dcf5a6d99c125db294bb06717b4cf05be5974f2ff7782bb59c127b1a4225a7ed74fb4c836cfd382b0b1439329063f4aaba804b06b54a7c472dc
-
Filesize
488KB
MD5b27f6bafdcf02742497158c34b7f2b1c
SHA191c3ac3fa3f12df79f39773023b8bddd1ccbaf63
SHA25620c7ece49ee6ad3cde1701ad7a700f9fa9d8a8718de9d8e733ad73417d813e43
SHA512425e846eaa5bd44edd35390848d3c02042dbf87d8061ebaa55de55aea2ff85fcb750096b38a26dd9fd738fc0f24ed2c61ba2d8f59090d142fd170a18d51ce5cf
-
Filesize
488KB
MD5b27f6bafdcf02742497158c34b7f2b1c
SHA191c3ac3fa3f12df79f39773023b8bddd1ccbaf63
SHA25620c7ece49ee6ad3cde1701ad7a700f9fa9d8a8718de9d8e733ad73417d813e43
SHA512425e846eaa5bd44edd35390848d3c02042dbf87d8061ebaa55de55aea2ff85fcb750096b38a26dd9fd738fc0f24ed2c61ba2d8f59090d142fd170a18d51ce5cf
-
Filesize
169KB
MD50b43ede4fcb557f6643cf864ce5e82f2
SHA11f3056ee9d33a8aeb74ae826755721c2e1ff7584
SHA2569ad9d96dde8737ce848493d3f08b2897085eb664695c000ffa2205504b17d63c
SHA5122e88e80524e158ac0fc8ce9bfbba2e77a4f7aa3e9852b1f55bb97f00d78b371cfd4db3ecd37121c9f7fbd2d1c4beacc0bcd25620cc1591e4f8cac1f1cff53f9e
-
Filesize
169KB
MD50b43ede4fcb557f6643cf864ce5e82f2
SHA11f3056ee9d33a8aeb74ae826755721c2e1ff7584
SHA2569ad9d96dde8737ce848493d3f08b2897085eb664695c000ffa2205504b17d63c
SHA5122e88e80524e158ac0fc8ce9bfbba2e77a4f7aa3e9852b1f55bb97f00d78b371cfd4db3ecd37121c9f7fbd2d1c4beacc0bcd25620cc1591e4f8cac1f1cff53f9e
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf