Analysis

  • max time kernel
    145s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-05-2023 19:27

General

  • Target

    c3839b633f21352702166f574f09962974fc30bbae72fb8ec0557c8c89a3342a.exe

  • Size

    1.2MB

  • MD5

    02d03ae36069b971df04ac11550cc22f

  • SHA1

    84ec96b83c2ed70f1277790201d96eb69185bf9d

  • SHA256

    c3839b633f21352702166f574f09962974fc30bbae72fb8ec0557c8c89a3342a

  • SHA512

    ac0c7260fb2ba5e86dd932d9ba51d28c20dad951a21de8f1fab1f5353ec0b6d2309afaf6c7b11afd9912e0cb1cfc0793014dea39a0f807820a9eea70fe473516

  • SSDEEP

    24576:6yfwlNZmka+KvlNbKUd3/eU8BYzbr2Y2GOVH/f:BfANZ2HW82tBwXnXiH/

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

life

C2

185.161.248.73:4164

Attributes
  • auth_value

    8685d11953530b68ad5ec703809d9f91

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c3839b633f21352702166f574f09962974fc30bbae72fb8ec0557c8c89a3342a.exe
    "C:\Users\Admin\AppData\Local\Temp\c3839b633f21352702166f574f09962974fc30bbae72fb8ec0557c8c89a3342a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1396
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z59424173.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z59424173.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2700
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z34446665.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z34446665.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4620
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z91108685.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z91108685.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3524
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s09543558.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s09543558.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3308
            • C:\Windows\Temp\1.exe
              "C:\Windows\Temp\1.exe"
              6⤵
              • Executes dropped EXE
              PID:1312
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3308 -s 1376
              6⤵
              • Program crash
              PID:444
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t07759713.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t07759713.exe
            5⤵
            • Executes dropped EXE
            PID:1328
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 3308 -ip 3308
    1⤵
      PID:3920

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z59424173.exe
      Filesize

      1.0MB

      MD5

      c2c00a7c9accb61421f2ab9552fd41a0

      SHA1

      cbb44923579d7533d643f7c6038f0c6acd705c98

      SHA256

      482c4049761dae703e22779a6e4bc41c29126e256922dffe7450f47ee73a3726

      SHA512

      bc45fd4e337247264def402b63792da62dc8d9b96b8111d8d1c955d82c1363ce2935a4a4a0d0c0a1c173d145e55d1162f2e6df0e4d7966aec899c0298c92195d

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z59424173.exe
      Filesize

      1.0MB

      MD5

      c2c00a7c9accb61421f2ab9552fd41a0

      SHA1

      cbb44923579d7533d643f7c6038f0c6acd705c98

      SHA256

      482c4049761dae703e22779a6e4bc41c29126e256922dffe7450f47ee73a3726

      SHA512

      bc45fd4e337247264def402b63792da62dc8d9b96b8111d8d1c955d82c1363ce2935a4a4a0d0c0a1c173d145e55d1162f2e6df0e4d7966aec899c0298c92195d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z34446665.exe
      Filesize

      759KB

      MD5

      39ec0614da175b159d66805ba08e4bda

      SHA1

      c3801fb2fe1ba35e1740192e2ec7b2385c50934c

      SHA256

      b5ad6e7d4d75a363ef2cbde6ddbb7f9b2e1928ad0b4fee46cb375b5170dcf130

      SHA512

      55b1d2e037da65eb747328716dd9cdf602c080312989a66ce0de6174ee35aee593dfedb4b8c7e8ed94eab8329373b1a547553108016ee560ca23340fc2a4f110

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z34446665.exe
      Filesize

      759KB

      MD5

      39ec0614da175b159d66805ba08e4bda

      SHA1

      c3801fb2fe1ba35e1740192e2ec7b2385c50934c

      SHA256

      b5ad6e7d4d75a363ef2cbde6ddbb7f9b2e1928ad0b4fee46cb375b5170dcf130

      SHA512

      55b1d2e037da65eb747328716dd9cdf602c080312989a66ce0de6174ee35aee593dfedb4b8c7e8ed94eab8329373b1a547553108016ee560ca23340fc2a4f110

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z91108685.exe
      Filesize

      577KB

      MD5

      f9d79cd098fea81785b6c752f9cf6ebc

      SHA1

      65917605327e9365c6e5b52c0d6da193aee4cb62

      SHA256

      79998aec9813abb428fd4e9b29d41126572f8edac6d6e855e812bae0ae4b2d05

      SHA512

      2d64508844320d50863d124f725fd1ddefa2701a6442fb14fbd80788c9832ca626ab0ae0fc0935319b3b926827b99b5af311a7e0543a30f4dc12e9e86552e668

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z91108685.exe
      Filesize

      577KB

      MD5

      f9d79cd098fea81785b6c752f9cf6ebc

      SHA1

      65917605327e9365c6e5b52c0d6da193aee4cb62

      SHA256

      79998aec9813abb428fd4e9b29d41126572f8edac6d6e855e812bae0ae4b2d05

      SHA512

      2d64508844320d50863d124f725fd1ddefa2701a6442fb14fbd80788c9832ca626ab0ae0fc0935319b3b926827b99b5af311a7e0543a30f4dc12e9e86552e668

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s09543558.exe
      Filesize

      574KB

      MD5

      b187e416287b0666f4fb9037c0a129f3

      SHA1

      87edfba923c3f8eb89390380aa7caa933699cff4

      SHA256

      d093a468655a958fe7e395262e0ff1625b4629b9b73daa475faa3a4d01df6b9f

      SHA512

      f74a0ad3e3d0f5d1ee7f67d3904c707b6ec38ecea68a4ccaf910f0db13a20b0fc923392e3dc100fe00395488f33c805fd9436dc8e91cfbff68b4bf243c59a66e

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s09543558.exe
      Filesize

      574KB

      MD5

      b187e416287b0666f4fb9037c0a129f3

      SHA1

      87edfba923c3f8eb89390380aa7caa933699cff4

      SHA256

      d093a468655a958fe7e395262e0ff1625b4629b9b73daa475faa3a4d01df6b9f

      SHA512

      f74a0ad3e3d0f5d1ee7f67d3904c707b6ec38ecea68a4ccaf910f0db13a20b0fc923392e3dc100fe00395488f33c805fd9436dc8e91cfbff68b4bf243c59a66e

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t07759713.exe
      Filesize

      169KB

      MD5

      df3ea32a62bef18913a5e557b8dfdb06

      SHA1

      2e9e8c332386e069981799515e552d6d780684f4

      SHA256

      138ed3de3a592c71feaf3ebef227948674ce20a4c3aae7ba4a539e8b0a3a444e

      SHA512

      984b826bb7867151afaba229ea76dad757c82d243b67cfba2ce9e69d30fcc08d629cf901ed39c13170a79f72021fe12cc6f0fac9bb566a861d8d0f1366d2044e

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t07759713.exe
      Filesize

      169KB

      MD5

      df3ea32a62bef18913a5e557b8dfdb06

      SHA1

      2e9e8c332386e069981799515e552d6d780684f4

      SHA256

      138ed3de3a592c71feaf3ebef227948674ce20a4c3aae7ba4a539e8b0a3a444e

      SHA512

      984b826bb7867151afaba229ea76dad757c82d243b67cfba2ce9e69d30fcc08d629cf901ed39c13170a79f72021fe12cc6f0fac9bb566a861d8d0f1366d2044e

    • C:\Windows\Temp\1.exe
      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • C:\Windows\Temp\1.exe
      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • C:\Windows\Temp\1.exe
      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • memory/1312-2343-0x0000000005350000-0x0000000005360000-memory.dmp
      Filesize

      64KB

    • memory/1312-2331-0x0000000005A80000-0x0000000006098000-memory.dmp
      Filesize

      6.1MB

    • memory/1312-2330-0x0000000000AE0000-0x0000000000B0E000-memory.dmp
      Filesize

      184KB

    • memory/1312-2335-0x00000000054A0000-0x00000000054DC000-memory.dmp
      Filesize

      240KB

    • memory/1312-2334-0x0000000005320000-0x0000000005332000-memory.dmp
      Filesize

      72KB

    • memory/1312-2333-0x0000000005570000-0x000000000567A000-memory.dmp
      Filesize

      1.0MB

    • memory/1328-2344-0x0000000002400000-0x0000000002410000-memory.dmp
      Filesize

      64KB

    • memory/1328-2342-0x0000000002400000-0x0000000002410000-memory.dmp
      Filesize

      64KB

    • memory/1328-2341-0x0000000000030000-0x000000000005E000-memory.dmp
      Filesize

      184KB

    • memory/3308-194-0x0000000004E40000-0x0000000004EA0000-memory.dmp
      Filesize

      384KB

    • memory/3308-216-0x0000000004E40000-0x0000000004EA0000-memory.dmp
      Filesize

      384KB

    • memory/3308-178-0x0000000004E40000-0x0000000004EA0000-memory.dmp
      Filesize

      384KB

    • memory/3308-180-0x0000000004E40000-0x0000000004EA0000-memory.dmp
      Filesize

      384KB

    • memory/3308-182-0x0000000004E40000-0x0000000004EA0000-memory.dmp
      Filesize

      384KB

    • memory/3308-184-0x0000000004E40000-0x0000000004EA0000-memory.dmp
      Filesize

      384KB

    • memory/3308-186-0x0000000004E40000-0x0000000004EA0000-memory.dmp
      Filesize

      384KB

    • memory/3308-188-0x0000000004E40000-0x0000000004EA0000-memory.dmp
      Filesize

      384KB

    • memory/3308-190-0x0000000004E40000-0x0000000004EA0000-memory.dmp
      Filesize

      384KB

    • memory/3308-192-0x0000000004E40000-0x0000000004EA0000-memory.dmp
      Filesize

      384KB

    • memory/3308-174-0x0000000004E40000-0x0000000004EA0000-memory.dmp
      Filesize

      384KB

    • memory/3308-196-0x0000000004E40000-0x0000000004EA0000-memory.dmp
      Filesize

      384KB

    • memory/3308-198-0x0000000004E40000-0x0000000004EA0000-memory.dmp
      Filesize

      384KB

    • memory/3308-200-0x0000000004E40000-0x0000000004EA0000-memory.dmp
      Filesize

      384KB

    • memory/3308-202-0x0000000004E40000-0x0000000004EA0000-memory.dmp
      Filesize

      384KB

    • memory/3308-204-0x0000000004E40000-0x0000000004EA0000-memory.dmp
      Filesize

      384KB

    • memory/3308-206-0x0000000004E40000-0x0000000004EA0000-memory.dmp
      Filesize

      384KB

    • memory/3308-208-0x0000000004E40000-0x0000000004EA0000-memory.dmp
      Filesize

      384KB

    • memory/3308-210-0x0000000004E40000-0x0000000004EA0000-memory.dmp
      Filesize

      384KB

    • memory/3308-212-0x0000000004E40000-0x0000000004EA0000-memory.dmp
      Filesize

      384KB

    • memory/3308-214-0x0000000004E40000-0x0000000004EA0000-memory.dmp
      Filesize

      384KB

    • memory/3308-176-0x0000000004E40000-0x0000000004EA0000-memory.dmp
      Filesize

      384KB

    • memory/3308-218-0x0000000004E40000-0x0000000004EA0000-memory.dmp
      Filesize

      384KB

    • memory/3308-220-0x0000000004E40000-0x0000000004EA0000-memory.dmp
      Filesize

      384KB

    • memory/3308-222-0x0000000004E40000-0x0000000004EA0000-memory.dmp
      Filesize

      384KB

    • memory/3308-224-0x0000000004E40000-0x0000000004EA0000-memory.dmp
      Filesize

      384KB

    • memory/3308-226-0x0000000004E40000-0x0000000004EA0000-memory.dmp
      Filesize

      384KB

    • memory/3308-228-0x0000000004E40000-0x0000000004EA0000-memory.dmp
      Filesize

      384KB

    • memory/3308-230-0x0000000004E40000-0x0000000004EA0000-memory.dmp
      Filesize

      384KB

    • memory/3308-172-0x0000000004E40000-0x0000000004EA0000-memory.dmp
      Filesize

      384KB

    • memory/3308-170-0x0000000004E40000-0x0000000004EA0000-memory.dmp
      Filesize

      384KB

    • memory/3308-168-0x0000000004E40000-0x0000000004EA0000-memory.dmp
      Filesize

      384KB

    • memory/3308-2315-0x0000000004EC0000-0x0000000004ED0000-memory.dmp
      Filesize

      64KB

    • memory/3308-2323-0x0000000004EC0000-0x0000000004ED0000-memory.dmp
      Filesize

      64KB

    • memory/3308-2324-0x0000000004EC0000-0x0000000004ED0000-memory.dmp
      Filesize

      64KB

    • memory/3308-2325-0x0000000004EC0000-0x0000000004ED0000-memory.dmp
      Filesize

      64KB

    • memory/3308-2336-0x0000000004EC0000-0x0000000004ED0000-memory.dmp
      Filesize

      64KB

    • memory/3308-167-0x0000000004E40000-0x0000000004EA0000-memory.dmp
      Filesize

      384KB

    • memory/3308-166-0x0000000004EC0000-0x0000000004ED0000-memory.dmp
      Filesize

      64KB

    • memory/3308-165-0x0000000004EC0000-0x0000000004ED0000-memory.dmp
      Filesize

      64KB

    • memory/3308-164-0x0000000004EC0000-0x0000000004ED0000-memory.dmp
      Filesize

      64KB

    • memory/3308-163-0x0000000000840000-0x000000000089B000-memory.dmp
      Filesize

      364KB

    • memory/3308-162-0x0000000004FD0000-0x0000000005574000-memory.dmp
      Filesize

      5.6MB