Analysis
-
max time kernel
148s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 19:28
Static task
static1
Behavioral task
behavioral1
Sample
c3e52ff29acfe7d1ddaecc5da10715c86672cc274c9ecbfe1fc1cba7d1fcaa90.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c3e52ff29acfe7d1ddaecc5da10715c86672cc274c9ecbfe1fc1cba7d1fcaa90.exe
Resource
win10v2004-20230220-en
General
-
Target
c3e52ff29acfe7d1ddaecc5da10715c86672cc274c9ecbfe1fc1cba7d1fcaa90.exe
-
Size
1.2MB
-
MD5
049bef1fc4462ad39b94752f4b7bddb6
-
SHA1
5cc85884d54fa899b84493df251e6db9591c3042
-
SHA256
c3e52ff29acfe7d1ddaecc5da10715c86672cc274c9ecbfe1fc1cba7d1fcaa90
-
SHA512
024f28033a7827aceb843412abddee1f4353de4bbdafa2e9455732acaf0290057daf5c81acbb9b56c8ecbd3c4049ea7824e77521169ea3ebde27b9408d131d0d
-
SSDEEP
24576:kydVqhtSVsjDuKDpB1g5XZCBGAARrsiei22RBpc6FMVNDY2p+:zih6sfbvICR4z2rJp
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/3740-2333-0x0000000005B70000-0x0000000006188000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation s18283132.exe -
Executes dropped EXE 6 IoCs
pid Process 2364 z76804493.exe 3716 z39002671.exe 4812 z12290969.exe 228 s18283132.exe 3740 1.exe 1920 t17222800.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z39002671.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z12290969.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z12290969.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c3e52ff29acfe7d1ddaecc5da10715c86672cc274c9ecbfe1fc1cba7d1fcaa90.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c3e52ff29acfe7d1ddaecc5da10715c86672cc274c9ecbfe1fc1cba7d1fcaa90.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z76804493.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z76804493.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z39002671.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3916 228 WerFault.exe 88 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 228 s18283132.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1376 wrote to memory of 2364 1376 c3e52ff29acfe7d1ddaecc5da10715c86672cc274c9ecbfe1fc1cba7d1fcaa90.exe 85 PID 1376 wrote to memory of 2364 1376 c3e52ff29acfe7d1ddaecc5da10715c86672cc274c9ecbfe1fc1cba7d1fcaa90.exe 85 PID 1376 wrote to memory of 2364 1376 c3e52ff29acfe7d1ddaecc5da10715c86672cc274c9ecbfe1fc1cba7d1fcaa90.exe 85 PID 2364 wrote to memory of 3716 2364 z76804493.exe 86 PID 2364 wrote to memory of 3716 2364 z76804493.exe 86 PID 2364 wrote to memory of 3716 2364 z76804493.exe 86 PID 3716 wrote to memory of 4812 3716 z39002671.exe 87 PID 3716 wrote to memory of 4812 3716 z39002671.exe 87 PID 3716 wrote to memory of 4812 3716 z39002671.exe 87 PID 4812 wrote to memory of 228 4812 z12290969.exe 88 PID 4812 wrote to memory of 228 4812 z12290969.exe 88 PID 4812 wrote to memory of 228 4812 z12290969.exe 88 PID 228 wrote to memory of 3740 228 s18283132.exe 93 PID 228 wrote to memory of 3740 228 s18283132.exe 93 PID 228 wrote to memory of 3740 228 s18283132.exe 93 PID 4812 wrote to memory of 1920 4812 z12290969.exe 97 PID 4812 wrote to memory of 1920 4812 z12290969.exe 97 PID 4812 wrote to memory of 1920 4812 z12290969.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3e52ff29acfe7d1ddaecc5da10715c86672cc274c9ecbfe1fc1cba7d1fcaa90.exe"C:\Users\Admin\AppData\Local\Temp\c3e52ff29acfe7d1ddaecc5da10715c86672cc274c9ecbfe1fc1cba7d1fcaa90.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z76804493.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z76804493.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z39002671.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z39002671.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z12290969.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z12290969.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s18283132.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s18283132.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
PID:3740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 14646⤵
- Program crash
PID:3916
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t17222800.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t17222800.exe5⤵
- Executes dropped EXE
PID:1920
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 228 -ip 2281⤵PID:3204
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5fbbb371c66cf381041cdce332cc3215c
SHA12ca6b720edc0430fcf9982a068e744bb5bfd0a11
SHA25686a1576d931499bcc5322af391c7621b62ec0631cf74ec3dad3e1ecc441847ab
SHA5125a90c78d32d1cede2493ea65e23ef196a3da3290bf0b788fd2e4970af1f9ef313d2a852509311df2427bec62b36c0584f0f1dce4ed5d93d894478e56b0d53a0a
-
Filesize
1.0MB
MD5fbbb371c66cf381041cdce332cc3215c
SHA12ca6b720edc0430fcf9982a068e744bb5bfd0a11
SHA25686a1576d931499bcc5322af391c7621b62ec0631cf74ec3dad3e1ecc441847ab
SHA5125a90c78d32d1cede2493ea65e23ef196a3da3290bf0b788fd2e4970af1f9ef313d2a852509311df2427bec62b36c0584f0f1dce4ed5d93d894478e56b0d53a0a
-
Filesize
760KB
MD583712540f6b50e802d1f2525b8be394f
SHA16df13a6a73d4f75d55c4629bd02a828297b61640
SHA25674ba0765a7f718964bec0a4671f7576c675b815424786fe54b1cfad9247911b3
SHA5123dd8cca538775ff5877b6ca0edee0358a5b7e6214093296b659b1639a67b7319733ba17fea73a9efda890f5f7f1a3488d543dd7b966a23b8b5bc81361526d257
-
Filesize
760KB
MD583712540f6b50e802d1f2525b8be394f
SHA16df13a6a73d4f75d55c4629bd02a828297b61640
SHA25674ba0765a7f718964bec0a4671f7576c675b815424786fe54b1cfad9247911b3
SHA5123dd8cca538775ff5877b6ca0edee0358a5b7e6214093296b659b1639a67b7319733ba17fea73a9efda890f5f7f1a3488d543dd7b966a23b8b5bc81361526d257
-
Filesize
577KB
MD520ad85068b596c621736a3525b384ef6
SHA18868e9e2d853aefe085d8f4ef5575c193736e151
SHA256dae1f92b2265226b059050320eafb6c90640334246d7f8fa75c720a54e65b497
SHA512c939055591622e44a38d2d078963067ae7cd295320dfa56904317d98ab66121857a97942d5955bb21fc79104310c9f7d900c0911d170d530b5ee026f0b9cc329
-
Filesize
577KB
MD520ad85068b596c621736a3525b384ef6
SHA18868e9e2d853aefe085d8f4ef5575c193736e151
SHA256dae1f92b2265226b059050320eafb6c90640334246d7f8fa75c720a54e65b497
SHA512c939055591622e44a38d2d078963067ae7cd295320dfa56904317d98ab66121857a97942d5955bb21fc79104310c9f7d900c0911d170d530b5ee026f0b9cc329
-
Filesize
502KB
MD5d46c984f9f1bdb2d0dc299797c496c0d
SHA1f1ed885161690c72e4e7e7e250238ecfa0632272
SHA25699ed517120973269632aac2c2f10ae60d5427a42ca5784ca6fda4a0804da4739
SHA512681b7c94664e3c1bc665dcc19af3fb6b6f75cc43717615604688264548cdb5137c290af5eccb45895e843aa7459704f646971bb0a0967837fe68f819c7b8d8dc
-
Filesize
502KB
MD5d46c984f9f1bdb2d0dc299797c496c0d
SHA1f1ed885161690c72e4e7e7e250238ecfa0632272
SHA25699ed517120973269632aac2c2f10ae60d5427a42ca5784ca6fda4a0804da4739
SHA512681b7c94664e3c1bc665dcc19af3fb6b6f75cc43717615604688264548cdb5137c290af5eccb45895e843aa7459704f646971bb0a0967837fe68f819c7b8d8dc
-
Filesize
169KB
MD54468e50cc0d8b3758a944020d0a157e1
SHA1201dab6e9da777a47c8e14818dc3f3263a85a951
SHA256433e9951af6c204489357573fec0d30b9834f6a57af681bc9d2551fd72c4c3f5
SHA51250eb65cf30fdac0b59204aa33c2c8d57c5ece27cb18c3f983b54815db4747190bd5b26c8b095a04bee5cbbc95bc58a4d964128d7f1c9ee042c7b3f2dceb5f24b
-
Filesize
169KB
MD54468e50cc0d8b3758a944020d0a157e1
SHA1201dab6e9da777a47c8e14818dc3f3263a85a951
SHA256433e9951af6c204489357573fec0d30b9834f6a57af681bc9d2551fd72c4c3f5
SHA51250eb65cf30fdac0b59204aa33c2c8d57c5ece27cb18c3f983b54815db4747190bd5b26c8b095a04bee5cbbc95bc58a4d964128d7f1c9ee042c7b3f2dceb5f24b
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf