Analysis
-
max time kernel
183s -
max time network
202s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 18:48
Static task
static1
Behavioral task
behavioral1
Sample
a4691cfa4f3f0bdc0e789dc4fb169c8eefe351a4fc649f4955b0147911bfc0cb.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a4691cfa4f3f0bdc0e789dc4fb169c8eefe351a4fc649f4955b0147911bfc0cb.exe
Resource
win10v2004-20230220-en
General
-
Target
a4691cfa4f3f0bdc0e789dc4fb169c8eefe351a4fc649f4955b0147911bfc0cb.exe
-
Size
1.2MB
-
MD5
e12c9efb4f6f72e2537faa4281d498d8
-
SHA1
eebce82f665feaff1951ef027725051a52384d11
-
SHA256
a4691cfa4f3f0bdc0e789dc4fb169c8eefe351a4fc649f4955b0147911bfc0cb
-
SHA512
c8100c4a9a67f6989f5c3d50196d597119fa4a24d5127eaa810275dfd099ceb37496b285967a4fed6aa034abe40165143b74640c5769db9f7105ace639835703
-
SSDEEP
24576:NyQgZpPbSCBipEH16mVtJK6EaC/w4t34VQ80UcQvLJ:op79OEHsmn46EaC/Jt34VQ43vL
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
Processes:
resource yara_rule behavioral2/memory/2304-2332-0x0000000005820000-0x0000000005E38000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
s65117730.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation s65117730.exe -
Executes dropped EXE 6 IoCs
Processes:
z67364451.exez85333566.exez22381058.exes65117730.exe1.exet84936691.exepid process 820 z67364451.exe 3444 z85333566.exe 732 z22381058.exe 3428 s65117730.exe 2304 1.exe 4104 t84936691.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
z67364451.exez85333566.exez22381058.exea4691cfa4f3f0bdc0e789dc4fb169c8eefe351a4fc649f4955b0147911bfc0cb.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z67364451.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z85333566.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z85333566.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z22381058.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z22381058.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a4691cfa4f3f0bdc0e789dc4fb169c8eefe351a4fc649f4955b0147911bfc0cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a4691cfa4f3f0bdc0e789dc4fb169c8eefe351a4fc649f4955b0147911bfc0cb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z67364451.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3800 3428 WerFault.exe s65117730.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
s65117730.exedescription pid process Token: SeDebugPrivilege 3428 s65117730.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
a4691cfa4f3f0bdc0e789dc4fb169c8eefe351a4fc649f4955b0147911bfc0cb.exez67364451.exez85333566.exez22381058.exes65117730.exedescription pid process target process PID 2036 wrote to memory of 820 2036 a4691cfa4f3f0bdc0e789dc4fb169c8eefe351a4fc649f4955b0147911bfc0cb.exe z67364451.exe PID 2036 wrote to memory of 820 2036 a4691cfa4f3f0bdc0e789dc4fb169c8eefe351a4fc649f4955b0147911bfc0cb.exe z67364451.exe PID 2036 wrote to memory of 820 2036 a4691cfa4f3f0bdc0e789dc4fb169c8eefe351a4fc649f4955b0147911bfc0cb.exe z67364451.exe PID 820 wrote to memory of 3444 820 z67364451.exe z85333566.exe PID 820 wrote to memory of 3444 820 z67364451.exe z85333566.exe PID 820 wrote to memory of 3444 820 z67364451.exe z85333566.exe PID 3444 wrote to memory of 732 3444 z85333566.exe z22381058.exe PID 3444 wrote to memory of 732 3444 z85333566.exe z22381058.exe PID 3444 wrote to memory of 732 3444 z85333566.exe z22381058.exe PID 732 wrote to memory of 3428 732 z22381058.exe s65117730.exe PID 732 wrote to memory of 3428 732 z22381058.exe s65117730.exe PID 732 wrote to memory of 3428 732 z22381058.exe s65117730.exe PID 3428 wrote to memory of 2304 3428 s65117730.exe 1.exe PID 3428 wrote to memory of 2304 3428 s65117730.exe 1.exe PID 3428 wrote to memory of 2304 3428 s65117730.exe 1.exe PID 732 wrote to memory of 4104 732 z22381058.exe t84936691.exe PID 732 wrote to memory of 4104 732 z22381058.exe t84936691.exe PID 732 wrote to memory of 4104 732 z22381058.exe t84936691.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4691cfa4f3f0bdc0e789dc4fb169c8eefe351a4fc649f4955b0147911bfc0cb.exe"C:\Users\Admin\AppData\Local\Temp\a4691cfa4f3f0bdc0e789dc4fb169c8eefe351a4fc649f4955b0147911bfc0cb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z67364451.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z67364451.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z85333566.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z85333566.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z22381058.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z22381058.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s65117730.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s65117730.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
PID:2304 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3428 -s 13846⤵
- Program crash
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t84936691.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t84936691.exe5⤵
- Executes dropped EXE
PID:4104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3428 -ip 34281⤵PID:4280
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5f251255d7ecb4668370589f27687884e
SHA136bcaa570289a2593b5b3282a1dcc4f7b24382bb
SHA25606f8992c2afd5188d59a945bf4053dfb4525d3b635a69c3fa90e8db7f02c3b37
SHA5120d602f80e148602d0e6abaa4c14775f40e40549cfab48a73e7dd32cc4db67ac4d6fcf25c6897821306289360aff2038298cc2bdcf887f054b0168f5fbb0b8b26
-
Filesize
1.0MB
MD5f251255d7ecb4668370589f27687884e
SHA136bcaa570289a2593b5b3282a1dcc4f7b24382bb
SHA25606f8992c2afd5188d59a945bf4053dfb4525d3b635a69c3fa90e8db7f02c3b37
SHA5120d602f80e148602d0e6abaa4c14775f40e40549cfab48a73e7dd32cc4db67ac4d6fcf25c6897821306289360aff2038298cc2bdcf887f054b0168f5fbb0b8b26
-
Filesize
761KB
MD568c43a9a50525d8cb739ce1a7667191e
SHA155884a192a930610db4f6cac6d67850ac92baebe
SHA256153c9ecb7a8281cc003eda388a41cd08dc78979727e56d932dd4b9363edbb2fe
SHA5128406f761a653819f6bba9d5bd7663bb042432a61f758f85af4bee43245eaba6d65b78748bb0d191c0e354565892ba6d6d22882fb4f4ac1e8305f5bd103c07b48
-
Filesize
761KB
MD568c43a9a50525d8cb739ce1a7667191e
SHA155884a192a930610db4f6cac6d67850ac92baebe
SHA256153c9ecb7a8281cc003eda388a41cd08dc78979727e56d932dd4b9363edbb2fe
SHA5128406f761a653819f6bba9d5bd7663bb042432a61f758f85af4bee43245eaba6d65b78748bb0d191c0e354565892ba6d6d22882fb4f4ac1e8305f5bd103c07b48
-
Filesize
578KB
MD5b019da982294055173bd87afa1f58e53
SHA110d95d1be4bc20be340fff1cd8f5597f84b3cc37
SHA256c11c6482854b81d9d8ab80b575be82c3932b01d882a6c7c5f88d7fbe3f72ded8
SHA512a9b31d68c7cc2ec8c1ad2df593b8205e28434894348b12716d31bafb261336ed83de89b2cae92b712dd7fe859ebc2689523f12047d70d72fb476ea22149935dd
-
Filesize
578KB
MD5b019da982294055173bd87afa1f58e53
SHA110d95d1be4bc20be340fff1cd8f5597f84b3cc37
SHA256c11c6482854b81d9d8ab80b575be82c3932b01d882a6c7c5f88d7fbe3f72ded8
SHA512a9b31d68c7cc2ec8c1ad2df593b8205e28434894348b12716d31bafb261336ed83de89b2cae92b712dd7fe859ebc2689523f12047d70d72fb476ea22149935dd
-
Filesize
580KB
MD5fbfa21efc610c4e805fe243d538ab612
SHA11c627968249d8911445c10acd2090eaaab2f82cb
SHA256239d104942b8a96773d124ac032f7dfa275832c97f5ca2352bcdb1647813950e
SHA512e4387de38dfec23462b6dbb2a530a6d36c1610ada0edb22e517eccd9ccd9e9b4f585408c3cd8a084224c6ea718cb228a6e733c6c25b0b9ac105962889823aa6c
-
Filesize
580KB
MD5fbfa21efc610c4e805fe243d538ab612
SHA11c627968249d8911445c10acd2090eaaab2f82cb
SHA256239d104942b8a96773d124ac032f7dfa275832c97f5ca2352bcdb1647813950e
SHA512e4387de38dfec23462b6dbb2a530a6d36c1610ada0edb22e517eccd9ccd9e9b4f585408c3cd8a084224c6ea718cb228a6e733c6c25b0b9ac105962889823aa6c
-
Filesize
169KB
MD5b914006dc10944b8c69a64a5d74a1dcc
SHA1dcc8cff6d539e01ca69a68c13e6aa2b100efd028
SHA2568f2ac5b97c3d6f825f21fbb45ba5b4d149669c79a411bb0462223f53c9a2e09d
SHA5127f0f451d00f8c3c6f4bde4e360c6e2e40e7557f83b3a3f26259eff08b1990c75f0bfc48d8b247725bc1bd56fd0110036a03580375cf3a58b2acf6b9d606209fd
-
Filesize
169KB
MD5b914006dc10944b8c69a64a5d74a1dcc
SHA1dcc8cff6d539e01ca69a68c13e6aa2b100efd028
SHA2568f2ac5b97c3d6f825f21fbb45ba5b4d149669c79a411bb0462223f53c9a2e09d
SHA5127f0f451d00f8c3c6f4bde4e360c6e2e40e7557f83b3a3f26259eff08b1990c75f0bfc48d8b247725bc1bd56fd0110036a03580375cf3a58b2acf6b9d606209fd
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf