Analysis
-
max time kernel
135s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 18:52
Static task
static1
Behavioral task
behavioral1
Sample
a85c0a87fdf46871e1db8dbdfc0b824e162f29aa964d0c7968e15738e8cd03ba.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a85c0a87fdf46871e1db8dbdfc0b824e162f29aa964d0c7968e15738e8cd03ba.exe
Resource
win10v2004-20230220-en
General
-
Target
a85c0a87fdf46871e1db8dbdfc0b824e162f29aa964d0c7968e15738e8cd03ba.exe
-
Size
1.2MB
-
MD5
85e8523bc6bbb75672dc9e277c87b76e
-
SHA1
7de3edbd0f06ca10ece7a67463b8f98bbc329d4e
-
SHA256
a85c0a87fdf46871e1db8dbdfc0b824e162f29aa964d0c7968e15738e8cd03ba
-
SHA512
5e0b6a07a194bdd36d46b6ab3a75c4ebc2fd64949f2fd35f1090c7966703f858159392fb9492d0cdf54cc6a83a4aba373e55a6317085391747e6f2b25808a272
-
SSDEEP
24576:hygwcC6dEn0Jv7XIBxI9b4dod5t9vhq318vK++r6mHvG+ugF8br4Zwr+:UzcbK039b4KDZh3vKb6Gu+95w
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
Processes:
resource yara_rule behavioral2/memory/1324-2332-0x0000000005310000-0x0000000005928000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
s90297730.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation s90297730.exe -
Executes dropped EXE 6 IoCs
Processes:
z74080749.exez16826824.exez60364424.exes90297730.exe1.exet84597429.exepid process 4820 z74080749.exe 2556 z16826824.exe 1808 z60364424.exe 3968 s90297730.exe 1324 1.exe 1876 t84597429.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
z16826824.exez60364424.exea85c0a87fdf46871e1db8dbdfc0b824e162f29aa964d0c7968e15738e8cd03ba.exez74080749.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z16826824.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z60364424.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z60364424.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a85c0a87fdf46871e1db8dbdfc0b824e162f29aa964d0c7968e15738e8cd03ba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a85c0a87fdf46871e1db8dbdfc0b824e162f29aa964d0c7968e15738e8cd03ba.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z74080749.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z74080749.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z16826824.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 756 3968 WerFault.exe s90297730.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
s90297730.exedescription pid process Token: SeDebugPrivilege 3968 s90297730.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
a85c0a87fdf46871e1db8dbdfc0b824e162f29aa964d0c7968e15738e8cd03ba.exez74080749.exez16826824.exez60364424.exes90297730.exedescription pid process target process PID 4552 wrote to memory of 4820 4552 a85c0a87fdf46871e1db8dbdfc0b824e162f29aa964d0c7968e15738e8cd03ba.exe z74080749.exe PID 4552 wrote to memory of 4820 4552 a85c0a87fdf46871e1db8dbdfc0b824e162f29aa964d0c7968e15738e8cd03ba.exe z74080749.exe PID 4552 wrote to memory of 4820 4552 a85c0a87fdf46871e1db8dbdfc0b824e162f29aa964d0c7968e15738e8cd03ba.exe z74080749.exe PID 4820 wrote to memory of 2556 4820 z74080749.exe z16826824.exe PID 4820 wrote to memory of 2556 4820 z74080749.exe z16826824.exe PID 4820 wrote to memory of 2556 4820 z74080749.exe z16826824.exe PID 2556 wrote to memory of 1808 2556 z16826824.exe z60364424.exe PID 2556 wrote to memory of 1808 2556 z16826824.exe z60364424.exe PID 2556 wrote to memory of 1808 2556 z16826824.exe z60364424.exe PID 1808 wrote to memory of 3968 1808 z60364424.exe s90297730.exe PID 1808 wrote to memory of 3968 1808 z60364424.exe s90297730.exe PID 1808 wrote to memory of 3968 1808 z60364424.exe s90297730.exe PID 3968 wrote to memory of 1324 3968 s90297730.exe 1.exe PID 3968 wrote to memory of 1324 3968 s90297730.exe 1.exe PID 3968 wrote to memory of 1324 3968 s90297730.exe 1.exe PID 1808 wrote to memory of 1876 1808 z60364424.exe t84597429.exe PID 1808 wrote to memory of 1876 1808 z60364424.exe t84597429.exe PID 1808 wrote to memory of 1876 1808 z60364424.exe t84597429.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a85c0a87fdf46871e1db8dbdfc0b824e162f29aa964d0c7968e15738e8cd03ba.exe"C:\Users\Admin\AppData\Local\Temp\a85c0a87fdf46871e1db8dbdfc0b824e162f29aa964d0c7968e15738e8cd03ba.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z74080749.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z74080749.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z16826824.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z16826824.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z60364424.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z60364424.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s90297730.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s90297730.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3968 -s 12086⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t84597429.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t84597429.exe5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3968 -ip 39681⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z74080749.exeFilesize
1.0MB
MD5c7d387c1e6411066a2636293c7e83962
SHA10bddb0dbbe46ac615e942f8c97f5c16efd318469
SHA256cc685700fa68013db8442fa2ab1d7631f77afa95fcfed9fc8c1340babbef0399
SHA512c856041e5c7a81e75f7f39c13db55057b8014d605a4a5384d5e80584e7910edee9fbd45283b540fd2cd5c005230df48edcc727533b91d3a8669e8d527aadf5be
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z74080749.exeFilesize
1.0MB
MD5c7d387c1e6411066a2636293c7e83962
SHA10bddb0dbbe46ac615e942f8c97f5c16efd318469
SHA256cc685700fa68013db8442fa2ab1d7631f77afa95fcfed9fc8c1340babbef0399
SHA512c856041e5c7a81e75f7f39c13db55057b8014d605a4a5384d5e80584e7910edee9fbd45283b540fd2cd5c005230df48edcc727533b91d3a8669e8d527aadf5be
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z16826824.exeFilesize
760KB
MD5fd64c32ce0b2dd25354f9d2eef02902d
SHA1595f8f3934f05c8babb2346fb7f1afb55262a074
SHA2568779803767a0eddae9b036c192a57769b0e2b86894f387b2bbd025b405bfc334
SHA512814ec9a414d044e09eb39b5b7b0c3c78707c4152e1693577afb2d9bdaa7cefb1cbda5282dcc5b22a420f50bd0e5fdc4639b32eb5b5fe4f7f9adf02bca5b7ffde
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z16826824.exeFilesize
760KB
MD5fd64c32ce0b2dd25354f9d2eef02902d
SHA1595f8f3934f05c8babb2346fb7f1afb55262a074
SHA2568779803767a0eddae9b036c192a57769b0e2b86894f387b2bbd025b405bfc334
SHA512814ec9a414d044e09eb39b5b7b0c3c78707c4152e1693577afb2d9bdaa7cefb1cbda5282dcc5b22a420f50bd0e5fdc4639b32eb5b5fe4f7f9adf02bca5b7ffde
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z60364424.exeFilesize
578KB
MD5bb67df60282a6ea7681be829a587b277
SHA124fe0dfa98c9b7e5f1bb3b46f10bdf718c2afc7a
SHA256c08c7f5d2427e891d06e4245450b2f52178974a0290662df0d2546f11362fbf4
SHA5129440ac2a5900b9ae1828fba5ddc6dec846cce380ef502c70e28332a2f4f9da025b0a633f9e00d10cf860a21679639469dff2df53f06276cccf4b6ef9511ea5d7
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z60364424.exeFilesize
578KB
MD5bb67df60282a6ea7681be829a587b277
SHA124fe0dfa98c9b7e5f1bb3b46f10bdf718c2afc7a
SHA256c08c7f5d2427e891d06e4245450b2f52178974a0290662df0d2546f11362fbf4
SHA5129440ac2a5900b9ae1828fba5ddc6dec846cce380ef502c70e28332a2f4f9da025b0a633f9e00d10cf860a21679639469dff2df53f06276cccf4b6ef9511ea5d7
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s90297730.exeFilesize
580KB
MD5287404a42d36239cbe3c7eb2e8dd9256
SHA10a32dca49fa61e17b697b95611a5c135f1fc2e66
SHA25613c7fc52361bf24ff65e0330de41438cd105c94ebb947391ae6c1c710fc90d41
SHA5125adbe2866ff21edf2448eb6ee8386b9d4f6ef1b459e502984ffe38b58799b6eebce8b38650144737ea14f423822abfe3506b6801432d7c184bcf4081b312ab3c
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s90297730.exeFilesize
580KB
MD5287404a42d36239cbe3c7eb2e8dd9256
SHA10a32dca49fa61e17b697b95611a5c135f1fc2e66
SHA25613c7fc52361bf24ff65e0330de41438cd105c94ebb947391ae6c1c710fc90d41
SHA5125adbe2866ff21edf2448eb6ee8386b9d4f6ef1b459e502984ffe38b58799b6eebce8b38650144737ea14f423822abfe3506b6801432d7c184bcf4081b312ab3c
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t84597429.exeFilesize
169KB
MD5aec5ad16c40c8e6d6f88abffddba33ad
SHA1bc11e33bd0b8b99ffebde6d448ad5d02dcf85104
SHA2568241e79bf00101dd98fb4c41f05f4b0ca181a1e8fa59f0926ca229c6779ccad6
SHA512ffed4219879cb159c1ed1308680fd195c60f97e5d39568964a0b17ef4d9a99f0cf3b2ed0c32502f7806beba14b4d46363a6508860171ea204522786b6598d6eb
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t84597429.exeFilesize
169KB
MD5aec5ad16c40c8e6d6f88abffddba33ad
SHA1bc11e33bd0b8b99ffebde6d448ad5d02dcf85104
SHA2568241e79bf00101dd98fb4c41f05f4b0ca181a1e8fa59f0926ca229c6779ccad6
SHA512ffed4219879cb159c1ed1308680fd195c60f97e5d39568964a0b17ef4d9a99f0cf3b2ed0c32502f7806beba14b4d46363a6508860171ea204522786b6598d6eb
-
C:\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
C:\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
C:\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
memory/1324-2343-0x0000000004BA0000-0x0000000004BB0000-memory.dmpFilesize
64KB
-
memory/1324-2332-0x0000000005310000-0x0000000005928000-memory.dmpFilesize
6.1MB
-
memory/1324-2330-0x00000000003F0000-0x000000000041E000-memory.dmpFilesize
184KB
-
memory/1324-2336-0x0000000004D90000-0x0000000004DCC000-memory.dmpFilesize
240KB
-
memory/1324-2335-0x0000000004BA0000-0x0000000004BB0000-memory.dmpFilesize
64KB
-
memory/1324-2334-0x0000000004D30000-0x0000000004D42000-memory.dmpFilesize
72KB
-
memory/1324-2333-0x0000000004E00000-0x0000000004F0A000-memory.dmpFilesize
1.0MB
-
memory/1876-2344-0x0000000002350000-0x0000000002360000-memory.dmpFilesize
64KB
-
memory/1876-2342-0x0000000002350000-0x0000000002360000-memory.dmpFilesize
64KB
-
memory/1876-2341-0x0000000000100000-0x000000000012E000-memory.dmpFilesize
184KB
-
memory/3968-194-0x0000000004F70000-0x0000000004FD0000-memory.dmpFilesize
384KB
-
memory/3968-218-0x0000000004F70000-0x0000000004FD0000-memory.dmpFilesize
384KB
-
memory/3968-180-0x0000000004F70000-0x0000000004FD0000-memory.dmpFilesize
384KB
-
memory/3968-182-0x0000000004F70000-0x0000000004FD0000-memory.dmpFilesize
384KB
-
memory/3968-184-0x0000000004F70000-0x0000000004FD0000-memory.dmpFilesize
384KB
-
memory/3968-186-0x0000000004F70000-0x0000000004FD0000-memory.dmpFilesize
384KB
-
memory/3968-188-0x0000000004F70000-0x0000000004FD0000-memory.dmpFilesize
384KB
-
memory/3968-190-0x0000000004F70000-0x0000000004FD0000-memory.dmpFilesize
384KB
-
memory/3968-192-0x0000000004F70000-0x0000000004FD0000-memory.dmpFilesize
384KB
-
memory/3968-176-0x0000000004F70000-0x0000000004FD0000-memory.dmpFilesize
384KB
-
memory/3968-198-0x0000000004F70000-0x0000000004FD0000-memory.dmpFilesize
384KB
-
memory/3968-196-0x0000000004F70000-0x0000000004FD0000-memory.dmpFilesize
384KB
-
memory/3968-200-0x0000000004F70000-0x0000000004FD0000-memory.dmpFilesize
384KB
-
memory/3968-202-0x0000000004F70000-0x0000000004FD0000-memory.dmpFilesize
384KB
-
memory/3968-204-0x0000000004F70000-0x0000000004FD0000-memory.dmpFilesize
384KB
-
memory/3968-206-0x0000000004F70000-0x0000000004FD0000-memory.dmpFilesize
384KB
-
memory/3968-208-0x0000000004F70000-0x0000000004FD0000-memory.dmpFilesize
384KB
-
memory/3968-210-0x0000000004F70000-0x0000000004FD0000-memory.dmpFilesize
384KB
-
memory/3968-212-0x0000000004F70000-0x0000000004FD0000-memory.dmpFilesize
384KB
-
memory/3968-214-0x0000000004F70000-0x0000000004FD0000-memory.dmpFilesize
384KB
-
memory/3968-216-0x0000000004F70000-0x0000000004FD0000-memory.dmpFilesize
384KB
-
memory/3968-178-0x0000000004F70000-0x0000000004FD0000-memory.dmpFilesize
384KB
-
memory/3968-220-0x0000000004F70000-0x0000000004FD0000-memory.dmpFilesize
384KB
-
memory/3968-222-0x0000000004F70000-0x0000000004FD0000-memory.dmpFilesize
384KB
-
memory/3968-224-0x0000000004F70000-0x0000000004FD0000-memory.dmpFilesize
384KB
-
memory/3968-226-0x0000000004F70000-0x0000000004FD0000-memory.dmpFilesize
384KB
-
memory/3968-228-0x0000000004F70000-0x0000000004FD0000-memory.dmpFilesize
384KB
-
memory/3968-174-0x0000000004F70000-0x0000000004FD0000-memory.dmpFilesize
384KB
-
memory/3968-172-0x0000000004F70000-0x0000000004FD0000-memory.dmpFilesize
384KB
-
memory/3968-170-0x0000000004F70000-0x0000000004FD0000-memory.dmpFilesize
384KB
-
memory/3968-168-0x0000000004F70000-0x0000000004FD0000-memory.dmpFilesize
384KB
-
memory/3968-167-0x0000000004F70000-0x0000000004FD0000-memory.dmpFilesize
384KB
-
memory/3968-166-0x0000000005000000-0x0000000005010000-memory.dmpFilesize
64KB
-
memory/3968-165-0x0000000005000000-0x0000000005010000-memory.dmpFilesize
64KB
-
memory/3968-164-0x0000000005000000-0x0000000005010000-memory.dmpFilesize
64KB
-
memory/3968-163-0x0000000005110000-0x00000000056B4000-memory.dmpFilesize
5.6MB
-
memory/3968-162-0x0000000000910000-0x000000000096B000-memory.dmpFilesize
364KB
-
memory/3968-230-0x0000000004F70000-0x0000000004FD0000-memory.dmpFilesize
384KB
-
memory/3968-2315-0x0000000005000000-0x0000000005010000-memory.dmpFilesize
64KB
-
memory/3968-2314-0x0000000005000000-0x0000000005010000-memory.dmpFilesize
64KB
-
memory/3968-2316-0x0000000005000000-0x0000000005010000-memory.dmpFilesize
64KB
-
memory/3968-2319-0x0000000005000000-0x0000000005010000-memory.dmpFilesize
64KB