Analysis

  • max time kernel
    135s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/05/2023, 19:15

General

  • Target

    bb96d7905bac85b63010f4c07a56a2c0c271f8eb88d7d563c9937fccd238691a.exe

  • Size

    866KB

  • MD5

    b599e6e7e3a4908be39d15243858b02e

  • SHA1

    fca69ba2b226f6cf6aa835e6cde61e7b4c8c8a65

  • SHA256

    bb96d7905bac85b63010f4c07a56a2c0c271f8eb88d7d563c9937fccd238691a

  • SHA512

    86738d1d11794ef880ac9c3559af737178e38a2ad2307a395dc0a2fd6688cfca5cb3bf28cbf493077da0ea8fd6b56631db4eda76751bdfcf01fc790907eac718

  • SSDEEP

    12288:ky90UroYWOdhbhH9fWIKzS9eRFiDus8Sr//5WzRwfq7L9r1P7sgglTw96W6PyVa4:kyvoYlDbhQ7uKFSL/4zR8E5rZxCFjk

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dark

C2

185.161.248.73:4164

Attributes
  • auth_value

    ae85b01f66afe8770afeed560513fc2d

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb96d7905bac85b63010f4c07a56a2c0c271f8eb88d7d563c9937fccd238691a.exe
    "C:\Users\Admin\AppData\Local\Temp\bb96d7905bac85b63010f4c07a56a2c0c271f8eb88d7d563c9937fccd238691a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1504
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y63290661.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y63290661.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2280
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p66366768.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p66366768.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2040
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          PID:1892
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2040 -s 1384
          4⤵
          • Program crash
          PID:4848
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r02244702.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r02244702.exe
        3⤵
        • Executes dropped EXE
        PID:3084
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2040 -ip 2040
    1⤵
      PID:4472

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y63290661.exe

            Filesize

            577KB

            MD5

            bd8638a4945f38684acbbc2e68fae683

            SHA1

            c3d259872a432910d385ab60d1e0304b43d4c7cb

            SHA256

            511c8e909500171846baf2a663ed309cadfef76c33eabfe3f6ac3fa2863e3914

            SHA512

            196f1eff0c2360a23f044383037948c9312cc6056a50af17e18edfe42ff58bc2e3f2078d3128eabfab144322ed1b0570d1ea45196b1cba176e5b28ce0dcc4b2f

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y63290661.exe

            Filesize

            577KB

            MD5

            bd8638a4945f38684acbbc2e68fae683

            SHA1

            c3d259872a432910d385ab60d1e0304b43d4c7cb

            SHA256

            511c8e909500171846baf2a663ed309cadfef76c33eabfe3f6ac3fa2863e3914

            SHA512

            196f1eff0c2360a23f044383037948c9312cc6056a50af17e18edfe42ff58bc2e3f2078d3128eabfab144322ed1b0570d1ea45196b1cba176e5b28ce0dcc4b2f

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p66366768.exe

            Filesize

            574KB

            MD5

            f5c1f0668fd2eab5c7600e580f00de2c

            SHA1

            e267e9e95b3f0978e84795bc59ce8e4ec98941e9

            SHA256

            02e7c55aa3d15f3f04107e9b009c0a69bac8fca401411eb5011be85ae8fccece

            SHA512

            48ee17416cea296ed45cfb2465ed65d63525e891257e41660e30d17ce193ae8090961fa1c10251ea253e92d3e11ff00c34388451745e7817934d6627f1f14d2b

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p66366768.exe

            Filesize

            574KB

            MD5

            f5c1f0668fd2eab5c7600e580f00de2c

            SHA1

            e267e9e95b3f0978e84795bc59ce8e4ec98941e9

            SHA256

            02e7c55aa3d15f3f04107e9b009c0a69bac8fca401411eb5011be85ae8fccece

            SHA512

            48ee17416cea296ed45cfb2465ed65d63525e891257e41660e30d17ce193ae8090961fa1c10251ea253e92d3e11ff00c34388451745e7817934d6627f1f14d2b

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r02244702.exe

            Filesize

            170KB

            MD5

            c046c8b6bafd97d9dbe15e34ac691cec

            SHA1

            ea2ef162675b33044401bdd23ae734d472d1071e

            SHA256

            8991fc2828492f84e64792717646ad6dcd3e31a04fa4d922d73af091822cb5cd

            SHA512

            fe99fe76e6b77963525d182370969c68cf536f82454300f83e105c479bf717e5eef6d831bda1cc8f66f2ba78dae8972d8e56a6a6be769af61396d8cc218f0c91

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r02244702.exe

            Filesize

            170KB

            MD5

            c046c8b6bafd97d9dbe15e34ac691cec

            SHA1

            ea2ef162675b33044401bdd23ae734d472d1071e

            SHA256

            8991fc2828492f84e64792717646ad6dcd3e31a04fa4d922d73af091822cb5cd

            SHA512

            fe99fe76e6b77963525d182370969c68cf536f82454300f83e105c479bf717e5eef6d831bda1cc8f66f2ba78dae8972d8e56a6a6be769af61396d8cc218f0c91

          • C:\Windows\Temp\1.exe

            Filesize

            168KB

            MD5

            f16fb63d4e551d3808e8f01f2671b57e

            SHA1

            781153ad6235a1152da112de1fb39a6f2d063575

            SHA256

            8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

            SHA512

            fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

          • C:\Windows\Temp\1.exe

            Filesize

            168KB

            MD5

            f16fb63d4e551d3808e8f01f2671b57e

            SHA1

            781153ad6235a1152da112de1fb39a6f2d063575

            SHA256

            8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

            SHA512

            fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

          • C:\Windows\Temp\1.exe

            Filesize

            168KB

            MD5

            f16fb63d4e551d3808e8f01f2671b57e

            SHA1

            781153ad6235a1152da112de1fb39a6f2d063575

            SHA256

            8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

            SHA512

            fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

          • memory/1892-2319-0x0000000005860000-0x0000000005870000-memory.dmp

            Filesize

            64KB

          • memory/1892-2317-0x0000000005980000-0x0000000005A8A000-memory.dmp

            Filesize

            1.0MB

          • memory/1892-2316-0x0000000005E90000-0x00000000064A8000-memory.dmp

            Filesize

            6.1MB

          • memory/1892-2315-0x0000000000F20000-0x0000000000F4E000-memory.dmp

            Filesize

            184KB

          • memory/1892-2318-0x0000000005870000-0x0000000005882000-memory.dmp

            Filesize

            72KB

          • memory/1892-2320-0x00000000058D0000-0x000000000590C000-memory.dmp

            Filesize

            240KB

          • memory/1892-2327-0x0000000005860000-0x0000000005870000-memory.dmp

            Filesize

            64KB

          • memory/2040-168-0x0000000002A50000-0x0000000002AB0000-memory.dmp

            Filesize

            384KB

          • memory/2040-208-0x0000000002A50000-0x0000000002AB0000-memory.dmp

            Filesize

            384KB

          • memory/2040-172-0x0000000002A50000-0x0000000002AB0000-memory.dmp

            Filesize

            384KB

          • memory/2040-174-0x0000000002A50000-0x0000000002AB0000-memory.dmp

            Filesize

            384KB

          • memory/2040-176-0x0000000002A50000-0x0000000002AB0000-memory.dmp

            Filesize

            384KB

          • memory/2040-178-0x0000000002A50000-0x0000000002AB0000-memory.dmp

            Filesize

            384KB

          • memory/2040-182-0x0000000002A50000-0x0000000002AB0000-memory.dmp

            Filesize

            384KB

          • memory/2040-183-0x00000000027E0000-0x00000000027F0000-memory.dmp

            Filesize

            64KB

          • memory/2040-185-0x00000000027E0000-0x00000000027F0000-memory.dmp

            Filesize

            64KB

          • memory/2040-186-0x0000000002A50000-0x0000000002AB0000-memory.dmp

            Filesize

            384KB

          • memory/2040-188-0x0000000002A50000-0x0000000002AB0000-memory.dmp

            Filesize

            384KB

          • memory/2040-180-0x0000000002A50000-0x0000000002AB0000-memory.dmp

            Filesize

            384KB

          • memory/2040-190-0x0000000002A50000-0x0000000002AB0000-memory.dmp

            Filesize

            384KB

          • memory/2040-192-0x0000000002A50000-0x0000000002AB0000-memory.dmp

            Filesize

            384KB

          • memory/2040-194-0x0000000002A50000-0x0000000002AB0000-memory.dmp

            Filesize

            384KB

          • memory/2040-196-0x0000000002A50000-0x0000000002AB0000-memory.dmp

            Filesize

            384KB

          • memory/2040-198-0x0000000002A50000-0x0000000002AB0000-memory.dmp

            Filesize

            384KB

          • memory/2040-200-0x0000000002A50000-0x0000000002AB0000-memory.dmp

            Filesize

            384KB

          • memory/2040-202-0x0000000002A50000-0x0000000002AB0000-memory.dmp

            Filesize

            384KB

          • memory/2040-204-0x0000000002A50000-0x0000000002AB0000-memory.dmp

            Filesize

            384KB

          • memory/2040-206-0x0000000002A50000-0x0000000002AB0000-memory.dmp

            Filesize

            384KB

          • memory/2040-170-0x0000000002A50000-0x0000000002AB0000-memory.dmp

            Filesize

            384KB

          • memory/2040-212-0x0000000002A50000-0x0000000002AB0000-memory.dmp

            Filesize

            384KB

          • memory/2040-210-0x0000000002A50000-0x0000000002AB0000-memory.dmp

            Filesize

            384KB

          • memory/2040-214-0x0000000002A50000-0x0000000002AB0000-memory.dmp

            Filesize

            384KB

          • memory/2040-216-0x0000000002A50000-0x0000000002AB0000-memory.dmp

            Filesize

            384KB

          • memory/2040-1920-0x00000000027E0000-0x00000000027F0000-memory.dmp

            Filesize

            64KB

          • memory/2040-2301-0x00000000027E0000-0x00000000027F0000-memory.dmp

            Filesize

            64KB

          • memory/2040-2303-0x00000000027E0000-0x00000000027F0000-memory.dmp

            Filesize

            64KB

          • memory/2040-164-0x0000000002A50000-0x0000000002AB0000-memory.dmp

            Filesize

            384KB

          • memory/2040-166-0x0000000002A50000-0x0000000002AB0000-memory.dmp

            Filesize

            384KB

          • memory/2040-162-0x0000000002A50000-0x0000000002AB0000-memory.dmp

            Filesize

            384KB

          • memory/2040-160-0x0000000002A50000-0x0000000002AB0000-memory.dmp

            Filesize

            384KB

          • memory/2040-156-0x0000000002A50000-0x0000000002AB0000-memory.dmp

            Filesize

            384KB

          • memory/2040-158-0x0000000002A50000-0x0000000002AB0000-memory.dmp

            Filesize

            384KB

          • memory/2040-152-0x0000000002A50000-0x0000000002AB0000-memory.dmp

            Filesize

            384KB

          • memory/2040-154-0x0000000002A50000-0x0000000002AB0000-memory.dmp

            Filesize

            384KB

          • memory/2040-151-0x0000000002A50000-0x0000000002AB0000-memory.dmp

            Filesize

            384KB

          • memory/2040-150-0x0000000005050000-0x00000000055F4000-memory.dmp

            Filesize

            5.6MB

          • memory/2040-149-0x00000000027E0000-0x00000000027F0000-memory.dmp

            Filesize

            64KB

          • memory/2040-148-0x0000000000840000-0x000000000089B000-memory.dmp

            Filesize

            364KB

          • memory/3084-2326-0x0000000004A50000-0x0000000004A60000-memory.dmp

            Filesize

            64KB

          • memory/3084-2325-0x0000000000090000-0x00000000000C0000-memory.dmp

            Filesize

            192KB

          • memory/3084-2328-0x0000000004A50000-0x0000000004A60000-memory.dmp

            Filesize

            64KB