Analysis

  • max time kernel
    143s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-05-2023 19:40

General

  • Target

    cda74336fe79fc1db75e35b5c83ab3c8acabd2b4a28e928a2dd5036df1bf7844.exe

  • Size

    1.2MB

  • MD5

    6cc0908fd535e311572d7172265e0291

  • SHA1

    7712b63a4256463537f0b05544598d16334314e8

  • SHA256

    cda74336fe79fc1db75e35b5c83ab3c8acabd2b4a28e928a2dd5036df1bf7844

  • SHA512

    b6f18d04dffade6a3ab94a9a9b8e4d3bfd2f1fd3207aff919f87b27e1d9fabb2907b1ff019bbc60e0e5e4838a4101326290b14e2dce50008f116b263887ab346

  • SSDEEP

    24576:fyyrv2tjWvWYhDfwHRUO54Mt57wlkElwH9BG0cKTB/DbG:qyj2t71HRUDc48k0cKTV

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

life

C2

185.161.248.73:4164

Attributes
  • auth_value

    8685d11953530b68ad5ec703809d9f91

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cda74336fe79fc1db75e35b5c83ab3c8acabd2b4a28e928a2dd5036df1bf7844.exe
    "C:\Users\Admin\AppData\Local\Temp\cda74336fe79fc1db75e35b5c83ab3c8acabd2b4a28e928a2dd5036df1bf7844.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1512
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z13136293.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z13136293.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4788
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z57672486.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z57672486.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1632
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z21926325.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z21926325.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3620
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s45939652.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s45939652.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:792
            • C:\Windows\Temp\1.exe
              "C:\Windows\Temp\1.exe"
              6⤵
              • Executes dropped EXE
              PID:2632
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 792 -s 1384
              6⤵
              • Program crash
              PID:4716
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t86149819.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t86149819.exe
            5⤵
            • Executes dropped EXE
            PID:4288
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 792 -ip 792
    1⤵
      PID:2220

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z13136293.exe

      Filesize

      1.0MB

      MD5

      b4750afc810918881f1bb396abd726e6

      SHA1

      fb8fefd6446a17a8d4542f4739263a50ad5207f2

      SHA256

      a406e2784e46f2ecaac0bf14840ddc2ee53ca9853992220771f4fdcb0ae298e6

      SHA512

      b8a43268881bd58d24941f296c2ab1ffb1dbf85aa8d7f3c5277493c48947278f39d3025be0d790784d22b7e2609ab9141e1da40cb5d2ca6a86dea44759af0c04

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z13136293.exe

      Filesize

      1.0MB

      MD5

      b4750afc810918881f1bb396abd726e6

      SHA1

      fb8fefd6446a17a8d4542f4739263a50ad5207f2

      SHA256

      a406e2784e46f2ecaac0bf14840ddc2ee53ca9853992220771f4fdcb0ae298e6

      SHA512

      b8a43268881bd58d24941f296c2ab1ffb1dbf85aa8d7f3c5277493c48947278f39d3025be0d790784d22b7e2609ab9141e1da40cb5d2ca6a86dea44759af0c04

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z57672486.exe

      Filesize

      761KB

      MD5

      42f7c620ac6df6fd8342be2ad96cf721

      SHA1

      4cb3db40157d6dc338160bbf6e013b47ffd2fd28

      SHA256

      f73891a67c62498422a26dc287a81017a81ff01d37bc7d2cdf6a93f1af0ead69

      SHA512

      109163b68cf6fe6f3ffebf089f1e5aa12f1b040381636d19c93516b8cf59fc51a173e67abecc17edd625172ecc76ef1edc8859b9b8dc687c7812e6b76ca231a7

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z57672486.exe

      Filesize

      761KB

      MD5

      42f7c620ac6df6fd8342be2ad96cf721

      SHA1

      4cb3db40157d6dc338160bbf6e013b47ffd2fd28

      SHA256

      f73891a67c62498422a26dc287a81017a81ff01d37bc7d2cdf6a93f1af0ead69

      SHA512

      109163b68cf6fe6f3ffebf089f1e5aa12f1b040381636d19c93516b8cf59fc51a173e67abecc17edd625172ecc76ef1edc8859b9b8dc687c7812e6b76ca231a7

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z21926325.exe

      Filesize

      578KB

      MD5

      013cd55177ccf6eb2b3ff0c4a9e48ba7

      SHA1

      8e30062c38d72fb08e98fbf13ed2d96ca8290c8a

      SHA256

      d85adc9f261733152444f9d20bd7e7a40c4250482f99031319c0d1f9bc7f07cd

      SHA512

      74cb68c64728e1800a13fcc16ce92c36743554e34aca09177257829dfc9e347830af0769e5396a967153e02124892c56e9d9315bec0d58f41b85a2b58412af37

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z21926325.exe

      Filesize

      578KB

      MD5

      013cd55177ccf6eb2b3ff0c4a9e48ba7

      SHA1

      8e30062c38d72fb08e98fbf13ed2d96ca8290c8a

      SHA256

      d85adc9f261733152444f9d20bd7e7a40c4250482f99031319c0d1f9bc7f07cd

      SHA512

      74cb68c64728e1800a13fcc16ce92c36743554e34aca09177257829dfc9e347830af0769e5396a967153e02124892c56e9d9315bec0d58f41b85a2b58412af37

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s45939652.exe

      Filesize

      580KB

      MD5

      8dd08ffc0a9eaa855f5fb6910a743146

      SHA1

      5dadcebfd64366723dd9cb6da2c2226fd901ce3a

      SHA256

      b2bfe8d9cc09773d9bf54d0ea6740baa62010cec74c09d904e1dc015e95b20c1

      SHA512

      d298208baf73e53f572301fffe41e1ea286128d9b034dbb727fa66f91f0bbee7b3a0526b419ddd7c21285c5ada426d385e38c62688e2f0efaad551a5c0b279f3

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s45939652.exe

      Filesize

      580KB

      MD5

      8dd08ffc0a9eaa855f5fb6910a743146

      SHA1

      5dadcebfd64366723dd9cb6da2c2226fd901ce3a

      SHA256

      b2bfe8d9cc09773d9bf54d0ea6740baa62010cec74c09d904e1dc015e95b20c1

      SHA512

      d298208baf73e53f572301fffe41e1ea286128d9b034dbb727fa66f91f0bbee7b3a0526b419ddd7c21285c5ada426d385e38c62688e2f0efaad551a5c0b279f3

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t86149819.exe

      Filesize

      169KB

      MD5

      5a09dd45a8c794aa80f4fc3e061b3e58

      SHA1

      11e21a64276cc2446d56d35c20b4390d31ac2090

      SHA256

      8d5ada2dda508201b585aad8a02fc8205144752e6d740ee7ef54b421298902eb

      SHA512

      1c8ac5d3d358e53747f0d4430326fe6769601ce257ef34968ef915f596990e7b1237982407fd9c54816504726f7b3323762e6f9c033083514ee32290ec6e913a

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t86149819.exe

      Filesize

      169KB

      MD5

      5a09dd45a8c794aa80f4fc3e061b3e58

      SHA1

      11e21a64276cc2446d56d35c20b4390d31ac2090

      SHA256

      8d5ada2dda508201b585aad8a02fc8205144752e6d740ee7ef54b421298902eb

      SHA512

      1c8ac5d3d358e53747f0d4430326fe6769601ce257ef34968ef915f596990e7b1237982407fd9c54816504726f7b3323762e6f9c033083514ee32290ec6e913a

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • memory/792-169-0x00000000054E0000-0x0000000005540000-memory.dmp

      Filesize

      384KB

    • memory/792-229-0x00000000054E0000-0x0000000005540000-memory.dmp

      Filesize

      384KB

    • memory/792-177-0x00000000054E0000-0x0000000005540000-memory.dmp

      Filesize

      384KB

    • memory/792-175-0x00000000054E0000-0x0000000005540000-memory.dmp

      Filesize

      384KB

    • memory/792-179-0x00000000054E0000-0x0000000005540000-memory.dmp

      Filesize

      384KB

    • memory/792-181-0x00000000054E0000-0x0000000005540000-memory.dmp

      Filesize

      384KB

    • memory/792-167-0x00000000054E0000-0x0000000005540000-memory.dmp

      Filesize

      384KB

    • memory/792-166-0x00000000054E0000-0x0000000005540000-memory.dmp

      Filesize

      384KB

    • memory/792-185-0x00000000054E0000-0x0000000005540000-memory.dmp

      Filesize

      384KB

    • memory/792-183-0x00000000054E0000-0x0000000005540000-memory.dmp

      Filesize

      384KB

    • memory/792-187-0x00000000054E0000-0x0000000005540000-memory.dmp

      Filesize

      384KB

    • memory/792-189-0x00000000054E0000-0x0000000005540000-memory.dmp

      Filesize

      384KB

    • memory/792-191-0x00000000054E0000-0x0000000005540000-memory.dmp

      Filesize

      384KB

    • memory/792-195-0x00000000054E0000-0x0000000005540000-memory.dmp

      Filesize

      384KB

    • memory/792-197-0x00000000054E0000-0x0000000005540000-memory.dmp

      Filesize

      384KB

    • memory/792-193-0x00000000054E0000-0x0000000005540000-memory.dmp

      Filesize

      384KB

    • memory/792-199-0x00000000054E0000-0x0000000005540000-memory.dmp

      Filesize

      384KB

    • memory/792-201-0x00000000054E0000-0x0000000005540000-memory.dmp

      Filesize

      384KB

    • memory/792-203-0x00000000054E0000-0x0000000005540000-memory.dmp

      Filesize

      384KB

    • memory/792-205-0x00000000054E0000-0x0000000005540000-memory.dmp

      Filesize

      384KB

    • memory/792-207-0x00000000054E0000-0x0000000005540000-memory.dmp

      Filesize

      384KB

    • memory/792-211-0x00000000054E0000-0x0000000005540000-memory.dmp

      Filesize

      384KB

    • memory/792-219-0x00000000054E0000-0x0000000005540000-memory.dmp

      Filesize

      384KB

    • memory/792-221-0x00000000054E0000-0x0000000005540000-memory.dmp

      Filesize

      384KB

    • memory/792-225-0x00000000054E0000-0x0000000005540000-memory.dmp

      Filesize

      384KB

    • memory/792-171-0x00000000054E0000-0x0000000005540000-memory.dmp

      Filesize

      384KB

    • memory/792-227-0x00000000054E0000-0x0000000005540000-memory.dmp

      Filesize

      384KB

    • memory/792-223-0x00000000054E0000-0x0000000005540000-memory.dmp

      Filesize

      384KB

    • memory/792-217-0x00000000054E0000-0x0000000005540000-memory.dmp

      Filesize

      384KB

    • memory/792-215-0x00000000054E0000-0x0000000005540000-memory.dmp

      Filesize

      384KB

    • memory/792-213-0x00000000054E0000-0x0000000005540000-memory.dmp

      Filesize

      384KB

    • memory/792-209-0x00000000054E0000-0x0000000005540000-memory.dmp

      Filesize

      384KB

    • memory/792-2314-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

      Filesize

      64KB

    • memory/792-173-0x00000000054E0000-0x0000000005540000-memory.dmp

      Filesize

      384KB

    • memory/792-165-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

      Filesize

      64KB

    • memory/792-164-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

      Filesize

      64KB

    • memory/792-162-0x0000000004EE0000-0x0000000005484000-memory.dmp

      Filesize

      5.6MB

    • memory/792-163-0x0000000000A10000-0x0000000000A6B000-memory.dmp

      Filesize

      364KB

    • memory/792-2328-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

      Filesize

      64KB

    • memory/792-2330-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

      Filesize

      64KB

    • memory/792-2329-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

      Filesize

      64KB

    • memory/2632-2331-0x0000000005470000-0x000000000557A000-memory.dmp

      Filesize

      1.0MB

    • memory/2632-2332-0x00000000051E0000-0x00000000051F2000-memory.dmp

      Filesize

      72KB

    • memory/2632-2333-0x0000000005360000-0x000000000539C000-memory.dmp

      Filesize

      240KB

    • memory/2632-2327-0x0000000005980000-0x0000000005F98000-memory.dmp

      Filesize

      6.1MB

    • memory/2632-2326-0x00000000009A0000-0x00000000009CE000-memory.dmp

      Filesize

      184KB

    • memory/2632-2340-0x0000000005250000-0x0000000005260000-memory.dmp

      Filesize

      64KB

    • memory/2632-2342-0x0000000005250000-0x0000000005260000-memory.dmp

      Filesize

      64KB

    • memory/4288-2338-0x0000000000840000-0x000000000086E000-memory.dmp

      Filesize

      184KB

    • memory/4288-2339-0x00000000051E0000-0x00000000051F0000-memory.dmp

      Filesize

      64KB

    • memory/4288-2341-0x00000000051E0000-0x00000000051F0000-memory.dmp

      Filesize

      64KB