Analysis
-
max time kernel
143s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 19:40
Static task
static1
Behavioral task
behavioral1
Sample
cda74336fe79fc1db75e35b5c83ab3c8acabd2b4a28e928a2dd5036df1bf7844.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
cda74336fe79fc1db75e35b5c83ab3c8acabd2b4a28e928a2dd5036df1bf7844.exe
Resource
win10v2004-20230220-en
General
-
Target
cda74336fe79fc1db75e35b5c83ab3c8acabd2b4a28e928a2dd5036df1bf7844.exe
-
Size
1.2MB
-
MD5
6cc0908fd535e311572d7172265e0291
-
SHA1
7712b63a4256463537f0b05544598d16334314e8
-
SHA256
cda74336fe79fc1db75e35b5c83ab3c8acabd2b4a28e928a2dd5036df1bf7844
-
SHA512
b6f18d04dffade6a3ab94a9a9b8e4d3bfd2f1fd3207aff919f87b27e1d9fabb2907b1ff019bbc60e0e5e4838a4101326290b14e2dce50008f116b263887ab346
-
SSDEEP
24576:fyyrv2tjWvWYhDfwHRUO54Mt57wlkElwH9BG0cKTB/DbG:qyj2t71HRUDc48k0cKTV
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
Processes:
resource yara_rule behavioral2/memory/2632-2327-0x0000000005980000-0x0000000005F98000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
s45939652.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation s45939652.exe -
Executes dropped EXE 6 IoCs
Processes:
z13136293.exez57672486.exez21926325.exes45939652.exe1.exet86149819.exepid process 4788 z13136293.exe 1632 z57672486.exe 3620 z21926325.exe 792 s45939652.exe 2632 1.exe 4288 t86149819.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
z21926325.execda74336fe79fc1db75e35b5c83ab3c8acabd2b4a28e928a2dd5036df1bf7844.exez13136293.exez57672486.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z21926325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z21926325.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cda74336fe79fc1db75e35b5c83ab3c8acabd2b4a28e928a2dd5036df1bf7844.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cda74336fe79fc1db75e35b5c83ab3c8acabd2b4a28e928a2dd5036df1bf7844.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z13136293.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z13136293.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z57672486.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z57672486.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4716 792 WerFault.exe s45939652.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
s45939652.exedescription pid process Token: SeDebugPrivilege 792 s45939652.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
cda74336fe79fc1db75e35b5c83ab3c8acabd2b4a28e928a2dd5036df1bf7844.exez13136293.exez57672486.exez21926325.exes45939652.exedescription pid process target process PID 1512 wrote to memory of 4788 1512 cda74336fe79fc1db75e35b5c83ab3c8acabd2b4a28e928a2dd5036df1bf7844.exe z13136293.exe PID 1512 wrote to memory of 4788 1512 cda74336fe79fc1db75e35b5c83ab3c8acabd2b4a28e928a2dd5036df1bf7844.exe z13136293.exe PID 1512 wrote to memory of 4788 1512 cda74336fe79fc1db75e35b5c83ab3c8acabd2b4a28e928a2dd5036df1bf7844.exe z13136293.exe PID 4788 wrote to memory of 1632 4788 z13136293.exe z57672486.exe PID 4788 wrote to memory of 1632 4788 z13136293.exe z57672486.exe PID 4788 wrote to memory of 1632 4788 z13136293.exe z57672486.exe PID 1632 wrote to memory of 3620 1632 z57672486.exe z21926325.exe PID 1632 wrote to memory of 3620 1632 z57672486.exe z21926325.exe PID 1632 wrote to memory of 3620 1632 z57672486.exe z21926325.exe PID 3620 wrote to memory of 792 3620 z21926325.exe s45939652.exe PID 3620 wrote to memory of 792 3620 z21926325.exe s45939652.exe PID 3620 wrote to memory of 792 3620 z21926325.exe s45939652.exe PID 792 wrote to memory of 2632 792 s45939652.exe 1.exe PID 792 wrote to memory of 2632 792 s45939652.exe 1.exe PID 792 wrote to memory of 2632 792 s45939652.exe 1.exe PID 3620 wrote to memory of 4288 3620 z21926325.exe t86149819.exe PID 3620 wrote to memory of 4288 3620 z21926325.exe t86149819.exe PID 3620 wrote to memory of 4288 3620 z21926325.exe t86149819.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cda74336fe79fc1db75e35b5c83ab3c8acabd2b4a28e928a2dd5036df1bf7844.exe"C:\Users\Admin\AppData\Local\Temp\cda74336fe79fc1db75e35b5c83ab3c8acabd2b4a28e928a2dd5036df1bf7844.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z13136293.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z13136293.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z57672486.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z57672486.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z21926325.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z21926325.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s45939652.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s45939652.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
PID:2632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 792 -s 13846⤵
- Program crash
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t86149819.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t86149819.exe5⤵
- Executes dropped EXE
PID:4288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 792 -ip 7921⤵PID:2220
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5b4750afc810918881f1bb396abd726e6
SHA1fb8fefd6446a17a8d4542f4739263a50ad5207f2
SHA256a406e2784e46f2ecaac0bf14840ddc2ee53ca9853992220771f4fdcb0ae298e6
SHA512b8a43268881bd58d24941f296c2ab1ffb1dbf85aa8d7f3c5277493c48947278f39d3025be0d790784d22b7e2609ab9141e1da40cb5d2ca6a86dea44759af0c04
-
Filesize
1.0MB
MD5b4750afc810918881f1bb396abd726e6
SHA1fb8fefd6446a17a8d4542f4739263a50ad5207f2
SHA256a406e2784e46f2ecaac0bf14840ddc2ee53ca9853992220771f4fdcb0ae298e6
SHA512b8a43268881bd58d24941f296c2ab1ffb1dbf85aa8d7f3c5277493c48947278f39d3025be0d790784d22b7e2609ab9141e1da40cb5d2ca6a86dea44759af0c04
-
Filesize
761KB
MD542f7c620ac6df6fd8342be2ad96cf721
SHA14cb3db40157d6dc338160bbf6e013b47ffd2fd28
SHA256f73891a67c62498422a26dc287a81017a81ff01d37bc7d2cdf6a93f1af0ead69
SHA512109163b68cf6fe6f3ffebf089f1e5aa12f1b040381636d19c93516b8cf59fc51a173e67abecc17edd625172ecc76ef1edc8859b9b8dc687c7812e6b76ca231a7
-
Filesize
761KB
MD542f7c620ac6df6fd8342be2ad96cf721
SHA14cb3db40157d6dc338160bbf6e013b47ffd2fd28
SHA256f73891a67c62498422a26dc287a81017a81ff01d37bc7d2cdf6a93f1af0ead69
SHA512109163b68cf6fe6f3ffebf089f1e5aa12f1b040381636d19c93516b8cf59fc51a173e67abecc17edd625172ecc76ef1edc8859b9b8dc687c7812e6b76ca231a7
-
Filesize
578KB
MD5013cd55177ccf6eb2b3ff0c4a9e48ba7
SHA18e30062c38d72fb08e98fbf13ed2d96ca8290c8a
SHA256d85adc9f261733152444f9d20bd7e7a40c4250482f99031319c0d1f9bc7f07cd
SHA51274cb68c64728e1800a13fcc16ce92c36743554e34aca09177257829dfc9e347830af0769e5396a967153e02124892c56e9d9315bec0d58f41b85a2b58412af37
-
Filesize
578KB
MD5013cd55177ccf6eb2b3ff0c4a9e48ba7
SHA18e30062c38d72fb08e98fbf13ed2d96ca8290c8a
SHA256d85adc9f261733152444f9d20bd7e7a40c4250482f99031319c0d1f9bc7f07cd
SHA51274cb68c64728e1800a13fcc16ce92c36743554e34aca09177257829dfc9e347830af0769e5396a967153e02124892c56e9d9315bec0d58f41b85a2b58412af37
-
Filesize
580KB
MD58dd08ffc0a9eaa855f5fb6910a743146
SHA15dadcebfd64366723dd9cb6da2c2226fd901ce3a
SHA256b2bfe8d9cc09773d9bf54d0ea6740baa62010cec74c09d904e1dc015e95b20c1
SHA512d298208baf73e53f572301fffe41e1ea286128d9b034dbb727fa66f91f0bbee7b3a0526b419ddd7c21285c5ada426d385e38c62688e2f0efaad551a5c0b279f3
-
Filesize
580KB
MD58dd08ffc0a9eaa855f5fb6910a743146
SHA15dadcebfd64366723dd9cb6da2c2226fd901ce3a
SHA256b2bfe8d9cc09773d9bf54d0ea6740baa62010cec74c09d904e1dc015e95b20c1
SHA512d298208baf73e53f572301fffe41e1ea286128d9b034dbb727fa66f91f0bbee7b3a0526b419ddd7c21285c5ada426d385e38c62688e2f0efaad551a5c0b279f3
-
Filesize
169KB
MD55a09dd45a8c794aa80f4fc3e061b3e58
SHA111e21a64276cc2446d56d35c20b4390d31ac2090
SHA2568d5ada2dda508201b585aad8a02fc8205144752e6d740ee7ef54b421298902eb
SHA5121c8ac5d3d358e53747f0d4430326fe6769601ce257ef34968ef915f596990e7b1237982407fd9c54816504726f7b3323762e6f9c033083514ee32290ec6e913a
-
Filesize
169KB
MD55a09dd45a8c794aa80f4fc3e061b3e58
SHA111e21a64276cc2446d56d35c20b4390d31ac2090
SHA2568d5ada2dda508201b585aad8a02fc8205144752e6d740ee7ef54b421298902eb
SHA5121c8ac5d3d358e53747f0d4430326fe6769601ce257ef34968ef915f596990e7b1237982407fd9c54816504726f7b3323762e6f9c033083514ee32290ec6e913a
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf