Analysis

  • max time kernel
    140s
  • max time network
    186s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-05-2023 20:41

General

  • Target

    ffe6447195dd3ea64c527e5e9b14c508dd7f0c569043f51028853ac42e1e2805.exe

  • Size

    1.2MB

  • MD5

    72a0783fb5df123613abe131b77b4a90

  • SHA1

    9d7faf18b2ae685a96699ec4d69a8da06add0cdc

  • SHA256

    ffe6447195dd3ea64c527e5e9b14c508dd7f0c569043f51028853ac42e1e2805

  • SHA512

    e1eb7e579a8c5f5588049d861801e05fbaded13fe9bc781054d0c782010e846c4bbf5f894244644a318e01611e90ce76ff2d4ee530b60787a587f5ecfb616015

  • SSDEEP

    24576:CylKByM/D5GRUHyunHY3Kurx/HoBmtqUVHpBdSsMG8Gg/AXyuBzV:pg/DDyuHY6IPcmtHddMcgER

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

life

C2

185.161.248.73:4164

Attributes
  • auth_value

    8685d11953530b68ad5ec703809d9f91

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ffe6447195dd3ea64c527e5e9b14c508dd7f0c569043f51028853ac42e1e2805.exe
    "C:\Users\Admin\AppData\Local\Temp\ffe6447195dd3ea64c527e5e9b14c508dd7f0c569043f51028853ac42e1e2805.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4132
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z33888258.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z33888258.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4260
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z92563820.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z92563820.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4596
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z51087290.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z51087290.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3796
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s16598214.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s16598214.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1516
            • C:\Windows\Temp\1.exe
              "C:\Windows\Temp\1.exe"
              6⤵
              • Executes dropped EXE
              PID:3384
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1516 -s 1392
              6⤵
              • Program crash
              PID:2952
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t69575608.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t69575608.exe
            5⤵
            • Executes dropped EXE
            PID:3512
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1516 -ip 1516
    1⤵
      PID:3180

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z33888258.exe
      Filesize

      1.0MB

      MD5

      937913e7480f0b382cddfebdb88e7959

      SHA1

      73b492e81201375b01bd888d4c69105410c62d8b

      SHA256

      653a918f5d46c1a665286ac267c0533bfd44844dc68c96712119c545f0d5e366

      SHA512

      d820b1c1d801e57c5475448f11f56e743af8195d986c3a2077042561cb34a2500f6f78118941243f972fb56e797bd03a6fc22f17f78431f90f6fa7f85012ee51

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z33888258.exe
      Filesize

      1.0MB

      MD5

      937913e7480f0b382cddfebdb88e7959

      SHA1

      73b492e81201375b01bd888d4c69105410c62d8b

      SHA256

      653a918f5d46c1a665286ac267c0533bfd44844dc68c96712119c545f0d5e366

      SHA512

      d820b1c1d801e57c5475448f11f56e743af8195d986c3a2077042561cb34a2500f6f78118941243f972fb56e797bd03a6fc22f17f78431f90f6fa7f85012ee51

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z92563820.exe
      Filesize

      759KB

      MD5

      669972a7a9ccc2ee9cf30a6baa0c8f1d

      SHA1

      fc5a9389c475772992d962fab642d1c08f5339d1

      SHA256

      6826aaac61038b339ed07debe2e76a0c4dc59dfc8654cb7b545db5baa0e65531

      SHA512

      88e8a4e442e119f14f7dcdf27d5a167e24c9a3172f4a4cdaa54a54ef71eb6f2e5327371a3a1536c1b27967153a0075ce20a7bd6d022d53900c86f5d03feb5e5b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z92563820.exe
      Filesize

      759KB

      MD5

      669972a7a9ccc2ee9cf30a6baa0c8f1d

      SHA1

      fc5a9389c475772992d962fab642d1c08f5339d1

      SHA256

      6826aaac61038b339ed07debe2e76a0c4dc59dfc8654cb7b545db5baa0e65531

      SHA512

      88e8a4e442e119f14f7dcdf27d5a167e24c9a3172f4a4cdaa54a54ef71eb6f2e5327371a3a1536c1b27967153a0075ce20a7bd6d022d53900c86f5d03feb5e5b

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z51087290.exe
      Filesize

      577KB

      MD5

      adad2848e7f4294d9b629fb831407b2a

      SHA1

      145b169499a88e5e41680b39edcc90fc01be4ee5

      SHA256

      0e2ff152403fa9c3347b0b97d5edc86ab4128fe7536f84fa7e1b32b44bc549eb

      SHA512

      7a879db8eac9d2d299326295c91d55d42c87a72b93c02a3b1a99621364a78bdd080ed927ef47d4df89641d503da52244c02276d34ca485fb5eebc7e8d9f65022

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z51087290.exe
      Filesize

      577KB

      MD5

      adad2848e7f4294d9b629fb831407b2a

      SHA1

      145b169499a88e5e41680b39edcc90fc01be4ee5

      SHA256

      0e2ff152403fa9c3347b0b97d5edc86ab4128fe7536f84fa7e1b32b44bc549eb

      SHA512

      7a879db8eac9d2d299326295c91d55d42c87a72b93c02a3b1a99621364a78bdd080ed927ef47d4df89641d503da52244c02276d34ca485fb5eebc7e8d9f65022

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s16598214.exe
      Filesize

      574KB

      MD5

      27f85d0472d69d98c511fe78f0ec1bb2

      SHA1

      64b3f4fc6ab55a7549ca7d9bb23f4482ccb81cfa

      SHA256

      2814ed5b1cb24e92ddde70449138744619fd6294e34c963c361d9f689f279933

      SHA512

      f0d34b6d807c1162c1cdb49e04f68e1401470c97e81b6b232be2ae1281a75b34960e2cee756b623ffef58df26820e651f28d9dfa3e231e052c598e8732ffb43e

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s16598214.exe
      Filesize

      574KB

      MD5

      27f85d0472d69d98c511fe78f0ec1bb2

      SHA1

      64b3f4fc6ab55a7549ca7d9bb23f4482ccb81cfa

      SHA256

      2814ed5b1cb24e92ddde70449138744619fd6294e34c963c361d9f689f279933

      SHA512

      f0d34b6d807c1162c1cdb49e04f68e1401470c97e81b6b232be2ae1281a75b34960e2cee756b623ffef58df26820e651f28d9dfa3e231e052c598e8732ffb43e

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t69575608.exe
      Filesize

      169KB

      MD5

      9452bfe35eec088769d9a4b1cd452032

      SHA1

      ffc4902e7f7118b776f2092456c136b29dcd168d

      SHA256

      98287b76fea98b1d3d6d6e42a58d405f1295be441eb8ab919599ff24c28b4830

      SHA512

      3e43311a05e6cb4a0d7268c869b6060f262350c3d55c3fca1007d26fa170188cff0655fc9bf2942db6f96b7c89d0e43bf193e656f5db088554f0ac6692fa0c1a

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t69575608.exe
      Filesize

      169KB

      MD5

      9452bfe35eec088769d9a4b1cd452032

      SHA1

      ffc4902e7f7118b776f2092456c136b29dcd168d

      SHA256

      98287b76fea98b1d3d6d6e42a58d405f1295be441eb8ab919599ff24c28b4830

      SHA512

      3e43311a05e6cb4a0d7268c869b6060f262350c3d55c3fca1007d26fa170188cff0655fc9bf2942db6f96b7c89d0e43bf193e656f5db088554f0ac6692fa0c1a

    • C:\Windows\Temp\1.exe
      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • C:\Windows\Temp\1.exe
      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • C:\Windows\Temp\1.exe
      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • memory/1516-187-0x0000000002A40000-0x0000000002AA0000-memory.dmp
      Filesize

      384KB

    • memory/1516-203-0x0000000002A40000-0x0000000002AA0000-memory.dmp
      Filesize

      384KB

    • memory/1516-164-0x00000000051B0000-0x00000000051C0000-memory.dmp
      Filesize

      64KB

    • memory/1516-165-0x00000000051C0000-0x0000000005764000-memory.dmp
      Filesize

      5.6MB

    • memory/1516-166-0x0000000000400000-0x0000000000835000-memory.dmp
      Filesize

      4.2MB

    • memory/1516-167-0x0000000000910000-0x000000000096B000-memory.dmp
      Filesize

      364KB

    • memory/1516-168-0x00000000051B0000-0x00000000051C0000-memory.dmp
      Filesize

      64KB

    • memory/1516-169-0x00000000051B0000-0x00000000051C0000-memory.dmp
      Filesize

      64KB

    • memory/1516-170-0x00000000051B0000-0x00000000051C0000-memory.dmp
      Filesize

      64KB

    • memory/1516-172-0x0000000002A40000-0x0000000002AA0000-memory.dmp
      Filesize

      384KB

    • memory/1516-173-0x0000000002A40000-0x0000000002AA0000-memory.dmp
      Filesize

      384KB

    • memory/1516-175-0x0000000002A40000-0x0000000002AA0000-memory.dmp
      Filesize

      384KB

    • memory/1516-177-0x0000000002A40000-0x0000000002AA0000-memory.dmp
      Filesize

      384KB

    • memory/1516-179-0x0000000002A40000-0x0000000002AA0000-memory.dmp
      Filesize

      384KB

    • memory/1516-181-0x0000000002A40000-0x0000000002AA0000-memory.dmp
      Filesize

      384KB

    • memory/1516-183-0x0000000002A40000-0x0000000002AA0000-memory.dmp
      Filesize

      384KB

    • memory/1516-185-0x0000000002A40000-0x0000000002AA0000-memory.dmp
      Filesize

      384KB

    • memory/1516-162-0x0000000000910000-0x000000000096B000-memory.dmp
      Filesize

      364KB

    • memory/1516-189-0x0000000002A40000-0x0000000002AA0000-memory.dmp
      Filesize

      384KB

    • memory/1516-191-0x0000000002A40000-0x0000000002AA0000-memory.dmp
      Filesize

      384KB

    • memory/1516-193-0x0000000002A40000-0x0000000002AA0000-memory.dmp
      Filesize

      384KB

    • memory/1516-195-0x0000000002A40000-0x0000000002AA0000-memory.dmp
      Filesize

      384KB

    • memory/1516-197-0x0000000002A40000-0x0000000002AA0000-memory.dmp
      Filesize

      384KB

    • memory/1516-199-0x0000000002A40000-0x0000000002AA0000-memory.dmp
      Filesize

      384KB

    • memory/1516-201-0x0000000002A40000-0x0000000002AA0000-memory.dmp
      Filesize

      384KB

    • memory/1516-163-0x00000000051B0000-0x00000000051C0000-memory.dmp
      Filesize

      64KB

    • memory/1516-207-0x0000000002A40000-0x0000000002AA0000-memory.dmp
      Filesize

      384KB

    • memory/1516-209-0x0000000002A40000-0x0000000002AA0000-memory.dmp
      Filesize

      384KB

    • memory/1516-205-0x0000000002A40000-0x0000000002AA0000-memory.dmp
      Filesize

      384KB

    • memory/1516-211-0x0000000002A40000-0x0000000002AA0000-memory.dmp
      Filesize

      384KB

    • memory/1516-213-0x0000000002A40000-0x0000000002AA0000-memory.dmp
      Filesize

      384KB

    • memory/1516-215-0x0000000002A40000-0x0000000002AA0000-memory.dmp
      Filesize

      384KB

    • memory/1516-217-0x0000000002A40000-0x0000000002AA0000-memory.dmp
      Filesize

      384KB

    • memory/1516-219-0x0000000002A40000-0x0000000002AA0000-memory.dmp
      Filesize

      384KB

    • memory/1516-221-0x0000000002A40000-0x0000000002AA0000-memory.dmp
      Filesize

      384KB

    • memory/1516-223-0x0000000002A40000-0x0000000002AA0000-memory.dmp
      Filesize

      384KB

    • memory/1516-226-0x0000000002A40000-0x0000000002AA0000-memory.dmp
      Filesize

      384KB

    • memory/1516-228-0x0000000002A40000-0x0000000002AA0000-memory.dmp
      Filesize

      384KB

    • memory/1516-230-0x0000000002A40000-0x0000000002AA0000-memory.dmp
      Filesize

      384KB

    • memory/1516-232-0x0000000002A40000-0x0000000002AA0000-memory.dmp
      Filesize

      384KB

    • memory/3384-2332-0x0000000000660000-0x000000000068E000-memory.dmp
      Filesize

      184KB

    • memory/3384-2333-0x0000000005660000-0x0000000005C78000-memory.dmp
      Filesize

      6.1MB

    • memory/3384-2334-0x0000000005150000-0x000000000525A000-memory.dmp
      Filesize

      1.0MB

    • memory/3384-2336-0x0000000005030000-0x0000000005040000-memory.dmp
      Filesize

      64KB

    • memory/3384-2335-0x0000000004FB0000-0x0000000004FC2000-memory.dmp
      Filesize

      72KB

    • memory/3384-2337-0x0000000005040000-0x000000000507C000-memory.dmp
      Filesize

      240KB

    • memory/3384-2344-0x0000000005030000-0x0000000005040000-memory.dmp
      Filesize

      64KB

    • memory/3512-2342-0x0000000000D60000-0x0000000000D8E000-memory.dmp
      Filesize

      184KB

    • memory/3512-2343-0x00000000056C0000-0x00000000056D0000-memory.dmp
      Filesize

      64KB

    • memory/3512-2345-0x00000000056C0000-0x00000000056D0000-memory.dmp
      Filesize

      64KB