Analysis
-
max time kernel
140s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 20:41
Static task
static1
Behavioral task
behavioral1
Sample
ffe6447195dd3ea64c527e5e9b14c508dd7f0c569043f51028853ac42e1e2805.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ffe6447195dd3ea64c527e5e9b14c508dd7f0c569043f51028853ac42e1e2805.exe
Resource
win10v2004-20230220-en
General
-
Target
ffe6447195dd3ea64c527e5e9b14c508dd7f0c569043f51028853ac42e1e2805.exe
-
Size
1.2MB
-
MD5
72a0783fb5df123613abe131b77b4a90
-
SHA1
9d7faf18b2ae685a96699ec4d69a8da06add0cdc
-
SHA256
ffe6447195dd3ea64c527e5e9b14c508dd7f0c569043f51028853ac42e1e2805
-
SHA512
e1eb7e579a8c5f5588049d861801e05fbaded13fe9bc781054d0c782010e846c4bbf5f894244644a318e01611e90ce76ff2d4ee530b60787a587f5ecfb616015
-
SSDEEP
24576:CylKByM/D5GRUHyunHY3Kurx/HoBmtqUVHpBdSsMG8Gg/AXyuBzV:pg/DDyuHY6IPcmtHddMcgER
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
Processes:
resource yara_rule behavioral2/memory/3384-2333-0x0000000005660000-0x0000000005C78000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
s16598214.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation s16598214.exe -
Executes dropped EXE 6 IoCs
Processes:
z33888258.exez92563820.exez51087290.exes16598214.exe1.exet69575608.exepid process 4260 z33888258.exe 4596 z92563820.exe 3796 z51087290.exe 1516 s16598214.exe 3384 1.exe 3512 t69575608.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
z33888258.exez92563820.exez51087290.exeffe6447195dd3ea64c527e5e9b14c508dd7f0c569043f51028853ac42e1e2805.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z33888258.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z33888258.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z92563820.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z92563820.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z51087290.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z51087290.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ffe6447195dd3ea64c527e5e9b14c508dd7f0c569043f51028853ac42e1e2805.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ffe6447195dd3ea64c527e5e9b14c508dd7f0c569043f51028853ac42e1e2805.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2952 1516 WerFault.exe s16598214.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
s16598214.exedescription pid process Token: SeDebugPrivilege 1516 s16598214.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
ffe6447195dd3ea64c527e5e9b14c508dd7f0c569043f51028853ac42e1e2805.exez33888258.exez92563820.exez51087290.exes16598214.exedescription pid process target process PID 4132 wrote to memory of 4260 4132 ffe6447195dd3ea64c527e5e9b14c508dd7f0c569043f51028853ac42e1e2805.exe z33888258.exe PID 4132 wrote to memory of 4260 4132 ffe6447195dd3ea64c527e5e9b14c508dd7f0c569043f51028853ac42e1e2805.exe z33888258.exe PID 4132 wrote to memory of 4260 4132 ffe6447195dd3ea64c527e5e9b14c508dd7f0c569043f51028853ac42e1e2805.exe z33888258.exe PID 4260 wrote to memory of 4596 4260 z33888258.exe z92563820.exe PID 4260 wrote to memory of 4596 4260 z33888258.exe z92563820.exe PID 4260 wrote to memory of 4596 4260 z33888258.exe z92563820.exe PID 4596 wrote to memory of 3796 4596 z92563820.exe z51087290.exe PID 4596 wrote to memory of 3796 4596 z92563820.exe z51087290.exe PID 4596 wrote to memory of 3796 4596 z92563820.exe z51087290.exe PID 3796 wrote to memory of 1516 3796 z51087290.exe s16598214.exe PID 3796 wrote to memory of 1516 3796 z51087290.exe s16598214.exe PID 3796 wrote to memory of 1516 3796 z51087290.exe s16598214.exe PID 1516 wrote to memory of 3384 1516 s16598214.exe 1.exe PID 1516 wrote to memory of 3384 1516 s16598214.exe 1.exe PID 1516 wrote to memory of 3384 1516 s16598214.exe 1.exe PID 3796 wrote to memory of 3512 3796 z51087290.exe t69575608.exe PID 3796 wrote to memory of 3512 3796 z51087290.exe t69575608.exe PID 3796 wrote to memory of 3512 3796 z51087290.exe t69575608.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffe6447195dd3ea64c527e5e9b14c508dd7f0c569043f51028853ac42e1e2805.exe"C:\Users\Admin\AppData\Local\Temp\ffe6447195dd3ea64c527e5e9b14c508dd7f0c569043f51028853ac42e1e2805.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z33888258.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z33888258.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z92563820.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z92563820.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z51087290.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z51087290.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s16598214.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s16598214.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
PID:3384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1516 -s 13926⤵
- Program crash
PID:2952
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t69575608.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t69575608.exe5⤵
- Executes dropped EXE
PID:3512
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1516 -ip 15161⤵PID:3180
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5937913e7480f0b382cddfebdb88e7959
SHA173b492e81201375b01bd888d4c69105410c62d8b
SHA256653a918f5d46c1a665286ac267c0533bfd44844dc68c96712119c545f0d5e366
SHA512d820b1c1d801e57c5475448f11f56e743af8195d986c3a2077042561cb34a2500f6f78118941243f972fb56e797bd03a6fc22f17f78431f90f6fa7f85012ee51
-
Filesize
1.0MB
MD5937913e7480f0b382cddfebdb88e7959
SHA173b492e81201375b01bd888d4c69105410c62d8b
SHA256653a918f5d46c1a665286ac267c0533bfd44844dc68c96712119c545f0d5e366
SHA512d820b1c1d801e57c5475448f11f56e743af8195d986c3a2077042561cb34a2500f6f78118941243f972fb56e797bd03a6fc22f17f78431f90f6fa7f85012ee51
-
Filesize
759KB
MD5669972a7a9ccc2ee9cf30a6baa0c8f1d
SHA1fc5a9389c475772992d962fab642d1c08f5339d1
SHA2566826aaac61038b339ed07debe2e76a0c4dc59dfc8654cb7b545db5baa0e65531
SHA51288e8a4e442e119f14f7dcdf27d5a167e24c9a3172f4a4cdaa54a54ef71eb6f2e5327371a3a1536c1b27967153a0075ce20a7bd6d022d53900c86f5d03feb5e5b
-
Filesize
759KB
MD5669972a7a9ccc2ee9cf30a6baa0c8f1d
SHA1fc5a9389c475772992d962fab642d1c08f5339d1
SHA2566826aaac61038b339ed07debe2e76a0c4dc59dfc8654cb7b545db5baa0e65531
SHA51288e8a4e442e119f14f7dcdf27d5a167e24c9a3172f4a4cdaa54a54ef71eb6f2e5327371a3a1536c1b27967153a0075ce20a7bd6d022d53900c86f5d03feb5e5b
-
Filesize
577KB
MD5adad2848e7f4294d9b629fb831407b2a
SHA1145b169499a88e5e41680b39edcc90fc01be4ee5
SHA2560e2ff152403fa9c3347b0b97d5edc86ab4128fe7536f84fa7e1b32b44bc549eb
SHA5127a879db8eac9d2d299326295c91d55d42c87a72b93c02a3b1a99621364a78bdd080ed927ef47d4df89641d503da52244c02276d34ca485fb5eebc7e8d9f65022
-
Filesize
577KB
MD5adad2848e7f4294d9b629fb831407b2a
SHA1145b169499a88e5e41680b39edcc90fc01be4ee5
SHA2560e2ff152403fa9c3347b0b97d5edc86ab4128fe7536f84fa7e1b32b44bc549eb
SHA5127a879db8eac9d2d299326295c91d55d42c87a72b93c02a3b1a99621364a78bdd080ed927ef47d4df89641d503da52244c02276d34ca485fb5eebc7e8d9f65022
-
Filesize
574KB
MD527f85d0472d69d98c511fe78f0ec1bb2
SHA164b3f4fc6ab55a7549ca7d9bb23f4482ccb81cfa
SHA2562814ed5b1cb24e92ddde70449138744619fd6294e34c963c361d9f689f279933
SHA512f0d34b6d807c1162c1cdb49e04f68e1401470c97e81b6b232be2ae1281a75b34960e2cee756b623ffef58df26820e651f28d9dfa3e231e052c598e8732ffb43e
-
Filesize
574KB
MD527f85d0472d69d98c511fe78f0ec1bb2
SHA164b3f4fc6ab55a7549ca7d9bb23f4482ccb81cfa
SHA2562814ed5b1cb24e92ddde70449138744619fd6294e34c963c361d9f689f279933
SHA512f0d34b6d807c1162c1cdb49e04f68e1401470c97e81b6b232be2ae1281a75b34960e2cee756b623ffef58df26820e651f28d9dfa3e231e052c598e8732ffb43e
-
Filesize
169KB
MD59452bfe35eec088769d9a4b1cd452032
SHA1ffc4902e7f7118b776f2092456c136b29dcd168d
SHA25698287b76fea98b1d3d6d6e42a58d405f1295be441eb8ab919599ff24c28b4830
SHA5123e43311a05e6cb4a0d7268c869b6060f262350c3d55c3fca1007d26fa170188cff0655fc9bf2942db6f96b7c89d0e43bf193e656f5db088554f0ac6692fa0c1a
-
Filesize
169KB
MD59452bfe35eec088769d9a4b1cd452032
SHA1ffc4902e7f7118b776f2092456c136b29dcd168d
SHA25698287b76fea98b1d3d6d6e42a58d405f1295be441eb8ab919599ff24c28b4830
SHA5123e43311a05e6cb4a0d7268c869b6060f262350c3d55c3fca1007d26fa170188cff0655fc9bf2942db6f96b7c89d0e43bf193e656f5db088554f0ac6692fa0c1a
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf