Analysis
-
max time kernel
226s -
max time network
268s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 22:07
Static task
static1
Behavioral task
behavioral1
Sample
5cee5194d3556d72c372b1789e379f3161887566ba046e2d7c22928bf80a1964.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5cee5194d3556d72c372b1789e379f3161887566ba046e2d7c22928bf80a1964.exe
Resource
win10v2004-20230221-en
General
-
Target
5cee5194d3556d72c372b1789e379f3161887566ba046e2d7c22928bf80a1964.exe
-
Size
1.2MB
-
MD5
d03f2c5d8e63bc44f4aca5b85156ba32
-
SHA1
36a27ef3eba6021e8d06b3867bc765bceebaf97c
-
SHA256
5cee5194d3556d72c372b1789e379f3161887566ba046e2d7c22928bf80a1964
-
SHA512
0c82b43db664109bc4ad18ae28ce6ddd622ffb10b67cdb10e6b97ef8b6764f82ccfc382a7d5ceda6071155cdf7c3d37a04caf01b76b5b0a19214eef7be04561b
-
SSDEEP
24576:ty+KRPBT0L7DGpzH5h8kHw0xDVEM/YSQSZAnDl+yM2oKggRORWd:I+KRxmDGtH56kHlTEN/Dl+yMXK4
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
Processes:
resource yara_rule behavioral2/memory/4460-2335-0x00000000057A0000-0x0000000005DB8000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
s06984792.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation s06984792.exe -
Executes dropped EXE 5 IoCs
Processes:
z44103710.exez70254716.exez26614370.exes06984792.exe1.exepid process 4672 z44103710.exe 840 z70254716.exe 4412 z26614370.exe 4344 s06984792.exe 4460 1.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
5cee5194d3556d72c372b1789e379f3161887566ba046e2d7c22928bf80a1964.exez44103710.exez70254716.exez26614370.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5cee5194d3556d72c372b1789e379f3161887566ba046e2d7c22928bf80a1964.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z44103710.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z44103710.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z70254716.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z70254716.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z26614370.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z26614370.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5cee5194d3556d72c372b1789e379f3161887566ba046e2d7c22928bf80a1964.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3348 4344 WerFault.exe s06984792.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
s06984792.exedescription pid process Token: SeDebugPrivilege 4344 s06984792.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
5cee5194d3556d72c372b1789e379f3161887566ba046e2d7c22928bf80a1964.exez44103710.exez70254716.exez26614370.exes06984792.exedescription pid process target process PID 1812 wrote to memory of 4672 1812 5cee5194d3556d72c372b1789e379f3161887566ba046e2d7c22928bf80a1964.exe z44103710.exe PID 1812 wrote to memory of 4672 1812 5cee5194d3556d72c372b1789e379f3161887566ba046e2d7c22928bf80a1964.exe z44103710.exe PID 1812 wrote to memory of 4672 1812 5cee5194d3556d72c372b1789e379f3161887566ba046e2d7c22928bf80a1964.exe z44103710.exe PID 4672 wrote to memory of 840 4672 z44103710.exe z70254716.exe PID 4672 wrote to memory of 840 4672 z44103710.exe z70254716.exe PID 4672 wrote to memory of 840 4672 z44103710.exe z70254716.exe PID 840 wrote to memory of 4412 840 z70254716.exe z26614370.exe PID 840 wrote to memory of 4412 840 z70254716.exe z26614370.exe PID 840 wrote to memory of 4412 840 z70254716.exe z26614370.exe PID 4412 wrote to memory of 4344 4412 z26614370.exe s06984792.exe PID 4412 wrote to memory of 4344 4412 z26614370.exe s06984792.exe PID 4412 wrote to memory of 4344 4412 z26614370.exe s06984792.exe PID 4344 wrote to memory of 4460 4344 s06984792.exe 1.exe PID 4344 wrote to memory of 4460 4344 s06984792.exe 1.exe PID 4344 wrote to memory of 4460 4344 s06984792.exe 1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5cee5194d3556d72c372b1789e379f3161887566ba046e2d7c22928bf80a1964.exe"C:\Users\Admin\AppData\Local\Temp\5cee5194d3556d72c372b1789e379f3161887566ba046e2d7c22928bf80a1964.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z44103710.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z44103710.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z70254716.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z70254716.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z26614370.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z26614370.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s06984792.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s06984792.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
PID:4460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4344 -s 15606⤵
- Program crash
PID:3348
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4344 -ip 43441⤵PID:2336
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD560628fe3f7e6c5859a7c154035fa8bed
SHA1029df2a9fca7eeff50ff9165002a48576de6c7a5
SHA256e35ecc6e4626814bb90c6d29eb4521cea98cadddc32c8d4fb3eb743561d439c9
SHA512a9d47a258436bb9f1ef1f433fffeafde13454b142c83e6a4c53f961ef208c7ab823fc015de0a9b5301273596ae815168c2f6489d8c627bc6c7e4163f48319884
-
Filesize
1.0MB
MD560628fe3f7e6c5859a7c154035fa8bed
SHA1029df2a9fca7eeff50ff9165002a48576de6c7a5
SHA256e35ecc6e4626814bb90c6d29eb4521cea98cadddc32c8d4fb3eb743561d439c9
SHA512a9d47a258436bb9f1ef1f433fffeafde13454b142c83e6a4c53f961ef208c7ab823fc015de0a9b5301273596ae815168c2f6489d8c627bc6c7e4163f48319884
-
Filesize
760KB
MD5994433386b3993b92a0b54f6fbc6733e
SHA12a451f0666e6c8144ac984f5d5c091fea3f5208a
SHA256db75e20f1835c61325c77bcb76690a06c2ef6d431ca7729a432a986cd3ef695b
SHA5126c5ddf5361bf4056ea646ee2212cd41a3a0ab971957dbec791a8722c1f34324f5957a5210d7a687ec342231413079c8b658ec79cce9c5f346a6089d1f8700701
-
Filesize
760KB
MD5994433386b3993b92a0b54f6fbc6733e
SHA12a451f0666e6c8144ac984f5d5c091fea3f5208a
SHA256db75e20f1835c61325c77bcb76690a06c2ef6d431ca7729a432a986cd3ef695b
SHA5126c5ddf5361bf4056ea646ee2212cd41a3a0ab971957dbec791a8722c1f34324f5957a5210d7a687ec342231413079c8b658ec79cce9c5f346a6089d1f8700701
-
Filesize
578KB
MD5bd0f3ddaeaef2b71aab63f5c985125db
SHA1cd6ac6ac60419da5468f458f720e89d7f8df3313
SHA256624ad2440ec4b486363da4c8183108e72683b0680c884ea19fdd8ea47a31bb3c
SHA512f3a70e1c06cb186adddfee72d138282b9c8079245b8f1f42104ba881aa871a821e6c91ec8af0f13d899d9c2188df9336a11d84728e2fcfcd0f14e6d6e4e5d7b8
-
Filesize
578KB
MD5bd0f3ddaeaef2b71aab63f5c985125db
SHA1cd6ac6ac60419da5468f458f720e89d7f8df3313
SHA256624ad2440ec4b486363da4c8183108e72683b0680c884ea19fdd8ea47a31bb3c
SHA512f3a70e1c06cb186adddfee72d138282b9c8079245b8f1f42104ba881aa871a821e6c91ec8af0f13d899d9c2188df9336a11d84728e2fcfcd0f14e6d6e4e5d7b8
-
Filesize
575KB
MD5aca2b185a03b08f5d6cf687e8d42cc7f
SHA15e46568d98a5c2838b9faff15843af8be94d9cea
SHA2562f20044b1f8b4f4d10c0d09d402164befa709e6b95c1cbbc04b46f34075d6eeb
SHA512dca24b858b8f46fc948f2f73c1fcb681a1953e393fb0f0b4201a1f3cb912bda348064d25b5f8263317f1ce8144539248dc79d8733b1d4e003601e38d598e11f7
-
Filesize
575KB
MD5aca2b185a03b08f5d6cf687e8d42cc7f
SHA15e46568d98a5c2838b9faff15843af8be94d9cea
SHA2562f20044b1f8b4f4d10c0d09d402164befa709e6b95c1cbbc04b46f34075d6eeb
SHA512dca24b858b8f46fc948f2f73c1fcb681a1953e393fb0f0b4201a1f3cb912bda348064d25b5f8263317f1ce8144539248dc79d8733b1d4e003601e38d598e11f7
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf