Analysis

  • max time kernel
    137s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2023, 21:38

General

  • Target

    451c683ce2ce3315f993e8d0c8fcd5579db68bb8f538e8ad00b0eccd12174d26.exe

  • Size

    782KB

  • MD5

    f10ea507b10dc7686f501e212ddf2f78

  • SHA1

    9a57a6f69204b244087ca67536ceee273df8fc8d

  • SHA256

    451c683ce2ce3315f993e8d0c8fcd5579db68bb8f538e8ad00b0eccd12174d26

  • SHA512

    8bdae5ba3be5823c746c4625b53e2584d89db03f798fea3b5701dc276ca268eb4d5ee8aaf270a6f8e19336f5ae352c954a10cd3e9ae232fb2e320b52714c0790

  • SSDEEP

    24576:cy8eUMoKPmdLaQp/pURLDSgoj4b2zop+4:L8Kmc4USX4beop

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dark

C2

185.161.248.73:4164

Attributes
  • auth_value

    ae85b01f66afe8770afeed560513fc2d

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\451c683ce2ce3315f993e8d0c8fcd5579db68bb8f538e8ad00b0eccd12174d26.exe
    "C:\Users\Admin\AppData\Local\Temp\451c683ce2ce3315f993e8d0c8fcd5579db68bb8f538e8ad00b0eccd12174d26.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1124
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x01119437.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x01119437.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1780
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m78605968.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m78605968.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2088
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          PID:4376
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2088 -s 1156
          4⤵
          • Program crash
          PID:392
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n35775686.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n35775686.exe
        3⤵
        • Executes dropped EXE
        PID:316
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2088 -ip 2088
    1⤵
      PID:4612

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x01119437.exe

      Filesize

      577KB

      MD5

      d9e5f6fd3a7f6ecc51e59fc4d60bf8c8

      SHA1

      f7e7b07175f200709f665831854dd436cb1be9fe

      SHA256

      8b3aef5f89638476978bbb823371c3cc9cedfef7ab548a3f6d8d33b648f94075

      SHA512

      f4e4dee51fa3c6d737debc547dcce29363ac58ecedeb6107f580975cf9b10f6086e35218a2640c983998e8d74d782abcf8a8bbc775679b1ead58f7a0090ebff2

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x01119437.exe

      Filesize

      577KB

      MD5

      d9e5f6fd3a7f6ecc51e59fc4d60bf8c8

      SHA1

      f7e7b07175f200709f665831854dd436cb1be9fe

      SHA256

      8b3aef5f89638476978bbb823371c3cc9cedfef7ab548a3f6d8d33b648f94075

      SHA512

      f4e4dee51fa3c6d737debc547dcce29363ac58ecedeb6107f580975cf9b10f6086e35218a2640c983998e8d74d782abcf8a8bbc775679b1ead58f7a0090ebff2

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m78605968.exe

      Filesize

      502KB

      MD5

      bab6b2cfc8c2c59562c467bc3904aaa0

      SHA1

      f602d82b7a06e089e8ff479e9fa2334d543d3c2d

      SHA256

      51dcaa23f03e69b90854282f12db8e76424395d4866933fad073b680d91d77bc

      SHA512

      9fe6acd0b31f4b524b9110fcfd6e8842904f5fee1952cde50e6944774182cbf84eeba598358c27b48975655b29f0c91b64ce206403d7ae5b7c26949d68f695a0

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m78605968.exe

      Filesize

      502KB

      MD5

      bab6b2cfc8c2c59562c467bc3904aaa0

      SHA1

      f602d82b7a06e089e8ff479e9fa2334d543d3c2d

      SHA256

      51dcaa23f03e69b90854282f12db8e76424395d4866933fad073b680d91d77bc

      SHA512

      9fe6acd0b31f4b524b9110fcfd6e8842904f5fee1952cde50e6944774182cbf84eeba598358c27b48975655b29f0c91b64ce206403d7ae5b7c26949d68f695a0

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n35775686.exe

      Filesize

      172KB

      MD5

      da03d08086b58dc759605fbc5d6574d5

      SHA1

      f7e297ca5dd4c004aed9f6907cab7d52a10750a3

      SHA256

      59f9d6d715abb59dbe1c172fac530f07316e4602992d959ad3c430c9c4700e48

      SHA512

      1269c32c2af37461efc7886777300e59b61355b0483a6e82b3288503c91f395bdc3ee8588e4031c09f9f8b084a21b6d1c1ba7e6ed891a7e3f03c3a2322b2af7f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n35775686.exe

      Filesize

      172KB

      MD5

      da03d08086b58dc759605fbc5d6574d5

      SHA1

      f7e297ca5dd4c004aed9f6907cab7d52a10750a3

      SHA256

      59f9d6d715abb59dbe1c172fac530f07316e4602992d959ad3c430c9c4700e48

      SHA512

      1269c32c2af37461efc7886777300e59b61355b0483a6e82b3288503c91f395bdc3ee8588e4031c09f9f8b084a21b6d1c1ba7e6ed891a7e3f03c3a2322b2af7f

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • memory/316-2331-0x0000000002C40000-0x0000000002C50000-memory.dmp

      Filesize

      64KB

    • memory/316-2329-0x0000000002C40000-0x0000000002C50000-memory.dmp

      Filesize

      64KB

    • memory/316-2328-0x0000000000880000-0x00000000008B0000-memory.dmp

      Filesize

      192KB

    • memory/2088-194-0x0000000002A10000-0x0000000002A70000-memory.dmp

      Filesize

      384KB

    • memory/2088-208-0x0000000002A10000-0x0000000002A70000-memory.dmp

      Filesize

      384KB

    • memory/2088-162-0x0000000002A10000-0x0000000002A70000-memory.dmp

      Filesize

      384KB

    • memory/2088-164-0x0000000002A10000-0x0000000002A70000-memory.dmp

      Filesize

      384KB

    • memory/2088-166-0x0000000002A10000-0x0000000002A70000-memory.dmp

      Filesize

      384KB

    • memory/2088-168-0x0000000002A10000-0x0000000002A70000-memory.dmp

      Filesize

      384KB

    • memory/2088-170-0x0000000002A10000-0x0000000002A70000-memory.dmp

      Filesize

      384KB

    • memory/2088-174-0x0000000002A10000-0x0000000002A70000-memory.dmp

      Filesize

      384KB

    • memory/2088-172-0x0000000002A10000-0x0000000002A70000-memory.dmp

      Filesize

      384KB

    • memory/2088-176-0x0000000002A10000-0x0000000002A70000-memory.dmp

      Filesize

      384KB

    • memory/2088-178-0x0000000002A10000-0x0000000002A70000-memory.dmp

      Filesize

      384KB

    • memory/2088-180-0x0000000002A10000-0x0000000002A70000-memory.dmp

      Filesize

      384KB

    • memory/2088-182-0x0000000002A10000-0x0000000002A70000-memory.dmp

      Filesize

      384KB

    • memory/2088-184-0x0000000002A10000-0x0000000002A70000-memory.dmp

      Filesize

      384KB

    • memory/2088-186-0x0000000002A10000-0x0000000002A70000-memory.dmp

      Filesize

      384KB

    • memory/2088-188-0x0000000002A10000-0x0000000002A70000-memory.dmp

      Filesize

      384KB

    • memory/2088-190-0x0000000002A10000-0x0000000002A70000-memory.dmp

      Filesize

      384KB

    • memory/2088-192-0x0000000002A10000-0x0000000002A70000-memory.dmp

      Filesize

      384KB

    • memory/2088-158-0x0000000002A10000-0x0000000002A70000-memory.dmp

      Filesize

      384KB

    • memory/2088-198-0x0000000002A10000-0x0000000002A70000-memory.dmp

      Filesize

      384KB

    • memory/2088-196-0x0000000002A10000-0x0000000002A70000-memory.dmp

      Filesize

      384KB

    • memory/2088-202-0x0000000002A10000-0x0000000002A70000-memory.dmp

      Filesize

      384KB

    • memory/2088-200-0x0000000002A10000-0x0000000002A70000-memory.dmp

      Filesize

      384KB

    • memory/2088-204-0x0000000002A10000-0x0000000002A70000-memory.dmp

      Filesize

      384KB

    • memory/2088-206-0x0000000002A10000-0x0000000002A70000-memory.dmp

      Filesize

      384KB

    • memory/2088-160-0x0000000002A10000-0x0000000002A70000-memory.dmp

      Filesize

      384KB

    • memory/2088-210-0x0000000002A10000-0x0000000002A70000-memory.dmp

      Filesize

      384KB

    • memory/2088-212-0x0000000002A10000-0x0000000002A70000-memory.dmp

      Filesize

      384KB

    • memory/2088-214-0x0000000002A10000-0x0000000002A70000-memory.dmp

      Filesize

      384KB

    • memory/2088-216-0x0000000002A10000-0x0000000002A70000-memory.dmp

      Filesize

      384KB

    • memory/2088-2301-0x00000000050C0000-0x00000000050D0000-memory.dmp

      Filesize

      64KB

    • memory/2088-2302-0x00000000050C0000-0x00000000050D0000-memory.dmp

      Filesize

      64KB

    • memory/2088-2303-0x00000000050C0000-0x00000000050D0000-memory.dmp

      Filesize

      64KB

    • memory/2088-2304-0x00000000050C0000-0x00000000050D0000-memory.dmp

      Filesize

      64KB

    • memory/2088-156-0x0000000002A10000-0x0000000002A70000-memory.dmp

      Filesize

      384KB

    • memory/2088-2313-0x00000000050C0000-0x00000000050D0000-memory.dmp

      Filesize

      64KB

    • memory/2088-154-0x0000000002A10000-0x0000000002A70000-memory.dmp

      Filesize

      384KB

    • memory/2088-153-0x0000000002A10000-0x0000000002A70000-memory.dmp

      Filesize

      384KB

    • memory/2088-148-0x0000000000940000-0x000000000099B000-memory.dmp

      Filesize

      364KB

    • memory/2088-149-0x00000000050D0000-0x0000000005674000-memory.dmp

      Filesize

      5.6MB

    • memory/2088-150-0x00000000050C0000-0x00000000050D0000-memory.dmp

      Filesize

      64KB

    • memory/2088-151-0x00000000050C0000-0x00000000050D0000-memory.dmp

      Filesize

      64KB

    • memory/2088-152-0x00000000050C0000-0x00000000050D0000-memory.dmp

      Filesize

      64KB

    • memory/4376-2323-0x0000000005960000-0x000000000599C000-memory.dmp

      Filesize

      240KB

    • memory/4376-2322-0x00000000057B0000-0x00000000057C0000-memory.dmp

      Filesize

      64KB

    • memory/4376-2321-0x0000000005900000-0x0000000005912000-memory.dmp

      Filesize

      72KB

    • memory/4376-2320-0x00000000059D0000-0x0000000005ADA000-memory.dmp

      Filesize

      1.0MB

    • memory/4376-2319-0x0000000005EE0000-0x00000000064F8000-memory.dmp

      Filesize

      6.1MB

    • memory/4376-2330-0x00000000057B0000-0x00000000057C0000-memory.dmp

      Filesize

      64KB

    • memory/4376-2318-0x0000000000FC0000-0x0000000000FEE000-memory.dmp

      Filesize

      184KB