Analysis
-
max time kernel
158s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 21:41
Static task
static1
Behavioral task
behavioral1
Sample
4788999499bfe86f75687042a52e4e8e4868f29ab8ae41ce0bd69400fc72a8ae.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4788999499bfe86f75687042a52e4e8e4868f29ab8ae41ce0bd69400fc72a8ae.exe
Resource
win10v2004-20230220-en
General
-
Target
4788999499bfe86f75687042a52e4e8e4868f29ab8ae41ce0bd69400fc72a8ae.exe
-
Size
1.2MB
-
MD5
5848962212fa8ddc4755202eb09c924c
-
SHA1
8c62faa6e8f60c1008bcc2f61e311d9a0f8006ce
-
SHA256
4788999499bfe86f75687042a52e4e8e4868f29ab8ae41ce0bd69400fc72a8ae
-
SHA512
f740adb9f7b5a3efde3b7e84925075cb8f6a23136f9606f3eef238337d9a9178b5606cc71d29d7d210eacd82c16b98b6cc2bb35884a400093ad373ac4e9712f3
-
SSDEEP
24576:PyTscEtDYd+WXPKMER/EG9NrxikD8XOQoJLYc6:aTsc2D++WXS/csNV3xP
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
Processes:
resource yara_rule behavioral2/memory/704-2333-0x000000000A870000-0x000000000AE88000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
s25517452.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation s25517452.exe -
Executes dropped EXE 6 IoCs
Processes:
z68993580.exez16352746.exez62512412.exes25517452.exe1.exet20798553.exepid process 2800 z68993580.exe 3748 z16352746.exe 4984 z62512412.exe 4584 s25517452.exe 704 1.exe 4272 t20798553.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
z16352746.exez62512412.exe4788999499bfe86f75687042a52e4e8e4868f29ab8ae41ce0bd69400fc72a8ae.exez68993580.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z16352746.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z62512412.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z62512412.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4788999499bfe86f75687042a52e4e8e4868f29ab8ae41ce0bd69400fc72a8ae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4788999499bfe86f75687042a52e4e8e4868f29ab8ae41ce0bd69400fc72a8ae.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z68993580.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z68993580.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z16352746.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3616 4584 WerFault.exe s25517452.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
s25517452.exedescription pid process Token: SeDebugPrivilege 4584 s25517452.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
4788999499bfe86f75687042a52e4e8e4868f29ab8ae41ce0bd69400fc72a8ae.exez68993580.exez16352746.exez62512412.exes25517452.exedescription pid process target process PID 3848 wrote to memory of 2800 3848 4788999499bfe86f75687042a52e4e8e4868f29ab8ae41ce0bd69400fc72a8ae.exe z68993580.exe PID 3848 wrote to memory of 2800 3848 4788999499bfe86f75687042a52e4e8e4868f29ab8ae41ce0bd69400fc72a8ae.exe z68993580.exe PID 3848 wrote to memory of 2800 3848 4788999499bfe86f75687042a52e4e8e4868f29ab8ae41ce0bd69400fc72a8ae.exe z68993580.exe PID 2800 wrote to memory of 3748 2800 z68993580.exe z16352746.exe PID 2800 wrote to memory of 3748 2800 z68993580.exe z16352746.exe PID 2800 wrote to memory of 3748 2800 z68993580.exe z16352746.exe PID 3748 wrote to memory of 4984 3748 z16352746.exe z62512412.exe PID 3748 wrote to memory of 4984 3748 z16352746.exe z62512412.exe PID 3748 wrote to memory of 4984 3748 z16352746.exe z62512412.exe PID 4984 wrote to memory of 4584 4984 z62512412.exe s25517452.exe PID 4984 wrote to memory of 4584 4984 z62512412.exe s25517452.exe PID 4984 wrote to memory of 4584 4984 z62512412.exe s25517452.exe PID 4584 wrote to memory of 704 4584 s25517452.exe 1.exe PID 4584 wrote to memory of 704 4584 s25517452.exe 1.exe PID 4584 wrote to memory of 704 4584 s25517452.exe 1.exe PID 4984 wrote to memory of 4272 4984 z62512412.exe t20798553.exe PID 4984 wrote to memory of 4272 4984 z62512412.exe t20798553.exe PID 4984 wrote to memory of 4272 4984 z62512412.exe t20798553.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4788999499bfe86f75687042a52e4e8e4868f29ab8ae41ce0bd69400fc72a8ae.exe"C:\Users\Admin\AppData\Local\Temp\4788999499bfe86f75687042a52e4e8e4868f29ab8ae41ce0bd69400fc72a8ae.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z68993580.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z68993580.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z16352746.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z16352746.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z62512412.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z62512412.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s25517452.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s25517452.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4584 -s 11886⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t20798553.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t20798553.exe5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4584 -ip 45841⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z68993580.exeFilesize
1.0MB
MD5e5dad40c2e0898a493b797c94dffc3ee
SHA1ff8fee5be83aaaf42d29fa565bc6449b6c043b7a
SHA25666413fcdf072f2ceb1a8b918b12efba4e9e42aeb4a7088930fa057ae1efd5d89
SHA5124917865df810eb37bbab64e7d194b76cbdc4493d846a94d88c14f94423240580cdda9ce450d849be57478cd33570d86103b6b174fa25ad653efbe3f8be0ccb69
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z68993580.exeFilesize
1.0MB
MD5e5dad40c2e0898a493b797c94dffc3ee
SHA1ff8fee5be83aaaf42d29fa565bc6449b6c043b7a
SHA25666413fcdf072f2ceb1a8b918b12efba4e9e42aeb4a7088930fa057ae1efd5d89
SHA5124917865df810eb37bbab64e7d194b76cbdc4493d846a94d88c14f94423240580cdda9ce450d849be57478cd33570d86103b6b174fa25ad653efbe3f8be0ccb69
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z16352746.exeFilesize
760KB
MD59229cc22175d7fc08a30092a073a1551
SHA116320b53fd443fa8f78cf1f66f459e9e9be47d65
SHA256238dad02cf095d6b582f9aa65210f99ff3eceb2e805ea989a13aef2d53289ee8
SHA512ff169e83ed4c8e8fd7c70bf1b039dd17e4d7b20b6316e430d0fc4316281861de548b231c89ddb099dee734d1d6b2bd810f318c9036c9575b149d668a4c694601
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z16352746.exeFilesize
760KB
MD59229cc22175d7fc08a30092a073a1551
SHA116320b53fd443fa8f78cf1f66f459e9e9be47d65
SHA256238dad02cf095d6b582f9aa65210f99ff3eceb2e805ea989a13aef2d53289ee8
SHA512ff169e83ed4c8e8fd7c70bf1b039dd17e4d7b20b6316e430d0fc4316281861de548b231c89ddb099dee734d1d6b2bd810f318c9036c9575b149d668a4c694601
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z62512412.exeFilesize
577KB
MD5c38ecbb73da15c430da1bc8a23a8f787
SHA17d8e6c52008e41d656c426e62d487870c9487931
SHA25676daea87304b5df617086f47c92a6d7998a36e538f1b8ffc5d3799bd14e59299
SHA512bf20472271a26777bd7d1a367005ed15a329f05aca5dcb17d77bc3f629b73a94c4b117411026781311be7bb7f90c00b6a8bf968c87d03d6b62ef2799436d1dab
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z62512412.exeFilesize
577KB
MD5c38ecbb73da15c430da1bc8a23a8f787
SHA17d8e6c52008e41d656c426e62d487870c9487931
SHA25676daea87304b5df617086f47c92a6d7998a36e538f1b8ffc5d3799bd14e59299
SHA512bf20472271a26777bd7d1a367005ed15a329f05aca5dcb17d77bc3f629b73a94c4b117411026781311be7bb7f90c00b6a8bf968c87d03d6b62ef2799436d1dab
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s25517452.exeFilesize
574KB
MD5971ec8ec03059e72dbb86479a6bdcee3
SHA1d9ab49be7ed74cd77754056598b79677a1971a2a
SHA256ff353c3d4258db8ad89b04efd19a9de542ed26083d232d3e78332f349c5fba9a
SHA5121fd8e6f55df067bee328110d2e6fe6597b19785b679ff9cba51aad9438c2ebed29ac199ddc191e27db49bc914c511bb47c22607a857395872c3d7cf30cb9535f
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s25517452.exeFilesize
574KB
MD5971ec8ec03059e72dbb86479a6bdcee3
SHA1d9ab49be7ed74cd77754056598b79677a1971a2a
SHA256ff353c3d4258db8ad89b04efd19a9de542ed26083d232d3e78332f349c5fba9a
SHA5121fd8e6f55df067bee328110d2e6fe6597b19785b679ff9cba51aad9438c2ebed29ac199ddc191e27db49bc914c511bb47c22607a857395872c3d7cf30cb9535f
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t20798553.exeFilesize
169KB
MD5f537c7d8c25aecaa126cc9306e611303
SHA14641ff71f193412f7528b749f5013c7eaf534751
SHA2561ac0f7c3d02c7b20b2e132c7bfc9d5fb052774b416949f758c9a59a58e3f9a55
SHA5128a28a598220823f604c58c0a1775a3b9c67b9f2d4f6e1951ff6932f91bb2ff5b3c7078d36caa911447601244f04c7971818217cb5bcc0a8b0a7e235e3ab38f71
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t20798553.exeFilesize
169KB
MD5f537c7d8c25aecaa126cc9306e611303
SHA14641ff71f193412f7528b749f5013c7eaf534751
SHA2561ac0f7c3d02c7b20b2e132c7bfc9d5fb052774b416949f758c9a59a58e3f9a55
SHA5128a28a598220823f604c58c0a1775a3b9c67b9f2d4f6e1951ff6932f91bb2ff5b3c7078d36caa911447601244f04c7971818217cb5bcc0a8b0a7e235e3ab38f71
-
C:\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
C:\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
C:\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
memory/704-2344-0x0000000004CC0000-0x0000000004CD0000-memory.dmpFilesize
64KB
-
memory/704-2333-0x000000000A870000-0x000000000AE88000-memory.dmpFilesize
6.1MB
-
memory/704-2332-0x0000000000440000-0x000000000046E000-memory.dmpFilesize
184KB
-
memory/704-2337-0x0000000004CC0000-0x0000000004CD0000-memory.dmpFilesize
64KB
-
memory/704-2336-0x000000000A350000-0x000000000A38C000-memory.dmpFilesize
240KB
-
memory/704-2335-0x000000000A2F0000-0x000000000A302000-memory.dmpFilesize
72KB
-
memory/704-2334-0x000000000A3C0000-0x000000000A4CA000-memory.dmpFilesize
1.0MB
-
memory/4272-2345-0x0000000005560000-0x0000000005570000-memory.dmpFilesize
64KB
-
memory/4272-2343-0x0000000005560000-0x0000000005570000-memory.dmpFilesize
64KB
-
memory/4272-2342-0x0000000000C80000-0x0000000000CAE000-memory.dmpFilesize
184KB
-
memory/4584-192-0x00000000054E0000-0x0000000005540000-memory.dmpFilesize
384KB
-
memory/4584-222-0x00000000054E0000-0x0000000005540000-memory.dmpFilesize
384KB
-
memory/4584-181-0x00000000054E0000-0x0000000005540000-memory.dmpFilesize
384KB
-
memory/4584-177-0x00000000025D0000-0x00000000025E0000-memory.dmpFilesize
64KB
-
memory/4584-184-0x00000000054E0000-0x0000000005540000-memory.dmpFilesize
384KB
-
memory/4584-186-0x00000000054E0000-0x0000000005540000-memory.dmpFilesize
384KB
-
memory/4584-188-0x00000000054E0000-0x0000000005540000-memory.dmpFilesize
384KB
-
memory/4584-190-0x00000000054E0000-0x0000000005540000-memory.dmpFilesize
384KB
-
memory/4584-194-0x00000000054E0000-0x0000000005540000-memory.dmpFilesize
384KB
-
memory/4584-180-0x00000000025D0000-0x00000000025E0000-memory.dmpFilesize
64KB
-
memory/4584-196-0x00000000054E0000-0x0000000005540000-memory.dmpFilesize
384KB
-
memory/4584-198-0x00000000054E0000-0x0000000005540000-memory.dmpFilesize
384KB
-
memory/4584-200-0x00000000054E0000-0x0000000005540000-memory.dmpFilesize
384KB
-
memory/4584-202-0x00000000054E0000-0x0000000005540000-memory.dmpFilesize
384KB
-
memory/4584-204-0x00000000054E0000-0x0000000005540000-memory.dmpFilesize
384KB
-
memory/4584-206-0x00000000054E0000-0x0000000005540000-memory.dmpFilesize
384KB
-
memory/4584-208-0x00000000054E0000-0x0000000005540000-memory.dmpFilesize
384KB
-
memory/4584-210-0x00000000054E0000-0x0000000005540000-memory.dmpFilesize
384KB
-
memory/4584-212-0x00000000054E0000-0x0000000005540000-memory.dmpFilesize
384KB
-
memory/4584-214-0x00000000054E0000-0x0000000005540000-memory.dmpFilesize
384KB
-
memory/4584-216-0x00000000054E0000-0x0000000005540000-memory.dmpFilesize
384KB
-
memory/4584-182-0x00000000025D0000-0x00000000025E0000-memory.dmpFilesize
64KB
-
memory/4584-220-0x00000000054E0000-0x0000000005540000-memory.dmpFilesize
384KB
-
memory/4584-218-0x00000000054E0000-0x0000000005540000-memory.dmpFilesize
384KB
-
memory/4584-224-0x00000000054E0000-0x0000000005540000-memory.dmpFilesize
384KB
-
memory/4584-226-0x00000000054E0000-0x0000000005540000-memory.dmpFilesize
384KB
-
memory/4584-228-0x00000000054E0000-0x0000000005540000-memory.dmpFilesize
384KB
-
memory/4584-230-0x00000000054E0000-0x0000000005540000-memory.dmpFilesize
384KB
-
memory/4584-178-0x00000000054E0000-0x0000000005540000-memory.dmpFilesize
384KB
-
memory/4584-176-0x0000000002290000-0x00000000022EB000-memory.dmpFilesize
364KB
-
memory/4584-174-0x00000000054E0000-0x0000000005540000-memory.dmpFilesize
384KB
-
memory/4584-172-0x00000000054E0000-0x0000000005540000-memory.dmpFilesize
384KB
-
memory/4584-170-0x00000000054E0000-0x0000000005540000-memory.dmpFilesize
384KB
-
memory/4584-168-0x00000000054E0000-0x0000000005540000-memory.dmpFilesize
384KB
-
memory/4584-166-0x00000000054E0000-0x0000000005540000-memory.dmpFilesize
384KB
-
memory/4584-164-0x00000000054E0000-0x0000000005540000-memory.dmpFilesize
384KB
-
memory/4584-163-0x00000000054E0000-0x0000000005540000-memory.dmpFilesize
384KB
-
memory/4584-162-0x0000000004EF0000-0x0000000005494000-memory.dmpFilesize
5.6MB
-
memory/4584-2314-0x00000000025D0000-0x00000000025E0000-memory.dmpFilesize
64KB
-
memory/4584-2315-0x00000000025D0000-0x00000000025E0000-memory.dmpFilesize
64KB
-
memory/4584-2316-0x00000000025D0000-0x00000000025E0000-memory.dmpFilesize
64KB
-
memory/4584-2317-0x00000000025D0000-0x00000000025E0000-memory.dmpFilesize
64KB
-
memory/4584-2320-0x00000000025D0000-0x00000000025E0000-memory.dmpFilesize
64KB