Analysis
-
max time kernel
137s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 21:41
Static task
static1
Behavioral task
behavioral1
Sample
479ab84a4e7b46360ca8a134dcb045e42e6b2380533fe8b36dc862992023e993.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
479ab84a4e7b46360ca8a134dcb045e42e6b2380533fe8b36dc862992023e993.exe
Resource
win10v2004-20230220-en
General
-
Target
479ab84a4e7b46360ca8a134dcb045e42e6b2380533fe8b36dc862992023e993.exe
-
Size
1.2MB
-
MD5
1de0a0a674279651f8510b4e20766d3d
-
SHA1
73c285ce1662d75241ce59eaeb2a4e211f93dac3
-
SHA256
479ab84a4e7b46360ca8a134dcb045e42e6b2380533fe8b36dc862992023e993
-
SHA512
dbe09f060cbfad4a23a41b0c49db0dc65a93285cc574a9b9d5cae31f4a467d0a4b7743c115661757ed77c5bb9f0cebfa955a74ec3387f4abe81f7663f8c7d5ed
-
SSDEEP
24576:GyKWStCKp1uWcYAUvOFbVAKK7N/dt17PCbkdwjQ+934tGHhS9PcjLVq:VCCKp1ZcxUmFBvglv+hsoItyecjL
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
Processes:
resource yara_rule behavioral2/memory/5092-2333-0x0000000005150000-0x0000000005768000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
s16351386.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation s16351386.exe -
Executes dropped EXE 6 IoCs
Processes:
z62501233.exez58467346.exez98929627.exes16351386.exe1.exet74526060.exepid process 2496 z62501233.exe 1760 z58467346.exe 4800 z98929627.exe 4832 s16351386.exe 5092 1.exe 3380 t74526060.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
z98929627.exe479ab84a4e7b46360ca8a134dcb045e42e6b2380533fe8b36dc862992023e993.exez62501233.exez58467346.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z98929627.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 479ab84a4e7b46360ca8a134dcb045e42e6b2380533fe8b36dc862992023e993.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 479ab84a4e7b46360ca8a134dcb045e42e6b2380533fe8b36dc862992023e993.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z62501233.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z62501233.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z58467346.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z58467346.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z98929627.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2304 4832 WerFault.exe s16351386.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
s16351386.exedescription pid process Token: SeDebugPrivilege 4832 s16351386.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
479ab84a4e7b46360ca8a134dcb045e42e6b2380533fe8b36dc862992023e993.exez62501233.exez58467346.exez98929627.exes16351386.exedescription pid process target process PID 4144 wrote to memory of 2496 4144 479ab84a4e7b46360ca8a134dcb045e42e6b2380533fe8b36dc862992023e993.exe z62501233.exe PID 4144 wrote to memory of 2496 4144 479ab84a4e7b46360ca8a134dcb045e42e6b2380533fe8b36dc862992023e993.exe z62501233.exe PID 4144 wrote to memory of 2496 4144 479ab84a4e7b46360ca8a134dcb045e42e6b2380533fe8b36dc862992023e993.exe z62501233.exe PID 2496 wrote to memory of 1760 2496 z62501233.exe z58467346.exe PID 2496 wrote to memory of 1760 2496 z62501233.exe z58467346.exe PID 2496 wrote to memory of 1760 2496 z62501233.exe z58467346.exe PID 1760 wrote to memory of 4800 1760 z58467346.exe z98929627.exe PID 1760 wrote to memory of 4800 1760 z58467346.exe z98929627.exe PID 1760 wrote to memory of 4800 1760 z58467346.exe z98929627.exe PID 4800 wrote to memory of 4832 4800 z98929627.exe s16351386.exe PID 4800 wrote to memory of 4832 4800 z98929627.exe s16351386.exe PID 4800 wrote to memory of 4832 4800 z98929627.exe s16351386.exe PID 4832 wrote to memory of 5092 4832 s16351386.exe 1.exe PID 4832 wrote to memory of 5092 4832 s16351386.exe 1.exe PID 4832 wrote to memory of 5092 4832 s16351386.exe 1.exe PID 4800 wrote to memory of 3380 4800 z98929627.exe t74526060.exe PID 4800 wrote to memory of 3380 4800 z98929627.exe t74526060.exe PID 4800 wrote to memory of 3380 4800 z98929627.exe t74526060.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\479ab84a4e7b46360ca8a134dcb045e42e6b2380533fe8b36dc862992023e993.exe"C:\Users\Admin\AppData\Local\Temp\479ab84a4e7b46360ca8a134dcb045e42e6b2380533fe8b36dc862992023e993.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z62501233.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z62501233.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z58467346.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z58467346.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z98929627.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z98929627.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s16351386.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s16351386.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4832 -s 13806⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t74526060.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t74526060.exe5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4832 -ip 48321⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z62501233.exeFilesize
1.0MB
MD5ff652de232abc2c2869dd8150dd0060a
SHA13e0db47dc383db5494a4dc27a90fa6e076903679
SHA2567af6933fe3a4c811973f65b5398c4f81b18124cb49dbee4e528f46f8dee36929
SHA512784a59a95bed33a7fa0a5db3516bf6fa255216319ff8da733f325a34b306519bf33bc142da4d64c0dda6def6ff49154e4bfed301ba69c5a24479f1ff47b78fb4
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z62501233.exeFilesize
1.0MB
MD5ff652de232abc2c2869dd8150dd0060a
SHA13e0db47dc383db5494a4dc27a90fa6e076903679
SHA2567af6933fe3a4c811973f65b5398c4f81b18124cb49dbee4e528f46f8dee36929
SHA512784a59a95bed33a7fa0a5db3516bf6fa255216319ff8da733f325a34b306519bf33bc142da4d64c0dda6def6ff49154e4bfed301ba69c5a24479f1ff47b78fb4
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z58467346.exeFilesize
760KB
MD572abe5dd01ee03ef9aed8129eca144f0
SHA11b3ab0d7e23795cc9d1da3f81093cfc4f5a9b5b8
SHA256b313147cb367e18b81410811e531920efbee42891bc5222c6da9a9ebd9792c43
SHA51208b6adc4cdf43c998587fe3523542b51c69c17dd0f86083639f591bf988b1d254a854b6773c5c7bf97ac279117ec29ee23de1c0ec4ad8d517c7b67dd958e29b4
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z58467346.exeFilesize
760KB
MD572abe5dd01ee03ef9aed8129eca144f0
SHA11b3ab0d7e23795cc9d1da3f81093cfc4f5a9b5b8
SHA256b313147cb367e18b81410811e531920efbee42891bc5222c6da9a9ebd9792c43
SHA51208b6adc4cdf43c998587fe3523542b51c69c17dd0f86083639f591bf988b1d254a854b6773c5c7bf97ac279117ec29ee23de1c0ec4ad8d517c7b67dd958e29b4
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z98929627.exeFilesize
577KB
MD5a1a4b6e06924fdfd86584968e0f277a8
SHA1983e4530b6cb89565a12d79ee72a8c1acaa9b29d
SHA256a7b73240e61db4b535f01631c4dab92b14c24de84674b53ad8bf43f30cee1e6e
SHA5123439b57d55cdfeea9bc6a8284dcc758347751774812469188dd2b95a2eb5035c0b3e7aab0abffda310b93a399e73af618a9b5ab6e5d8b4bc7dc8b6c4aeba39b5
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z98929627.exeFilesize
577KB
MD5a1a4b6e06924fdfd86584968e0f277a8
SHA1983e4530b6cb89565a12d79ee72a8c1acaa9b29d
SHA256a7b73240e61db4b535f01631c4dab92b14c24de84674b53ad8bf43f30cee1e6e
SHA5123439b57d55cdfeea9bc6a8284dcc758347751774812469188dd2b95a2eb5035c0b3e7aab0abffda310b93a399e73af618a9b5ab6e5d8b4bc7dc8b6c4aeba39b5
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s16351386.exeFilesize
574KB
MD5ad29c555bbb6172f4ea4a8f4feef9491
SHA10617a61e3e0fac92fb31c8bbef3d101e08ee32c2
SHA256969a0ab6e75e929c922be7a6c11b3378c27213a7bbe7147ebf24e05353b29f5d
SHA512b38b7e8ca9a4d2766c4f69094dc955d20b9b35f58c874145c0f09ee7e8627652b0dba14a246ef3a26a07ea08e761322abb3072948706b65284f46c39b8746dff
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s16351386.exeFilesize
574KB
MD5ad29c555bbb6172f4ea4a8f4feef9491
SHA10617a61e3e0fac92fb31c8bbef3d101e08ee32c2
SHA256969a0ab6e75e929c922be7a6c11b3378c27213a7bbe7147ebf24e05353b29f5d
SHA512b38b7e8ca9a4d2766c4f69094dc955d20b9b35f58c874145c0f09ee7e8627652b0dba14a246ef3a26a07ea08e761322abb3072948706b65284f46c39b8746dff
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t74526060.exeFilesize
169KB
MD51d87939aa2affddc2d12889e814f85cc
SHA149606c2e1859fd3721042315aa499a7e6f8e14d6
SHA256acc13e175dc08555c20189a2aa9ddc1736e0ccb29427f2576872f9cf01a30da6
SHA5122c88c21eee7e5b7e5156b37fc43295f4cbc4fa43939dd74b00c47df1295ad919adf1b4e4220c161603d7e898b93defd5b1cf3cd7a623ada91842268933c1f978
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t74526060.exeFilesize
169KB
MD51d87939aa2affddc2d12889e814f85cc
SHA149606c2e1859fd3721042315aa499a7e6f8e14d6
SHA256acc13e175dc08555c20189a2aa9ddc1736e0ccb29427f2576872f9cf01a30da6
SHA5122c88c21eee7e5b7e5156b37fc43295f4cbc4fa43939dd74b00c47df1295ad919adf1b4e4220c161603d7e898b93defd5b1cf3cd7a623ada91842268933c1f978
-
C:\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
C:\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
C:\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
memory/3380-2345-0x0000000005040000-0x0000000005050000-memory.dmpFilesize
64KB
-
memory/3380-2343-0x0000000005040000-0x0000000005050000-memory.dmpFilesize
64KB
-
memory/3380-2342-0x0000000000660000-0x000000000068E000-memory.dmpFilesize
184KB
-
memory/4832-196-0x00000000029B0000-0x0000000002A10000-memory.dmpFilesize
384KB
-
memory/4832-214-0x00000000029B0000-0x0000000002A10000-memory.dmpFilesize
384KB
-
memory/4832-168-0x00000000029B0000-0x0000000002A10000-memory.dmpFilesize
384KB
-
memory/4832-170-0x00000000029B0000-0x0000000002A10000-memory.dmpFilesize
384KB
-
memory/4832-172-0x00000000029B0000-0x0000000002A10000-memory.dmpFilesize
384KB
-
memory/4832-174-0x00000000029B0000-0x0000000002A10000-memory.dmpFilesize
384KB
-
memory/4832-176-0x00000000029B0000-0x0000000002A10000-memory.dmpFilesize
384KB
-
memory/4832-178-0x00000000029B0000-0x0000000002A10000-memory.dmpFilesize
384KB
-
memory/4832-180-0x00000000029B0000-0x0000000002A10000-memory.dmpFilesize
384KB
-
memory/4832-182-0x00000000029B0000-0x0000000002A10000-memory.dmpFilesize
384KB
-
memory/4832-184-0x00000000029B0000-0x0000000002A10000-memory.dmpFilesize
384KB
-
memory/4832-186-0x00000000029B0000-0x0000000002A10000-memory.dmpFilesize
384KB
-
memory/4832-188-0x00000000029B0000-0x0000000002A10000-memory.dmpFilesize
384KB
-
memory/4832-190-0x00000000029B0000-0x0000000002A10000-memory.dmpFilesize
384KB
-
memory/4832-192-0x00000000029B0000-0x0000000002A10000-memory.dmpFilesize
384KB
-
memory/4832-194-0x00000000029B0000-0x0000000002A10000-memory.dmpFilesize
384KB
-
memory/4832-165-0x0000000002450000-0x0000000002460000-memory.dmpFilesize
64KB
-
memory/4832-198-0x00000000029B0000-0x0000000002A10000-memory.dmpFilesize
384KB
-
memory/4832-200-0x00000000029B0000-0x0000000002A10000-memory.dmpFilesize
384KB
-
memory/4832-202-0x00000000029B0000-0x0000000002A10000-memory.dmpFilesize
384KB
-
memory/4832-204-0x00000000029B0000-0x0000000002A10000-memory.dmpFilesize
384KB
-
memory/4832-206-0x00000000029B0000-0x0000000002A10000-memory.dmpFilesize
384KB
-
memory/4832-208-0x00000000029B0000-0x0000000002A10000-memory.dmpFilesize
384KB
-
memory/4832-210-0x00000000029B0000-0x0000000002A10000-memory.dmpFilesize
384KB
-
memory/4832-212-0x00000000029B0000-0x0000000002A10000-memory.dmpFilesize
384KB
-
memory/4832-167-0x00000000029B0000-0x0000000002A10000-memory.dmpFilesize
384KB
-
memory/4832-216-0x00000000029B0000-0x0000000002A10000-memory.dmpFilesize
384KB
-
memory/4832-218-0x00000000029B0000-0x0000000002A10000-memory.dmpFilesize
384KB
-
memory/4832-220-0x00000000029B0000-0x0000000002A10000-memory.dmpFilesize
384KB
-
memory/4832-222-0x00000000029B0000-0x0000000002A10000-memory.dmpFilesize
384KB
-
memory/4832-224-0x00000000029B0000-0x0000000002A10000-memory.dmpFilesize
384KB
-
memory/4832-226-0x00000000029B0000-0x0000000002A10000-memory.dmpFilesize
384KB
-
memory/4832-228-0x00000000029B0000-0x0000000002A10000-memory.dmpFilesize
384KB
-
memory/4832-230-0x00000000029B0000-0x0000000002A10000-memory.dmpFilesize
384KB
-
memory/4832-2314-0x0000000002450000-0x0000000002460000-memory.dmpFilesize
64KB
-
memory/4832-2315-0x0000000002450000-0x0000000002460000-memory.dmpFilesize
64KB
-
memory/4832-2316-0x0000000002450000-0x0000000002460000-memory.dmpFilesize
64KB
-
memory/4832-2318-0x0000000002450000-0x0000000002460000-memory.dmpFilesize
64KB
-
memory/4832-2332-0x0000000002450000-0x0000000002460000-memory.dmpFilesize
64KB
-
memory/4832-162-0x00000000051C0000-0x0000000005764000-memory.dmpFilesize
5.6MB
-
memory/4832-163-0x0000000000910000-0x000000000096B000-memory.dmpFilesize
364KB
-
memory/4832-164-0x0000000002450000-0x0000000002460000-memory.dmpFilesize
64KB
-
memory/4832-166-0x0000000002450000-0x0000000002460000-memory.dmpFilesize
64KB
-
memory/5092-2336-0x0000000004BB0000-0x0000000004BEC000-memory.dmpFilesize
240KB
-
memory/5092-2335-0x0000000004B50000-0x0000000004B62000-memory.dmpFilesize
72KB
-
memory/5092-2334-0x0000000004C40000-0x0000000004D4A000-memory.dmpFilesize
1.0MB
-
memory/5092-2333-0x0000000005150000-0x0000000005768000-memory.dmpFilesize
6.1MB
-
memory/5092-2337-0x0000000004920000-0x0000000004930000-memory.dmpFilesize
64KB
-
memory/5092-2344-0x0000000004920000-0x0000000004930000-memory.dmpFilesize
64KB
-
memory/5092-2331-0x00000000000C0000-0x00000000000EE000-memory.dmpFilesize
184KB