Analysis
-
max time kernel
135s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 21:42
Static task
static1
Behavioral task
behavioral1
Sample
486392593c5d1a269f5408c180f4ee9b5e54e1810ef993d3681766632b0a8429.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
486392593c5d1a269f5408c180f4ee9b5e54e1810ef993d3681766632b0a8429.exe
Resource
win10v2004-20230220-en
General
-
Target
486392593c5d1a269f5408c180f4ee9b5e54e1810ef993d3681766632b0a8429.exe
-
Size
1.2MB
-
MD5
c71ad9455a40262ca2c86afaead5bb08
-
SHA1
96ce52a4e69a71621b53db6214a7c7f7b9cad5ee
-
SHA256
486392593c5d1a269f5408c180f4ee9b5e54e1810ef993d3681766632b0a8429
-
SHA512
d8af58f68252dd01233bdbfabe8d1a799e585e59e45ae9f25bbf7ff1670238be714bf736e80b3da557b8dffd8cfb5cfeda04c54daa266380e7665061e171f7cc
-
SSDEEP
24576:qye9rGoxD+8YdIjsXtAyXstcz9uDtpdY3ghHg5A6q4IUtFjjAG:xIY8YdIknecz9uxT7A5tqdUTA
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
Processes:
resource yara_rule behavioral2/memory/3872-2331-0x0000000005E30000-0x0000000006448000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
s57594641.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation s57594641.exe -
Executes dropped EXE 6 IoCs
Processes:
z32113204.exez35111002.exez64789443.exes57594641.exe1.exet87479749.exepid process 1728 z32113204.exe 1524 z35111002.exe 960 z64789443.exe 3040 s57594641.exe 3872 1.exe 3992 t87479749.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
z64789443.exe486392593c5d1a269f5408c180f4ee9b5e54e1810ef993d3681766632b0a8429.exez32113204.exez35111002.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z64789443.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 486392593c5d1a269f5408c180f4ee9b5e54e1810ef993d3681766632b0a8429.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 486392593c5d1a269f5408c180f4ee9b5e54e1810ef993d3681766632b0a8429.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z32113204.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z32113204.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z35111002.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z35111002.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z64789443.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3956 3040 WerFault.exe s57594641.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
s57594641.exedescription pid process Token: SeDebugPrivilege 3040 s57594641.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
486392593c5d1a269f5408c180f4ee9b5e54e1810ef993d3681766632b0a8429.exez32113204.exez35111002.exez64789443.exes57594641.exedescription pid process target process PID 1220 wrote to memory of 1728 1220 486392593c5d1a269f5408c180f4ee9b5e54e1810ef993d3681766632b0a8429.exe z32113204.exe PID 1220 wrote to memory of 1728 1220 486392593c5d1a269f5408c180f4ee9b5e54e1810ef993d3681766632b0a8429.exe z32113204.exe PID 1220 wrote to memory of 1728 1220 486392593c5d1a269f5408c180f4ee9b5e54e1810ef993d3681766632b0a8429.exe z32113204.exe PID 1728 wrote to memory of 1524 1728 z32113204.exe z35111002.exe PID 1728 wrote to memory of 1524 1728 z32113204.exe z35111002.exe PID 1728 wrote to memory of 1524 1728 z32113204.exe z35111002.exe PID 1524 wrote to memory of 960 1524 z35111002.exe z64789443.exe PID 1524 wrote to memory of 960 1524 z35111002.exe z64789443.exe PID 1524 wrote to memory of 960 1524 z35111002.exe z64789443.exe PID 960 wrote to memory of 3040 960 z64789443.exe s57594641.exe PID 960 wrote to memory of 3040 960 z64789443.exe s57594641.exe PID 960 wrote to memory of 3040 960 z64789443.exe s57594641.exe PID 3040 wrote to memory of 3872 3040 s57594641.exe 1.exe PID 3040 wrote to memory of 3872 3040 s57594641.exe 1.exe PID 3040 wrote to memory of 3872 3040 s57594641.exe 1.exe PID 960 wrote to memory of 3992 960 z64789443.exe t87479749.exe PID 960 wrote to memory of 3992 960 z64789443.exe t87479749.exe PID 960 wrote to memory of 3992 960 z64789443.exe t87479749.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\486392593c5d1a269f5408c180f4ee9b5e54e1810ef993d3681766632b0a8429.exe"C:\Users\Admin\AppData\Local\Temp\486392593c5d1a269f5408c180f4ee9b5e54e1810ef993d3681766632b0a8429.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z32113204.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z32113204.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z35111002.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z35111002.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z64789443.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z64789443.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s57594641.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s57594641.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 13686⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t87479749.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t87479749.exe5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3040 -ip 30401⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z32113204.exeFilesize
1.0MB
MD56bfb7ee3c2a436e31e52a538d6497a06
SHA1c8ac0f9839464ca0130b0e10fe33b4dd0cf5783d
SHA256077fb401be9cd7bd82256c57c5f5f7bd4a03d056a1a2c3fcda57118dd126ea06
SHA5126934b8d625ff50a7a018306513e0f0e0b1bb1f26ebe45eab4a9051f4949b2232c9914cea05f18a5490494b2b5194bf10f101d3d834cc43653e7925bdbe9921dd
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z32113204.exeFilesize
1.0MB
MD56bfb7ee3c2a436e31e52a538d6497a06
SHA1c8ac0f9839464ca0130b0e10fe33b4dd0cf5783d
SHA256077fb401be9cd7bd82256c57c5f5f7bd4a03d056a1a2c3fcda57118dd126ea06
SHA5126934b8d625ff50a7a018306513e0f0e0b1bb1f26ebe45eab4a9051f4949b2232c9914cea05f18a5490494b2b5194bf10f101d3d834cc43653e7925bdbe9921dd
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z35111002.exeFilesize
760KB
MD59a23938da86f8d884e27b0b22c0031d9
SHA1c7f496b472285d44bbae72e01a57c5545cdcc64b
SHA256eb5ffc5cc7334b6ed26e446086b5e462bc32ca6dbb8478e9f9ad5d26516c007c
SHA512a1d49edc8bb12465d3010ee13b12cfd8efd08277fce8ac7a22ecfef41c6b9f998e45806432032cec4815a065f125905d4206b896d128a44b1b9847eede1b02ce
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z35111002.exeFilesize
760KB
MD59a23938da86f8d884e27b0b22c0031d9
SHA1c7f496b472285d44bbae72e01a57c5545cdcc64b
SHA256eb5ffc5cc7334b6ed26e446086b5e462bc32ca6dbb8478e9f9ad5d26516c007c
SHA512a1d49edc8bb12465d3010ee13b12cfd8efd08277fce8ac7a22ecfef41c6b9f998e45806432032cec4815a065f125905d4206b896d128a44b1b9847eede1b02ce
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z64789443.exeFilesize
578KB
MD527e17304e5007ad914ccd99bc3aef2df
SHA1136794da62a3b9e0526d434068003ab0f2d1fd2f
SHA256921f883609928774e395207ec56f52cbabc04b919f4f42b3e41ddf5d1a71d402
SHA51205df449c6e16fc4698000d92cedfb762125daf5e254bb1a28ce2adb53d3ff2b45c73b202c9f4f699b261930b422bd996e5231936eb1289d9c6ac4cadcd9b1d3b
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z64789443.exeFilesize
578KB
MD527e17304e5007ad914ccd99bc3aef2df
SHA1136794da62a3b9e0526d434068003ab0f2d1fd2f
SHA256921f883609928774e395207ec56f52cbabc04b919f4f42b3e41ddf5d1a71d402
SHA51205df449c6e16fc4698000d92cedfb762125daf5e254bb1a28ce2adb53d3ff2b45c73b202c9f4f699b261930b422bd996e5231936eb1289d9c6ac4cadcd9b1d3b
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s57594641.exeFilesize
580KB
MD519174e3370a22a2bb53b3b397586a020
SHA1336d09fb76bb98d7591888f0781ace269e40c320
SHA2560f7d97ae3875016f5843a28b7a43de5ed87de7d7b743927360a9796fd98f6a4d
SHA512b4393aecdef8266b6cb79180bd1b433fbeda16f24b928174156fca3ac0b49dcc3f3d425911e7a847e103435420c1dafdf6e7f5e52bf309aeda4653f8646c5853
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s57594641.exeFilesize
580KB
MD519174e3370a22a2bb53b3b397586a020
SHA1336d09fb76bb98d7591888f0781ace269e40c320
SHA2560f7d97ae3875016f5843a28b7a43de5ed87de7d7b743927360a9796fd98f6a4d
SHA512b4393aecdef8266b6cb79180bd1b433fbeda16f24b928174156fca3ac0b49dcc3f3d425911e7a847e103435420c1dafdf6e7f5e52bf309aeda4653f8646c5853
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t87479749.exeFilesize
169KB
MD5bd3447593725a759f2998e97c8b4aad1
SHA1877b3b4f37ae98b2e9ae1674d5d99d47472ebacd
SHA2569229f04238b65f3daf53f8d723deb65f333b49e286ad86d8afffb81e916f274b
SHA51265c7460094611d33d79f08bbe52481cc016e4dc3bfac2682fd9cb6e49999120dde1ac03a0aa5f5ab1a51c44deaab9fbf7970c9955c5ae4ab939524015961d0e3
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t87479749.exeFilesize
169KB
MD5bd3447593725a759f2998e97c8b4aad1
SHA1877b3b4f37ae98b2e9ae1674d5d99d47472ebacd
SHA2569229f04238b65f3daf53f8d723deb65f333b49e286ad86d8afffb81e916f274b
SHA51265c7460094611d33d79f08bbe52481cc016e4dc3bfac2682fd9cb6e49999120dde1ac03a0aa5f5ab1a51c44deaab9fbf7970c9955c5ae4ab939524015961d0e3
-
C:\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
C:\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
C:\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
memory/3040-196-0x0000000004F60000-0x0000000004FC0000-memory.dmpFilesize
384KB
-
memory/3040-210-0x0000000004F60000-0x0000000004FC0000-memory.dmpFilesize
384KB
-
memory/3040-164-0x0000000004FC0000-0x0000000004FD0000-memory.dmpFilesize
64KB
-
memory/3040-166-0x0000000004FC0000-0x0000000004FD0000-memory.dmpFilesize
64KB
-
memory/3040-167-0x0000000004F60000-0x0000000004FC0000-memory.dmpFilesize
384KB
-
memory/3040-168-0x0000000004F60000-0x0000000004FC0000-memory.dmpFilesize
384KB
-
memory/3040-170-0x0000000004F60000-0x0000000004FC0000-memory.dmpFilesize
384KB
-
memory/3040-172-0x0000000004F60000-0x0000000004FC0000-memory.dmpFilesize
384KB
-
memory/3040-174-0x0000000004F60000-0x0000000004FC0000-memory.dmpFilesize
384KB
-
memory/3040-176-0x0000000004F60000-0x0000000004FC0000-memory.dmpFilesize
384KB
-
memory/3040-178-0x0000000004F60000-0x0000000004FC0000-memory.dmpFilesize
384KB
-
memory/3040-180-0x0000000004F60000-0x0000000004FC0000-memory.dmpFilesize
384KB
-
memory/3040-182-0x0000000004F60000-0x0000000004FC0000-memory.dmpFilesize
384KB
-
memory/3040-184-0x0000000004F60000-0x0000000004FC0000-memory.dmpFilesize
384KB
-
memory/3040-186-0x0000000004F60000-0x0000000004FC0000-memory.dmpFilesize
384KB
-
memory/3040-188-0x0000000004F60000-0x0000000004FC0000-memory.dmpFilesize
384KB
-
memory/3040-190-0x0000000004F60000-0x0000000004FC0000-memory.dmpFilesize
384KB
-
memory/3040-194-0x0000000004F60000-0x0000000004FC0000-memory.dmpFilesize
384KB
-
memory/3040-192-0x0000000004F60000-0x0000000004FC0000-memory.dmpFilesize
384KB
-
memory/3040-163-0x0000000000A90000-0x0000000000AEB000-memory.dmpFilesize
364KB
-
memory/3040-198-0x0000000004F60000-0x0000000004FC0000-memory.dmpFilesize
384KB
-
memory/3040-200-0x0000000004F60000-0x0000000004FC0000-memory.dmpFilesize
384KB
-
memory/3040-204-0x0000000004F60000-0x0000000004FC0000-memory.dmpFilesize
384KB
-
memory/3040-202-0x0000000004F60000-0x0000000004FC0000-memory.dmpFilesize
384KB
-
memory/3040-206-0x0000000004F60000-0x0000000004FC0000-memory.dmpFilesize
384KB
-
memory/3040-165-0x0000000004FC0000-0x0000000004FD0000-memory.dmpFilesize
64KB
-
memory/3040-208-0x0000000004F60000-0x0000000004FC0000-memory.dmpFilesize
384KB
-
memory/3040-212-0x0000000004F60000-0x0000000004FC0000-memory.dmpFilesize
384KB
-
memory/3040-214-0x0000000004F60000-0x0000000004FC0000-memory.dmpFilesize
384KB
-
memory/3040-218-0x0000000004F60000-0x0000000004FC0000-memory.dmpFilesize
384KB
-
memory/3040-216-0x0000000004F60000-0x0000000004FC0000-memory.dmpFilesize
384KB
-
memory/3040-220-0x0000000004F60000-0x0000000004FC0000-memory.dmpFilesize
384KB
-
memory/3040-224-0x0000000004F60000-0x0000000004FC0000-memory.dmpFilesize
384KB
-
memory/3040-226-0x0000000004F60000-0x0000000004FC0000-memory.dmpFilesize
384KB
-
memory/3040-228-0x0000000004F60000-0x0000000004FC0000-memory.dmpFilesize
384KB
-
memory/3040-230-0x0000000004F60000-0x0000000004FC0000-memory.dmpFilesize
384KB
-
memory/3040-222-0x0000000004F60000-0x0000000004FC0000-memory.dmpFilesize
384KB
-
memory/3040-2315-0x0000000004FC0000-0x0000000004FD0000-memory.dmpFilesize
64KB
-
memory/3040-2316-0x0000000004FC0000-0x0000000004FD0000-memory.dmpFilesize
64KB
-
memory/3040-2317-0x0000000004FC0000-0x0000000004FD0000-memory.dmpFilesize
64KB
-
memory/3040-2318-0x0000000004FC0000-0x0000000004FD0000-memory.dmpFilesize
64KB
-
memory/3040-162-0x00000000050D0000-0x0000000005674000-memory.dmpFilesize
5.6MB
-
memory/3872-2331-0x0000000005E30000-0x0000000006448000-memory.dmpFilesize
6.1MB
-
memory/3872-2332-0x0000000005920000-0x0000000005A2A000-memory.dmpFilesize
1.0MB
-
memory/3872-2333-0x00000000055E0000-0x00000000055F2000-memory.dmpFilesize
72KB
-
memory/3872-2334-0x0000000005850000-0x000000000588C000-memory.dmpFilesize
240KB
-
memory/3872-2330-0x0000000000D60000-0x0000000000D8E000-memory.dmpFilesize
184KB
-
memory/3872-2335-0x0000000005600000-0x0000000005610000-memory.dmpFilesize
64KB
-
memory/3872-2342-0x0000000005600000-0x0000000005610000-memory.dmpFilesize
64KB
-
memory/3992-2340-0x0000000000690000-0x00000000006BE000-memory.dmpFilesize
184KB
-
memory/3992-2341-0x00000000027E0000-0x00000000027F0000-memory.dmpFilesize
64KB
-
memory/3992-2343-0x00000000027E0000-0x00000000027F0000-memory.dmpFilesize
64KB