Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 21:45
Static task
static1
Behavioral task
behavioral1
Sample
4afe5ea4664a74cb2dce03af832d2c329fc19e37f49aa8db5162b50217c5d88c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4afe5ea4664a74cb2dce03af832d2c329fc19e37f49aa8db5162b50217c5d88c.exe
Resource
win10v2004-20230220-en
General
-
Target
4afe5ea4664a74cb2dce03af832d2c329fc19e37f49aa8db5162b50217c5d88c.exe
-
Size
1.2MB
-
MD5
93eb6dacdea45140bf85ebc35012b523
-
SHA1
b30f96f424bf52be8d189984fc53d554021c6f64
-
SHA256
4afe5ea4664a74cb2dce03af832d2c329fc19e37f49aa8db5162b50217c5d88c
-
SHA512
1ef678d0ba182f42dc49023dc4f5049d8711497595950d08a80a6a2d3896fa90273dd2b11a2ae5eea6b7b27cfd848001a820b97b548d26958f1d869ae6c80de1
-
SSDEEP
24576:Hypwbh7+G4O3zb5w5aKoUHguRI6XrTziTxXesCrt3PHmoy4nM7AbTrG:SqxTH5w5aKoUAqjXDMXesGtfG7TAbT
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
Processes:
resource yara_rule behavioral2/memory/1212-2336-0x0000000005E10000-0x0000000006428000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
s23150453.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation s23150453.exe -
Executes dropped EXE 6 IoCs
Processes:
z61283242.exez59574464.exez55730395.exes23150453.exe1.exet21846365.exepid process 2384 z61283242.exe 1536 z59574464.exe 2216 z55730395.exe 3424 s23150453.exe 1212 1.exe 4452 t21846365.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
z55730395.exe4afe5ea4664a74cb2dce03af832d2c329fc19e37f49aa8db5162b50217c5d88c.exez61283242.exez59574464.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z55730395.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z55730395.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4afe5ea4664a74cb2dce03af832d2c329fc19e37f49aa8db5162b50217c5d88c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4afe5ea4664a74cb2dce03af832d2c329fc19e37f49aa8db5162b50217c5d88c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z61283242.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z61283242.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z59574464.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z59574464.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
s23150453.exedescription pid process Token: SeDebugPrivilege 3424 s23150453.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
4afe5ea4664a74cb2dce03af832d2c329fc19e37f49aa8db5162b50217c5d88c.exez61283242.exez59574464.exez55730395.exes23150453.exedescription pid process target process PID 1260 wrote to memory of 2384 1260 4afe5ea4664a74cb2dce03af832d2c329fc19e37f49aa8db5162b50217c5d88c.exe z61283242.exe PID 1260 wrote to memory of 2384 1260 4afe5ea4664a74cb2dce03af832d2c329fc19e37f49aa8db5162b50217c5d88c.exe z61283242.exe PID 1260 wrote to memory of 2384 1260 4afe5ea4664a74cb2dce03af832d2c329fc19e37f49aa8db5162b50217c5d88c.exe z61283242.exe PID 2384 wrote to memory of 1536 2384 z61283242.exe z59574464.exe PID 2384 wrote to memory of 1536 2384 z61283242.exe z59574464.exe PID 2384 wrote to memory of 1536 2384 z61283242.exe z59574464.exe PID 1536 wrote to memory of 2216 1536 z59574464.exe z55730395.exe PID 1536 wrote to memory of 2216 1536 z59574464.exe z55730395.exe PID 1536 wrote to memory of 2216 1536 z59574464.exe z55730395.exe PID 2216 wrote to memory of 3424 2216 z55730395.exe s23150453.exe PID 2216 wrote to memory of 3424 2216 z55730395.exe s23150453.exe PID 2216 wrote to memory of 3424 2216 z55730395.exe s23150453.exe PID 3424 wrote to memory of 1212 3424 s23150453.exe 1.exe PID 3424 wrote to memory of 1212 3424 s23150453.exe 1.exe PID 3424 wrote to memory of 1212 3424 s23150453.exe 1.exe PID 2216 wrote to memory of 4452 2216 z55730395.exe t21846365.exe PID 2216 wrote to memory of 4452 2216 z55730395.exe t21846365.exe PID 2216 wrote to memory of 4452 2216 z55730395.exe t21846365.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4afe5ea4664a74cb2dce03af832d2c329fc19e37f49aa8db5162b50217c5d88c.exe"C:\Users\Admin\AppData\Local\Temp\4afe5ea4664a74cb2dce03af832d2c329fc19e37f49aa8db5162b50217c5d88c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z61283242.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z61283242.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z59574464.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z59574464.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z55730395.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z55730395.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s23150453.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s23150453.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t21846365.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t21846365.exe5⤵
- Executes dropped EXE
PID:4452
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z61283242.exeFilesize
1.0MB
MD5c83d2d7934b3cb82fd870df020fd2626
SHA1bce88bb3f288e0adffb4618c7e3564f18310a94f
SHA25694a5a0fd9ed4f8de9306240f9a1d2d5866a23d4bca8fc958d6c97c13bda2bb41
SHA512079a50238e0eae434690efc9b45a539577327a57ace6aa4bbb40389e841b7d88a012ca3359278c21c9616c94b614000a2dfec3380f46d5a0b06936bfc70405e0
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z61283242.exeFilesize
1.0MB
MD5c83d2d7934b3cb82fd870df020fd2626
SHA1bce88bb3f288e0adffb4618c7e3564f18310a94f
SHA25694a5a0fd9ed4f8de9306240f9a1d2d5866a23d4bca8fc958d6c97c13bda2bb41
SHA512079a50238e0eae434690efc9b45a539577327a57ace6aa4bbb40389e841b7d88a012ca3359278c21c9616c94b614000a2dfec3380f46d5a0b06936bfc70405e0
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z59574464.exeFilesize
765KB
MD5e6143adecc9f79b684cf073e38e2fa2a
SHA1ce43e50cbc44dbc6eb8c656401300139e1f19583
SHA2561355200e7a4935761cd0bbbbb1a2f6bebcee2b7124d1585b71a8fd6c4939d638
SHA51201e7f6ecae03cc1e908ef89e5e275ac043693eefe6edd2d30a7a1bbf6ab79ea417f123db94e8d8b6b15e02697e420234acbd5bb1455032eaf0188e5d7d6157ec
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z59574464.exeFilesize
765KB
MD5e6143adecc9f79b684cf073e38e2fa2a
SHA1ce43e50cbc44dbc6eb8c656401300139e1f19583
SHA2561355200e7a4935761cd0bbbbb1a2f6bebcee2b7124d1585b71a8fd6c4939d638
SHA51201e7f6ecae03cc1e908ef89e5e275ac043693eefe6edd2d30a7a1bbf6ab79ea417f123db94e8d8b6b15e02697e420234acbd5bb1455032eaf0188e5d7d6157ec
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z55730395.exeFilesize
582KB
MD50113a08cf198ccfafc4dfd184aeec8f0
SHA141789c6d3ca7723a3b646d648ace0d3df9294b02
SHA2567c1fd37417b84beca147dca58dffb723c46858990c1cec020f13bd73f059fed6
SHA512c7d57af690c2adcc052f411810ec2bf535e767367e0f743fe6f27ded25f07cee91848843807a2072cebc2deeb9ddf06e5ae43d48efd8f1a88f4096f593377238
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z55730395.exeFilesize
582KB
MD50113a08cf198ccfafc4dfd184aeec8f0
SHA141789c6d3ca7723a3b646d648ace0d3df9294b02
SHA2567c1fd37417b84beca147dca58dffb723c46858990c1cec020f13bd73f059fed6
SHA512c7d57af690c2adcc052f411810ec2bf535e767367e0f743fe6f27ded25f07cee91848843807a2072cebc2deeb9ddf06e5ae43d48efd8f1a88f4096f593377238
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s23150453.exeFilesize
582KB
MD599ed72939c96509b649679cb3f52fa59
SHA1e03790b29bc38ee92df52b5f54e17e95259ad1da
SHA2562441cc1ea78f49e1c486d09e3aa79db8ba8ae9312abf0403dfc18720f1d815cf
SHA5121651aa8c9e172acaacc0284533d32c88640b5f96cbf7c4d62369b7463ffc0e963b744b96fd1a21c26b156668bbadef02e98c99dbf3ed05c9384c6d1901ee0480
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s23150453.exeFilesize
582KB
MD599ed72939c96509b649679cb3f52fa59
SHA1e03790b29bc38ee92df52b5f54e17e95259ad1da
SHA2562441cc1ea78f49e1c486d09e3aa79db8ba8ae9312abf0403dfc18720f1d815cf
SHA5121651aa8c9e172acaacc0284533d32c88640b5f96cbf7c4d62369b7463ffc0e963b744b96fd1a21c26b156668bbadef02e98c99dbf3ed05c9384c6d1901ee0480
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t21846365.exeFilesize
169KB
MD5d7911e968304bc5de1a5d5cad7150a6b
SHA12fe5528494773806326286bbfb183f2361e55280
SHA256db27c0888ef6a1c8cccebec9a2f7a600dd8aeca8c3f844e8e5d2a5d3657b2616
SHA512993237ce394fdd48b97385a55e2e1a8d775e02ed3360e17681c39d1fa0a5edf045e1f070c3ce7d953c4b052b068bef3547f5fcedbb38a7bfe40f82396018b4e8
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t21846365.exeFilesize
169KB
MD5d7911e968304bc5de1a5d5cad7150a6b
SHA12fe5528494773806326286bbfb183f2361e55280
SHA256db27c0888ef6a1c8cccebec9a2f7a600dd8aeca8c3f844e8e5d2a5d3657b2616
SHA512993237ce394fdd48b97385a55e2e1a8d775e02ed3360e17681c39d1fa0a5edf045e1f070c3ce7d953c4b052b068bef3547f5fcedbb38a7bfe40f82396018b4e8
-
C:\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
C:\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
C:\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
memory/1212-2330-0x0000000000C60000-0x0000000000C8E000-memory.dmpFilesize
184KB
-
memory/1212-2342-0x00000000056E0000-0x00000000056F0000-memory.dmpFilesize
64KB
-
memory/1212-2340-0x00000000056E0000-0x00000000056F0000-memory.dmpFilesize
64KB
-
memory/1212-2339-0x0000000005610000-0x000000000564C000-memory.dmpFilesize
240KB
-
memory/1212-2338-0x00000000055F0000-0x0000000005602000-memory.dmpFilesize
72KB
-
memory/1212-2336-0x0000000005E10000-0x0000000006428000-memory.dmpFilesize
6.1MB
-
memory/3424-195-0x00000000028E0000-0x0000000002940000-memory.dmpFilesize
384KB
-
memory/3424-214-0x00000000028E0000-0x0000000002940000-memory.dmpFilesize
384KB
-
memory/3424-173-0x00000000028E0000-0x0000000002940000-memory.dmpFilesize
384KB
-
memory/3424-175-0x00000000028E0000-0x0000000002940000-memory.dmpFilesize
384KB
-
memory/3424-177-0x00000000028E0000-0x0000000002940000-memory.dmpFilesize
384KB
-
memory/3424-179-0x00000000028E0000-0x0000000002940000-memory.dmpFilesize
384KB
-
memory/3424-181-0x00000000028E0000-0x0000000002940000-memory.dmpFilesize
384KB
-
memory/3424-183-0x00000000028E0000-0x0000000002940000-memory.dmpFilesize
384KB
-
memory/3424-185-0x00000000028E0000-0x0000000002940000-memory.dmpFilesize
384KB
-
memory/3424-187-0x00000000028E0000-0x0000000002940000-memory.dmpFilesize
384KB
-
memory/3424-189-0x00000000028E0000-0x0000000002940000-memory.dmpFilesize
384KB
-
memory/3424-191-0x00000000028E0000-0x0000000002940000-memory.dmpFilesize
384KB
-
memory/3424-193-0x00000000028E0000-0x0000000002940000-memory.dmpFilesize
384KB
-
memory/3424-171-0x00000000028E0000-0x0000000002940000-memory.dmpFilesize
384KB
-
memory/3424-197-0x00000000028E0000-0x0000000002940000-memory.dmpFilesize
384KB
-
memory/3424-199-0x00000000028E0000-0x0000000002940000-memory.dmpFilesize
384KB
-
memory/3424-201-0x0000000004F10000-0x0000000004F20000-memory.dmpFilesize
64KB
-
memory/3424-202-0x00000000028E0000-0x0000000002940000-memory.dmpFilesize
384KB
-
memory/3424-204-0x00000000028E0000-0x0000000002940000-memory.dmpFilesize
384KB
-
memory/3424-206-0x00000000028E0000-0x0000000002940000-memory.dmpFilesize
384KB
-
memory/3424-208-0x00000000028E0000-0x0000000002940000-memory.dmpFilesize
384KB
-
memory/3424-210-0x00000000028E0000-0x0000000002940000-memory.dmpFilesize
384KB
-
memory/3424-212-0x00000000028E0000-0x0000000002940000-memory.dmpFilesize
384KB
-
memory/3424-169-0x00000000028E0000-0x0000000002940000-memory.dmpFilesize
384KB
-
memory/3424-216-0x00000000028E0000-0x0000000002940000-memory.dmpFilesize
384KB
-
memory/3424-218-0x00000000028E0000-0x0000000002940000-memory.dmpFilesize
384KB
-
memory/3424-220-0x00000000028E0000-0x0000000002940000-memory.dmpFilesize
384KB
-
memory/3424-222-0x00000000028E0000-0x0000000002940000-memory.dmpFilesize
384KB
-
memory/3424-224-0x00000000028E0000-0x0000000002940000-memory.dmpFilesize
384KB
-
memory/3424-226-0x00000000028E0000-0x0000000002940000-memory.dmpFilesize
384KB
-
memory/3424-228-0x00000000028E0000-0x0000000002940000-memory.dmpFilesize
384KB
-
memory/3424-167-0x00000000028E0000-0x0000000002940000-memory.dmpFilesize
384KB
-
memory/3424-230-0x00000000028E0000-0x0000000002940000-memory.dmpFilesize
384KB
-
memory/3424-2142-0x0000000004F10000-0x0000000004F20000-memory.dmpFilesize
64KB
-
memory/3424-2315-0x0000000004F10000-0x0000000004F20000-memory.dmpFilesize
64KB
-
memory/3424-2318-0x0000000004F10000-0x0000000004F20000-memory.dmpFilesize
64KB
-
memory/3424-2319-0x0000000004F10000-0x0000000004F20000-memory.dmpFilesize
64KB
-
memory/3424-162-0x0000000000970000-0x00000000009CB000-memory.dmpFilesize
364KB
-
memory/3424-166-0x00000000028E0000-0x0000000002940000-memory.dmpFilesize
384KB
-
memory/3424-163-0x0000000004F10000-0x0000000004F20000-memory.dmpFilesize
64KB
-
memory/3424-165-0x0000000005020000-0x00000000055C4000-memory.dmpFilesize
5.6MB
-
memory/3424-164-0x0000000004F10000-0x0000000004F20000-memory.dmpFilesize
64KB
-
memory/4452-2337-0x0000000005210000-0x000000000531A000-memory.dmpFilesize
1.0MB
-
memory/4452-2341-0x0000000004FF0000-0x0000000005000000-memory.dmpFilesize
64KB
-
memory/4452-2335-0x00000000006D0000-0x00000000006FE000-memory.dmpFilesize
184KB
-
memory/4452-2343-0x0000000004FF0000-0x0000000005000000-memory.dmpFilesize
64KB