Analysis
-
max time kernel
129s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 20:16
Static task
static1
Behavioral task
behavioral1
Sample
0551466aa73591b9105e4d7f9507d9e155da68b5034355713f40814a38d2458d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0551466aa73591b9105e4d7f9507d9e155da68b5034355713f40814a38d2458d.exe
Resource
win10v2004-20230220-en
General
-
Target
0551466aa73591b9105e4d7f9507d9e155da68b5034355713f40814a38d2458d.exe
-
Size
1.2MB
-
MD5
707725bd286476cd5f8e61f798fd1c3a
-
SHA1
b6539dd68ec34352416b826adee13f60145935ee
-
SHA256
0551466aa73591b9105e4d7f9507d9e155da68b5034355713f40814a38d2458d
-
SHA512
4116579b7d79970930a869897370e392a3ba18bc1487c5f2001a4256d9c12be671915c960c7b17fd22deffd4ec45fee71386b0f854250882dc53f0fe48825866
-
SSDEEP
24576:zyD/Gg+8bXihqVnxHD6xRtpNMi7Fz/1KJUAEXqRzwJm9Q/zxsl:GD/Gp8TvYDNzg86pw4m/zx
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
Processes:
resource yara_rule behavioral2/memory/4712-2331-0x0000000005EC0000-0x00000000064D8000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
s01188533.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation s01188533.exe -
Executes dropped EXE 6 IoCs
Processes:
z47064142.exez47099460.exez10945997.exes01188533.exe1.exet15525222.exepid process 1268 z47064142.exe 1972 z47099460.exe 2216 z10945997.exe 1832 s01188533.exe 4712 1.exe 1680 t15525222.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
z10945997.exe0551466aa73591b9105e4d7f9507d9e155da68b5034355713f40814a38d2458d.exez47064142.exez47099460.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z10945997.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0551466aa73591b9105e4d7f9507d9e155da68b5034355713f40814a38d2458d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0551466aa73591b9105e4d7f9507d9e155da68b5034355713f40814a38d2458d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z47064142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z47064142.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z47099460.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z47099460.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z10945997.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1172 1832 WerFault.exe s01188533.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
s01188533.exedescription pid process Token: SeDebugPrivilege 1832 s01188533.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
0551466aa73591b9105e4d7f9507d9e155da68b5034355713f40814a38d2458d.exez47064142.exez47099460.exez10945997.exes01188533.exedescription pid process target process PID 3704 wrote to memory of 1268 3704 0551466aa73591b9105e4d7f9507d9e155da68b5034355713f40814a38d2458d.exe z47064142.exe PID 3704 wrote to memory of 1268 3704 0551466aa73591b9105e4d7f9507d9e155da68b5034355713f40814a38d2458d.exe z47064142.exe PID 3704 wrote to memory of 1268 3704 0551466aa73591b9105e4d7f9507d9e155da68b5034355713f40814a38d2458d.exe z47064142.exe PID 1268 wrote to memory of 1972 1268 z47064142.exe z47099460.exe PID 1268 wrote to memory of 1972 1268 z47064142.exe z47099460.exe PID 1268 wrote to memory of 1972 1268 z47064142.exe z47099460.exe PID 1972 wrote to memory of 2216 1972 z47099460.exe z10945997.exe PID 1972 wrote to memory of 2216 1972 z47099460.exe z10945997.exe PID 1972 wrote to memory of 2216 1972 z47099460.exe z10945997.exe PID 2216 wrote to memory of 1832 2216 z10945997.exe s01188533.exe PID 2216 wrote to memory of 1832 2216 z10945997.exe s01188533.exe PID 2216 wrote to memory of 1832 2216 z10945997.exe s01188533.exe PID 1832 wrote to memory of 4712 1832 s01188533.exe 1.exe PID 1832 wrote to memory of 4712 1832 s01188533.exe 1.exe PID 1832 wrote to memory of 4712 1832 s01188533.exe 1.exe PID 2216 wrote to memory of 1680 2216 z10945997.exe t15525222.exe PID 2216 wrote to memory of 1680 2216 z10945997.exe t15525222.exe PID 2216 wrote to memory of 1680 2216 z10945997.exe t15525222.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0551466aa73591b9105e4d7f9507d9e155da68b5034355713f40814a38d2458d.exe"C:\Users\Admin\AppData\Local\Temp\0551466aa73591b9105e4d7f9507d9e155da68b5034355713f40814a38d2458d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z47064142.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z47064142.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z47099460.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z47099460.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z10945997.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z10945997.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s01188533.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s01188533.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
PID:4712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1832 -s 15206⤵
- Program crash
PID:1172
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t15525222.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t15525222.exe5⤵
- Executes dropped EXE
PID:1680
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1832 -ip 18321⤵PID:2396
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD573c60f538a0e4b06af0fa7388d376a94
SHA1da0d7346a3ecdca0b79bdde209ac68e748d83977
SHA256b118c3438e7945031fb55db6759c2d62abbfba1c8f784db89026263d1252f435
SHA512c8448087163a975077da1672ad334d706bebe731a902eb71e1e45d9912e985a55723b5eed368cda72f0bddfd665fc936c838b94533d5929b2a460c366a775079
-
Filesize
1.0MB
MD573c60f538a0e4b06af0fa7388d376a94
SHA1da0d7346a3ecdca0b79bdde209ac68e748d83977
SHA256b118c3438e7945031fb55db6759c2d62abbfba1c8f784db89026263d1252f435
SHA512c8448087163a975077da1672ad334d706bebe731a902eb71e1e45d9912e985a55723b5eed368cda72f0bddfd665fc936c838b94533d5929b2a460c366a775079
-
Filesize
761KB
MD5a463bbd477d343cac7ebb45c28cbd010
SHA16b6e67fb43d2da5a29818b483c481e0c321d8b3a
SHA2563661d024b2b94eaff833da39578c8e2c1f464da984062162f17f11d3760071a3
SHA512d6625ec78a0678636058ea270fb687fcd92dff9a28cb760b6195fffd84a6ab6dc0d66e6aac474b38bffcbbe917228087e706a6533169eb0033ac2f786feb6785
-
Filesize
761KB
MD5a463bbd477d343cac7ebb45c28cbd010
SHA16b6e67fb43d2da5a29818b483c481e0c321d8b3a
SHA2563661d024b2b94eaff833da39578c8e2c1f464da984062162f17f11d3760071a3
SHA512d6625ec78a0678636058ea270fb687fcd92dff9a28cb760b6195fffd84a6ab6dc0d66e6aac474b38bffcbbe917228087e706a6533169eb0033ac2f786feb6785
-
Filesize
578KB
MD5c695ed2ccca8768a018c84d41c53cd1f
SHA1bfd38db2dc78e94d08741a7d1d9907b7a601a1ce
SHA256278b0eb7c23716f195b115758be81aea68df11e09e33716d16e081ed0308f383
SHA512de9a5f3c1e78cf1d28138fb1c2924148f61c296e21bcab62a5a342df029ff22405d3bf5761047d25b2e7faf45dcd6b2a71da20a7ac245d26d21f2e307e24a0c0
-
Filesize
578KB
MD5c695ed2ccca8768a018c84d41c53cd1f
SHA1bfd38db2dc78e94d08741a7d1d9907b7a601a1ce
SHA256278b0eb7c23716f195b115758be81aea68df11e09e33716d16e081ed0308f383
SHA512de9a5f3c1e78cf1d28138fb1c2924148f61c296e21bcab62a5a342df029ff22405d3bf5761047d25b2e7faf45dcd6b2a71da20a7ac245d26d21f2e307e24a0c0
-
Filesize
502KB
MD577df2c213a75dba9c17a0b71700e1bc5
SHA12479324bee42666457da303073d4419d63b8e317
SHA256cd794b8eeb4c53f770c633a424722ffd92d2d27e137a5bf8a4927f0e6e31e8e8
SHA51296ce791653a263bea666fc6f92f27a8eb6752f8dd18b40d3297486341235e5c53a77222443dcfb1d40b476f34e1c6d032de63b97010f00dfb47ae5b57e3db5c0
-
Filesize
502KB
MD577df2c213a75dba9c17a0b71700e1bc5
SHA12479324bee42666457da303073d4419d63b8e317
SHA256cd794b8eeb4c53f770c633a424722ffd92d2d27e137a5bf8a4927f0e6e31e8e8
SHA51296ce791653a263bea666fc6f92f27a8eb6752f8dd18b40d3297486341235e5c53a77222443dcfb1d40b476f34e1c6d032de63b97010f00dfb47ae5b57e3db5c0
-
Filesize
169KB
MD5bc9df3348a2791024a40aa9c488d204c
SHA18e26d6766a271cdb258f4b7e2e941b30aabf3ed3
SHA2561b996f0a4cf5559aba464ee8c0bdaaf663d28934c62a467e788efa1301899e89
SHA512170db9b15e200daff1bfac7fc023320bc28fe91a19272853e0119429273c7786678ff0e37472d198f0b0b7e6d24baef98ce19e09e37e57896521b0411b44af01
-
Filesize
169KB
MD5bc9df3348a2791024a40aa9c488d204c
SHA18e26d6766a271cdb258f4b7e2e941b30aabf3ed3
SHA2561b996f0a4cf5559aba464ee8c0bdaaf663d28934c62a467e788efa1301899e89
SHA512170db9b15e200daff1bfac7fc023320bc28fe91a19272853e0119429273c7786678ff0e37472d198f0b0b7e6d24baef98ce19e09e37e57896521b0411b44af01
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf