Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-05-2023 21:16

General

  • Target

    33e7cefcff0b0dd97f1145ddbdd93c43f877b4955bf83e5f33636c62d89b02c2.exe

  • Size

    1.2MB

  • MD5

    61d304bbf73cfe10a1b3abeccd7bc0e9

  • SHA1

    89a7f897d3cfa2c19ccdd59c2f172e1031d79481

  • SHA256

    33e7cefcff0b0dd97f1145ddbdd93c43f877b4955bf83e5f33636c62d89b02c2

  • SHA512

    6cb718a026fa567c96b4c3c2f5a5db3701c7a0e5d7ca4a99b31c37f4e0b7152ccd5d36ee05eabc93c8b7daf08ed737aec98c83ff9b2b9ad33b66fffc0906e269

  • SSDEEP

    24576:oyMy8yK7Jn2wJZmt+KBzt/V5VF2rnCoav/embd/gia81s0:vMt7JnRalr9jFunAv/Rbd/g81s

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

life

C2

185.161.248.73:4164

Attributes
  • auth_value

    8685d11953530b68ad5ec703809d9f91

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\33e7cefcff0b0dd97f1145ddbdd93c43f877b4955bf83e5f33636c62d89b02c2.exe
    "C:\Users\Admin\AppData\Local\Temp\33e7cefcff0b0dd97f1145ddbdd93c43f877b4955bf83e5f33636c62d89b02c2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:636
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z96064612.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z96064612.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2932
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z55422252.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z55422252.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2224
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z27052400.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z27052400.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3156
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s25857888.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s25857888.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1156
            • C:\Windows\Temp\1.exe
              "C:\Windows\Temp\1.exe"
              6⤵
              • Executes dropped EXE
              PID:2628
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1156 -s 1468
              6⤵
              • Program crash
              PID:2036
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t05338406.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t05338406.exe
            5⤵
            • Executes dropped EXE
            PID:4980
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1156 -ip 1156
    1⤵
      PID:1700

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z96064612.exe
      Filesize

      1.0MB

      MD5

      56ae7a95adf149c6a496ac68280c85d6

      SHA1

      65237a843aea04ace1402af32b5819da41f91235

      SHA256

      5d9d547dd11b6656dfa27113ec74e985b85b4fc6302595751ce67f61e7c9643a

      SHA512

      fbc8ee971b2e8c4ee58cd00eb7cb5ba31ad2a07d70633828ff76fb6279c889874fa30ef65b2bce7f172bad495f5d87af35786600fefc24a1651b47dbcafd499c

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z96064612.exe
      Filesize

      1.0MB

      MD5

      56ae7a95adf149c6a496ac68280c85d6

      SHA1

      65237a843aea04ace1402af32b5819da41f91235

      SHA256

      5d9d547dd11b6656dfa27113ec74e985b85b4fc6302595751ce67f61e7c9643a

      SHA512

      fbc8ee971b2e8c4ee58cd00eb7cb5ba31ad2a07d70633828ff76fb6279c889874fa30ef65b2bce7f172bad495f5d87af35786600fefc24a1651b47dbcafd499c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z55422252.exe
      Filesize

      760KB

      MD5

      e954f96ea46f281c7826005280541337

      SHA1

      e6008ce2529e46db343f2a99d96c8fac58ac91f5

      SHA256

      d0db5ebb018d16c4d6ada34446187687c6336b8c2944d0051d2e9df5b29a5198

      SHA512

      e2edb697297df7ec4b818a9603d6366703ece2cadd37bfbb5d699b96704253e9de5464ed9c65b76eb7ea0865dfe799cce33a05d0e478f2959177df986efe316a

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z55422252.exe
      Filesize

      760KB

      MD5

      e954f96ea46f281c7826005280541337

      SHA1

      e6008ce2529e46db343f2a99d96c8fac58ac91f5

      SHA256

      d0db5ebb018d16c4d6ada34446187687c6336b8c2944d0051d2e9df5b29a5198

      SHA512

      e2edb697297df7ec4b818a9603d6366703ece2cadd37bfbb5d699b96704253e9de5464ed9c65b76eb7ea0865dfe799cce33a05d0e478f2959177df986efe316a

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z27052400.exe
      Filesize

      577KB

      MD5

      dd066e45fdeb5e78ebab4bfc67c29f84

      SHA1

      83a5ac52e8da2b0fa946e17aba67a73b63d2b132

      SHA256

      6e3f72e8bf80160d95d3af7c6884f730ab230e062c8b2497643679386ce804b5

      SHA512

      4ec18aef6845fe8dd821162e6da7e617d15def29900ac493d106113fb82535a3576945ac0c395fd91a2f49327c0008f74bced59497bd6f1640583b0b603d8489

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z27052400.exe
      Filesize

      577KB

      MD5

      dd066e45fdeb5e78ebab4bfc67c29f84

      SHA1

      83a5ac52e8da2b0fa946e17aba67a73b63d2b132

      SHA256

      6e3f72e8bf80160d95d3af7c6884f730ab230e062c8b2497643679386ce804b5

      SHA512

      4ec18aef6845fe8dd821162e6da7e617d15def29900ac493d106113fb82535a3576945ac0c395fd91a2f49327c0008f74bced59497bd6f1640583b0b603d8489

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s25857888.exe
      Filesize

      574KB

      MD5

      6cf22593757cbcb5f24d501203960300

      SHA1

      64afb026d1d802d1f6d9d08924a9126b1aec1c11

      SHA256

      deb62822b46d57856eefa5a44e94afce3bbcc24717ddffe283257e63cf0ee6e6

      SHA512

      d176c9ebf3af146eb8f315990ae8c00e755ce68623aebeb06fad515c407baa8511970f639c1a3b32673fe8d4fa95a1d7e80c30c666faf921ddae819f1af744ea

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s25857888.exe
      Filesize

      574KB

      MD5

      6cf22593757cbcb5f24d501203960300

      SHA1

      64afb026d1d802d1f6d9d08924a9126b1aec1c11

      SHA256

      deb62822b46d57856eefa5a44e94afce3bbcc24717ddffe283257e63cf0ee6e6

      SHA512

      d176c9ebf3af146eb8f315990ae8c00e755ce68623aebeb06fad515c407baa8511970f639c1a3b32673fe8d4fa95a1d7e80c30c666faf921ddae819f1af744ea

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t05338406.exe
      Filesize

      169KB

      MD5

      d92b2c5a3e2293102a35f976b7808c7d

      SHA1

      f2436d17f65f50a2e784473bca777b5438fdcfa9

      SHA256

      ee9cb877138212c99d7d0aa13b25b9344a6d6018f76cdf4cdc10c9c4be6557e5

      SHA512

      bcade93e9e761a3bc2b6fa4eb4a549d96a73692c06065499c77a6720558ba3f357ae9393cea82eea02462b6f15ee58624998ab1c2a5ef51add27d19b5b9e72fe

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t05338406.exe
      Filesize

      169KB

      MD5

      d92b2c5a3e2293102a35f976b7808c7d

      SHA1

      f2436d17f65f50a2e784473bca777b5438fdcfa9

      SHA256

      ee9cb877138212c99d7d0aa13b25b9344a6d6018f76cdf4cdc10c9c4be6557e5

      SHA512

      bcade93e9e761a3bc2b6fa4eb4a549d96a73692c06065499c77a6720558ba3f357ae9393cea82eea02462b6f15ee58624998ab1c2a5ef51add27d19b5b9e72fe

    • C:\Windows\Temp\1.exe
      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • C:\Windows\Temp\1.exe
      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • C:\Windows\Temp\1.exe
      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • memory/1156-204-0x0000000005660000-0x00000000056C0000-memory.dmp
      Filesize

      384KB

    • memory/1156-216-0x0000000005660000-0x00000000056C0000-memory.dmp
      Filesize

      384KB

    • memory/1156-177-0x0000000005660000-0x00000000056C0000-memory.dmp
      Filesize

      384KB

    • memory/1156-173-0x0000000005660000-0x00000000056C0000-memory.dmp
      Filesize

      384KB

    • memory/1156-179-0x0000000005660000-0x00000000056C0000-memory.dmp
      Filesize

      384KB

    • memory/1156-171-0x0000000005660000-0x00000000056C0000-memory.dmp
      Filesize

      384KB

    • memory/1156-183-0x0000000005660000-0x00000000056C0000-memory.dmp
      Filesize

      384KB

    • memory/1156-185-0x0000000005660000-0x00000000056C0000-memory.dmp
      Filesize

      384KB

    • memory/1156-181-0x0000000005660000-0x00000000056C0000-memory.dmp
      Filesize

      384KB

    • memory/1156-187-0x0000000005660000-0x00000000056C0000-memory.dmp
      Filesize

      384KB

    • memory/1156-189-0x0000000005660000-0x00000000056C0000-memory.dmp
      Filesize

      384KB

    • memory/1156-191-0x0000000005660000-0x00000000056C0000-memory.dmp
      Filesize

      384KB

    • memory/1156-193-0x0000000005660000-0x00000000056C0000-memory.dmp
      Filesize

      384KB

    • memory/1156-195-0x0000000005660000-0x00000000056C0000-memory.dmp
      Filesize

      384KB

    • memory/1156-196-0x0000000002520000-0x0000000002530000-memory.dmp
      Filesize

      64KB

    • memory/1156-199-0x0000000005660000-0x00000000056C0000-memory.dmp
      Filesize

      384KB

    • memory/1156-198-0x0000000002520000-0x0000000002530000-memory.dmp
      Filesize

      64KB

    • memory/1156-202-0x0000000005660000-0x00000000056C0000-memory.dmp
      Filesize

      384KB

    • memory/1156-201-0x0000000002520000-0x0000000002530000-memory.dmp
      Filesize

      64KB

    • memory/1156-169-0x0000000005660000-0x00000000056C0000-memory.dmp
      Filesize

      384KB

    • memory/1156-206-0x0000000005660000-0x00000000056C0000-memory.dmp
      Filesize

      384KB

    • memory/1156-208-0x0000000005660000-0x00000000056C0000-memory.dmp
      Filesize

      384KB

    • memory/1156-210-0x0000000005660000-0x00000000056C0000-memory.dmp
      Filesize

      384KB

    • memory/1156-214-0x0000000005660000-0x00000000056C0000-memory.dmp
      Filesize

      384KB

    • memory/1156-212-0x0000000005660000-0x00000000056C0000-memory.dmp
      Filesize

      384KB

    • memory/1156-175-0x0000000005660000-0x00000000056C0000-memory.dmp
      Filesize

      384KB

    • memory/1156-218-0x0000000005660000-0x00000000056C0000-memory.dmp
      Filesize

      384KB

    • memory/1156-220-0x0000000005660000-0x00000000056C0000-memory.dmp
      Filesize

      384KB

    • memory/1156-222-0x0000000005660000-0x00000000056C0000-memory.dmp
      Filesize

      384KB

    • memory/1156-224-0x0000000005660000-0x00000000056C0000-memory.dmp
      Filesize

      384KB

    • memory/1156-226-0x0000000005660000-0x00000000056C0000-memory.dmp
      Filesize

      384KB

    • memory/1156-228-0x0000000005660000-0x00000000056C0000-memory.dmp
      Filesize

      384KB

    • memory/1156-230-0x0000000005660000-0x00000000056C0000-memory.dmp
      Filesize

      384KB

    • memory/1156-167-0x0000000005660000-0x00000000056C0000-memory.dmp
      Filesize

      384KB

    • memory/1156-2324-0x0000000002520000-0x0000000002530000-memory.dmp
      Filesize

      64KB

    • memory/1156-165-0x0000000005660000-0x00000000056C0000-memory.dmp
      Filesize

      384KB

    • memory/1156-2322-0x0000000002520000-0x0000000002530000-memory.dmp
      Filesize

      64KB

    • memory/1156-164-0x0000000005660000-0x00000000056C0000-memory.dmp
      Filesize

      384KB

    • memory/1156-2328-0x0000000002520000-0x0000000002530000-memory.dmp
      Filesize

      64KB

    • memory/1156-162-0x0000000000A70000-0x0000000000ACB000-memory.dmp
      Filesize

      364KB

    • memory/1156-163-0x0000000005070000-0x0000000005614000-memory.dmp
      Filesize

      5.6MB

    • memory/2628-2331-0x00000000058A0000-0x0000000005EB8000-memory.dmp
      Filesize

      6.1MB

    • memory/2628-2329-0x00000000008E0000-0x000000000090E000-memory.dmp
      Filesize

      184KB

    • memory/2628-2335-0x0000000005390000-0x000000000549A000-memory.dmp
      Filesize

      1.0MB

    • memory/2628-2337-0x0000000002CD0000-0x0000000002CE2000-memory.dmp
      Filesize

      72KB

    • memory/2628-2338-0x0000000002D20000-0x0000000002D30000-memory.dmp
      Filesize

      64KB

    • memory/2628-2339-0x00000000052C0000-0x00000000052FC000-memory.dmp
      Filesize

      240KB

    • memory/2628-2341-0x0000000002D20000-0x0000000002D30000-memory.dmp
      Filesize

      64KB

    • memory/4980-2336-0x0000000000A00000-0x0000000000A2E000-memory.dmp
      Filesize

      184KB

    • memory/4980-2340-0x00000000052B0000-0x00000000052C0000-memory.dmp
      Filesize

      64KB

    • memory/4980-2342-0x00000000052B0000-0x00000000052C0000-memory.dmp
      Filesize

      64KB