Analysis
-
max time kernel
138s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 21:24
Static task
static1
Behavioral task
behavioral1
Sample
3a85259fe25aa155360523ff45bfbcc096b2399af53bc8c7eedc0d3f9ee36c8e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3a85259fe25aa155360523ff45bfbcc096b2399af53bc8c7eedc0d3f9ee36c8e.exe
Resource
win10v2004-20230220-en
General
-
Target
3a85259fe25aa155360523ff45bfbcc096b2399af53bc8c7eedc0d3f9ee36c8e.exe
-
Size
1.2MB
-
MD5
4003572c787ad8b8dfd71d20cfa3c617
-
SHA1
18b5e3d42c265aba2020bd46f0b880e0576bbd28
-
SHA256
3a85259fe25aa155360523ff45bfbcc096b2399af53bc8c7eedc0d3f9ee36c8e
-
SHA512
ebd01d10df8d3328686f171a6b9976098bbc307d4002a6604f0c8244dee8b3ded830f92e0e430b8bbbd7eeb16750636341129c47a810d376d766e9b01df9d551
-
SSDEEP
24576:xy3IWKapH5dfljU2nw/Zle1mko/MYY8TxJ3DhD7f4s1v:k4WKapHDdUew//e1m5/333DhQ
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
Processes:
resource yara_rule behavioral2/memory/1744-2333-0x0000000005560000-0x0000000005B78000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
s27735516.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation s27735516.exe -
Executes dropped EXE 6 IoCs
Processes:
z99261688.exez32226167.exez61261214.exes27735516.exe1.exet44754791.exepid process 4412 z99261688.exe 3768 z32226167.exe 4456 z61261214.exe 4064 s27735516.exe 1744 1.exe 3772 t44754791.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
3a85259fe25aa155360523ff45bfbcc096b2399af53bc8c7eedc0d3f9ee36c8e.exez99261688.exez32226167.exez61261214.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3a85259fe25aa155360523ff45bfbcc096b2399af53bc8c7eedc0d3f9ee36c8e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3a85259fe25aa155360523ff45bfbcc096b2399af53bc8c7eedc0d3f9ee36c8e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z99261688.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z99261688.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z32226167.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z32226167.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z61261214.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z61261214.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4684 4064 WerFault.exe s27735516.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
s27735516.exedescription pid process Token: SeDebugPrivilege 4064 s27735516.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
3a85259fe25aa155360523ff45bfbcc096b2399af53bc8c7eedc0d3f9ee36c8e.exez99261688.exez32226167.exez61261214.exes27735516.exedescription pid process target process PID 2492 wrote to memory of 4412 2492 3a85259fe25aa155360523ff45bfbcc096b2399af53bc8c7eedc0d3f9ee36c8e.exe z99261688.exe PID 2492 wrote to memory of 4412 2492 3a85259fe25aa155360523ff45bfbcc096b2399af53bc8c7eedc0d3f9ee36c8e.exe z99261688.exe PID 2492 wrote to memory of 4412 2492 3a85259fe25aa155360523ff45bfbcc096b2399af53bc8c7eedc0d3f9ee36c8e.exe z99261688.exe PID 4412 wrote to memory of 3768 4412 z99261688.exe z32226167.exe PID 4412 wrote to memory of 3768 4412 z99261688.exe z32226167.exe PID 4412 wrote to memory of 3768 4412 z99261688.exe z32226167.exe PID 3768 wrote to memory of 4456 3768 z32226167.exe z61261214.exe PID 3768 wrote to memory of 4456 3768 z32226167.exe z61261214.exe PID 3768 wrote to memory of 4456 3768 z32226167.exe z61261214.exe PID 4456 wrote to memory of 4064 4456 z61261214.exe s27735516.exe PID 4456 wrote to memory of 4064 4456 z61261214.exe s27735516.exe PID 4456 wrote to memory of 4064 4456 z61261214.exe s27735516.exe PID 4064 wrote to memory of 1744 4064 s27735516.exe 1.exe PID 4064 wrote to memory of 1744 4064 s27735516.exe 1.exe PID 4064 wrote to memory of 1744 4064 s27735516.exe 1.exe PID 4456 wrote to memory of 3772 4456 z61261214.exe t44754791.exe PID 4456 wrote to memory of 3772 4456 z61261214.exe t44754791.exe PID 4456 wrote to memory of 3772 4456 z61261214.exe t44754791.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a85259fe25aa155360523ff45bfbcc096b2399af53bc8c7eedc0d3f9ee36c8e.exe"C:\Users\Admin\AppData\Local\Temp\3a85259fe25aa155360523ff45bfbcc096b2399af53bc8c7eedc0d3f9ee36c8e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z99261688.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z99261688.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z32226167.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z32226167.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z61261214.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z61261214.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s27735516.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s27735516.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
PID:1744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 13766⤵
- Program crash
PID:4684
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t44754791.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t44754791.exe5⤵
- Executes dropped EXE
PID:3772
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4064 -ip 40641⤵PID:1964
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD577cd539e6bb802d2c7a45799bed22069
SHA194bd6268a99a199129930222b2f68f1af9f7bbca
SHA256497e9622259d34edf315187417dd6d9a9a8e85dab4046b05bdddb90d14e7c302
SHA512f35cae02e91425628f7f7ec0abeed73bb64d4ac1936ac043d6448452929b49786cc22d8d7355bb11e7fcb59d42eab22f9197dd0efc1f4dc8fc8b705ce6a45883
-
Filesize
1.0MB
MD577cd539e6bb802d2c7a45799bed22069
SHA194bd6268a99a199129930222b2f68f1af9f7bbca
SHA256497e9622259d34edf315187417dd6d9a9a8e85dab4046b05bdddb90d14e7c302
SHA512f35cae02e91425628f7f7ec0abeed73bb64d4ac1936ac043d6448452929b49786cc22d8d7355bb11e7fcb59d42eab22f9197dd0efc1f4dc8fc8b705ce6a45883
-
Filesize
752KB
MD54e7d72b302d12b94ca21a0c7b190bbec
SHA19bca05cfa5379f42059c61f96b9f2ee855348e84
SHA2568844a936314816684bd41f7288088fbdf775afec579ed158406ccd4a1ce3efee
SHA5120f75f6e0d703984ce73c45e380f51af4aeb55858ca21a6d3d4dce18f77f84e845ecabb383061cef5b6d712fc39da4d69a5a6b053ac21ac3eb8005f2ab5058498
-
Filesize
752KB
MD54e7d72b302d12b94ca21a0c7b190bbec
SHA19bca05cfa5379f42059c61f96b9f2ee855348e84
SHA2568844a936314816684bd41f7288088fbdf775afec579ed158406ccd4a1ce3efee
SHA5120f75f6e0d703984ce73c45e380f51af4aeb55858ca21a6d3d4dce18f77f84e845ecabb383061cef5b6d712fc39da4d69a5a6b053ac21ac3eb8005f2ab5058498
-
Filesize
569KB
MD5f118cf77615e1052b169083c23fae31d
SHA1e33808b09a731f79e48204b4a623445f8a41e163
SHA25680eb40e308861153c12bfe75567fc37159e0fbb3dfe2925c24e43bb0c8f4c928
SHA512089fbf2fde1b9e10c7a9a5dd92239735a3238c376d0879587f5745b0f790416c094b5a3fee84e22810e0445b6243e996f92b31517319ad15aa14d090ce57df01
-
Filesize
569KB
MD5f118cf77615e1052b169083c23fae31d
SHA1e33808b09a731f79e48204b4a623445f8a41e163
SHA25680eb40e308861153c12bfe75567fc37159e0fbb3dfe2925c24e43bb0c8f4c928
SHA512089fbf2fde1b9e10c7a9a5dd92239735a3238c376d0879587f5745b0f790416c094b5a3fee84e22810e0445b6243e996f92b31517319ad15aa14d090ce57df01
-
Filesize
488KB
MD51a038a5fa4dd8abc47649ec998769578
SHA1587c8b135b509a58638986d91aa2fd8d76c0ddb3
SHA256f953a6a3468b3c1587873999febd25c81fd1bab11f0c9574967e1978a1266e59
SHA512c33358248266f24704e8b7df628b42d4bbbe9b914ef3c003b8231931c1af04ccf6c56fa13ff42d3b37859f5e29d9cc49cfcb82b6679296c673cca3bc97567286
-
Filesize
488KB
MD51a038a5fa4dd8abc47649ec998769578
SHA1587c8b135b509a58638986d91aa2fd8d76c0ddb3
SHA256f953a6a3468b3c1587873999febd25c81fd1bab11f0c9574967e1978a1266e59
SHA512c33358248266f24704e8b7df628b42d4bbbe9b914ef3c003b8231931c1af04ccf6c56fa13ff42d3b37859f5e29d9cc49cfcb82b6679296c673cca3bc97567286
-
Filesize
169KB
MD578bbe11715bf15957da7b3e7fe0f41e6
SHA1521b868ff476906f5dee61003ba89856d7dbabaf
SHA256d82b4d4a5e3761593541a1a05a205803ee94cfeb32f67889ba9c69e50beebec7
SHA512e87572253ddc1c121a158bd8fa940d53f335c93a0200cfcea808c5741154cf13a1fea7c1593c51b5fef9c36fad1dab4c32b8e6b74386dda2afc9512fae201a74
-
Filesize
169KB
MD578bbe11715bf15957da7b3e7fe0f41e6
SHA1521b868ff476906f5dee61003ba89856d7dbabaf
SHA256d82b4d4a5e3761593541a1a05a205803ee94cfeb32f67889ba9c69e50beebec7
SHA512e87572253ddc1c121a158bd8fa940d53f335c93a0200cfcea808c5741154cf13a1fea7c1593c51b5fef9c36fad1dab4c32b8e6b74386dda2afc9512fae201a74
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf