Analysis
-
max time kernel
187s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 20:35
Static task
static1
Behavioral task
behavioral1
Sample
133932b34397a7c79eee7abf1a3ae5a3c0381f1073f1469d863454e3f40f32d0.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
133932b34397a7c79eee7abf1a3ae5a3c0381f1073f1469d863454e3f40f32d0.exe
Resource
win10v2004-20230220-en
General
-
Target
133932b34397a7c79eee7abf1a3ae5a3c0381f1073f1469d863454e3f40f32d0.exe
-
Size
1.2MB
-
MD5
d97d9cb3f0c27b34ee1528dabb0c14c8
-
SHA1
bb1bb3cf5c2a08c4ba43ee92e5645f0cb6fbcaf9
-
SHA256
133932b34397a7c79eee7abf1a3ae5a3c0381f1073f1469d863454e3f40f32d0
-
SHA512
ce5e92368180ba50517e344b72a8598094ebba278f436cd477475846cc8ac17f07178a4a08eab6534932986590aa20fca1a6e48573cf8b6fc8e5c1675ac6d8c8
-
SSDEEP
24576:CyOodXGXtsVh73MByv+VaTOv/ahHuKNW6ManOD+RGEEluZ+tQ68s/vIdLoTeKK:p5EtyhMBy2VaTOvIfNMr+mZQ68SvIdcP
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
Processes:
resource yara_rule behavioral2/memory/452-2336-0x000000000A440000-0x000000000AA58000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
s42713041.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation s42713041.exe -
Executes dropped EXE 6 IoCs
Processes:
z25618088.exez07442028.exez44776043.exes42713041.exe1.exet58392272.exepid process 2160 z25618088.exe 3508 z07442028.exe 652 z44776043.exe 752 s42713041.exe 452 1.exe 1800 t58392272.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
z07442028.exez44776043.exe133932b34397a7c79eee7abf1a3ae5a3c0381f1073f1469d863454e3f40f32d0.exez25618088.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z07442028.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z44776043.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z44776043.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 133932b34397a7c79eee7abf1a3ae5a3c0381f1073f1469d863454e3f40f32d0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 133932b34397a7c79eee7abf1a3ae5a3c0381f1073f1469d863454e3f40f32d0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z25618088.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z25618088.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z07442028.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4364 752 WerFault.exe s42713041.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
s42713041.exedescription pid process Token: SeDebugPrivilege 752 s42713041.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
133932b34397a7c79eee7abf1a3ae5a3c0381f1073f1469d863454e3f40f32d0.exez25618088.exez07442028.exez44776043.exes42713041.exedescription pid process target process PID 1988 wrote to memory of 2160 1988 133932b34397a7c79eee7abf1a3ae5a3c0381f1073f1469d863454e3f40f32d0.exe z25618088.exe PID 1988 wrote to memory of 2160 1988 133932b34397a7c79eee7abf1a3ae5a3c0381f1073f1469d863454e3f40f32d0.exe z25618088.exe PID 1988 wrote to memory of 2160 1988 133932b34397a7c79eee7abf1a3ae5a3c0381f1073f1469d863454e3f40f32d0.exe z25618088.exe PID 2160 wrote to memory of 3508 2160 z25618088.exe z07442028.exe PID 2160 wrote to memory of 3508 2160 z25618088.exe z07442028.exe PID 2160 wrote to memory of 3508 2160 z25618088.exe z07442028.exe PID 3508 wrote to memory of 652 3508 z07442028.exe z44776043.exe PID 3508 wrote to memory of 652 3508 z07442028.exe z44776043.exe PID 3508 wrote to memory of 652 3508 z07442028.exe z44776043.exe PID 652 wrote to memory of 752 652 z44776043.exe s42713041.exe PID 652 wrote to memory of 752 652 z44776043.exe s42713041.exe PID 652 wrote to memory of 752 652 z44776043.exe s42713041.exe PID 752 wrote to memory of 452 752 s42713041.exe 1.exe PID 752 wrote to memory of 452 752 s42713041.exe 1.exe PID 752 wrote to memory of 452 752 s42713041.exe 1.exe PID 652 wrote to memory of 1800 652 z44776043.exe t58392272.exe PID 652 wrote to memory of 1800 652 z44776043.exe t58392272.exe PID 652 wrote to memory of 1800 652 z44776043.exe t58392272.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\133932b34397a7c79eee7abf1a3ae5a3c0381f1073f1469d863454e3f40f32d0.exe"C:\Users\Admin\AppData\Local\Temp\133932b34397a7c79eee7abf1a3ae5a3c0381f1073f1469d863454e3f40f32d0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z25618088.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z25618088.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z07442028.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z07442028.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z44776043.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z44776043.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s42713041.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s42713041.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
PID:452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 752 -s 13726⤵
- Program crash
PID:4364
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t58392272.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t58392272.exe5⤵
- Executes dropped EXE
PID:1800
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 752 -ip 7521⤵PID:5036
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5a999e28b8f11829150977b3bdff6ae91
SHA1518ed85181c76a08e277aaad241694fb966549e9
SHA256f9fb9b884a37f18d56507df2e9a409e8ce0c8525ee6a18a8382f67325a99f0ee
SHA51255fa4c9e079012dea941cb93b9f9090c723ee071264737a191f58d558e68abf23569f64d34f1ff537caeb48005c4d746896b5d58af0247a5020143c1a013ea2e
-
Filesize
1.0MB
MD5a999e28b8f11829150977b3bdff6ae91
SHA1518ed85181c76a08e277aaad241694fb966549e9
SHA256f9fb9b884a37f18d56507df2e9a409e8ce0c8525ee6a18a8382f67325a99f0ee
SHA51255fa4c9e079012dea941cb93b9f9090c723ee071264737a191f58d558e68abf23569f64d34f1ff537caeb48005c4d746896b5d58af0247a5020143c1a013ea2e
-
Filesize
764KB
MD50bac8cd69a793e50315e28e8f110110b
SHA1aa45dece091e15e1488b98dcc08de7f1028b5370
SHA25614ca55675ce073d622d928940c5a75ff2acffe05512fd813f4815983854a2812
SHA5128b11470e1b2e00c200b021102cd2e09afae9286051c92fd3264fd9c813c7beb2761f79890d08b95174b260e3b29bc6d8cffa7d2893b5f579a86a26a9535e54b6
-
Filesize
764KB
MD50bac8cd69a793e50315e28e8f110110b
SHA1aa45dece091e15e1488b98dcc08de7f1028b5370
SHA25614ca55675ce073d622d928940c5a75ff2acffe05512fd813f4815983854a2812
SHA5128b11470e1b2e00c200b021102cd2e09afae9286051c92fd3264fd9c813c7beb2761f79890d08b95174b260e3b29bc6d8cffa7d2893b5f579a86a26a9535e54b6
-
Filesize
581KB
MD5fae4042197f55aadf8c1cddb99b3b873
SHA1816446588080126fe08bbadce4273401c24ed9b1
SHA2566f48d7da1af6c32381f61ed9c9ccd932121fb7497050a500335d2bc97b525586
SHA512a2314168b52bca326572f323f324a6c9791066f43f7b4e5e4d6d2e7f27dbde00bff4c6df687b5262a51af0c2d86aeb1b7d09266d8f641585a772be5b47544407
-
Filesize
581KB
MD5fae4042197f55aadf8c1cddb99b3b873
SHA1816446588080126fe08bbadce4273401c24ed9b1
SHA2566f48d7da1af6c32381f61ed9c9ccd932121fb7497050a500335d2bc97b525586
SHA512a2314168b52bca326572f323f324a6c9791066f43f7b4e5e4d6d2e7f27dbde00bff4c6df687b5262a51af0c2d86aeb1b7d09266d8f641585a772be5b47544407
-
Filesize
580KB
MD5e8adba85fcc99163ccebfbef101b60ae
SHA181c7377605f84f42f637c2461b3f453d024a2684
SHA256663551eaebc73d44d10d6e75104cf37e6ab9148331590bf6932c185f4b7dda81
SHA512f94ebd7346bab3c13dbfb752ab361686b9f6c9037ceb02188cbfacb62455258810dfc49238a0de8fc3beb4136248fb939866c525b2d7f6ca06a7bef29ed32261
-
Filesize
580KB
MD5e8adba85fcc99163ccebfbef101b60ae
SHA181c7377605f84f42f637c2461b3f453d024a2684
SHA256663551eaebc73d44d10d6e75104cf37e6ab9148331590bf6932c185f4b7dda81
SHA512f94ebd7346bab3c13dbfb752ab361686b9f6c9037ceb02188cbfacb62455258810dfc49238a0de8fc3beb4136248fb939866c525b2d7f6ca06a7bef29ed32261
-
Filesize
169KB
MD503241ad7f26442cce0031baa8992902a
SHA134afe86a5627b47bac53a6d28c3b952eb0e4f47f
SHA2566711fdf56c7c0401bf13a106843d611ae4cf959e0c3dc40f5252096efd4940d8
SHA512117bb569198135a00a6d6dffa3fd8d750cafeebbb29af1d07a667d17a9c2e9e59ae6f9318bae6b44cb2869886537c1cbe082117981cfef36eb58b328205d282c
-
Filesize
169KB
MD503241ad7f26442cce0031baa8992902a
SHA134afe86a5627b47bac53a6d28c3b952eb0e4f47f
SHA2566711fdf56c7c0401bf13a106843d611ae4cf959e0c3dc40f5252096efd4940d8
SHA512117bb569198135a00a6d6dffa3fd8d750cafeebbb29af1d07a667d17a9c2e9e59ae6f9318bae6b44cb2869886537c1cbe082117981cfef36eb58b328205d282c
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf