Analysis

  • max time kernel
    140s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-05-2023 21:00

General

  • Target

    245843519f21bc29ee194c7713d1f19d6d9eb0c8fee24aa9427494416299ee8c.exe

  • Size

    891KB

  • MD5

    edefddcdaf3bdbd6cf34c6aad9747a5f

  • SHA1

    b590992bdf2686673640af8a98682e2e6fc30f0f

  • SHA256

    245843519f21bc29ee194c7713d1f19d6d9eb0c8fee24aa9427494416299ee8c

  • SHA512

    3fc2503a2f784c4376abd72615204315b6fa93054f72a0a4b9e6cb1091f84668818e1f1c73571e551dadddb1cdda146ecd7a7a14524b319fddf5e38fd7373c7c

  • SSDEEP

    24576:Mydf0nqTJroQ6tY9F/Uaxp7+NtD5c5za:7dYAVoTt4F/13OtDi

Malware Config

Extracted

Family

redline

Botnet

dark

C2

185.161.248.73:4164

Attributes
  • auth_value

    ae85b01f66afe8770afeed560513fc2d

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\245843519f21bc29ee194c7713d1f19d6d9eb0c8fee24aa9427494416299ee8c.exe
    "C:\Users\Admin\AppData\Local\Temp\245843519f21bc29ee194c7713d1f19d6d9eb0c8fee24aa9427494416299ee8c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4400
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st663258.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st663258.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2156
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\33112685.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\33112685.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:740
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4220
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp723140.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp723140.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:3196
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 1188
          4⤵
          • Program crash
          PID:5008
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr981273.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr981273.exe
      2⤵
      • Executes dropped EXE
      PID:4284
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3196 -ip 3196
    1⤵
      PID:1976

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr981273.exe

      Filesize

      170KB

      MD5

      d691d6bd646e071f6fb4b64a7cfbcb96

      SHA1

      12e17696e01624028e4e318a7729a5f4a385c885

      SHA256

      8217427310f284b792fa802d95615f7c8ca377bff79578524b978df255933e42

      SHA512

      e2f95dfc1e55cc6327dd82d4db3daa69d156fc281da657ef7888a64600c5b7c2c57d2040e61e2b58bd6c367fabdd4aece38e0c90703ea4144f0d290ebe3077f6

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr981273.exe

      Filesize

      170KB

      MD5

      d691d6bd646e071f6fb4b64a7cfbcb96

      SHA1

      12e17696e01624028e4e318a7729a5f4a385c885

      SHA256

      8217427310f284b792fa802d95615f7c8ca377bff79578524b978df255933e42

      SHA512

      e2f95dfc1e55cc6327dd82d4db3daa69d156fc281da657ef7888a64600c5b7c2c57d2040e61e2b58bd6c367fabdd4aece38e0c90703ea4144f0d290ebe3077f6

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st663258.exe

      Filesize

      738KB

      MD5

      01c4102f71ec2df6c0d26413e55db7b0

      SHA1

      bd18179bae4e7509f9a0dbb5870ef0dca94736b9

      SHA256

      bdc3718f7c8aa05495c8f9ca0431977d31563ada3060060740eff2987559b396

      SHA512

      eb2a52dfe0242681a5aa625c44d556707fa4db8028153db2facbac0b4aeac3b9ba412d5295bf73459ebebb756bc0d2846b0271a3c479211ddc03d6f887d07815

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st663258.exe

      Filesize

      738KB

      MD5

      01c4102f71ec2df6c0d26413e55db7b0

      SHA1

      bd18179bae4e7509f9a0dbb5870ef0dca94736b9

      SHA256

      bdc3718f7c8aa05495c8f9ca0431977d31563ada3060060740eff2987559b396

      SHA512

      eb2a52dfe0242681a5aa625c44d556707fa4db8028153db2facbac0b4aeac3b9ba412d5295bf73459ebebb756bc0d2846b0271a3c479211ddc03d6f887d07815

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\33112685.exe

      Filesize

      303KB

      MD5

      7e75d1e49a14eb8bd2851cf7a49c762a

      SHA1

      275ec92dfd756659d17c9caf85dec6f212ddd21f

      SHA256

      8080927dbc3d956b2778040133aa38b80390629f58930d41db5c53b8e494bfb0

      SHA512

      ef1bafd7b82c20d032c76ae3eaf1ced4d290d7de0610eebd12d81bc0ce106de8b3d4a5ccbb94ff0a7f525f10160dcc6744b80e7ac97bac79aaebcb6435e7a34f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\33112685.exe

      Filesize

      303KB

      MD5

      7e75d1e49a14eb8bd2851cf7a49c762a

      SHA1

      275ec92dfd756659d17c9caf85dec6f212ddd21f

      SHA256

      8080927dbc3d956b2778040133aa38b80390629f58930d41db5c53b8e494bfb0

      SHA512

      ef1bafd7b82c20d032c76ae3eaf1ced4d290d7de0610eebd12d81bc0ce106de8b3d4a5ccbb94ff0a7f525f10160dcc6744b80e7ac97bac79aaebcb6435e7a34f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp723140.exe

      Filesize

      574KB

      MD5

      8df5b31f39162641d8f67fb7f60e860b

      SHA1

      0094ad87d3d8ad268fc2dc0f2fc678a3b9681107

      SHA256

      2c2ef9c59dd1a93a3e78c62d602f115ed727895da707150325784d3b04ec32b9

      SHA512

      1157d0f34ff22b7a2cf2ff252f9773b34ab36a8dca7c8efda6be860a4a13eddb8ea2b18463c6485a267df8af02fd65dd5dfa277dc597c637c15e0d731bed38e5

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp723140.exe

      Filesize

      574KB

      MD5

      8df5b31f39162641d8f67fb7f60e860b

      SHA1

      0094ad87d3d8ad268fc2dc0f2fc678a3b9681107

      SHA256

      2c2ef9c59dd1a93a3e78c62d602f115ed727895da707150325784d3b04ec32b9

      SHA512

      1157d0f34ff22b7a2cf2ff252f9773b34ab36a8dca7c8efda6be860a4a13eddb8ea2b18463c6485a267df8af02fd65dd5dfa277dc597c637c15e0d731bed38e5

    • C:\Windows\Temp\1.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Windows\Temp\1.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Windows\Temp\1.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • memory/740-193-0x00000000049B0000-0x0000000004A01000-memory.dmp

      Filesize

      324KB

    • memory/740-205-0x00000000049B0000-0x0000000004A01000-memory.dmp

      Filesize

      324KB

    • memory/740-151-0x00000000049B0000-0x0000000004A01000-memory.dmp

      Filesize

      324KB

    • memory/740-153-0x00000000049B0000-0x0000000004A01000-memory.dmp

      Filesize

      324KB

    • memory/740-155-0x00000000049B0000-0x0000000004A01000-memory.dmp

      Filesize

      324KB

    • memory/740-157-0x00000000049B0000-0x0000000004A01000-memory.dmp

      Filesize

      324KB

    • memory/740-159-0x00000000049B0000-0x0000000004A01000-memory.dmp

      Filesize

      324KB

    • memory/740-161-0x00000000049B0000-0x0000000004A01000-memory.dmp

      Filesize

      324KB

    • memory/740-163-0x00000000049B0000-0x0000000004A01000-memory.dmp

      Filesize

      324KB

    • memory/740-165-0x00000000049B0000-0x0000000004A01000-memory.dmp

      Filesize

      324KB

    • memory/740-167-0x00000000049B0000-0x0000000004A01000-memory.dmp

      Filesize

      324KB

    • memory/740-169-0x00000000049B0000-0x0000000004A01000-memory.dmp

      Filesize

      324KB

    • memory/740-171-0x00000000049B0000-0x0000000004A01000-memory.dmp

      Filesize

      324KB

    • memory/740-173-0x00000000049B0000-0x0000000004A01000-memory.dmp

      Filesize

      324KB

    • memory/740-175-0x00000000049B0000-0x0000000004A01000-memory.dmp

      Filesize

      324KB

    • memory/740-177-0x00000000049B0000-0x0000000004A01000-memory.dmp

      Filesize

      324KB

    • memory/740-179-0x00000000049B0000-0x0000000004A01000-memory.dmp

      Filesize

      324KB

    • memory/740-181-0x00000000049B0000-0x0000000004A01000-memory.dmp

      Filesize

      324KB

    • memory/740-183-0x00000000049B0000-0x0000000004A01000-memory.dmp

      Filesize

      324KB

    • memory/740-185-0x00000000049B0000-0x0000000004A01000-memory.dmp

      Filesize

      324KB

    • memory/740-187-0x00000000049B0000-0x0000000004A01000-memory.dmp

      Filesize

      324KB

    • memory/740-189-0x00000000049B0000-0x0000000004A01000-memory.dmp

      Filesize

      324KB

    • memory/740-191-0x00000000049B0000-0x0000000004A01000-memory.dmp

      Filesize

      324KB

    • memory/740-149-0x0000000004B30000-0x0000000004B40000-memory.dmp

      Filesize

      64KB

    • memory/740-195-0x00000000049B0000-0x0000000004A01000-memory.dmp

      Filesize

      324KB

    • memory/740-197-0x00000000049B0000-0x0000000004A01000-memory.dmp

      Filesize

      324KB

    • memory/740-199-0x00000000049B0000-0x0000000004A01000-memory.dmp

      Filesize

      324KB

    • memory/740-201-0x00000000049B0000-0x0000000004A01000-memory.dmp

      Filesize

      324KB

    • memory/740-203-0x00000000049B0000-0x0000000004A01000-memory.dmp

      Filesize

      324KB

    • memory/740-150-0x00000000049B0000-0x0000000004A01000-memory.dmp

      Filesize

      324KB

    • memory/740-207-0x00000000049B0000-0x0000000004A01000-memory.dmp

      Filesize

      324KB

    • memory/740-209-0x00000000049B0000-0x0000000004A01000-memory.dmp

      Filesize

      324KB

    • memory/740-211-0x00000000049B0000-0x0000000004A01000-memory.dmp

      Filesize

      324KB

    • memory/740-213-0x00000000049B0000-0x0000000004A01000-memory.dmp

      Filesize

      324KB

    • memory/740-2278-0x0000000004B30000-0x0000000004B40000-memory.dmp

      Filesize

      64KB

    • memory/740-2279-0x0000000004B30000-0x0000000004B40000-memory.dmp

      Filesize

      64KB

    • memory/740-2281-0x0000000004B30000-0x0000000004B40000-memory.dmp

      Filesize

      64KB

    • memory/740-2282-0x0000000004B30000-0x0000000004B40000-memory.dmp

      Filesize

      64KB

    • memory/740-147-0x0000000004B30000-0x0000000004B40000-memory.dmp

      Filesize

      64KB

    • memory/740-148-0x0000000004B40000-0x00000000050E4000-memory.dmp

      Filesize

      5.6MB

    • memory/3196-2351-0x0000000000920000-0x000000000097B000-memory.dmp

      Filesize

      364KB

    • memory/3196-4452-0x0000000004FC0000-0x0000000004FD0000-memory.dmp

      Filesize

      64KB

    • memory/3196-2354-0x0000000004FC0000-0x0000000004FD0000-memory.dmp

      Filesize

      64KB

    • memory/3196-4451-0x0000000004FC0000-0x0000000004FD0000-memory.dmp

      Filesize

      64KB

    • memory/3196-2352-0x0000000004FC0000-0x0000000004FD0000-memory.dmp

      Filesize

      64KB

    • memory/3196-4453-0x0000000004FC0000-0x0000000004FD0000-memory.dmp

      Filesize

      64KB

    • memory/3196-4454-0x0000000005760000-0x00000000057F2000-memory.dmp

      Filesize

      584KB

    • memory/3196-2356-0x0000000004FC0000-0x0000000004FD0000-memory.dmp

      Filesize

      64KB

    • memory/3196-4449-0x0000000004FC0000-0x0000000004FD0000-memory.dmp

      Filesize

      64KB

    • memory/4220-2294-0x0000000000B60000-0x0000000000B6A000-memory.dmp

      Filesize

      40KB

    • memory/4284-4463-0x0000000000DA0000-0x0000000000DD0000-memory.dmp

      Filesize

      192KB

    • memory/4284-4464-0x000000000B1A0000-0x000000000B7B8000-memory.dmp

      Filesize

      6.1MB

    • memory/4284-4465-0x000000000AD20000-0x000000000AE2A000-memory.dmp

      Filesize

      1.0MB

    • memory/4284-4466-0x000000000AC50000-0x000000000AC62000-memory.dmp

      Filesize

      72KB

    • memory/4284-4467-0x000000000ACB0000-0x000000000ACEC000-memory.dmp

      Filesize

      240KB

    • memory/4284-4468-0x00000000056F0000-0x0000000005700000-memory.dmp

      Filesize

      64KB

    • memory/4284-4469-0x00000000056F0000-0x0000000005700000-memory.dmp

      Filesize

      64KB