Analysis
-
max time kernel
203s -
max time network
210s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2023 00:59
Static task
static1
Behavioral task
behavioral1
Sample
35bc0c39b867f9ccc49f3cf5d533b0ae4ad1b5d9c346af6a49da41c2a3add8f0.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
35bc0c39b867f9ccc49f3cf5d533b0ae4ad1b5d9c346af6a49da41c2a3add8f0.exe
Resource
win10v2004-20230220-en
General
-
Target
35bc0c39b867f9ccc49f3cf5d533b0ae4ad1b5d9c346af6a49da41c2a3add8f0.exe
-
Size
1.2MB
-
MD5
abf5cb16d786913afbbad2b42f758e50
-
SHA1
2fe9268bcb1df6e2d189cd3e4046584d08771698
-
SHA256
35bc0c39b867f9ccc49f3cf5d533b0ae4ad1b5d9c346af6a49da41c2a3add8f0
-
SHA512
b91c83f2ce99137c789ed851b273ae3d112b29f40907df7873201ef04248dc3d33b4f8eb36e61c0b5e91d2b3b4a7b71bffcb7c0470fa5d43e2b5a6fa6ee8bd6d
-
SSDEEP
24576:3ynd4zqpMoijd5092OJF3Efk6NzHLeMZVvFFMgvSK5RznpjikjC/enlL2:C2zq/46956fkezHqSV/526lL
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
Processes:
resource yara_rule behavioral2/memory/2100-2340-0x0000000005050000-0x0000000005668000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
s89253813.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation s89253813.exe -
Executes dropped EXE 6 IoCs
Processes:
z11160280.exez37104015.exez71421568.exes89253813.exe1.exet01721911.exepid process 2524 z11160280.exe 3364 z37104015.exe 1604 z71421568.exe 3316 s89253813.exe 2100 1.exe 3600 t01721911.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
35bc0c39b867f9ccc49f3cf5d533b0ae4ad1b5d9c346af6a49da41c2a3add8f0.exez11160280.exez37104015.exez71421568.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 35bc0c39b867f9ccc49f3cf5d533b0ae4ad1b5d9c346af6a49da41c2a3add8f0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 35bc0c39b867f9ccc49f3cf5d533b0ae4ad1b5d9c346af6a49da41c2a3add8f0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z11160280.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z11160280.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z37104015.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z37104015.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z71421568.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z71421568.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 396 3316 WerFault.exe s89253813.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
s89253813.exedescription pid process Token: SeDebugPrivilege 3316 s89253813.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
35bc0c39b867f9ccc49f3cf5d533b0ae4ad1b5d9c346af6a49da41c2a3add8f0.exez11160280.exez37104015.exez71421568.exes89253813.exedescription pid process target process PID 3340 wrote to memory of 2524 3340 35bc0c39b867f9ccc49f3cf5d533b0ae4ad1b5d9c346af6a49da41c2a3add8f0.exe z11160280.exe PID 3340 wrote to memory of 2524 3340 35bc0c39b867f9ccc49f3cf5d533b0ae4ad1b5d9c346af6a49da41c2a3add8f0.exe z11160280.exe PID 3340 wrote to memory of 2524 3340 35bc0c39b867f9ccc49f3cf5d533b0ae4ad1b5d9c346af6a49da41c2a3add8f0.exe z11160280.exe PID 2524 wrote to memory of 3364 2524 z11160280.exe z37104015.exe PID 2524 wrote to memory of 3364 2524 z11160280.exe z37104015.exe PID 2524 wrote to memory of 3364 2524 z11160280.exe z37104015.exe PID 3364 wrote to memory of 1604 3364 z37104015.exe z71421568.exe PID 3364 wrote to memory of 1604 3364 z37104015.exe z71421568.exe PID 3364 wrote to memory of 1604 3364 z37104015.exe z71421568.exe PID 1604 wrote to memory of 3316 1604 z71421568.exe s89253813.exe PID 1604 wrote to memory of 3316 1604 z71421568.exe s89253813.exe PID 1604 wrote to memory of 3316 1604 z71421568.exe s89253813.exe PID 3316 wrote to memory of 2100 3316 s89253813.exe 1.exe PID 3316 wrote to memory of 2100 3316 s89253813.exe 1.exe PID 3316 wrote to memory of 2100 3316 s89253813.exe 1.exe PID 1604 wrote to memory of 3600 1604 z71421568.exe t01721911.exe PID 1604 wrote to memory of 3600 1604 z71421568.exe t01721911.exe PID 1604 wrote to memory of 3600 1604 z71421568.exe t01721911.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\35bc0c39b867f9ccc49f3cf5d533b0ae4ad1b5d9c346af6a49da41c2a3add8f0.exe"C:\Users\Admin\AppData\Local\Temp\35bc0c39b867f9ccc49f3cf5d533b0ae4ad1b5d9c346af6a49da41c2a3add8f0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z11160280.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z11160280.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z37104015.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z37104015.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z71421568.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z71421568.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s89253813.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s89253813.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
PID:2100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3316 -s 14966⤵
- Program crash
PID:396
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t01721911.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t01721911.exe5⤵
- Executes dropped EXE
PID:3600
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3316 -ip 33161⤵PID:3652
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5798392d0fc02a28f797ed102c6a1658e
SHA11d83695c149104b0c4a730efcae51bdbbf87a56a
SHA256740d920cdf3d39e27e31cf93ae4ae23ce8f8c0136b903c07fedb8bd7608e0398
SHA512e988e24753b6bb3ccd70c8f4195ed359b431544171bbe19e544e66fae9d3cbad0ad59038f4fd99e4e4d88c2279a0149e83846561f3d097feddf9d8951dbeb21f
-
Filesize
1.0MB
MD5798392d0fc02a28f797ed102c6a1658e
SHA11d83695c149104b0c4a730efcae51bdbbf87a56a
SHA256740d920cdf3d39e27e31cf93ae4ae23ce8f8c0136b903c07fedb8bd7608e0398
SHA512e988e24753b6bb3ccd70c8f4195ed359b431544171bbe19e544e66fae9d3cbad0ad59038f4fd99e4e4d88c2279a0149e83846561f3d097feddf9d8951dbeb21f
-
Filesize
761KB
MD570d1cc95441ea4fcf88bafc72f97e5da
SHA117c39529f4a8d19f6144e962b386e61b125b01f1
SHA2569de37aa8950a31ca6ffe09ac018dacb97f7b7d32fb841bc61e18010e5a81918c
SHA512e9bd4f062a40349524ca9733034ee91af20f8c840e3d0e010b1595d693796088ec9d26ec4b1135b05a60384e8ec87bb2749fe6beea978af459f554debad5fa3e
-
Filesize
761KB
MD570d1cc95441ea4fcf88bafc72f97e5da
SHA117c39529f4a8d19f6144e962b386e61b125b01f1
SHA2569de37aa8950a31ca6ffe09ac018dacb97f7b7d32fb841bc61e18010e5a81918c
SHA512e9bd4f062a40349524ca9733034ee91af20f8c840e3d0e010b1595d693796088ec9d26ec4b1135b05a60384e8ec87bb2749fe6beea978af459f554debad5fa3e
-
Filesize
578KB
MD56e72117a239c33ed47fc7667dd7ea12a
SHA1f2ac77e04833f6ce2b90c0328779fc31086c8194
SHA256c2c318482ca0e76afe2ab5275e2b594228bd3d3c1924651f68f46c1b3338ae9b
SHA5129080f0c9455b3c134881afec1122fa0529fce0124398233838e60705ce1676fda679a2714a3f543e9fa208733984d1c1a768be6a6c1eac2901a21ffefb42b10d
-
Filesize
578KB
MD56e72117a239c33ed47fc7667dd7ea12a
SHA1f2ac77e04833f6ce2b90c0328779fc31086c8194
SHA256c2c318482ca0e76afe2ab5275e2b594228bd3d3c1924651f68f46c1b3338ae9b
SHA5129080f0c9455b3c134881afec1122fa0529fce0124398233838e60705ce1676fda679a2714a3f543e9fa208733984d1c1a768be6a6c1eac2901a21ffefb42b10d
-
Filesize
575KB
MD588d69bd797522173cd58442e31ce9205
SHA195ba323ce4ce4467fe334397b22b12322f008ef6
SHA2561c73dd38d328d66812f0256512ca1e2cc801187d306b04f357c7ea4e4d761a66
SHA512fc49a2d5dd70ef82b2817e1af02058ed954d367b9501365a2fd65db313f8bbede724f1e4c0af48c0aac4b59573884c6a1eabffc20728f2599c56273f16e5038d
-
Filesize
575KB
MD588d69bd797522173cd58442e31ce9205
SHA195ba323ce4ce4467fe334397b22b12322f008ef6
SHA2561c73dd38d328d66812f0256512ca1e2cc801187d306b04f357c7ea4e4d761a66
SHA512fc49a2d5dd70ef82b2817e1af02058ed954d367b9501365a2fd65db313f8bbede724f1e4c0af48c0aac4b59573884c6a1eabffc20728f2599c56273f16e5038d
-
Filesize
169KB
MD503a42a3f0507cd841e8f015cac8be9b5
SHA13dff275e93ced5521d4f91a716f4af5bc6751b83
SHA2567d454ffabe86f8a099f4684baa2c7558513b40a6f818912ea375f9c4c54220e2
SHA512362a1718760c4a05635d86430ff0483ff58493a75fa23f892923bebb39923a1d92218c50200a29a41ce6ddd2ff5b28411d3d5255dfac204990becb83ad20564e
-
Filesize
169KB
MD503a42a3f0507cd841e8f015cac8be9b5
SHA13dff275e93ced5521d4f91a716f4af5bc6751b83
SHA2567d454ffabe86f8a099f4684baa2c7558513b40a6f818912ea375f9c4c54220e2
SHA512362a1718760c4a05635d86430ff0483ff58493a75fa23f892923bebb39923a1d92218c50200a29a41ce6ddd2ff5b28411d3d5255dfac204990becb83ad20564e
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf