Analysis
-
max time kernel
199s -
max time network
210s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2023 02:37
Static task
static1
Behavioral task
behavioral1
Sample
606311606eec52b4ba576af15f424b66f82b186770c7f0a195969f23f69144d8.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
606311606eec52b4ba576af15f424b66f82b186770c7f0a195969f23f69144d8.exe
Resource
win10v2004-20230220-en
General
-
Target
606311606eec52b4ba576af15f424b66f82b186770c7f0a195969f23f69144d8.exe
-
Size
867KB
-
MD5
efaec4bc4ed305691d4c43128832fe5c
-
SHA1
f27f89484f20c4057046f1744adcb73480159d52
-
SHA256
606311606eec52b4ba576af15f424b66f82b186770c7f0a195969f23f69144d8
-
SHA512
4c5160a3085f4d6386adbab17ff133246332031e1968508eb0256f2891850587b04209d006486962ce657f3cc333e5c5ac74b16a27fdb0512474457630b0117e
-
SSDEEP
24576:CyaosOxc1UqoHXILCHB2s+wYj33lA0peEFmQU:pI/UqoHXECHYXjnl1peE
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dark
185.161.248.73:4164
-
auth_value
ae85b01f66afe8770afeed560513fc2d
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
Processes:
resource yara_rule behavioral2/memory/3352-2323-0x00000000053D0000-0x00000000059E8000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
p05707716.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation p05707716.exe -
Executes dropped EXE 4 IoCs
Processes:
y01062732.exep05707716.exe1.exer56086615.exepid process 1376 y01062732.exe 3232 p05707716.exe 3352 1.exe 4012 r56086615.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
y01062732.exe606311606eec52b4ba576af15f424b66f82b186770c7f0a195969f23f69144d8.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y01062732.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 606311606eec52b4ba576af15f424b66f82b186770c7f0a195969f23f69144d8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 606311606eec52b4ba576af15f424b66f82b186770c7f0a195969f23f69144d8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y01062732.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4992 3232 WerFault.exe p05707716.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
p05707716.exedescription pid process Token: SeDebugPrivilege 3232 p05707716.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
606311606eec52b4ba576af15f424b66f82b186770c7f0a195969f23f69144d8.exey01062732.exep05707716.exedescription pid process target process PID 3336 wrote to memory of 1376 3336 606311606eec52b4ba576af15f424b66f82b186770c7f0a195969f23f69144d8.exe y01062732.exe PID 3336 wrote to memory of 1376 3336 606311606eec52b4ba576af15f424b66f82b186770c7f0a195969f23f69144d8.exe y01062732.exe PID 3336 wrote to memory of 1376 3336 606311606eec52b4ba576af15f424b66f82b186770c7f0a195969f23f69144d8.exe y01062732.exe PID 1376 wrote to memory of 3232 1376 y01062732.exe p05707716.exe PID 1376 wrote to memory of 3232 1376 y01062732.exe p05707716.exe PID 1376 wrote to memory of 3232 1376 y01062732.exe p05707716.exe PID 3232 wrote to memory of 3352 3232 p05707716.exe 1.exe PID 3232 wrote to memory of 3352 3232 p05707716.exe 1.exe PID 3232 wrote to memory of 3352 3232 p05707716.exe 1.exe PID 1376 wrote to memory of 4012 1376 y01062732.exe r56086615.exe PID 1376 wrote to memory of 4012 1376 y01062732.exe r56086615.exe PID 1376 wrote to memory of 4012 1376 y01062732.exe r56086615.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\606311606eec52b4ba576af15f424b66f82b186770c7f0a195969f23f69144d8.exe"C:\Users\Admin\AppData\Local\Temp\606311606eec52b4ba576af15f424b66f82b186770c7f0a195969f23f69144d8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y01062732.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y01062732.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p05707716.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p05707716.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3232 -s 14484⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r56086615.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r56086615.exe3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3232 -ip 32321⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y01062732.exeFilesize
577KB
MD5d2db5ae1347cbafd39efbf1cb17ddbfa
SHA18681d90b9ba5fefca503c9b52d736d1333a8d7f7
SHA256c82a5419e77a9b7a3e341b83bfa8dbe132c65473a98a7a9a13c1f07690ce52b6
SHA5124226d69ec5f65a75334e23890ab4e9bbd93ad95097d43ef84e18b2c80eef23bce3faa92918f7c47f61e7ab0f0857bbf0a42e32bd657120b117278b5f4e781a4a
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y01062732.exeFilesize
577KB
MD5d2db5ae1347cbafd39efbf1cb17ddbfa
SHA18681d90b9ba5fefca503c9b52d736d1333a8d7f7
SHA256c82a5419e77a9b7a3e341b83bfa8dbe132c65473a98a7a9a13c1f07690ce52b6
SHA5124226d69ec5f65a75334e23890ab4e9bbd93ad95097d43ef84e18b2c80eef23bce3faa92918f7c47f61e7ab0f0857bbf0a42e32bd657120b117278b5f4e781a4a
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p05707716.exeFilesize
575KB
MD599ad2ad88ae3411112c27921a206ad9f
SHA19c1fb26f6879868de20ebfdeec05160eed674226
SHA2560481b2505948bb9c28d3f5621793f98d0cf3c0804f0002fffdbb81854c441a24
SHA5127f3975a27c9349295bcd5b53edc95880994e5c6ab021ecc3426c2cfede4ce4bbbc93518c8a32453006443e4ef7cba58296bcf2608f1acaaee8879802985228b0
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p05707716.exeFilesize
575KB
MD599ad2ad88ae3411112c27921a206ad9f
SHA19c1fb26f6879868de20ebfdeec05160eed674226
SHA2560481b2505948bb9c28d3f5621793f98d0cf3c0804f0002fffdbb81854c441a24
SHA5127f3975a27c9349295bcd5b53edc95880994e5c6ab021ecc3426c2cfede4ce4bbbc93518c8a32453006443e4ef7cba58296bcf2608f1acaaee8879802985228b0
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r56086615.exeFilesize
172KB
MD5f9fd29b4a1260d28cfb12f5753f31435
SHA12a2b24cf5a74fad75648ab20e585d9dd91f0a928
SHA2563a5985eb5fdf39b8398985b9604ed7ac3b061869884101eb2478d853be78bba3
SHA512c2e74ca203340de11575eb066a0a75f4c8601fd1333383edff6dd0ec667a0159902e0002d0201980ffcd0583c5f0eacfadba039bf91af03b012e3f22f8d2b157
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r56086615.exeFilesize
172KB
MD5f9fd29b4a1260d28cfb12f5753f31435
SHA12a2b24cf5a74fad75648ab20e585d9dd91f0a928
SHA2563a5985eb5fdf39b8398985b9604ed7ac3b061869884101eb2478d853be78bba3
SHA512c2e74ca203340de11575eb066a0a75f4c8601fd1333383edff6dd0ec667a0159902e0002d0201980ffcd0583c5f0eacfadba039bf91af03b012e3f22f8d2b157
-
C:\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
C:\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
C:\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
memory/3232-186-0x0000000004EF0000-0x0000000004F50000-memory.dmpFilesize
384KB
-
memory/3232-198-0x0000000004EF0000-0x0000000004F50000-memory.dmpFilesize
384KB
-
memory/3232-152-0x0000000004F50000-0x0000000004F60000-memory.dmpFilesize
64KB
-
memory/3232-151-0x0000000004F50000-0x0000000004F60000-memory.dmpFilesize
64KB
-
memory/3232-153-0x0000000004EF0000-0x0000000004F50000-memory.dmpFilesize
384KB
-
memory/3232-154-0x0000000004EF0000-0x0000000004F50000-memory.dmpFilesize
384KB
-
memory/3232-156-0x0000000004EF0000-0x0000000004F50000-memory.dmpFilesize
384KB
-
memory/3232-158-0x0000000004EF0000-0x0000000004F50000-memory.dmpFilesize
384KB
-
memory/3232-160-0x0000000004EF0000-0x0000000004F50000-memory.dmpFilesize
384KB
-
memory/3232-162-0x0000000004EF0000-0x0000000004F50000-memory.dmpFilesize
384KB
-
memory/3232-164-0x0000000004EF0000-0x0000000004F50000-memory.dmpFilesize
384KB
-
memory/3232-166-0x0000000004EF0000-0x0000000004F50000-memory.dmpFilesize
384KB
-
memory/3232-168-0x0000000004EF0000-0x0000000004F50000-memory.dmpFilesize
384KB
-
memory/3232-170-0x0000000004EF0000-0x0000000004F50000-memory.dmpFilesize
384KB
-
memory/3232-172-0x0000000004EF0000-0x0000000004F50000-memory.dmpFilesize
384KB
-
memory/3232-174-0x0000000004EF0000-0x0000000004F50000-memory.dmpFilesize
384KB
-
memory/3232-176-0x0000000004EF0000-0x0000000004F50000-memory.dmpFilesize
384KB
-
memory/3232-178-0x0000000004EF0000-0x0000000004F50000-memory.dmpFilesize
384KB
-
memory/3232-180-0x0000000004EF0000-0x0000000004F50000-memory.dmpFilesize
384KB
-
memory/3232-182-0x0000000004EF0000-0x0000000004F50000-memory.dmpFilesize
384KB
-
memory/3232-184-0x0000000004EF0000-0x0000000004F50000-memory.dmpFilesize
384KB
-
memory/3232-149-0x0000000004FD0000-0x0000000005574000-memory.dmpFilesize
5.6MB
-
memory/3232-188-0x0000000004EF0000-0x0000000004F50000-memory.dmpFilesize
384KB
-
memory/3232-190-0x0000000004EF0000-0x0000000004F50000-memory.dmpFilesize
384KB
-
memory/3232-192-0x0000000004EF0000-0x0000000004F50000-memory.dmpFilesize
384KB
-
memory/3232-196-0x0000000004EF0000-0x0000000004F50000-memory.dmpFilesize
384KB
-
memory/3232-194-0x0000000004EF0000-0x0000000004F50000-memory.dmpFilesize
384KB
-
memory/3232-150-0x0000000004F50000-0x0000000004F60000-memory.dmpFilesize
64KB
-
memory/3232-200-0x0000000004EF0000-0x0000000004F50000-memory.dmpFilesize
384KB
-
memory/3232-202-0x0000000004EF0000-0x0000000004F50000-memory.dmpFilesize
384KB
-
memory/3232-204-0x0000000004EF0000-0x0000000004F50000-memory.dmpFilesize
384KB
-
memory/3232-206-0x0000000004EF0000-0x0000000004F50000-memory.dmpFilesize
384KB
-
memory/3232-208-0x0000000004EF0000-0x0000000004F50000-memory.dmpFilesize
384KB
-
memory/3232-210-0x0000000004EF0000-0x0000000004F50000-memory.dmpFilesize
384KB
-
memory/3232-212-0x0000000004EF0000-0x0000000004F50000-memory.dmpFilesize
384KB
-
memory/3232-214-0x0000000004EF0000-0x0000000004F50000-memory.dmpFilesize
384KB
-
memory/3232-216-0x0000000004EF0000-0x0000000004F50000-memory.dmpFilesize
384KB
-
memory/3232-2300-0x0000000000970000-0x00000000009CB000-memory.dmpFilesize
364KB
-
memory/3232-2302-0x0000000004F50000-0x0000000004F60000-memory.dmpFilesize
64KB
-
memory/3232-2303-0x0000000004F50000-0x0000000004F60000-memory.dmpFilesize
64KB
-
memory/3232-2304-0x0000000004F50000-0x0000000004F60000-memory.dmpFilesize
64KB
-
memory/3232-2306-0x0000000004F50000-0x0000000004F60000-memory.dmpFilesize
64KB
-
memory/3232-2322-0x0000000004F50000-0x0000000004F60000-memory.dmpFilesize
64KB
-
memory/3232-148-0x0000000000970000-0x00000000009CB000-memory.dmpFilesize
364KB
-
memory/3352-2323-0x00000000053D0000-0x00000000059E8000-memory.dmpFilesize
6.1MB
-
memory/3352-2324-0x0000000004EC0000-0x0000000004FCA000-memory.dmpFilesize
1.0MB
-
memory/3352-2325-0x0000000002430000-0x0000000002442000-memory.dmpFilesize
72KB
-
memory/3352-2326-0x00000000025D0000-0x000000000260C000-memory.dmpFilesize
240KB
-
memory/3352-2320-0x0000000000250000-0x000000000027E000-memory.dmpFilesize
184KB
-
memory/3352-2327-0x0000000004CA0000-0x0000000004CB0000-memory.dmpFilesize
64KB
-
memory/3352-2334-0x0000000004CA0000-0x0000000004CB0000-memory.dmpFilesize
64KB
-
memory/4012-2332-0x0000000000DE0000-0x0000000000E10000-memory.dmpFilesize
192KB
-
memory/4012-2333-0x0000000005710000-0x0000000005720000-memory.dmpFilesize
64KB
-
memory/4012-2335-0x0000000005710000-0x0000000005720000-memory.dmpFilesize
64KB