Analysis
-
max time kernel
154s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2023 02:25
Static task
static1
Behavioral task
behavioral1
Sample
5b78ffa959b3dc563253f20b6dd99954d9b919303631c12db225da0345e5ccf1.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5b78ffa959b3dc563253f20b6dd99954d9b919303631c12db225da0345e5ccf1.exe
Resource
win10v2004-20230220-en
General
-
Target
5b78ffa959b3dc563253f20b6dd99954d9b919303631c12db225da0345e5ccf1.exe
-
Size
793KB
-
MD5
caaaa9aa524b1ac11089da0295c4132d
-
SHA1
48970adb1136c1dddd0f928caf98fb09542cd8df
-
SHA256
5b78ffa959b3dc563253f20b6dd99954d9b919303631c12db225da0345e5ccf1
-
SHA512
75f1a3020d15eac3be24ba582f729a42edc09fa3b3bdc37126fd161d3adf4947e58ba503dbafd58c98838741c065118f0308349ec2e057113d785c21830124aa
-
SSDEEP
12288:Zy90uuTWZRsa6Iui0lV4PFHRiYVCL9wwECKVI+qmLeq/gM3La35TsyY:ZybEIU4NHRikCxwwE+mMM3LiTW
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dork
185.161.248.73:4164
-
auth_value
e81be7d6cfb453cc812e1b4890eeadad
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
Processes:
resource yara_rule behavioral2/memory/1032-2315-0x0000000005290000-0x00000000058A8000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
m42024360.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation m42024360.exe -
Executes dropped EXE 4 IoCs
Processes:
x49211052.exem42024360.exe1.exen96182240.exepid process 1120 x49211052.exe 4924 m42024360.exe 1032 1.exe 4564 n96182240.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
5b78ffa959b3dc563253f20b6dd99954d9b919303631c12db225da0345e5ccf1.exex49211052.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5b78ffa959b3dc563253f20b6dd99954d9b919303631c12db225da0345e5ccf1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5b78ffa959b3dc563253f20b6dd99954d9b919303631c12db225da0345e5ccf1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x49211052.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x49211052.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 912 4924 WerFault.exe m42024360.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
m42024360.exedescription pid process Token: SeDebugPrivilege 4924 m42024360.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
5b78ffa959b3dc563253f20b6dd99954d9b919303631c12db225da0345e5ccf1.exex49211052.exem42024360.exedescription pid process target process PID 376 wrote to memory of 1120 376 5b78ffa959b3dc563253f20b6dd99954d9b919303631c12db225da0345e5ccf1.exe x49211052.exe PID 376 wrote to memory of 1120 376 5b78ffa959b3dc563253f20b6dd99954d9b919303631c12db225da0345e5ccf1.exe x49211052.exe PID 376 wrote to memory of 1120 376 5b78ffa959b3dc563253f20b6dd99954d9b919303631c12db225da0345e5ccf1.exe x49211052.exe PID 1120 wrote to memory of 4924 1120 x49211052.exe m42024360.exe PID 1120 wrote to memory of 4924 1120 x49211052.exe m42024360.exe PID 1120 wrote to memory of 4924 1120 x49211052.exe m42024360.exe PID 4924 wrote to memory of 1032 4924 m42024360.exe 1.exe PID 4924 wrote to memory of 1032 4924 m42024360.exe 1.exe PID 4924 wrote to memory of 1032 4924 m42024360.exe 1.exe PID 1120 wrote to memory of 4564 1120 x49211052.exe n96182240.exe PID 1120 wrote to memory of 4564 1120 x49211052.exe n96182240.exe PID 1120 wrote to memory of 4564 1120 x49211052.exe n96182240.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b78ffa959b3dc563253f20b6dd99954d9b919303631c12db225da0345e5ccf1.exe"C:\Users\Admin\AppData\Local\Temp\5b78ffa959b3dc563253f20b6dd99954d9b919303631c12db225da0345e5ccf1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x49211052.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x49211052.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m42024360.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m42024360.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
PID:1032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 14244⤵
- Program crash
PID:912 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n96182240.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n96182240.exe3⤵
- Executes dropped EXE
PID:4564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4924 -ip 49241⤵PID:2668
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x49211052.exeFilesize
589KB
MD52d0b67849962c65a08904383f1bc2879
SHA12706f9c6cbff29649b8d9997e89a0aa2b5437723
SHA256060b223824562a54d544c43ea14a1e950cf1f0446159acce4b45b7522e8f3d92
SHA512651282cadd0050d03e149ab51431c93d30310e3e5ff9de7e6285dba025373fecd3068144a11c6525fc61103822ff3238d8d270f16bb64fd2aa737d037a42bcce
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x49211052.exeFilesize
589KB
MD52d0b67849962c65a08904383f1bc2879
SHA12706f9c6cbff29649b8d9997e89a0aa2b5437723
SHA256060b223824562a54d544c43ea14a1e950cf1f0446159acce4b45b7522e8f3d92
SHA512651282cadd0050d03e149ab51431c93d30310e3e5ff9de7e6285dba025373fecd3068144a11c6525fc61103822ff3238d8d270f16bb64fd2aa737d037a42bcce
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m42024360.exeFilesize
529KB
MD578ccdb726dd25c1db093e9440e0d5b3e
SHA169de83fb054ddc3832beef3d92c4eff07214c5ff
SHA25674b49262d7ab691a97cf42c5f32385f3f46dfad3c3c02e49f9edd41e27d18a28
SHA5127be4ef0be45ca86c74fcc0a599f23604696acfd6236b242e9f4519ee8e7aad33f6f68cfaa7c2edd5067bbd69ea31cfda5a77a9386cc126cf88588d7917510622
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m42024360.exeFilesize
529KB
MD578ccdb726dd25c1db093e9440e0d5b3e
SHA169de83fb054ddc3832beef3d92c4eff07214c5ff
SHA25674b49262d7ab691a97cf42c5f32385f3f46dfad3c3c02e49f9edd41e27d18a28
SHA5127be4ef0be45ca86c74fcc0a599f23604696acfd6236b242e9f4519ee8e7aad33f6f68cfaa7c2edd5067bbd69ea31cfda5a77a9386cc126cf88588d7917510622
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n96182240.exeFilesize
169KB
MD5d76ed2d8813c064822fdbe845d726ac7
SHA1ac10dbd42fbc220f99de2ff0dadefddd2a15f1cb
SHA2561a389b50b7013f81555ce142311d184b99c4e1c88fcf79644f0034a4db5351a8
SHA512eb534ccf9de7f245d76125768e94d6f88dc4dd9931730e9a8c8b84c1c00492fb881f49494d916ac1cf79c876ccd1c709f59f792aa43c5244a5457ef9ee3d38dc
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n96182240.exeFilesize
169KB
MD5d76ed2d8813c064822fdbe845d726ac7
SHA1ac10dbd42fbc220f99de2ff0dadefddd2a15f1cb
SHA2561a389b50b7013f81555ce142311d184b99c4e1c88fcf79644f0034a4db5351a8
SHA512eb534ccf9de7f245d76125768e94d6f88dc4dd9931730e9a8c8b84c1c00492fb881f49494d916ac1cf79c876ccd1c709f59f792aa43c5244a5457ef9ee3d38dc
-
C:\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
C:\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
C:\Windows\Temp\1.exeFilesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
memory/1032-2319-0x0000000004C90000-0x0000000004CA2000-memory.dmpFilesize
72KB
-
memory/1032-2321-0x0000000004B10000-0x0000000004B4C000-memory.dmpFilesize
240KB
-
memory/1032-2320-0x0000000004C60000-0x0000000004C70000-memory.dmpFilesize
64KB
-
memory/1032-2318-0x0000000004D80000-0x0000000004E8A000-memory.dmpFilesize
1.0MB
-
memory/1032-2315-0x0000000005290000-0x00000000058A8000-memory.dmpFilesize
6.1MB
-
memory/1032-2313-0x0000000000340000-0x000000000036E000-memory.dmpFilesize
184KB
-
memory/1032-2329-0x0000000004C60000-0x0000000004C70000-memory.dmpFilesize
64KB
-
memory/4564-2327-0x0000000000250000-0x0000000000280000-memory.dmpFilesize
192KB
-
memory/4564-2328-0x0000000004B00000-0x0000000004B10000-memory.dmpFilesize
64KB
-
memory/4564-2330-0x0000000004B00000-0x0000000004B10000-memory.dmpFilesize
64KB
-
memory/4924-163-0x0000000005790000-0x00000000057F0000-memory.dmpFilesize
384KB
-
memory/4924-211-0x0000000005790000-0x00000000057F0000-memory.dmpFilesize
384KB
-
memory/4924-177-0x0000000005790000-0x00000000057F0000-memory.dmpFilesize
384KB
-
memory/4924-179-0x0000000005790000-0x00000000057F0000-memory.dmpFilesize
384KB
-
memory/4924-181-0x0000000005790000-0x00000000057F0000-memory.dmpFilesize
384KB
-
memory/4924-183-0x0000000005790000-0x00000000057F0000-memory.dmpFilesize
384KB
-
memory/4924-185-0x0000000005790000-0x00000000057F0000-memory.dmpFilesize
384KB
-
memory/4924-187-0x0000000005790000-0x00000000057F0000-memory.dmpFilesize
384KB
-
memory/4924-189-0x0000000005790000-0x00000000057F0000-memory.dmpFilesize
384KB
-
memory/4924-191-0x0000000005790000-0x00000000057F0000-memory.dmpFilesize
384KB
-
memory/4924-193-0x0000000005790000-0x00000000057F0000-memory.dmpFilesize
384KB
-
memory/4924-195-0x0000000005790000-0x00000000057F0000-memory.dmpFilesize
384KB
-
memory/4924-197-0x0000000005790000-0x00000000057F0000-memory.dmpFilesize
384KB
-
memory/4924-199-0x0000000005790000-0x00000000057F0000-memory.dmpFilesize
384KB
-
memory/4924-201-0x0000000005790000-0x00000000057F0000-memory.dmpFilesize
384KB
-
memory/4924-203-0x0000000005790000-0x00000000057F0000-memory.dmpFilesize
384KB
-
memory/4924-205-0x0000000005790000-0x00000000057F0000-memory.dmpFilesize
384KB
-
memory/4924-207-0x0000000005790000-0x00000000057F0000-memory.dmpFilesize
384KB
-
memory/4924-209-0x0000000005790000-0x00000000057F0000-memory.dmpFilesize
384KB
-
memory/4924-175-0x0000000005790000-0x00000000057F0000-memory.dmpFilesize
384KB
-
memory/4924-213-0x0000000005790000-0x00000000057F0000-memory.dmpFilesize
384KB
-
memory/4924-215-0x0000000005790000-0x00000000057F0000-memory.dmpFilesize
384KB
-
memory/4924-1843-0x0000000002A60000-0x0000000002A70000-memory.dmpFilesize
64KB
-
memory/4924-173-0x0000000005790000-0x00000000057F0000-memory.dmpFilesize
384KB
-
memory/4924-171-0x0000000005790000-0x00000000057F0000-memory.dmpFilesize
384KB
-
memory/4924-169-0x0000000005790000-0x00000000057F0000-memory.dmpFilesize
384KB
-
memory/4924-2312-0x0000000002A60000-0x0000000002A70000-memory.dmpFilesize
64KB
-
memory/4924-167-0x0000000005790000-0x00000000057F0000-memory.dmpFilesize
384KB
-
memory/4924-165-0x0000000005790000-0x00000000057F0000-memory.dmpFilesize
384KB
-
memory/4924-2316-0x0000000002A60000-0x0000000002A70000-memory.dmpFilesize
64KB
-
memory/4924-161-0x0000000005790000-0x00000000057F0000-memory.dmpFilesize
384KB
-
memory/4924-159-0x0000000005790000-0x00000000057F0000-memory.dmpFilesize
384KB
-
memory/4924-157-0x0000000005790000-0x00000000057F0000-memory.dmpFilesize
384KB
-
memory/4924-155-0x0000000005790000-0x00000000057F0000-memory.dmpFilesize
384KB
-
memory/4924-153-0x0000000005790000-0x00000000057F0000-memory.dmpFilesize
384KB
-
memory/4924-152-0x0000000005790000-0x00000000057F0000-memory.dmpFilesize
384KB
-
memory/4924-151-0x00000000051E0000-0x0000000005784000-memory.dmpFilesize
5.6MB
-
memory/4924-150-0x0000000002A60000-0x0000000002A70000-memory.dmpFilesize
64KB
-
memory/4924-149-0x0000000002A60000-0x0000000002A70000-memory.dmpFilesize
64KB
-
memory/4924-148-0x0000000002740000-0x000000000279B000-memory.dmpFilesize
364KB