Analysis

  • max time kernel
    136s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-05-2023 09:00

General

  • Target

    ff712edd1f0e1f0d8a592be1707f275fbc10522f7d6e61eaa612e96ded0fbbf2.exe

  • Size

    773KB

  • MD5

    4804a2b6aefae575c048ae3c27119d4e

  • SHA1

    f148465558f5ca216396b4309d0b6e1526b7dab5

  • SHA256

    ff712edd1f0e1f0d8a592be1707f275fbc10522f7d6e61eaa612e96ded0fbbf2

  • SHA512

    9aab853085cc10a4177696e477c06c279dabc1f3af1283ab076d51b59c01b415522775d4954e42cb7115c86cb6e7fd6da8741c15f228dd04179efd4888c0fb06

  • SSDEEP

    12288:By90PbQCAC402oxz5iNss/N+P6U39WP25hDbJeZmnKRHlYlT4fNzdEOzida+d:ByM9vgNsSN+P99W8l2HGlT3Iida+d

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

donka

C2

185.161.248.73:4164

Attributes
  • auth_value

    ebd13e189a2e7c34425e5f4c46bb7a55

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff712edd1f0e1f0d8a592be1707f275fbc10522f7d6e61eaa612e96ded0fbbf2.exe
    "C:\Users\Admin\AppData\Local\Temp\ff712edd1f0e1f0d8a592be1707f275fbc10522f7d6e61eaa612e96ded0fbbf2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x84908061.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x84908061.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3816
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m69739828.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m69739828.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2872
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          PID:2880
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 1376
          4⤵
          • Program crash
          PID:1452
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n20021811.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n20021811.exe
        3⤵
        • Executes dropped EXE
        PID:208
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 2872 -ip 2872
    1⤵
      PID:768

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x84908061.exe
      Filesize

      570KB

      MD5

      cc45a49588419c5b9e3fe1f0340f721a

      SHA1

      287b4342405b1ff2673be7c584bdd9bcafddc372

      SHA256

      f8e10cd6b8a4855ffc7a016f8f0c751c36ba436efc1614c23c9be1e25d6955a9

      SHA512

      2a3c2f0c550660e13c83a77037b3d8f639b7ac7fd8c5de533f3c79da7fe4714db30f705bc917fa0dd6df5a1c2a2a431093c62a9cb98ccd6fb92da1dc748f977d

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x84908061.exe
      Filesize

      570KB

      MD5

      cc45a49588419c5b9e3fe1f0340f721a

      SHA1

      287b4342405b1ff2673be7c584bdd9bcafddc372

      SHA256

      f8e10cd6b8a4855ffc7a016f8f0c751c36ba436efc1614c23c9be1e25d6955a9

      SHA512

      2a3c2f0c550660e13c83a77037b3d8f639b7ac7fd8c5de533f3c79da7fe4714db30f705bc917fa0dd6df5a1c2a2a431093c62a9cb98ccd6fb92da1dc748f977d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m69739828.exe
      Filesize

      475KB

      MD5

      2e52681deb6c262b2adb052933d6416c

      SHA1

      7156d595089c686aecdf54bf692b88188fa73c26

      SHA256

      fd657e1d8aded41823a52e89e6521ff31625a6bfbd3a107e2a5f392ffe900406

      SHA512

      a3096bc0b0b6b1989b74383e565e29f766bd46462d75767160f457ebb7b4e5f5c37279551cc60ae81efdb76e8ec794c4ff08395482e56cc2b87b2715dd7b07f8

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m69739828.exe
      Filesize

      475KB

      MD5

      2e52681deb6c262b2adb052933d6416c

      SHA1

      7156d595089c686aecdf54bf692b88188fa73c26

      SHA256

      fd657e1d8aded41823a52e89e6521ff31625a6bfbd3a107e2a5f392ffe900406

      SHA512

      a3096bc0b0b6b1989b74383e565e29f766bd46462d75767160f457ebb7b4e5f5c37279551cc60ae81efdb76e8ec794c4ff08395482e56cc2b87b2715dd7b07f8

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n20021811.exe
      Filesize

      168KB

      MD5

      5ac1980a69bd02985cc2b7c3a6fb236c

      SHA1

      657654013a4befcd80364684b951edb19e0b7fda

      SHA256

      f20dafc211983f33d8e2e8299f146d33a0b4f9bfb0c5db9238e9e6d146bcab05

      SHA512

      3f19ee90ca66401b44c25fc4dc580a53c3dcf02068d50aad7c3337000d16c958ea9b3476c5921b1648290c08478a89a2e2e96527116358ca43a74d52f154b3fe

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n20021811.exe
      Filesize

      168KB

      MD5

      5ac1980a69bd02985cc2b7c3a6fb236c

      SHA1

      657654013a4befcd80364684b951edb19e0b7fda

      SHA256

      f20dafc211983f33d8e2e8299f146d33a0b4f9bfb0c5db9238e9e6d146bcab05

      SHA512

      3f19ee90ca66401b44c25fc4dc580a53c3dcf02068d50aad7c3337000d16c958ea9b3476c5921b1648290c08478a89a2e2e96527116358ca43a74d52f154b3fe

    • C:\Windows\Temp\1.exe
      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • C:\Windows\Temp\1.exe
      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • C:\Windows\Temp\1.exe
      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • memory/208-2328-0x0000000004D00000-0x0000000004D10000-memory.dmp
      Filesize

      64KB

    • memory/208-2326-0x0000000004D00000-0x0000000004D10000-memory.dmp
      Filesize

      64KB

    • memory/208-2325-0x0000000000390000-0x00000000003C0000-memory.dmp
      Filesize

      192KB

    • memory/2872-180-0x00000000053A0000-0x0000000005400000-memory.dmp
      Filesize

      384KB

    • memory/2872-190-0x00000000053A0000-0x0000000005400000-memory.dmp
      Filesize

      384KB

    • memory/2872-153-0x00000000053A0000-0x0000000005400000-memory.dmp
      Filesize

      384KB

    • memory/2872-154-0x00000000053A0000-0x0000000005400000-memory.dmp
      Filesize

      384KB

    • memory/2872-156-0x00000000053A0000-0x0000000005400000-memory.dmp
      Filesize

      384KB

    • memory/2872-160-0x00000000053A0000-0x0000000005400000-memory.dmp
      Filesize

      384KB

    • memory/2872-158-0x00000000053A0000-0x0000000005400000-memory.dmp
      Filesize

      384KB

    • memory/2872-162-0x00000000053A0000-0x0000000005400000-memory.dmp
      Filesize

      384KB

    • memory/2872-164-0x00000000053A0000-0x0000000005400000-memory.dmp
      Filesize

      384KB

    • memory/2872-166-0x00000000053A0000-0x0000000005400000-memory.dmp
      Filesize

      384KB

    • memory/2872-168-0x00000000053A0000-0x0000000005400000-memory.dmp
      Filesize

      384KB

    • memory/2872-170-0x00000000053A0000-0x0000000005400000-memory.dmp
      Filesize

      384KB

    • memory/2872-172-0x00000000053A0000-0x0000000005400000-memory.dmp
      Filesize

      384KB

    • memory/2872-174-0x00000000053A0000-0x0000000005400000-memory.dmp
      Filesize

      384KB

    • memory/2872-176-0x00000000053A0000-0x0000000005400000-memory.dmp
      Filesize

      384KB

    • memory/2872-178-0x00000000053A0000-0x0000000005400000-memory.dmp
      Filesize

      384KB

    • memory/2872-151-0x0000000002590000-0x00000000025A0000-memory.dmp
      Filesize

      64KB

    • memory/2872-182-0x00000000053A0000-0x0000000005400000-memory.dmp
      Filesize

      384KB

    • memory/2872-184-0x00000000053A0000-0x0000000005400000-memory.dmp
      Filesize

      384KB

    • memory/2872-186-0x00000000053A0000-0x0000000005400000-memory.dmp
      Filesize

      384KB

    • memory/2872-188-0x00000000053A0000-0x0000000005400000-memory.dmp
      Filesize

      384KB

    • memory/2872-192-0x00000000053A0000-0x0000000005400000-memory.dmp
      Filesize

      384KB

    • memory/2872-194-0x00000000053A0000-0x0000000005400000-memory.dmp
      Filesize

      384KB

    • memory/2872-152-0x0000000002590000-0x00000000025A0000-memory.dmp
      Filesize

      64KB

    • memory/2872-198-0x00000000053A0000-0x0000000005400000-memory.dmp
      Filesize

      384KB

    • memory/2872-196-0x00000000053A0000-0x0000000005400000-memory.dmp
      Filesize

      384KB

    • memory/2872-204-0x00000000053A0000-0x0000000005400000-memory.dmp
      Filesize

      384KB

    • memory/2872-206-0x00000000053A0000-0x0000000005400000-memory.dmp
      Filesize

      384KB

    • memory/2872-202-0x00000000053A0000-0x0000000005400000-memory.dmp
      Filesize

      384KB

    • memory/2872-200-0x00000000053A0000-0x0000000005400000-memory.dmp
      Filesize

      384KB

    • memory/2872-210-0x00000000053A0000-0x0000000005400000-memory.dmp
      Filesize

      384KB

    • memory/2872-212-0x00000000053A0000-0x0000000005400000-memory.dmp
      Filesize

      384KB

    • memory/2872-214-0x00000000053A0000-0x0000000005400000-memory.dmp
      Filesize

      384KB

    • memory/2872-216-0x00000000053A0000-0x0000000005400000-memory.dmp
      Filesize

      384KB

    • memory/2872-208-0x00000000053A0000-0x0000000005400000-memory.dmp
      Filesize

      384KB

    • memory/2872-2300-0x0000000002590000-0x00000000025A0000-memory.dmp
      Filesize

      64KB

    • memory/2872-2302-0x0000000002590000-0x00000000025A0000-memory.dmp
      Filesize

      64KB

    • memory/2872-148-0x0000000002110000-0x000000000216B000-memory.dmp
      Filesize

      364KB

    • memory/2872-149-0x0000000002590000-0x00000000025A0000-memory.dmp
      Filesize

      64KB

    • memory/2872-150-0x0000000004D90000-0x0000000005334000-memory.dmp
      Filesize

      5.6MB

    • memory/2880-2317-0x000000000AE80000-0x000000000AE92000-memory.dmp
      Filesize

      72KB

    • memory/2880-2316-0x000000000AF50000-0x000000000B05A000-memory.dmp
      Filesize

      1.0MB

    • memory/2880-2315-0x000000000B3D0000-0x000000000B9E8000-memory.dmp
      Filesize

      6.1MB

    • memory/2880-2318-0x000000000AEE0000-0x000000000AF1C000-memory.dmp
      Filesize

      240KB

    • memory/2880-2319-0x00000000058E0000-0x00000000058F0000-memory.dmp
      Filesize

      64KB

    • memory/2880-2327-0x00000000058E0000-0x00000000058F0000-memory.dmp
      Filesize

      64KB

    • memory/2880-2314-0x0000000000FD0000-0x0000000000FFE000-memory.dmp
      Filesize

      184KB