Analysis

  • max time kernel
    135s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-05-2023 09:02

General

  • Target

    ffe6447195dd3ea64c527e5e9b14c508dd7f0c569043f51028853ac42e1e2805.exe

  • Size

    1.2MB

  • MD5

    72a0783fb5df123613abe131b77b4a90

  • SHA1

    9d7faf18b2ae685a96699ec4d69a8da06add0cdc

  • SHA256

    ffe6447195dd3ea64c527e5e9b14c508dd7f0c569043f51028853ac42e1e2805

  • SHA512

    e1eb7e579a8c5f5588049d861801e05fbaded13fe9bc781054d0c782010e846c4bbf5f894244644a318e01611e90ce76ff2d4ee530b60787a587f5ecfb616015

  • SSDEEP

    24576:CylKByM/D5GRUHyunHY3Kurx/HoBmtqUVHpBdSsMG8Gg/AXyuBzV:pg/DDyuHY6IPcmtHddMcgER

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

life

C2

185.161.248.73:4164

Attributes
  • auth_value

    8685d11953530b68ad5ec703809d9f91

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ffe6447195dd3ea64c527e5e9b14c508dd7f0c569043f51028853ac42e1e2805.exe
    "C:\Users\Admin\AppData\Local\Temp\ffe6447195dd3ea64c527e5e9b14c508dd7f0c569043f51028853ac42e1e2805.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3240
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z33888258.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z33888258.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2092
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z92563820.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z92563820.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1852
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z51087290.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z51087290.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2776
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s16598214.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s16598214.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3052
            • C:\Windows\Temp\1.exe
              "C:\Windows\Temp\1.exe"
              6⤵
              • Executes dropped EXE
              PID:3164
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 1368
              6⤵
              • Program crash
              PID:3472
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t69575608.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t69575608.exe
            5⤵
            • Executes dropped EXE
            PID:4640
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3052 -ip 3052
    1⤵
      PID:3476

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z33888258.exe
      Filesize

      1.0MB

      MD5

      937913e7480f0b382cddfebdb88e7959

      SHA1

      73b492e81201375b01bd888d4c69105410c62d8b

      SHA256

      653a918f5d46c1a665286ac267c0533bfd44844dc68c96712119c545f0d5e366

      SHA512

      d820b1c1d801e57c5475448f11f56e743af8195d986c3a2077042561cb34a2500f6f78118941243f972fb56e797bd03a6fc22f17f78431f90f6fa7f85012ee51

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z33888258.exe
      Filesize

      1.0MB

      MD5

      937913e7480f0b382cddfebdb88e7959

      SHA1

      73b492e81201375b01bd888d4c69105410c62d8b

      SHA256

      653a918f5d46c1a665286ac267c0533bfd44844dc68c96712119c545f0d5e366

      SHA512

      d820b1c1d801e57c5475448f11f56e743af8195d986c3a2077042561cb34a2500f6f78118941243f972fb56e797bd03a6fc22f17f78431f90f6fa7f85012ee51

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z92563820.exe
      Filesize

      759KB

      MD5

      669972a7a9ccc2ee9cf30a6baa0c8f1d

      SHA1

      fc5a9389c475772992d962fab642d1c08f5339d1

      SHA256

      6826aaac61038b339ed07debe2e76a0c4dc59dfc8654cb7b545db5baa0e65531

      SHA512

      88e8a4e442e119f14f7dcdf27d5a167e24c9a3172f4a4cdaa54a54ef71eb6f2e5327371a3a1536c1b27967153a0075ce20a7bd6d022d53900c86f5d03feb5e5b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z92563820.exe
      Filesize

      759KB

      MD5

      669972a7a9ccc2ee9cf30a6baa0c8f1d

      SHA1

      fc5a9389c475772992d962fab642d1c08f5339d1

      SHA256

      6826aaac61038b339ed07debe2e76a0c4dc59dfc8654cb7b545db5baa0e65531

      SHA512

      88e8a4e442e119f14f7dcdf27d5a167e24c9a3172f4a4cdaa54a54ef71eb6f2e5327371a3a1536c1b27967153a0075ce20a7bd6d022d53900c86f5d03feb5e5b

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z51087290.exe
      Filesize

      577KB

      MD5

      adad2848e7f4294d9b629fb831407b2a

      SHA1

      145b169499a88e5e41680b39edcc90fc01be4ee5

      SHA256

      0e2ff152403fa9c3347b0b97d5edc86ab4128fe7536f84fa7e1b32b44bc549eb

      SHA512

      7a879db8eac9d2d299326295c91d55d42c87a72b93c02a3b1a99621364a78bdd080ed927ef47d4df89641d503da52244c02276d34ca485fb5eebc7e8d9f65022

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z51087290.exe
      Filesize

      577KB

      MD5

      adad2848e7f4294d9b629fb831407b2a

      SHA1

      145b169499a88e5e41680b39edcc90fc01be4ee5

      SHA256

      0e2ff152403fa9c3347b0b97d5edc86ab4128fe7536f84fa7e1b32b44bc549eb

      SHA512

      7a879db8eac9d2d299326295c91d55d42c87a72b93c02a3b1a99621364a78bdd080ed927ef47d4df89641d503da52244c02276d34ca485fb5eebc7e8d9f65022

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s16598214.exe
      Filesize

      574KB

      MD5

      27f85d0472d69d98c511fe78f0ec1bb2

      SHA1

      64b3f4fc6ab55a7549ca7d9bb23f4482ccb81cfa

      SHA256

      2814ed5b1cb24e92ddde70449138744619fd6294e34c963c361d9f689f279933

      SHA512

      f0d34b6d807c1162c1cdb49e04f68e1401470c97e81b6b232be2ae1281a75b34960e2cee756b623ffef58df26820e651f28d9dfa3e231e052c598e8732ffb43e

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s16598214.exe
      Filesize

      574KB

      MD5

      27f85d0472d69d98c511fe78f0ec1bb2

      SHA1

      64b3f4fc6ab55a7549ca7d9bb23f4482ccb81cfa

      SHA256

      2814ed5b1cb24e92ddde70449138744619fd6294e34c963c361d9f689f279933

      SHA512

      f0d34b6d807c1162c1cdb49e04f68e1401470c97e81b6b232be2ae1281a75b34960e2cee756b623ffef58df26820e651f28d9dfa3e231e052c598e8732ffb43e

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t69575608.exe
      Filesize

      169KB

      MD5

      9452bfe35eec088769d9a4b1cd452032

      SHA1

      ffc4902e7f7118b776f2092456c136b29dcd168d

      SHA256

      98287b76fea98b1d3d6d6e42a58d405f1295be441eb8ab919599ff24c28b4830

      SHA512

      3e43311a05e6cb4a0d7268c869b6060f262350c3d55c3fca1007d26fa170188cff0655fc9bf2942db6f96b7c89d0e43bf193e656f5db088554f0ac6692fa0c1a

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t69575608.exe
      Filesize

      169KB

      MD5

      9452bfe35eec088769d9a4b1cd452032

      SHA1

      ffc4902e7f7118b776f2092456c136b29dcd168d

      SHA256

      98287b76fea98b1d3d6d6e42a58d405f1295be441eb8ab919599ff24c28b4830

      SHA512

      3e43311a05e6cb4a0d7268c869b6060f262350c3d55c3fca1007d26fa170188cff0655fc9bf2942db6f96b7c89d0e43bf193e656f5db088554f0ac6692fa0c1a

    • C:\Windows\Temp\1.exe
      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • C:\Windows\Temp\1.exe
      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • C:\Windows\Temp\1.exe
      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • memory/3052-176-0x0000000005500000-0x0000000005560000-memory.dmp
      Filesize

      384KB

    • memory/3052-218-0x0000000005500000-0x0000000005560000-memory.dmp
      Filesize

      384KB

    • memory/3052-174-0x0000000005500000-0x0000000005560000-memory.dmp
      Filesize

      384KB

    • memory/3052-170-0x0000000005500000-0x0000000005560000-memory.dmp
      Filesize

      384KB

    • memory/3052-177-0x0000000000920000-0x000000000097B000-memory.dmp
      Filesize

      364KB

    • memory/3052-179-0x0000000004ED0000-0x0000000004EE0000-memory.dmp
      Filesize

      64KB

    • memory/3052-181-0x0000000004ED0000-0x0000000004EE0000-memory.dmp
      Filesize

      64KB

    • memory/3052-183-0x0000000004ED0000-0x0000000004EE0000-memory.dmp
      Filesize

      64KB

    • memory/3052-184-0x0000000005500000-0x0000000005560000-memory.dmp
      Filesize

      384KB

    • memory/3052-180-0x0000000005500000-0x0000000005560000-memory.dmp
      Filesize

      384KB

    • memory/3052-186-0x0000000005500000-0x0000000005560000-memory.dmp
      Filesize

      384KB

    • memory/3052-188-0x0000000005500000-0x0000000005560000-memory.dmp
      Filesize

      384KB

    • memory/3052-190-0x0000000005500000-0x0000000005560000-memory.dmp
      Filesize

      384KB

    • memory/3052-192-0x0000000005500000-0x0000000005560000-memory.dmp
      Filesize

      384KB

    • memory/3052-194-0x0000000005500000-0x0000000005560000-memory.dmp
      Filesize

      384KB

    • memory/3052-196-0x0000000005500000-0x0000000005560000-memory.dmp
      Filesize

      384KB

    • memory/3052-198-0x0000000005500000-0x0000000005560000-memory.dmp
      Filesize

      384KB

    • memory/3052-200-0x0000000005500000-0x0000000005560000-memory.dmp
      Filesize

      384KB

    • memory/3052-202-0x0000000005500000-0x0000000005560000-memory.dmp
      Filesize

      384KB

    • memory/3052-204-0x0000000005500000-0x0000000005560000-memory.dmp
      Filesize

      384KB

    • memory/3052-206-0x0000000005500000-0x0000000005560000-memory.dmp
      Filesize

      384KB

    • memory/3052-208-0x0000000005500000-0x0000000005560000-memory.dmp
      Filesize

      384KB

    • memory/3052-210-0x0000000005500000-0x0000000005560000-memory.dmp
      Filesize

      384KB

    • memory/3052-212-0x0000000005500000-0x0000000005560000-memory.dmp
      Filesize

      384KB

    • memory/3052-216-0x0000000005500000-0x0000000005560000-memory.dmp
      Filesize

      384KB

    • memory/3052-172-0x0000000005500000-0x0000000005560000-memory.dmp
      Filesize

      384KB

    • memory/3052-214-0x0000000005500000-0x0000000005560000-memory.dmp
      Filesize

      384KB

    • memory/3052-220-0x0000000005500000-0x0000000005560000-memory.dmp
      Filesize

      384KB

    • memory/3052-226-0x0000000005500000-0x0000000005560000-memory.dmp
      Filesize

      384KB

    • memory/3052-224-0x0000000005500000-0x0000000005560000-memory.dmp
      Filesize

      384KB

    • memory/3052-222-0x0000000005500000-0x0000000005560000-memory.dmp
      Filesize

      384KB

    • memory/3052-228-0x0000000005500000-0x0000000005560000-memory.dmp
      Filesize

      384KB

    • memory/3052-230-0x0000000005500000-0x0000000005560000-memory.dmp
      Filesize

      384KB

    • memory/3052-2316-0x0000000004ED0000-0x0000000004EE0000-memory.dmp
      Filesize

      64KB

    • memory/3052-168-0x0000000005500000-0x0000000005560000-memory.dmp
      Filesize

      384KB

    • memory/3052-166-0x0000000005500000-0x0000000005560000-memory.dmp
      Filesize

      384KB

    • memory/3052-164-0x0000000005500000-0x0000000005560000-memory.dmp
      Filesize

      384KB

    • memory/3052-162-0x0000000004F50000-0x00000000054F4000-memory.dmp
      Filesize

      5.6MB

    • memory/3052-2328-0x0000000004ED0000-0x0000000004EE0000-memory.dmp
      Filesize

      64KB

    • memory/3052-2329-0x0000000004ED0000-0x0000000004EE0000-memory.dmp
      Filesize

      64KB

    • memory/3052-163-0x0000000005500000-0x0000000005560000-memory.dmp
      Filesize

      384KB

    • memory/3164-2331-0x0000000005470000-0x000000000557A000-memory.dmp
      Filesize

      1.0MB

    • memory/3164-2332-0x00000000053A0000-0x00000000053B2000-memory.dmp
      Filesize

      72KB

    • memory/3164-2333-0x0000000005400000-0x000000000543C000-memory.dmp
      Filesize

      240KB

    • memory/3164-2334-0x0000000005240000-0x0000000005250000-memory.dmp
      Filesize

      64KB

    • memory/3164-2330-0x0000000005970000-0x0000000005F88000-memory.dmp
      Filesize

      6.1MB

    • memory/3164-2327-0x0000000000910000-0x000000000093E000-memory.dmp
      Filesize

      184KB

    • memory/3164-2341-0x0000000005240000-0x0000000005250000-memory.dmp
      Filesize

      64KB

    • memory/4640-2339-0x0000000000810000-0x000000000083E000-memory.dmp
      Filesize

      184KB

    • memory/4640-2340-0x00000000051E0000-0x00000000051F0000-memory.dmp
      Filesize

      64KB

    • memory/4640-2342-0x00000000051E0000-0x00000000051F0000-memory.dmp
      Filesize

      64KB