Analysis
-
max time kernel
103s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2022 09:25
Static task
static1
Behavioral task
behavioral1
Sample
29a808de2d82612a27d0ffb5a6505a90e0884d8ea332a282847d7da04f52b5f1.exe
Resource
win10v2004-20220812-en
General
-
Target
29a808de2d82612a27d0ffb5a6505a90e0884d8ea332a282847d7da04f52b5f1.exe
-
Size
785KB
-
MD5
d6e9e86e003086022805cd59d1a406bd
-
SHA1
514a4aaa1d1a0577fb1f84ff5d36cba8ea9619ea
-
SHA256
29a808de2d82612a27d0ffb5a6505a90e0884d8ea332a282847d7da04f52b5f1
-
SHA512
bff9b88db4187f31f1aa4f405d676df909eacf5ad48a9f413278e2fdc656e735c0ab265f0f4cdc87b8885d15109ffc7cfca071faca9352988ec2a6f0afb36ac9
-
SSDEEP
1536:Wrae78zjORCDGwfdCSog01313os5gP2DKPJY8rPf128M+ZtgTr2u92PUmqIf0O0Q:uahKyd2n31x5BuIZ7T9vGPr
Malware Config
Extracted
redline
bethoven
185.215.113.46:8223
-
auth_value
42d21fccbcd8cb0441971e6ed0b0897a
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/4108-146-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
Executes dropped EXE 2 IoCs
pid Process 2744 SETUP_~1.EXE 4108 SETUP_~1.EXE -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation SETUP_~1.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce 29a808de2d82612a27d0ffb5a6505a90e0884d8ea332a282847d7da04f52b5f1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 29a808de2d82612a27d0ffb5a6505a90e0884d8ea332a282847d7da04f52b5f1.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2744 set thread context of 4108 2744 SETUP_~1.EXE 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4324 powershell.exe 4324 powershell.exe 4108 SETUP_~1.EXE 4108 SETUP_~1.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2744 SETUP_~1.EXE Token: SeDebugPrivilege 4324 powershell.exe Token: SeDebugPrivilege 4108 SETUP_~1.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3740 wrote to memory of 2744 3740 29a808de2d82612a27d0ffb5a6505a90e0884d8ea332a282847d7da04f52b5f1.exe 82 PID 3740 wrote to memory of 2744 3740 29a808de2d82612a27d0ffb5a6505a90e0884d8ea332a282847d7da04f52b5f1.exe 82 PID 3740 wrote to memory of 2744 3740 29a808de2d82612a27d0ffb5a6505a90e0884d8ea332a282847d7da04f52b5f1.exe 82 PID 2744 wrote to memory of 4324 2744 SETUP_~1.EXE 89 PID 2744 wrote to memory of 4324 2744 SETUP_~1.EXE 89 PID 2744 wrote to memory of 4324 2744 SETUP_~1.EXE 89 PID 2744 wrote to memory of 4108 2744 SETUP_~1.EXE 92 PID 2744 wrote to memory of 4108 2744 SETUP_~1.EXE 92 PID 2744 wrote to memory of 4108 2744 SETUP_~1.EXE 92 PID 2744 wrote to memory of 4108 2744 SETUP_~1.EXE 92 PID 2744 wrote to memory of 4108 2744 SETUP_~1.EXE 92 PID 2744 wrote to memory of 4108 2744 SETUP_~1.EXE 92 PID 2744 wrote to memory of 4108 2744 SETUP_~1.EXE 92 PID 2744 wrote to memory of 4108 2744 SETUP_~1.EXE 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\29a808de2d82612a27d0ffb5a6505a90e0884d8ea332a282847d7da04f52b5f1.exe"C:\Users\Admin\AppData\Local\Temp\29a808de2d82612a27d0ffb5a6505a90e0884d8ea332a282847d7da04f52b5f1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA0AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4324
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4108
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e87e48b105757e1c7563d1c719059733
SHA128a3f2b2e0672da2b531f4757d2b20b53032dafc
SHA2560aaf22dc84cc3fcfe53de7ccfed8e662247dfb7f1a9967032c88790d0c663461
SHA512bf19c5743143aee914a453c41189c722c9b90a5b8bf299cecf3e1f97656d32cd209ecb74da8aebc89bb41c27d189f73aaaabbc64fe383410c95dc76ad4218968
-
Filesize
333.8MB
MD56adc030eeebd67c41f767f7ff4d7fea0
SHA1e5d80aff951e4b6df714cb4eb650bafb54e87370
SHA256b12ba6202ed39313ebef9404fd7513effd5c00d8e3f403fe971a8550843ef5ec
SHA5129a3c48019d245e2a6e041bd8aa0a477c9f24d5678036a6252d112fe493283e5996ffbdcc7d0c8fdafbe0d636a4d26ae28a1c476222dbabb5ad9893b64e977475
-
Filesize
333.8MB
MD56adc030eeebd67c41f767f7ff4d7fea0
SHA1e5d80aff951e4b6df714cb4eb650bafb54e87370
SHA256b12ba6202ed39313ebef9404fd7513effd5c00d8e3f403fe971a8550843ef5ec
SHA5129a3c48019d245e2a6e041bd8aa0a477c9f24d5678036a6252d112fe493283e5996ffbdcc7d0c8fdafbe0d636a4d26ae28a1c476222dbabb5ad9893b64e977475
-
Filesize
333.8MB
MD56adc030eeebd67c41f767f7ff4d7fea0
SHA1e5d80aff951e4b6df714cb4eb650bafb54e87370
SHA256b12ba6202ed39313ebef9404fd7513effd5c00d8e3f403fe971a8550843ef5ec
SHA5129a3c48019d245e2a6e041bd8aa0a477c9f24d5678036a6252d112fe493283e5996ffbdcc7d0c8fdafbe0d636a4d26ae28a1c476222dbabb5ad9893b64e977475