Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2024, 02:33
Static task
static1
Behavioral task
behavioral1
Sample
b49f21e73a9371b97ee689c1c0f2b403cf6faa1633071f097dfc7fc91caaa072.exe
Resource
win10v2004-20240419-en
General
-
Target
b49f21e73a9371b97ee689c1c0f2b403cf6faa1633071f097dfc7fc91caaa072.exe
-
Size
890KB
-
MD5
b8136b372c89d71781a271582fbacb3a
-
SHA1
a5e68997978907379c1423a838b7e499dd77060c
-
SHA256
b49f21e73a9371b97ee689c1c0f2b403cf6faa1633071f097dfc7fc91caaa072
-
SHA512
e5d82a0330961c7e54549257f28c3ddaf134a8de64580cc9ade9b7eb90735814d1455d7f234dcb7a1d573693c28b277cf02c1888d09fb8e9385e52f9281be2ca
-
SSDEEP
24576:QyKWk2TmJX4n7RnS+RPXm2dTbgIf9V89IaeqmyPA:XKNp47wO/rf9C9frmy
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dante
185.161.248.73:4164
-
auth_value
f4066af6b8a6f23125c8ee48288a3f90
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/2260-2168-0x00000000059C0000-0x00000000059F2000-memory.dmp family_redline behavioral1/files/0x000b000000023bbe-2173.dat family_redline behavioral1/memory/3700-2181-0x0000000000250000-0x000000000027E000-memory.dmp family_redline behavioral1/files/0x000a000000023bc5-2192.dat family_redline behavioral1/memory/1036-2194-0x0000000000D20000-0x0000000000D50000-memory.dmp family_redline -
Detects executables packed with ConfuserEx Mod 5 IoCs
resource yara_rule behavioral1/memory/2260-2168-0x00000000059C0000-0x00000000059F2000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/files/0x000b000000023bbe-2173.dat INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/3700-2181-0x0000000000250000-0x000000000027E000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/files/0x000a000000023bc5-2192.dat INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1036-2194-0x0000000000D20000-0x0000000000D50000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation p20477689.exe -
Executes dropped EXE 4 IoCs
pid Process 3740 y40453080.exe 2260 p20477689.exe 3700 1.exe 1036 r10614486.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b49f21e73a9371b97ee689c1c0f2b403cf6faa1633071f097dfc7fc91caaa072.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y40453080.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 436 2260 WerFault.exe 84 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2260 p20477689.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1296 wrote to memory of 3740 1296 b49f21e73a9371b97ee689c1c0f2b403cf6faa1633071f097dfc7fc91caaa072.exe 83 PID 1296 wrote to memory of 3740 1296 b49f21e73a9371b97ee689c1c0f2b403cf6faa1633071f097dfc7fc91caaa072.exe 83 PID 1296 wrote to memory of 3740 1296 b49f21e73a9371b97ee689c1c0f2b403cf6faa1633071f097dfc7fc91caaa072.exe 83 PID 3740 wrote to memory of 2260 3740 y40453080.exe 84 PID 3740 wrote to memory of 2260 3740 y40453080.exe 84 PID 3740 wrote to memory of 2260 3740 y40453080.exe 84 PID 2260 wrote to memory of 3700 2260 p20477689.exe 88 PID 2260 wrote to memory of 3700 2260 p20477689.exe 88 PID 2260 wrote to memory of 3700 2260 p20477689.exe 88 PID 3740 wrote to memory of 1036 3740 y40453080.exe 93 PID 3740 wrote to memory of 1036 3740 y40453080.exe 93 PID 3740 wrote to memory of 1036 3740 y40453080.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\b49f21e73a9371b97ee689c1c0f2b403cf6faa1633071f097dfc7fc91caaa072.exe"C:\Users\Admin\AppData\Local\Temp\b49f21e73a9371b97ee689c1c0f2b403cf6faa1633071f097dfc7fc91caaa072.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y40453080.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y40453080.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p20477689.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p20477689.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
PID:3700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2260 -s 14964⤵
- Program crash
PID:436
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r10614486.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r10614486.exe3⤵
- Executes dropped EXE
PID:1036
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2260 -ip 22601⤵PID:2500
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
589KB
MD543c538dd7b9f408790b837180944f8eb
SHA127524bdcb965db027f1f11295ef63bd146f55e8a
SHA2563fad64c1dc1b2dbcc64401ea48d1c355f74e8abc3316474de725a4ddb1f67ca4
SHA512553eb261f1427f8357e3cf86926595db47d9d57da5a733a9eeda4dae75e5c05d035bb8a8a9a916df0b7c37b4e0b7fd91f93deb25c0de19d3cd07e6740df9b080
-
Filesize
530KB
MD52ddeda56523a7d88c1d932a06965fe3e
SHA175328f89d27a06646e29c929a46c2506f86c039b
SHA256150197056219fc22ca21e9ee152fa97639d7983d224b9c7e551959ab646fc63a
SHA512cc6ede4b10cdf603fb66071c4f36668fec5234084e54a535ecd0aa3098666bdc63a2182ebc655f21339f93134785090855b4c2d4d9f45a8b08a5886bfd4c7dfd
-
Filesize
168KB
MD5398d41c5e9b605a7384ed20396f7c27f
SHA1e182785853d43f64f9e598ec9ef5210b7f2db687
SHA256c8dda11c51c052551ee553b11fea5c16c39cd8a9d0d2dc747a9a07e4ff16928b
SHA5128f32f1f7afd1dda51e0da91fb6401687014c6fb7d8e443dff0d60dbb95546660a3879cb44d2b143490d4fc8cd12e6d073e183e242ec882d5090473301667e1d0
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf