Overview
overview
10Static
static
30f6ce02639...df.exe
windows10-2004-x64
1017dbf09aca...d0.exe
windows7-x64
317dbf09aca...d0.exe
windows10-2004-x64
101b624e343d...55.exe
windows10-2004-x64
102faa75c50b...6d.exe
windows7-x64
32faa75c50b...6d.exe
windows10-2004-x64
104be1f370e8...6b.exe
windows7-x64
34be1f370e8...6b.exe
windows10-2004-x64
10576cad65a8...60.exe
windows10-2004-x64
106aa8d5d0d6...df.exe
windows10-2004-x64
106eeb3d69d9...69.exe
windows7-x64
36eeb3d69d9...69.exe
windows10-2004-x64
1077b8709187...06.exe
windows7-x64
377b8709187...06.exe
windows10-2004-x64
107f4e227924...bb.exe
windows7-x64
37f4e227924...bb.exe
windows10-2004-x64
108a870280a0...35.exe
windows7-x64
38a870280a0...35.exe
windows10-2004-x64
108db6f54494...1f.exe
windows10-2004-x64
10b21367ffaa...ef.exe
windows10-2004-x64
10b62068be50...da.exe
windows10-2004-x64
10be5114d10d...f3.exe
windows10-2004-x64
10d191282ff4...7a.exe
windows10-2004-x64
10de9167b772...91.exe
windows10-2004-x64
10f6dc0b4c65...d6.exe
windows10-2004-x64
10f85eca1ce9...65.exe
windows7-x64
3f85eca1ce9...65.exe
windows10-2004-x64
10f8dfa98c4e...be.exe
windows10-2004-x64
10Analysis
-
max time kernel
131s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 14:50
Static task
static1
Behavioral task
behavioral1
Sample
0f6ce02639d4d4caede8c3432a529ff995f9d50cbfec335bbe9dc19b8f5c9ddf.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
17dbf09aca5536c41f48cdee19e90cc995aeb0b0973ec6bca572f03b1ead46d0.exe
Resource
win7-20240508-en
Behavioral task
behavioral3
Sample
17dbf09aca5536c41f48cdee19e90cc995aeb0b0973ec6bca572f03b1ead46d0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
1b624e343d222ec9333b85d3af29b913b42ba3196fcb192f618e87ec4afa8855.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
2faa75c50b323133e8cbf507e6a3a4846097090d2e2c1a5afb174f798ee42a6d.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
2faa75c50b323133e8cbf507e6a3a4846097090d2e2c1a5afb174f798ee42a6d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
4be1f370e880d06da141a2c9957de478c40592a3abf6312aa8c2ef401a37d36b.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
4be1f370e880d06da141a2c9957de478c40592a3abf6312aa8c2ef401a37d36b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
576cad65a899197ae35e757e578a7c10c29e57c266d1fa4931c6f98f3d2e3a60.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
6aa8d5d0d6b96fe2a165ee46c9e31059a444b4fae6660eee669539f88bf869df.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
6eeb3d69d9979df74b9c482de2344395f5470b94f07494b4a4dd74fb5d286069.exe
Resource
win7-20240419-en
Behavioral task
behavioral12
Sample
6eeb3d69d9979df74b9c482de2344395f5470b94f07494b4a4dd74fb5d286069.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
77b8709187b6802be16e005b1139331349304c04ecd4e741e8609229f0134806.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
77b8709187b6802be16e005b1139331349304c04ecd4e741e8609229f0134806.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
7f4e22792482af87ecb52079082a4c33f24544a6b37c4e5da40ac1ac7f9ca3bb.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
7f4e22792482af87ecb52079082a4c33f24544a6b37c4e5da40ac1ac7f9ca3bb.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
8a870280a0dc165cadf46427c4e47c56d3fa42aa2cf823a54358bf48f5102435.exe
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
8a870280a0dc165cadf46427c4e47c56d3fa42aa2cf823a54358bf48f5102435.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
8db6f544940545b4e7f0eef92bc68e65f5e9efd3707f33b7e5594777d56ed71f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
b21367ffaa0009b30055944fc1052857ec46336d5bfe2efd3dab109667a56fef.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
b62068be50129166f539eb32a63746c4245a497e9b72553efdf326582cc5f4da.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral22
Sample
be5114d10db820426670fbbb41db92b8671a5f55a0b396e2d54b44606067a6f3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
d191282ff466919a5feb6c8682f696332eded6dd8747d336fe16593c6ea96f7a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral24
Sample
de9167b7720db28dc71aba69c32792f2bcfef4425545478b6b641677be8a0391.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
f6dc0b4c65662a9753e54800489b07d9f5a6a4c896a61d93f3a1a3e28d5bc9d6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral26
Sample
f85eca1ce903e035e1355a0ec74636f6d825aeaf8efa5c98472b6acad6536365.exe
Resource
win7-20240221-en
Behavioral task
behavioral27
Sample
f85eca1ce903e035e1355a0ec74636f6d825aeaf8efa5c98472b6acad6536365.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral28
Sample
f8dfa98c4e38deff7955c243f9db7b01692e43c0997eca9e5e141cc565cf05be.exe
Resource
win10v2004-20240426-en
General
-
Target
be5114d10db820426670fbbb41db92b8671a5f55a0b396e2d54b44606067a6f3.exe
-
Size
307KB
-
MD5
851a5f99a016bd43c7a70531d0676684
-
SHA1
d079d1c95a771f7b293d4936e046f144599191f6
-
SHA256
be5114d10db820426670fbbb41db92b8671a5f55a0b396e2d54b44606067a6f3
-
SHA512
3205df87162fa5c10064d9361c78e7c07582c7da1d7f327e74d3758f477c585e5899e3b82b2a654307d295490f39e39b4d04fb25c27c1cc27f932380a2f4d361
-
SSDEEP
6144:KFy+bnr+Yp0yN90QEIwSAlqDfNUkP85+kon5P8l:jMrUy90BrtW85+Tql
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral22/files/0x000a000000023445-5.dat family_redline behavioral22/memory/2168-8-0x0000000000DB0000-0x0000000000DE0000-memory.dmp family_redline -
Executes dropped EXE 1 IoCs
pid Process 2168 g2412948.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" be5114d10db820426670fbbb41db92b8671a5f55a0b396e2d54b44606067a6f3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3828 wrote to memory of 2168 3828 be5114d10db820426670fbbb41db92b8671a5f55a0b396e2d54b44606067a6f3.exe 83 PID 3828 wrote to memory of 2168 3828 be5114d10db820426670fbbb41db92b8671a5f55a0b396e2d54b44606067a6f3.exe 83 PID 3828 wrote to memory of 2168 3828 be5114d10db820426670fbbb41db92b8671a5f55a0b396e2d54b44606067a6f3.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\be5114d10db820426670fbbb41db92b8671a5f55a0b396e2d54b44606067a6f3.exe"C:\Users\Admin\AppData\Local\Temp\be5114d10db820426670fbbb41db92b8671a5f55a0b396e2d54b44606067a6f3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g2412948.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g2412948.exe2⤵
- Executes dropped EXE
PID:2168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD57fcf4cd3e71c764f90fd9a4e5ab142c4
SHA1e723b9230c9af8c1141cbca0f6dd1e34341a6653
SHA2568c420dc55efa7fe6a808f9acc4d0b9069edd9b038bb71568911694d2083a1d6b
SHA512b9c6293825caaa2efc67cd6016627bdfd77a251275ce57b6220da0faa0fe1939233756c12a65c17e3960e8e87f13e1187a088bf94453f638d5d40055b90ceee4