Analysis

  • max time kernel
    137s
  • max time network
    139s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19/08/2024, 17:07

General

  • Target

    d3d9x.dll

  • Size

    512KB

  • MD5

    4b75d83048343fc02744fee64d8ca8fa

  • SHA1

    6fa69c43490661d7b43b6985a223410d713dbed2

  • SHA256

    ec1cb701cc753a1a05d349b1f5da907a3f7c365fbf0d209a0c71c644f27e700a

  • SHA512

    d83871092ba20cc32fedce9627924ff797e8c409b2b07a72c0ec9aa292ac6b5fa64eef6717abf4fd5e135b8fb3e5a68703bd21a2364fcc03970405e71a2fd16f

  • SSDEEP

    12288:FLaa5kL2dwqmJjZA9Esh5gp3bfZOGbdcs2zZ9t:FLaaeIx4vs4p3lOGbuse

Malware Config

Extracted

Family

redline

C2

185.196.9.26:6302

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\d3d9x.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4440
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\d3d9x.dll,#1
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4292
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2428

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2428-11-0x0000000005CE0000-0x0000000005DEA000-memory.dmp

    Filesize

    1.0MB

  • memory/2428-12-0x0000000005630000-0x0000000005642000-memory.dmp

    Filesize

    72KB

  • memory/2428-3-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2428-22-0x0000000074A00000-0x0000000074AD0000-memory.dmp

    Filesize

    832KB

  • memory/2428-5-0x0000000074A00000-0x0000000074AD0000-memory.dmp

    Filesize

    832KB

  • memory/2428-6-0x00000000057E0000-0x0000000005CDE000-memory.dmp

    Filesize

    5.0MB

  • memory/2428-7-0x00000000053C0000-0x0000000005452000-memory.dmp

    Filesize

    584KB

  • memory/2428-8-0x0000000074A00000-0x0000000074AD0000-memory.dmp

    Filesize

    832KB

  • memory/2428-9-0x0000000005470000-0x000000000547A000-memory.dmp

    Filesize

    40KB

  • memory/2428-10-0x00000000062F0000-0x00000000068F6000-memory.dmp

    Filesize

    6.0MB

  • memory/2428-20-0x0000000074A00000-0x0000000074AD0000-memory.dmp

    Filesize

    832KB

  • memory/2428-13-0x0000000005690000-0x00000000056CE000-memory.dmp

    Filesize

    248KB

  • memory/2428-19-0x0000000074A00000-0x0000000074AD0000-memory.dmp

    Filesize

    832KB

  • memory/2428-14-0x00000000056D0000-0x000000000571B000-memory.dmp

    Filesize

    300KB

  • memory/2428-15-0x0000000005F90000-0x0000000005FF6000-memory.dmp

    Filesize

    408KB

  • memory/2428-16-0x0000000006D90000-0x0000000006DE0000-memory.dmp

    Filesize

    320KB

  • memory/2428-17-0x0000000006FB0000-0x0000000007172000-memory.dmp

    Filesize

    1.8MB

  • memory/2428-18-0x00000000076B0000-0x0000000007BDC000-memory.dmp

    Filesize

    5.2MB

  • memory/4292-1-0x0000000074A10000-0x0000000074A70000-memory.dmp

    Filesize

    384KB

  • memory/4292-2-0x0000000074A00000-0x0000000074AD0000-memory.dmp

    Filesize

    832KB

  • memory/4292-4-0x0000000074A00000-0x0000000074AD0000-memory.dmp

    Filesize

    832KB