Analysis
-
max time kernel
137s -
max time network
139s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
19/08/2024, 17:07
Static task
static1
Behavioral task
behavioral1
Sample
d3d9x.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d3d9x.dll
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
d3d9x.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
d3d9x.dll
Resource
win11-20240802-en
General
-
Target
d3d9x.dll
-
Size
512KB
-
MD5
4b75d83048343fc02744fee64d8ca8fa
-
SHA1
6fa69c43490661d7b43b6985a223410d713dbed2
-
SHA256
ec1cb701cc753a1a05d349b1f5da907a3f7c365fbf0d209a0c71c644f27e700a
-
SHA512
d83871092ba20cc32fedce9627924ff797e8c409b2b07a72c0ec9aa292ac6b5fa64eef6717abf4fd5e135b8fb3e5a68703bd21a2364fcc03970405e71a2fd16f
-
SSDEEP
12288:FLaa5kL2dwqmJjZA9Esh5gp3bfZOGbdcs2zZ9t:FLaaeIx4vs4p3lOGbuse
Malware Config
Extracted
redline
185.196.9.26:6302
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/2428-3-0x0000000000400000-0x0000000000452000-memory.dmp family_redline -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4292 set thread context of 2428 4292 rundll32.exe 74 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2428 MSBuild.exe 2428 MSBuild.exe 2428 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2428 MSBuild.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4440 wrote to memory of 4292 4440 rundll32.exe 73 PID 4440 wrote to memory of 4292 4440 rundll32.exe 73 PID 4440 wrote to memory of 4292 4440 rundll32.exe 73 PID 4292 wrote to memory of 2428 4292 rundll32.exe 74 PID 4292 wrote to memory of 2428 4292 rundll32.exe 74 PID 4292 wrote to memory of 2428 4292 rundll32.exe 74 PID 4292 wrote to memory of 2428 4292 rundll32.exe 74 PID 4292 wrote to memory of 2428 4292 rundll32.exe 74 PID 4292 wrote to memory of 2428 4292 rundll32.exe 74 PID 4292 wrote to memory of 2428 4292 rundll32.exe 74 PID 4292 wrote to memory of 2428 4292 rundll32.exe 74
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d3d9x.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d3d9x.dll,#12⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2428
-
-