Analysis
-
max time kernel
120s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2024 01:10
Static task
static1
Behavioral task
behavioral1
Sample
66f4cba528387d30b2ccad263197222c9783701531c2cf076cdc1d3445ff8029.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
66f4cba528387d30b2ccad263197222c9783701531c2cf076cdc1d3445ff8029.dll
Resource
win10v2004-20240802-en
General
-
Target
66f4cba528387d30b2ccad263197222c9783701531c2cf076cdc1d3445ff8029.dll
-
Size
514KB
-
MD5
5edc78827ab864ef09cdf554ac0d8bd4
-
SHA1
cbd2b14da1d11f0ee854fd7fb13c5f8e146b4ab3
-
SHA256
66f4cba528387d30b2ccad263197222c9783701531c2cf076cdc1d3445ff8029
-
SHA512
fed82e16e4c6a8870bac4f6b9ba342eab391eacd3b3fac8b031acfb5355981915c83e07756e096c9ac2561c0153291e98718bdbd8a388544a933d452647e6c60
-
SSDEEP
6144:TX209k+Gxw7weUhGJdZlx5QQ7ZALc3Ld15Ikdp9L3+5SUP:TG09k+GquGJdZlxfZV5nN+S
Malware Config
Extracted
redline
185.196.9.26:6302
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/2832-2-0x0000000000400000-0x0000000000452000-memory.dmp family_redline -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3516 set thread context of 2832 3516 rundll32.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 2832 MSBuild.exe 2832 MSBuild.exe 2832 MSBuild.exe 2832 MSBuild.exe 2832 MSBuild.exe 2832 MSBuild.exe 2832 MSBuild.exe 2832 MSBuild.exe 2832 MSBuild.exe 2832 MSBuild.exe 2832 MSBuild.exe 2832 MSBuild.exe 2832 MSBuild.exe 2832 MSBuild.exe 2832 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2832 MSBuild.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3960 wrote to memory of 3516 3960 rundll32.exe 91 PID 3960 wrote to memory of 3516 3960 rundll32.exe 91 PID 3960 wrote to memory of 3516 3960 rundll32.exe 91 PID 3516 wrote to memory of 2832 3516 rundll32.exe 92 PID 3516 wrote to memory of 2832 3516 rundll32.exe 92 PID 3516 wrote to memory of 2832 3516 rundll32.exe 92 PID 3516 wrote to memory of 2832 3516 rundll32.exe 92 PID 3516 wrote to memory of 2832 3516 rundll32.exe 92 PID 3516 wrote to memory of 2832 3516 rundll32.exe 92 PID 3516 wrote to memory of 2832 3516 rundll32.exe 92 PID 3516 wrote to memory of 2832 3516 rundll32.exe 92
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\66f4cba528387d30b2ccad263197222c9783701531c2cf076cdc1d3445ff8029.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\66f4cba528387d30b2ccad263197222c9783701531c2cf076cdc1d3445ff8029.dll,#12⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4108,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=4020 /prefetch:81⤵PID:2340