Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 01:16
Static task
static1
Behavioral task
behavioral1
Sample
3756d25659af8e8326899a3b2ab8b018bd167cd09302f846775544088a65cd53.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3756d25659af8e8326899a3b2ab8b018bd167cd09302f846775544088a65cd53.exe
Resource
win10v2004-20240802-en
General
-
Target
3756d25659af8e8326899a3b2ab8b018bd167cd09302f846775544088a65cd53.exe
-
Size
1.1MB
-
MD5
4b0f5b53264c56125bd5c889e063bbca
-
SHA1
af67f0e3380e79157505e9372922e372ca28fdeb
-
SHA256
3756d25659af8e8326899a3b2ab8b018bd167cd09302f846775544088a65cd53
-
SHA512
39ac9635eda068f758ff2ece2997100e9cabb254c02e4abb374b99fa415554369273a957ef51209fd0df624db1792bbb30a7f7da96015a7e98df73d290dae0ac
-
SSDEEP
24576:xQYmBqkDPByJzhAfD7MjzlR7BvVsqYrJc7f752/HnK2:xQ1DZ0z0MjHNvGqWJcB
Malware Config
Extracted
redline
yellowbag.top:80
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/3580-41-0x0000000000190000-0x00000000001C0000-memory.dmp family_redline -
Manipulates Digital Signatures 1 TTPs 3 IoCs
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.1!7\Name = "szOID_ROOT_PROGRAM_AUTO_UPDATE_CA_REVOCATION" certutil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.2!7\Name = "szOID_ROOT_PROGRAM_AUTO_UPDATE_END_REVOCATION" certutil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.3!7\Name = "szOID_ROOT_PROGRAM_NO_OCSP_FAILOVER_TO_CRL" certutil.exe -
Deletes itself 1 IoCs
pid Process 808 powershell.exe -
Executes dropped EXE 2 IoCs
pid Process 3932 fontdrvhost.com 4696 fontdrvhost.com -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3756d25659af8e8326899a3b2ab8b018bd167cd09302f846775544088a65cd53.exe -
pid Process 2572 cmd.exe 3188 certutil.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4696 set thread context of 3580 4696 fontdrvhost.com 97 -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language certutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fontdrvhost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3756d25659af8e8326899a3b2ab8b018bd167cd09302f846775544088a65cd53.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fontdrvhost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1836 PING.EXE -
Kills process with taskkill 1 IoCs
pid Process 4240 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1836 PING.EXE -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 808 powershell.exe 808 powershell.exe 808 powershell.exe 808 powershell.exe 808 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 808 powershell.exe Token: SeDebugPrivilege 3580 RegAsm.exe Token: SeDebugPrivilege 4240 taskkill.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 3932 fontdrvhost.com 3932 fontdrvhost.com 3932 fontdrvhost.com 4696 fontdrvhost.com 4696 fontdrvhost.com 4696 fontdrvhost.com -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 3932 fontdrvhost.com 3932 fontdrvhost.com 3932 fontdrvhost.com 4696 fontdrvhost.com 4696 fontdrvhost.com 4696 fontdrvhost.com -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1748 wrote to memory of 2572 1748 3756d25659af8e8326899a3b2ab8b018bd167cd09302f846775544088a65cd53.exe 82 PID 1748 wrote to memory of 2572 1748 3756d25659af8e8326899a3b2ab8b018bd167cd09302f846775544088a65cd53.exe 82 PID 1748 wrote to memory of 2572 1748 3756d25659af8e8326899a3b2ab8b018bd167cd09302f846775544088a65cd53.exe 82 PID 2572 wrote to memory of 3188 2572 cmd.exe 84 PID 2572 wrote to memory of 3188 2572 cmd.exe 84 PID 2572 wrote to memory of 3188 2572 cmd.exe 84 PID 2572 wrote to memory of 3932 2572 cmd.exe 85 PID 2572 wrote to memory of 3932 2572 cmd.exe 85 PID 2572 wrote to memory of 3932 2572 cmd.exe 85 PID 3932 wrote to memory of 4696 3932 fontdrvhost.com 86 PID 3932 wrote to memory of 4696 3932 fontdrvhost.com 86 PID 3932 wrote to memory of 4696 3932 fontdrvhost.com 86 PID 2572 wrote to memory of 1836 2572 cmd.exe 87 PID 2572 wrote to memory of 1836 2572 cmd.exe 87 PID 2572 wrote to memory of 1836 2572 cmd.exe 87 PID 1748 wrote to memory of 808 1748 3756d25659af8e8326899a3b2ab8b018bd167cd09302f846775544088a65cd53.exe 88 PID 1748 wrote to memory of 808 1748 3756d25659af8e8326899a3b2ab8b018bd167cd09302f846775544088a65cd53.exe 88 PID 1748 wrote to memory of 808 1748 3756d25659af8e8326899a3b2ab8b018bd167cd09302f846775544088a65cd53.exe 88 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97 PID 4696 wrote to memory of 3580 4696 fontdrvhost.com 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\3756d25659af8e8326899a3b2ab8b018bd167cd09302f846775544088a65cd53.exe"C:\Users\Admin\AppData\Local\Temp\3756d25659af8e8326899a3b2ab8b018bd167cd09302f846775544088a65cd53.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\cmd.execmd /c <nul set /p ="M" > fontdrvhost.com & type ZKEKFq.com >> fontdrvhost.com & del ZKEKFq.com & certutil -decode YmJse.com A & fontdrvhost.com A & ping 127.0.0.1 -n 32⤵
- Deobfuscate/Decode Files or Information
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\certutil.execertutil -decode YmJse.com A3⤵
- Manipulates Digital Signatures
- Deobfuscate/Decode Files or Information
- System Location Discovery: System Language Discovery
PID:3188
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fontdrvhost.comfontdrvhost.com A3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fontdrvhost.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fontdrvhost.com A4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3580 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 3580 && choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵
- System Location Discovery: System Language Discovery
PID:2788 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 35807⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4240
-
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 37⤵
- System Location Discovery: System Language Discovery
PID:316
-
-
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 33⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1836
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command $mgwa = (Get-WmiObject win32_process -Filter "processid=$pid").parentprocessid; $feqynbs = (Get-WmiObject win32_process -Filter "processid=$mgwa").executablepath; Stop-Process -ID $mgwa -Force; Start-Sleep -s 1; Remove-Item -path $feqynbs2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:808
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Deobfuscate/Decode Files or Information
1Indicator Removal
1File Deletion
1Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
358KB
MD5293918878c0ce8cffbd344b16eac656e
SHA135b476831f6aea74b3455809b35119204b9971d4
SHA256da606e3891954918706a34e5f85e203ecc3e81b4c5f791ff8281255fcbe2ba49
SHA5125e4215bf1a3098ceeb3d9ab90ad9c88be5f0db4cf31ce3fad201f3a76cb39e927487158f79e2dbb84f1479aeabd7473e54aeef553ae890af96b460580b4fcabc
-
Filesize
165KB
MD567bb52ecfe627a96076afafd2dde32c7
SHA180427ac274ecce18b2436e1cf0bd12623562ce96
SHA256c0793851a648fbc2fb02f59225895d9da673106733d4c62c145ffc57a771907a
SHA51209ef9408848fef543fa665b9fa50889b0f25f8bf61188d8a4e3b45319b54c01712c4c4b8a02fc89065ade1682cd5ab97c3eaa70cdbbc7921049c4716bf9768a0
-
Filesize
492KB
MD5c96bf5ceca92a5362f342a7ee19fdc88
SHA16d31b0eebd75cef42bc8935260320d6b13666ddd
SHA2565b57292ae991d305d450d659a54710eb4ae53a0b8eb67e0cdd2eaa88980348c1
SHA51205bd0d4a3a33ddc3b3208e26f9b215f4627f6738ae8759df9222dad068f7a5b14905434ce04b376942aaab02ad1ff81afedd8303db756c38057591f6bfd0096c
-
Filesize
872KB
MD5d86ab2aeeac2553c7857ece4492eda5d
SHA10828db56b556f3f0486a9de9d2c728216035e8e6
SHA2568861365fb619dbb90da0027db93d041681c30deb93071ec588121a8f8ba08436
SHA5128c0154d80fb47ea5225816e95db0126d02950f0ec7909a68205ee67a0d1c4dbff971933ee5ba0307c24658ce52400e144cde720e514acf3024fbdb2505345cfe
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82