Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16/10/2024, 23:56
Static task
static1
Behavioral task
behavioral1
Sample
12f9806ad64e90f6276302e3c023fb71.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
12f9806ad64e90f6276302e3c023fb71.exe
Resource
win10v2004-20241007-en
General
-
Target
12f9806ad64e90f6276302e3c023fb71.exe
-
Size
5KB
-
MD5
12f9806ad64e90f6276302e3c023fb71
-
SHA1
769b8bdcd4e87324fc7b05d07b600842ceba3aed
-
SHA256
8a5b6b6a2d9cd640f59a4c7ed58ad3bbc54268205dd3899356f5cb99a9352a78
-
SHA512
7700b9b3ddf0eae92daa73d098a1c081428b3cdd754293912217b20ef6086e227915d3dfe8cb86d15e00b3a39377bb67ca2c96172b628bff6389f7ec602927f1
-
SSDEEP
48:6LaoejN+CAc+CJrjV6CIndMh0Dc7bVrricqDsKrQ7tieK8CNJjpfbNtm:QWNPAc+CJrR6a0Dclri3DADNizNt
Malware Config
Extracted
redline
7772121777
87.120.127.223:42128
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/files/0x0008000000023c7e-1110.dat family_redline behavioral2/memory/5404-1122-0x00000000002C0000-0x00000000002DE000-memory.dmp family_redline -
SectopRAT payload 2 IoCs
resource yara_rule behavioral2/files/0x0008000000023c7e-1110.dat family_sectoprat behavioral2/memory/5404-1122-0x00000000002C0000-0x00000000002DE000-memory.dmp family_sectoprat -
Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
description pid Process procid_target PID 3264 created 3432 3264 tmpA3B2.tmp.exe 56 PID 5556 created 3432 5556 InstallUtil.exe 56 PID 3892 created 3432 3892 Plain_Checker.exe 56 -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 12f9806ad64e90f6276302e3c023fb71.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation tmpA3B2.tmp.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation Plain_Checker.exe -
Executes dropped EXE 3 IoCs
pid Process 3264 tmpA3B2.tmp.exe 5404 build.exe 3892 Plain_Checker.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Adobe_Install_Updater = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe_Install_Updater.exe" tmpA3B2.tmp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Yftssfzf = "C:\\Users\\Admin\\AppData\\Roaming\\Yftssfzf.exe" Plain_Checker.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3264 set thread context of 5556 3264 tmpA3B2.tmp.exe 97 PID 5556 set thread context of 3488 5556 InstallUtil.exe 111 PID 3892 set thread context of 760 3892 Plain_Checker.exe 122 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12f9806ad64e90f6276302e3c023fb71.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpA3B2.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Plain_Checker.exe -
Gathers network information 2 TTPs 6 IoCs
Uses commandline utility to view network configuration.
pid Process 4852 ipconfig.exe 5848 ipconfig.exe 5296 ipconfig.exe 6020 ipconfig.exe 5104 ipconfig.exe 2120 ipconfig.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3488 InstallUtil.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3264 tmpA3B2.tmp.exe 5556 InstallUtil.exe 3892 Plain_Checker.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 1268 12f9806ad64e90f6276302e3c023fb71.exe Token: SeDebugPrivilege 3264 tmpA3B2.tmp.exe Token: SeDebugPrivilege 3264 tmpA3B2.tmp.exe Token: SeDebugPrivilege 5556 InstallUtil.exe Token: SeDebugPrivilege 5404 build.exe Token: SeDebugPrivilege 5556 InstallUtil.exe Token: SeDebugPrivilege 3892 Plain_Checker.exe Token: SeDebugPrivilege 3488 InstallUtil.exe Token: SeDebugPrivilege 3892 Plain_Checker.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1268 wrote to memory of 3264 1268 12f9806ad64e90f6276302e3c023fb71.exe 87 PID 1268 wrote to memory of 3264 1268 12f9806ad64e90f6276302e3c023fb71.exe 87 PID 1268 wrote to memory of 3264 1268 12f9806ad64e90f6276302e3c023fb71.exe 87 PID 3264 wrote to memory of 4740 3264 tmpA3B2.tmp.exe 88 PID 3264 wrote to memory of 4740 3264 tmpA3B2.tmp.exe 88 PID 3264 wrote to memory of 4740 3264 tmpA3B2.tmp.exe 88 PID 4740 wrote to memory of 4852 4740 cmd.exe 90 PID 4740 wrote to memory of 4852 4740 cmd.exe 90 PID 4740 wrote to memory of 4852 4740 cmd.exe 90 PID 3264 wrote to memory of 5404 3264 tmpA3B2.tmp.exe 95 PID 3264 wrote to memory of 5404 3264 tmpA3B2.tmp.exe 95 PID 3264 wrote to memory of 5404 3264 tmpA3B2.tmp.exe 95 PID 3264 wrote to memory of 5556 3264 tmpA3B2.tmp.exe 97 PID 3264 wrote to memory of 5556 3264 tmpA3B2.tmp.exe 97 PID 3264 wrote to memory of 5556 3264 tmpA3B2.tmp.exe 97 PID 3264 wrote to memory of 5556 3264 tmpA3B2.tmp.exe 97 PID 3264 wrote to memory of 5556 3264 tmpA3B2.tmp.exe 97 PID 3264 wrote to memory of 5556 3264 tmpA3B2.tmp.exe 97 PID 3264 wrote to memory of 5556 3264 tmpA3B2.tmp.exe 97 PID 3264 wrote to memory of 5556 3264 tmpA3B2.tmp.exe 97 PID 3264 wrote to memory of 5828 3264 tmpA3B2.tmp.exe 98 PID 3264 wrote to memory of 5828 3264 tmpA3B2.tmp.exe 98 PID 3264 wrote to memory of 5828 3264 tmpA3B2.tmp.exe 98 PID 5828 wrote to memory of 5848 5828 cmd.exe 101 PID 5828 wrote to memory of 5848 5828 cmd.exe 101 PID 5828 wrote to memory of 5848 5828 cmd.exe 101 PID 5556 wrote to memory of 5364 5556 InstallUtil.exe 106 PID 5556 wrote to memory of 5364 5556 InstallUtil.exe 106 PID 5556 wrote to memory of 5364 5556 InstallUtil.exe 106 PID 5364 wrote to memory of 5296 5364 cmd.exe 109 PID 5364 wrote to memory of 5296 5364 cmd.exe 109 PID 5364 wrote to memory of 5296 5364 cmd.exe 109 PID 5556 wrote to memory of 3892 5556 InstallUtil.exe 110 PID 5556 wrote to memory of 3892 5556 InstallUtil.exe 110 PID 5556 wrote to memory of 3892 5556 InstallUtil.exe 110 PID 5556 wrote to memory of 3488 5556 InstallUtil.exe 111 PID 5556 wrote to memory of 3488 5556 InstallUtil.exe 111 PID 5556 wrote to memory of 3488 5556 InstallUtil.exe 111 PID 5556 wrote to memory of 3488 5556 InstallUtil.exe 111 PID 5556 wrote to memory of 3488 5556 InstallUtil.exe 111 PID 5556 wrote to memory of 3488 5556 InstallUtil.exe 111 PID 5556 wrote to memory of 3488 5556 InstallUtil.exe 111 PID 5556 wrote to memory of 3488 5556 InstallUtil.exe 111 PID 5556 wrote to memory of 2580 5556 InstallUtil.exe 112 PID 5556 wrote to memory of 2580 5556 InstallUtil.exe 112 PID 5556 wrote to memory of 2580 5556 InstallUtil.exe 112 PID 2580 wrote to memory of 6020 2580 cmd.exe 115 PID 2580 wrote to memory of 6020 2580 cmd.exe 115 PID 2580 wrote to memory of 6020 2580 cmd.exe 115 PID 3892 wrote to memory of 5492 3892 Plain_Checker.exe 119 PID 3892 wrote to memory of 5492 3892 Plain_Checker.exe 119 PID 3892 wrote to memory of 5492 3892 Plain_Checker.exe 119 PID 5492 wrote to memory of 5104 5492 cmd.exe 121 PID 5492 wrote to memory of 5104 5492 cmd.exe 121 PID 5492 wrote to memory of 5104 5492 cmd.exe 121 PID 3892 wrote to memory of 760 3892 Plain_Checker.exe 122 PID 3892 wrote to memory of 760 3892 Plain_Checker.exe 122 PID 3892 wrote to memory of 760 3892 Plain_Checker.exe 122 PID 3892 wrote to memory of 760 3892 Plain_Checker.exe 122 PID 3892 wrote to memory of 760 3892 Plain_Checker.exe 122 PID 3892 wrote to memory of 760 3892 Plain_Checker.exe 122 PID 3892 wrote to memory of 760 3892 Plain_Checker.exe 122 PID 3892 wrote to memory of 760 3892 Plain_Checker.exe 122 PID 3892 wrote to memory of 3384 3892 Plain_Checker.exe 123
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\12f9806ad64e90f6276302e3c023fb71.exe"C:\Users\Admin\AppData\Local\Temp\12f9806ad64e90f6276302e3c023fb71.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\tmpA3B2.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpA3B2.tmp.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release5⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:4852
-
-
-
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5404
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5828 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew5⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:5848
-
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5556 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5364 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release4⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:5296
-
-
-
C:\Users\Admin\AppData\Local\Temp\Plain_Checker.exe"C:\Users\Admin\AppData\Local\Temp\Plain_Checker.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5492 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release5⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:5104
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew4⤵
- System Location Discovery: System Language Discovery
PID:3384 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew5⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2120
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew4⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:6020
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
PID:3488
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
PID:760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5c3f3579faf5abfc023f4e282cff43313
SHA19ad2f1cc766b02b1f7e85d4024969c3079950d6a
SHA25649b47081f5f4a706cd3b70421094b9ddf59a6c18fcbd177d5f6565fc14514ea1
SHA512427c9ca6f2e78c5fd98e6ec4bd8daf916ca46290e8e1cdf935657bd1bd4ea8273c9cd4ee91bbb5176ee06abced7d238622dc697e2cb575041c515585f4072b00
-
Filesize
127KB
MD530f7aac5d8d65200c618c6a0a94c4065
SHA1773f4aa04303897702a468134cf66b2b15665140
SHA2569b7fc6c8743440fb3958135998d2e4a67143dbdb980d18790ce68ff2634e495d
SHA512d7d91352d58ebcf44c3674366e3d76bebc4119a9b060f376166bb99b03b3a894592dc0a3263d0240727a1d8b7cca178e7719778ed8894300ad0b1e2c1d604053
-
Filesize
7KB
MD53a1085797ca3089008cb2b51d2fcdc84
SHA1f5ea90ec6ad07f137c058ef2874dbd3a1b444f95
SHA2568fc221b7c8e3f52f22841c866cf0d842f2a1266e79b472273766ce1704474499
SHA5125e1cf172f3ad81c6bdc5bb3e75743a5a7ac4d4250012112888707a334f3336ba43b5aa71d4cf67f6aa3f8207e21460aa13d06524241e6d0ff9e4d9e7c05f0eac