Analysis
-
max time kernel
131s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 11:03
Static task
static1
Behavioral task
behavioral1
Sample
b8759b45a3a040536cda03f0a5bdc1850b58d71a91154f278bbcd158b966eefc.exe
Resource
win10v2004-20241007-en
General
-
Target
b8759b45a3a040536cda03f0a5bdc1850b58d71a91154f278bbcd158b966eefc.exe
-
Size
1.1MB
-
MD5
2f52337c3546433b9a391e704b652f49
-
SHA1
e4c818132b5e30c79406e1f38c8fe267f6267aef
-
SHA256
b8759b45a3a040536cda03f0a5bdc1850b58d71a91154f278bbcd158b966eefc
-
SHA512
9a6ae4897686bfc0988b3856e7904943a6653264a2df4fd4afe910250eaa115c6464c762ef635f3d189bfdb1ae78789965e8a652620f2dfd23d8da37d14bd183
-
SSDEEP
24576:JyLq9Yqv0TazkmqNqLXq9yRn1xtlUf6BRH7b+cfXX:8LWR0eAmq0+9yF1xtlUCBRH7b+cfX
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b98-19.dat family_redline behavioral1/memory/2968-21-0x0000000000010000-0x000000000003A000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3008 x6592147.exe 768 x3543965.exe 2968 f6927770.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x6592147.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x3543965.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b8759b45a3a040536cda03f0a5bdc1850b58d71a91154f278bbcd158b966eefc.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x3543965.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6927770.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8759b45a3a040536cda03f0a5bdc1850b58d71a91154f278bbcd158b966eefc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x6592147.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4080 wrote to memory of 3008 4080 b8759b45a3a040536cda03f0a5bdc1850b58d71a91154f278bbcd158b966eefc.exe 83 PID 4080 wrote to memory of 3008 4080 b8759b45a3a040536cda03f0a5bdc1850b58d71a91154f278bbcd158b966eefc.exe 83 PID 4080 wrote to memory of 3008 4080 b8759b45a3a040536cda03f0a5bdc1850b58d71a91154f278bbcd158b966eefc.exe 83 PID 3008 wrote to memory of 768 3008 x6592147.exe 85 PID 3008 wrote to memory of 768 3008 x6592147.exe 85 PID 3008 wrote to memory of 768 3008 x6592147.exe 85 PID 768 wrote to memory of 2968 768 x3543965.exe 86 PID 768 wrote to memory of 2968 768 x3543965.exe 86 PID 768 wrote to memory of 2968 768 x3543965.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8759b45a3a040536cda03f0a5bdc1850b58d71a91154f278bbcd158b966eefc.exe"C:\Users\Admin\AppData\Local\Temp\b8759b45a3a040536cda03f0a5bdc1850b58d71a91154f278bbcd158b966eefc.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6592147.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6592147.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3543965.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3543965.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f6927770.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f6927770.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2968
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
748KB
MD5ec386e1c9bd116ab463851a52659df15
SHA15de4e676c817abcb092de5063c8aadeaa97b3962
SHA2563dbe22b7959a6a5967eeca1183721de0f241aa745f5016a26db9681468af2513
SHA512b29a4726485efe9a870e8ed9e13b65d8164bc89ec3e106afff29a66274ffd186d70ec284c6d7e4430db820149e8bb28ec9cc70bfec3032dab048961e37ab915e
-
Filesize
304KB
MD5dfd4a3e79a72ecac9aeee2ad8fc84945
SHA18256643674086d5acf283d02dd5152f679f24e90
SHA2568b0d2a8ffe85242da77da5157a6083d6b3097fb827ab73c53b9fc45326332b62
SHA512331cfc7497cc20ea930839c901833d66ca5d522751741ece6b1534cdd2ee630947be2c39d6c4ba3ad5e6bab37d4693c6e377267aea72b71782f5be78ea02f811
-
Filesize
145KB
MD5608eaaa1cded18083e0bd614ac74e21c
SHA18f7ef2f1fb73b378ccc2d1d26207939bcb1d44cd
SHA25690664b136eb98f7efb9cfc441ade6843d67feea66a890b5961cf922102372994
SHA51231e0b53b901ba687dc8b9cfe468b705a24e36eeed1d17cf96e90931eef0e01db5f8d386c6c536e1b9c8d5e5e2feba982e64a75b013e346a73c391f709f99cce0