Analysis
-
max time kernel
132s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/11/2024, 23:53
Static task
static1
Behavioral task
behavioral1
Sample
a7c0f197214dae7c70095bda45ed3ec54c40cfa7f7026084318d14426f72880a.exe
Resource
win10v2004-20241007-en
General
-
Target
a7c0f197214dae7c70095bda45ed3ec54c40cfa7f7026084318d14426f72880a.exe
-
Size
642KB
-
MD5
ec295c3f47a4605dc55b9dbf2e8e81bb
-
SHA1
87ca6686af19ab2ec8c0b3ac9ec4d2b2989842d1
-
SHA256
a7c0f197214dae7c70095bda45ed3ec54c40cfa7f7026084318d14426f72880a
-
SHA512
9e40114850ac95abd3ea8333fd5668d9e8383557bf524e4fb8dff3d0f5e97fe3bd074bd4461339534358ecab1889587e3ab41ea9509d3503667d43a8607888c8
-
SSDEEP
12288:LMrVy90xCe0bduMxZ1byiHCgVB3zxhYnuR88HpvmwDsz8WOJu5pxhN2DJ:OySkLbyWC89+48MsiC5pxz2DJ
Malware Config
Extracted
redline
darm
217.196.96.56:4138
-
auth_value
d88ac8ccc04ab9979b04b46313db1648
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c78-12.dat family_redline behavioral1/memory/3824-15-0x0000000000950000-0x0000000000980000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 4356 x0269060.exe 3824 g3012789.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a7c0f197214dae7c70095bda45ed3ec54c40cfa7f7026084318d14426f72880a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x0269060.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a7c0f197214dae7c70095bda45ed3ec54c40cfa7f7026084318d14426f72880a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x0269060.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g3012789.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1860 wrote to memory of 4356 1860 a7c0f197214dae7c70095bda45ed3ec54c40cfa7f7026084318d14426f72880a.exe 83 PID 1860 wrote to memory of 4356 1860 a7c0f197214dae7c70095bda45ed3ec54c40cfa7f7026084318d14426f72880a.exe 83 PID 1860 wrote to memory of 4356 1860 a7c0f197214dae7c70095bda45ed3ec54c40cfa7f7026084318d14426f72880a.exe 83 PID 4356 wrote to memory of 3824 4356 x0269060.exe 85 PID 4356 wrote to memory of 3824 4356 x0269060.exe 85 PID 4356 wrote to memory of 3824 4356 x0269060.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7c0f197214dae7c70095bda45ed3ec54c40cfa7f7026084318d14426f72880a.exe"C:\Users\Admin\AppData\Local\Temp\a7c0f197214dae7c70095bda45ed3ec54c40cfa7f7026084318d14426f72880a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0269060.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0269060.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g3012789.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g3012789.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3824
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
383KB
MD510ad02aa3e4a740c5f96429d1dc731ab
SHA1e2a6a0a6755c728716ee4c86b28c5a18c7ae69ed
SHA25669737e6666e5e974cf85764e0eceddc2d6bfc73c769a5973b3e9316d41a1c6bd
SHA5124d999b454cf8816e3b66a4174354d9acf62cfb1ca70bf6a382e495cdef30a77eff4f893e8d36ac383902b28a2dfb87d37f926bbb2d8772b020b5e3edc3d9e679
-
Filesize
168KB
MD5d6a163465f8a46acc11e0a950ff5dd41
SHA15e01f9e662bc4c75a56fb959296f3ecaf468bb44
SHA25646680c82702662e3b0eb9e012838247eec39e9cbdaf0e584236b1c2cb2aad3e9
SHA512bbf9c0f2b9972e96ed9fd85cf330a2eb90a2ba143d65792996a7fec97ecaf8a3c7b042fde3fba5a88a5ac8a6afdd89cbb1d71e97427e60fe46bd23c3f153f246