Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 02:17
Static task
static1
Behavioral task
behavioral1
Sample
fa17fb4d70e3c39e5548ea0f6980ae951c1f009890d79471b4792360002e34a7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa17fb4d70e3c39e5548ea0f6980ae951c1f009890d79471b4792360002e34a7.exe
Resource
win10v2004-20241007-en
General
-
Target
fa17fb4d70e3c39e5548ea0f6980ae951c1f009890d79471b4792360002e34a7.exe
-
Size
2.1MB
-
MD5
9cc134659561ee2afd14fd6433e9661d
-
SHA1
9c358826da568be19f1c244f810d3ff59087c295
-
SHA256
fa17fb4d70e3c39e5548ea0f6980ae951c1f009890d79471b4792360002e34a7
-
SHA512
34fa7b49d7cdbae6bcd9d57af67c36258fd7c3721abda9e576a523630c0f072d1a67ed43ecd7304256907d1625f4dbb8e68ed98c0934e734ba338cb1fafdd125
-
SSDEEP
49152:V5O7fPYebhETwwFP+/CHapiBiSyKHKmagg5vtpNuT4D3S:V5EfP1bhmFPaCuiRsmJgnpNuT4DC
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
51.89.207.166:47909
-
auth_value
3a050df92d0cf082b2cdaf87863616be
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/2368-19-0x0000000000700000-0x0000000000732000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation fa17fb4d70e3c39e5548ea0f6980ae951c1f009890d79471b4792360002e34a7.exe -
Executes dropped EXE 2 IoCs
pid Process 5072 123.exe 2836 321.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5072 set thread context of 2368 5072 123.exe 91 PID 2836 set thread context of 4888 2836 321.exe 95 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2608 5072 WerFault.exe 85 2568 2836 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa17fb4d70e3c39e5548ea0f6980ae951c1f009890d79471b4792360002e34a7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 321.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 924 cmd.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1648 wrote to memory of 5072 1648 fa17fb4d70e3c39e5548ea0f6980ae951c1f009890d79471b4792360002e34a7.exe 85 PID 1648 wrote to memory of 5072 1648 fa17fb4d70e3c39e5548ea0f6980ae951c1f009890d79471b4792360002e34a7.exe 85 PID 1648 wrote to memory of 5072 1648 fa17fb4d70e3c39e5548ea0f6980ae951c1f009890d79471b4792360002e34a7.exe 85 PID 1648 wrote to memory of 2836 1648 fa17fb4d70e3c39e5548ea0f6980ae951c1f009890d79471b4792360002e34a7.exe 89 PID 1648 wrote to memory of 2836 1648 fa17fb4d70e3c39e5548ea0f6980ae951c1f009890d79471b4792360002e34a7.exe 89 PID 1648 wrote to memory of 2836 1648 fa17fb4d70e3c39e5548ea0f6980ae951c1f009890d79471b4792360002e34a7.exe 89 PID 5072 wrote to memory of 2368 5072 123.exe 91 PID 5072 wrote to memory of 2368 5072 123.exe 91 PID 5072 wrote to memory of 2368 5072 123.exe 91 PID 5072 wrote to memory of 2368 5072 123.exe 91 PID 5072 wrote to memory of 2368 5072 123.exe 91 PID 2836 wrote to memory of 4888 2836 321.exe 95 PID 2836 wrote to memory of 4888 2836 321.exe 95 PID 2836 wrote to memory of 4888 2836 321.exe 95 PID 2836 wrote to memory of 4888 2836 321.exe 95 PID 2836 wrote to memory of 4888 2836 321.exe 95 PID 4888 wrote to memory of 924 4888 vbc.exe 102 PID 4888 wrote to memory of 924 4888 vbc.exe 102 PID 4888 wrote to memory of 924 4888 vbc.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa17fb4d70e3c39e5548ea0f6980ae951c1f009890d79471b4792360002e34a7.exe"C:\Users\Admin\AppData\Local\Temp\fa17fb4d70e3c39e5548ea0f6980ae951c1f009890d79471b4792360002e34a7.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\Temp\123.exe"C:\Windows\Temp\123.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 2523⤵
- Program crash
PID:2608
-
-
-
C:\Windows\Temp\321.exe"C:\Windows\Temp\321.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\bebra.exe4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:924
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2836 -s 2403⤵
- Program crash
PID:2568
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 5072 -ip 50721⤵PID:4872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2836 -ip 28361⤵PID:1236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
781KB
MD50632395c34953f977b66430b2e419f54
SHA13f66a0792520591681b111f160f4e466acbd8493
SHA25683fdd437290ea0cbead8f5661509722b693a5ae393e695d4b5c797fb79e298de
SHA512f9b25b52d07f7edc974ba3240696927cbba8a29a1e053727ed5220aff899fe81a5744c335d20a3ecc5ce0cd1c24913e9e92ff498185daeb76ac9e44501fdfd6b
-
Filesize
3.1MB
MD50d73467bf51df297e4c69c977b8f71d5
SHA102872ad910b72e289c056fe6c488896e0211160f
SHA2561810896e37030314c7cad251890b3e5d69e724d3d155dae682adc674734e9a99
SHA512cab6b7cd35b1f9633cb0d1d69ca0e1470ab903fd9f0d6be0b1d1cdec2db4f3363bd83e182339470ef5158e25a7ae431b36b715c1d94f4911a7eb9e33bd966849