Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 08:21
Static task
static1
Behavioral task
behavioral1
Sample
66b3c1abc4a114c1ce8d8e5b38089402ef590d8c02c15286e99e0e1a71cde2b3.exe
Resource
win10v2004-20241007-en
General
-
Target
66b3c1abc4a114c1ce8d8e5b38089402ef590d8c02c15286e99e0e1a71cde2b3.exe
-
Size
850KB
-
MD5
f0539215df2f62300ffaccbc58b48d5b
-
SHA1
d302501ab811405cdefd46d1534149687ee6ceed
-
SHA256
66b3c1abc4a114c1ce8d8e5b38089402ef590d8c02c15286e99e0e1a71cde2b3
-
SHA512
5d431386be6afc4985b8fc056f2e40d00438e401ec1a91fdc09f049e4c8ecee98ab127c9bb687bb802d94944ac924e7fd0e0450af53bece68257735e117d5103
-
SSDEEP
24576:dyM8fpvv4bpySo8oxFBSF3EHdiCwY70ngo:43fpvQb6BxehE9iC
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dante
185.161.248.73:4164
-
auth_value
f4066af6b8a6f23125c8ee48288a3f90
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/3640-2168-0x0000000005760000-0x0000000005792000-memory.dmp family_redline behavioral1/files/0x0008000000023c64-2172.dat family_redline behavioral1/memory/4352-2182-0x0000000000010000-0x000000000003E000-memory.dmp family_redline behavioral1/files/0x0007000000023c6a-2188.dat family_redline behavioral1/memory/5584-2190-0x0000000000E80000-0x0000000000EB0000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation p15810462.exe -
Executes dropped EXE 4 IoCs
pid Process 3212 y97125293.exe 3640 p15810462.exe 4352 1.exe 5584 r45754424.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 66b3c1abc4a114c1ce8d8e5b38089402ef590d8c02c15286e99e0e1a71cde2b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y97125293.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66b3c1abc4a114c1ce8d8e5b38089402ef590d8c02c15286e99e0e1a71cde2b3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y97125293.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language p15810462.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language r45754424.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3640 p15810462.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3896 wrote to memory of 3212 3896 66b3c1abc4a114c1ce8d8e5b38089402ef590d8c02c15286e99e0e1a71cde2b3.exe 84 PID 3896 wrote to memory of 3212 3896 66b3c1abc4a114c1ce8d8e5b38089402ef590d8c02c15286e99e0e1a71cde2b3.exe 84 PID 3896 wrote to memory of 3212 3896 66b3c1abc4a114c1ce8d8e5b38089402ef590d8c02c15286e99e0e1a71cde2b3.exe 84 PID 3212 wrote to memory of 3640 3212 y97125293.exe 85 PID 3212 wrote to memory of 3640 3212 y97125293.exe 85 PID 3212 wrote to memory of 3640 3212 y97125293.exe 85 PID 3640 wrote to memory of 4352 3640 p15810462.exe 88 PID 3640 wrote to memory of 4352 3640 p15810462.exe 88 PID 3640 wrote to memory of 4352 3640 p15810462.exe 88 PID 3212 wrote to memory of 5584 3212 y97125293.exe 89 PID 3212 wrote to memory of 5584 3212 y97125293.exe 89 PID 3212 wrote to memory of 5584 3212 y97125293.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\66b3c1abc4a114c1ce8d8e5b38089402ef590d8c02c15286e99e0e1a71cde2b3.exe"C:\Users\Admin\AppData\Local\Temp\66b3c1abc4a114c1ce8d8e5b38089402ef590d8c02c15286e99e0e1a71cde2b3.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y97125293.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y97125293.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p15810462.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p15810462.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4352
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r45754424.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r45754424.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5584
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
570KB
MD56b2ac2f9b72ecd714aca516fd4a2a087
SHA1d191742bad2f64fc9b4f51a705d512ac87e4ede8
SHA256bcd51650da4177d085899757c01182bc12d9aa786e8e6943bffcfeaf383939f6
SHA5120a51a02df1db48a8042c7dfdf6a8c2fee66faf3e5487d411003ba70dc600a59349db1239ba2f5bc3bed3a1acf03e9a42d8cfaf42f07bf5b481a3c4562a0a2152
-
Filesize
476KB
MD5150f371c88cb9f074578fe8d665fad29
SHA1f24e76782905d5b556423f6cb47dc3ac73389d9e
SHA256b46d222ebfee86cc9bd77e618400a2f22cbc6856b8c56e07ba7bb37301515082
SHA512f9a8c23f5e79b46bbf2b3525e1dde12e1fb21ba9d9ff774f023dd1f7ac55dd5012a77b8e9dafa63b7a4955b52399e5e326bf4fa8d8b84f566665951774d57354
-
Filesize
169KB
MD51327bf783a1b8aab1e9032fb2cd6fc95
SHA1c5c9f0916b47f56ec203ef771c7e60f8590cec40
SHA2560d6ea02d7d8aebeb3b1eb86d96f7ae35a38333c0f7e22f159eddd12f134038f2
SHA5126924505dcbdfa3163e1373931830d2e4a860067909ca3b4c868ec6fbee9f0f582329a0e6c6a38c2a04d18392772b9d7baddf6683a4a6ee62c7e1816208d85847
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf