Analysis
-
max time kernel
137s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/11/2024, 19:03
Static task
static1
Behavioral task
behavioral1
Sample
e35932e6623e87cd21898111e872561ede10da0c1db522d1dfbf932e00c79284.exe
Resource
win10v2004-20241007-en
General
-
Target
e35932e6623e87cd21898111e872561ede10da0c1db522d1dfbf932e00c79284.exe
-
Size
850KB
-
MD5
1f29f2bbc3c8f6aa675faf4584eb76cc
-
SHA1
d60df36f4af744581a4a733ff551566a360ba674
-
SHA256
e35932e6623e87cd21898111e872561ede10da0c1db522d1dfbf932e00c79284
-
SHA512
36b20c6c77df91e4d1f78ce69fcb1f38696afa57b816c24e58f63ec180d731e4ed65309b6f52771339dede635f4297b98420e67f282f5e5a90109393a7a3424d
-
SSDEEP
24576:kyRzdzlLouWPQOgMBxrIPLGEhmL+y7ERNFtsY:ztdzJokOxrITGBL1u
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dante
185.161.248.73:4164
-
auth_value
f4066af6b8a6f23125c8ee48288a3f90
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/3656-2169-0x0000000002990000-0x00000000029C2000-memory.dmp family_redline behavioral1/files/0x0002000000022dcd-2174.dat family_redline behavioral1/memory/2732-2182-0x00000000004F0000-0x000000000051E000-memory.dmp family_redline behavioral1/files/0x000a000000023b5e-2195.dat family_redline behavioral1/memory/1996-2196-0x0000000000BA0000-0x0000000000BD0000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation p12319553.exe -
Executes dropped EXE 4 IoCs
pid Process 872 y73770469.exe 3656 p12319553.exe 2732 1.exe 1996 r47639229.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e35932e6623e87cd21898111e872561ede10da0c1db522d1dfbf932e00c79284.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y73770469.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2428 3656 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language p12319553.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language r47639229.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e35932e6623e87cd21898111e872561ede10da0c1db522d1dfbf932e00c79284.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y73770469.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3656 p12319553.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3900 wrote to memory of 872 3900 e35932e6623e87cd21898111e872561ede10da0c1db522d1dfbf932e00c79284.exe 83 PID 3900 wrote to memory of 872 3900 e35932e6623e87cd21898111e872561ede10da0c1db522d1dfbf932e00c79284.exe 83 PID 3900 wrote to memory of 872 3900 e35932e6623e87cd21898111e872561ede10da0c1db522d1dfbf932e00c79284.exe 83 PID 872 wrote to memory of 3656 872 y73770469.exe 85 PID 872 wrote to memory of 3656 872 y73770469.exe 85 PID 872 wrote to memory of 3656 872 y73770469.exe 85 PID 3656 wrote to memory of 2732 3656 p12319553.exe 92 PID 3656 wrote to memory of 2732 3656 p12319553.exe 92 PID 3656 wrote to memory of 2732 3656 p12319553.exe 92 PID 872 wrote to memory of 1996 872 y73770469.exe 96 PID 872 wrote to memory of 1996 872 y73770469.exe 96 PID 872 wrote to memory of 1996 872 y73770469.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\e35932e6623e87cd21898111e872561ede10da0c1db522d1dfbf932e00c79284.exe"C:\Users\Admin\AppData\Local\Temp\e35932e6623e87cd21898111e872561ede10da0c1db522d1dfbf932e00c79284.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y73770469.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y73770469.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p12319553.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p12319553.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3656 -s 15124⤵
- Program crash
PID:2428
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r47639229.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r47639229.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1996
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3656 -ip 36561⤵PID:2880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
570KB
MD5605f354a89ba4d939cf642499fc92574
SHA17e0d785ac4dbb696a13a05ba34c54c61e77a5a8c
SHA256f14a4547448879a60f326c354a1c310cfd75a150946e76585f713efd060dda78
SHA512622bed4f1710ba68c4cef05d125e1a92711354c29da59056a1164d6c3dba1adb719e17615c1a7fc82311d78e471a760d47983358637cd81ab60a361e71ab88bd
-
Filesize
479KB
MD5ee0bdca46b1f72fd2225510d7090e420
SHA12109919a94bd8231552ce0af10688ec0484b70d8
SHA256c49c063df0b8738b0d6d4126534eec43f549673b899d90f6df19148422d93d0a
SHA512a379e9db49c1356f3dcc62589b30ffba29e5d2ecebb5bec22e9585773b1c985f456ad27c43267fc38682e1ad5ed25a1c63bf65c58dd2a3333f28ce0fdc54d854
-
Filesize
169KB
MD574e344b31f9589fa74d52fba4352dc84
SHA1c92dd2daf64f4c04160f2f45596a8cea7fe4e700
SHA256cc9fcf71f3a019019e4f67665ccbc48c2e98d5c4bce3666ec0c51652d6a6630e
SHA512f3a7de4a8a7cfd376a0b418d3289eea5b61d0d8da4f47667a9f00fbf7133f7ef1bf98d83480d79c7529c6cc48422c31c5f926c430fd54de29c457651e4813a36
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf