Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 22:17
Static task
static1
Behavioral task
behavioral1
Sample
73087e06d9c60633db3212aad7cc17ffbc487584566c1ad4c8ec02761e8c5bfb.exe
Resource
win10v2004-20241007-en
General
-
Target
73087e06d9c60633db3212aad7cc17ffbc487584566c1ad4c8ec02761e8c5bfb.exe
-
Size
765KB
-
MD5
1fc1fa9c05077199a2038321e77361b5
-
SHA1
eb33bec0c967ca436a44bc1dd40e8c3b20f5e61b
-
SHA256
73087e06d9c60633db3212aad7cc17ffbc487584566c1ad4c8ec02761e8c5bfb
-
SHA512
4ebad317efc86ed3dae79975b4961b9f4772d753eb77ad5e7ef5ffd9c7c2298332e710c836712b02b4d353816e1e047db1f87fabaab878e15ba355fe4be5ac91
-
SSDEEP
12288:RMrty90ytLfQZRxbpBIuWTvrkPDdLSORtqbZFBYIlvqbL1OsPf6VT:UyJJfQdbbI+PtRtqbZxV+gsu
Malware Config
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3628-22-0x00000000029A0000-0x00000000029E6000-memory.dmp family_redline behavioral1/memory/3628-24-0x0000000004D80000-0x0000000004DC4000-memory.dmp family_redline behavioral1/memory/3628-26-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3628-42-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3628-86-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3628-84-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3628-82-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3628-80-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3628-79-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3628-76-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3628-74-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3628-72-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3628-70-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3628-68-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3628-66-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3628-62-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3628-60-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3628-58-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3628-56-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3628-54-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3628-52-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3628-50-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3628-48-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3628-46-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3628-40-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3628-38-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3628-36-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3628-34-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3628-32-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3628-30-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3628-28-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3628-88-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3628-64-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3628-44-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3628-25-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1432 vKm27.exe 2872 vjI61.exe 3628 dVR43.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 73087e06d9c60633db3212aad7cc17ffbc487584566c1ad4c8ec02761e8c5bfb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vKm27.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vjI61.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 73087e06d9c60633db3212aad7cc17ffbc487584566c1ad4c8ec02761e8c5bfb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vKm27.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjI61.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dVR43.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3628 dVR43.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1848 wrote to memory of 1432 1848 73087e06d9c60633db3212aad7cc17ffbc487584566c1ad4c8ec02761e8c5bfb.exe 83 PID 1848 wrote to memory of 1432 1848 73087e06d9c60633db3212aad7cc17ffbc487584566c1ad4c8ec02761e8c5bfb.exe 83 PID 1848 wrote to memory of 1432 1848 73087e06d9c60633db3212aad7cc17ffbc487584566c1ad4c8ec02761e8c5bfb.exe 83 PID 1432 wrote to memory of 2872 1432 vKm27.exe 84 PID 1432 wrote to memory of 2872 1432 vKm27.exe 84 PID 1432 wrote to memory of 2872 1432 vKm27.exe 84 PID 2872 wrote to memory of 3628 2872 vjI61.exe 86 PID 2872 wrote to memory of 3628 2872 vjI61.exe 86 PID 2872 wrote to memory of 3628 2872 vjI61.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\73087e06d9c60633db3212aad7cc17ffbc487584566c1ad4c8ec02761e8c5bfb.exe"C:\Users\Admin\AppData\Local\Temp\73087e06d9c60633db3212aad7cc17ffbc487584566c1ad4c8ec02761e8c5bfb.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vKm27.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vKm27.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vjI61.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vjI61.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dVR43.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dVR43.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3628
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
661KB
MD51572f0ee9399087d3ee32d3826910b62
SHA15a8bb0bc36bd165d4943fc50bd5407f3f31212de
SHA2563a5c03b6ee71f28f8b3b764b8f9a3677a1342e99686dcd1384e4c82b2cb9f9fa
SHA51278e188384ab2493a3214a94db6563ea8db5722973e1dc737072065968f48e823f754c100f2b4dc55ed3cd2a9d6e68076563de218205ebf8f132f6644612e6850
-
Filesize
516KB
MD59b2d3576607d2a5b5c6dc1cf31f543f2
SHA1697b0142325b7278c9f31e35b90fc66fc328217b
SHA256ddd444a6dfa2e86c3421d4f40015ff7bda99e99f479fb0e0024c68d69299f544
SHA512e55f3c77c97f160c66fefa5b2071d71a828899dca818b9950e5e26d329d3fd64cb6a2b5ebe8702a08de78ef01b7aeec392a1cccb735fa1690bc03a8e03cfb0df
-
Filesize
297KB
MD5c76b024698fbf2e549cbc0515872a7b4
SHA16dd18e417c892a26a1b9eca8b4a07421e743f052
SHA256c0171f0d598f860d522908c1247e21d1325ec3d14cfda22e181d642fe1d29c20
SHA51248b8cd24779f46abd1769ac6453f4b22782b0ec34841b89e15f32e130d6b4d29eb5999f00afb9fdfc927fbc02f0ec0607c933163ff1794beba58fe3db5e3e19c