Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 21:30
Static task
static1
Behavioral task
behavioral1
Sample
ae5650267f944d9a1de3448639ac7498adc7046869ec02dbd17b217befb65fdc.exe
Resource
win10v2004-20241007-en
General
-
Target
ae5650267f944d9a1de3448639ac7498adc7046869ec02dbd17b217befb65fdc.exe
-
Size
479KB
-
MD5
86b587f1ca5bd2b317f3a45cee1e8d30
-
SHA1
a9b6e10a60c2dfeea3c8493258a59e7563f26e0e
-
SHA256
ae5650267f944d9a1de3448639ac7498adc7046869ec02dbd17b217befb65fdc
-
SHA512
197ab54726e680cce2e6d415c14445c49cc4f6aaf59a42f9d8cc13c34faf12c3109e0408fbd6883d6ff86beb6243f2e15917a14a9b3f84e92363de78580c6cff
-
SSDEEP
6144:KDy+bnr+1p0yN90QELeO8yl3lzNZj71wK7LIgRvDgBU+5WDp38Y+DIXk2V9pZfRi:ZMrBy90EOtlz7j71w9XU+43sa9zEl5
Malware Config
Extracted
redline
daris
217.196.96.56:4138
-
auth_value
3491f24ae0250969cd45ce4b3fe77549
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c96-12.dat family_redline behavioral1/memory/4924-15-0x0000000000FC0000-0x0000000000FEE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 3728 y2078381.exe 4924 k6941044.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ae5650267f944d9a1de3448639ac7498adc7046869ec02dbd17b217befb65fdc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y2078381.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ae5650267f944d9a1de3448639ac7498adc7046869ec02dbd17b217befb65fdc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y2078381.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k6941044.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3004 wrote to memory of 3728 3004 ae5650267f944d9a1de3448639ac7498adc7046869ec02dbd17b217befb65fdc.exe 83 PID 3004 wrote to memory of 3728 3004 ae5650267f944d9a1de3448639ac7498adc7046869ec02dbd17b217befb65fdc.exe 83 PID 3004 wrote to memory of 3728 3004 ae5650267f944d9a1de3448639ac7498adc7046869ec02dbd17b217befb65fdc.exe 83 PID 3728 wrote to memory of 4924 3728 y2078381.exe 84 PID 3728 wrote to memory of 4924 3728 y2078381.exe 84 PID 3728 wrote to memory of 4924 3728 y2078381.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae5650267f944d9a1de3448639ac7498adc7046869ec02dbd17b217befb65fdc.exe"C:\Users\Admin\AppData\Local\Temp\ae5650267f944d9a1de3448639ac7498adc7046869ec02dbd17b217befb65fdc.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2078381.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2078381.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k6941044.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k6941044.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4924
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
308KB
MD5c48571c1dfb18704ce27f76d19b49408
SHA143ede3a4c0f1ec58952ffff3f56677569ce9dc06
SHA256edcbf019d8d405a480d5f3f92764e1b7582d9682fa0caf0473ed382f44dbed48
SHA512f73566c7da2453a44b82bb7378b82a90be0c36ebd070cd40394b126e0dcdfa13e3c348d24ab0f95f106d88e0387dcc33d815e0f7b7ac0e4f0516a4ec28077c41
-
Filesize
168KB
MD56e557a9a63a10793c87a0c49d8b28971
SHA1c02af0f07dfa3fee5fbf6bbdb6ea07b6ab579014
SHA2568382a22d162a866345142fc25019d287962c6468cebebd911bf5232a1898ab91
SHA51267e50e1c88035a243e5026041eb5364aeb39f91ace91926ae0d4f2afd6d4773307d9f371a41d2a739bcc710d4edf693990df0c60f5a1ce10ff2b2df693e8af3f