Analysis
-
max time kernel
132s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 21:39
Static task
static1
Behavioral task
behavioral1
Sample
350c11af48c82ce1320555217b3c1d299d88a9766581dce837d203430ea92498.exe
Resource
win10v2004-20241007-en
General
-
Target
350c11af48c82ce1320555217b3c1d299d88a9766581dce837d203430ea92498.exe
-
Size
479KB
-
MD5
4f4a78bc173342550892aac84bd2d00d
-
SHA1
374c3746dc3d34eb00a4e2689722cb233a667f03
-
SHA256
350c11af48c82ce1320555217b3c1d299d88a9766581dce837d203430ea92498
-
SHA512
fb2e8b3b50da4ce47458f806a523d041af7c6577d92a44531eab2a58718349a12968ebc26c1f5c6477680cdfbc579360c1cf7b2f6dd12327c6c954fe128d2c5f
-
SSDEEP
6144:KOy+bnr+Op0yN90QEmNGwjUaOkE64LFZ2mFfwMweTxvBkkWxTDZT4/0alUduJJs6:yMrqy90YNJI054Lx4KxuD5dUsndKZ
Malware Config
Extracted
redline
dippo
217.196.96.102:4132
-
auth_value
79490ff628fd6af3b29170c3c163874b
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c8e-12.dat family_redline behavioral1/memory/4536-15-0x0000000000F90000-0x0000000000FBE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 4760 x6259830.exe 4536 g6782677.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 350c11af48c82ce1320555217b3c1d299d88a9766581dce837d203430ea92498.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x6259830.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 350c11af48c82ce1320555217b3c1d299d88a9766581dce837d203430ea92498.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x6259830.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g6782677.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2616 wrote to memory of 4760 2616 350c11af48c82ce1320555217b3c1d299d88a9766581dce837d203430ea92498.exe 83 PID 2616 wrote to memory of 4760 2616 350c11af48c82ce1320555217b3c1d299d88a9766581dce837d203430ea92498.exe 83 PID 2616 wrote to memory of 4760 2616 350c11af48c82ce1320555217b3c1d299d88a9766581dce837d203430ea92498.exe 83 PID 4760 wrote to memory of 4536 4760 x6259830.exe 84 PID 4760 wrote to memory of 4536 4760 x6259830.exe 84 PID 4760 wrote to memory of 4536 4760 x6259830.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\350c11af48c82ce1320555217b3c1d299d88a9766581dce837d203430ea92498.exe"C:\Users\Admin\AppData\Local\Temp\350c11af48c82ce1320555217b3c1d299d88a9766581dce837d203430ea92498.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6259830.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6259830.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g6782677.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g6782677.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4536
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD5eefd8a0c252132a9ae4f45717e22b4ee
SHA13b8e769cae7a46d96cfb978ade2836f3666e89f2
SHA256c0b30333c5f7e5f0d563bd4f7f04f686c0c821e242935d5524a2795316c61f17
SHA512d171ad2492f0acff1acbb4c5b9c011824c1efbcfe485374ed45a971cbb7a2e8709a811bc97730e7fce1e3490186e275afd1c0f573602c95feb5d044b542e5e09
-
Filesize
168KB
MD5d25f20377285d86c44c73d7454100cb6
SHA132c9b0fa4721288b43d35778b47e2e1eac1b146b
SHA256e490265b5f59742f96bb42a117412e40e197fbb218baaf4325d4d14a00962179
SHA5122e9c2bc39754be13b46608269d3a62777d4fc624cb3ab1609d68ec8ad53a746ebe9a5ced4b98dc40b07627be2caa9b5a7fb1b3fb81e94b794c9b404731cc8f5f