Analysis
-
max time kernel
140s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 21:43
Static task
static1
Behavioral task
behavioral1
Sample
3d9a18e09c1146887f4c1214aa722a5571a9ffc741a40f4cc5e22a97e5bbedd4.exe
Resource
win10v2004-20241007-en
General
-
Target
3d9a18e09c1146887f4c1214aa722a5571a9ffc741a40f4cc5e22a97e5bbedd4.exe
-
Size
589KB
-
MD5
f55a2ac9b8b8b367edf480a6d28b28f1
-
SHA1
4a1106b3aa08b58cd6c1385afbe5e9672102c059
-
SHA256
3d9a18e09c1146887f4c1214aa722a5571a9ffc741a40f4cc5e22a97e5bbedd4
-
SHA512
934a78f241586e65d69fb5f177fa26af7e13191dfc731773e0b6f3c11d63329e8319cc23ffe2102160c52078031ac701c3d8adba0b265598f64246ca18753822
-
SSDEEP
12288:BMr1y90OlIo7NOFrOgOug766KhjbAHUdjgOU82uG:MyF57NOFJO5KpZd8F82uG
Malware Config
Extracted
redline
crypt1
176.113.115.17:4132
-
auth_value
2e2ca7bbceaa9f98252a6f9fc0e6fa86
Extracted
redline
romka
193.233.20.11:4131
-
auth_value
fcbb3247051f5290e8ac5b1a841af67b
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/592-9-0x0000000000400000-0x0000000000432000-memory.dmp family_redline behavioral1/memory/4880-25-0x0000000002500000-0x0000000002546000-memory.dmp family_redline behavioral1/memory/4880-27-0x0000000004B20000-0x0000000004B64000-memory.dmp family_redline behavioral1/memory/4880-63-0x0000000004B20000-0x0000000004B5E000-memory.dmp family_redline behavioral1/memory/4880-71-0x0000000004B20000-0x0000000004B5E000-memory.dmp family_redline behavioral1/memory/4880-85-0x0000000004B20000-0x0000000004B5E000-memory.dmp family_redline behavioral1/memory/4880-83-0x0000000004B20000-0x0000000004B5E000-memory.dmp family_redline behavioral1/memory/4880-81-0x0000000004B20000-0x0000000004B5E000-memory.dmp family_redline behavioral1/memory/4880-79-0x0000000004B20000-0x0000000004B5E000-memory.dmp family_redline behavioral1/memory/4880-77-0x0000000004B20000-0x0000000004B5E000-memory.dmp family_redline behavioral1/memory/4880-75-0x0000000004B20000-0x0000000004B5E000-memory.dmp family_redline behavioral1/memory/4880-73-0x0000000004B20000-0x0000000004B5E000-memory.dmp family_redline behavioral1/memory/4880-69-0x0000000004B20000-0x0000000004B5E000-memory.dmp family_redline behavioral1/memory/4880-67-0x0000000004B20000-0x0000000004B5E000-memory.dmp family_redline behavioral1/memory/4880-65-0x0000000004B20000-0x0000000004B5E000-memory.dmp family_redline behavioral1/memory/4880-61-0x0000000004B20000-0x0000000004B5E000-memory.dmp family_redline behavioral1/memory/4880-59-0x0000000004B20000-0x0000000004B5E000-memory.dmp family_redline behavioral1/memory/4880-57-0x0000000004B20000-0x0000000004B5E000-memory.dmp family_redline behavioral1/memory/4880-55-0x0000000004B20000-0x0000000004B5E000-memory.dmp family_redline behavioral1/memory/4880-53-0x0000000004B20000-0x0000000004B5E000-memory.dmp family_redline behavioral1/memory/4880-51-0x0000000004B20000-0x0000000004B5E000-memory.dmp family_redline behavioral1/memory/4880-49-0x0000000004B20000-0x0000000004B5E000-memory.dmp family_redline behavioral1/memory/4880-47-0x0000000004B20000-0x0000000004B5E000-memory.dmp family_redline behavioral1/memory/4880-45-0x0000000004B20000-0x0000000004B5E000-memory.dmp family_redline behavioral1/memory/4880-43-0x0000000004B20000-0x0000000004B5E000-memory.dmp family_redline behavioral1/memory/4880-41-0x0000000004B20000-0x0000000004B5E000-memory.dmp family_redline behavioral1/memory/4880-39-0x0000000004B20000-0x0000000004B5E000-memory.dmp family_redline behavioral1/memory/4880-37-0x0000000004B20000-0x0000000004B5E000-memory.dmp family_redline behavioral1/memory/4880-35-0x0000000004B20000-0x0000000004B5E000-memory.dmp family_redline behavioral1/memory/4880-33-0x0000000004B20000-0x0000000004B5E000-memory.dmp family_redline behavioral1/memory/4880-31-0x0000000004B20000-0x0000000004B5E000-memory.dmp family_redline behavioral1/memory/4880-29-0x0000000004B20000-0x0000000004B5E000-memory.dmp family_redline behavioral1/memory/4880-28-0x0000000004B20000-0x0000000004B5E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 2536 dek56.exe 4880 lUB30.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3d9a18e09c1146887f4c1214aa722a5571a9ffc741a40f4cc5e22a97e5bbedd4.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2536 set thread context of 592 2536 dek56.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3d9a18e09c1146887f4c1214aa722a5571a9ffc741a40f4cc5e22a97e5bbedd4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dek56.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lUB30.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4880 lUB30.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2896 wrote to memory of 2536 2896 3d9a18e09c1146887f4c1214aa722a5571a9ffc741a40f4cc5e22a97e5bbedd4.exe 83 PID 2896 wrote to memory of 2536 2896 3d9a18e09c1146887f4c1214aa722a5571a9ffc741a40f4cc5e22a97e5bbedd4.exe 83 PID 2896 wrote to memory of 2536 2896 3d9a18e09c1146887f4c1214aa722a5571a9ffc741a40f4cc5e22a97e5bbedd4.exe 83 PID 2536 wrote to memory of 592 2536 dek56.exe 85 PID 2536 wrote to memory of 592 2536 dek56.exe 85 PID 2536 wrote to memory of 592 2536 dek56.exe 85 PID 2536 wrote to memory of 592 2536 dek56.exe 85 PID 2536 wrote to memory of 592 2536 dek56.exe 85 PID 2896 wrote to memory of 4880 2896 3d9a18e09c1146887f4c1214aa722a5571a9ffc741a40f4cc5e22a97e5bbedd4.exe 86 PID 2896 wrote to memory of 4880 2896 3d9a18e09c1146887f4c1214aa722a5571a9ffc741a40f4cc5e22a97e5bbedd4.exe 86 PID 2896 wrote to memory of 4880 2896 3d9a18e09c1146887f4c1214aa722a5571a9ffc741a40f4cc5e22a97e5bbedd4.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d9a18e09c1146887f4c1214aa722a5571a9ffc741a40f4cc5e22a97e5bbedd4.exe"C:\Users\Admin\AppData\Local\Temp\3d9a18e09c1146887f4c1214aa722a5571a9ffc741a40f4cc5e22a97e5bbedd4.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dek56.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dek56.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- System Location Discovery: System Language Discovery
PID:592
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lUB30.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lUB30.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
277KB
MD53bc6ecb7d1f35f3171383f88879659b7
SHA1e82887b3d6ab38ae3b8880d6c904244495dcf0cc
SHA256c95f1ca2230edb615f3365e4c3ad09e4e1940a2c554eaf27c0df2d5bc4fc1068
SHA512709eb1c1c322c70a2a377324fa1766bfff9a3e1d37db04da240aaab36317d813b6f32f5c0d0a3f8d30f196f132985fce0ec030d5783df3c7bff76a4ccfb4431c
-
Filesize
485KB
MD559d1fe48a024d26b75b47e87b12195f3
SHA1bc746791776a8149262fb3a64e6ffdc5bebc493c
SHA256214086dee69e38aa1794161d531a8f5b4c1a37fccc469986ae254873d4b21a40
SHA5121930e7924d54e80d9a73b2d7cbfc20ce82948bf6912fa4df6be400810d9249f5e866806b1e3df63e596d50f3f8e677251558005fa69dceac9d67afee2a4328ce