Analysis
-
max time kernel
140s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 22:29
Static task
static1
Behavioral task
behavioral1
Sample
83b77cc8b30fe15803c2759046d3916e05739a4b4c90cc5b5a9d51ce39f6a321.exe
Resource
win10v2004-20241007-en
General
-
Target
83b77cc8b30fe15803c2759046d3916e05739a4b4c90cc5b5a9d51ce39f6a321.exe
-
Size
564KB
-
MD5
dd796866e1d545a43f3b7b362528307d
-
SHA1
5a62c3041d9928c8992ff1b7ae27506b208ad710
-
SHA256
83b77cc8b30fe15803c2759046d3916e05739a4b4c90cc5b5a9d51ce39f6a321
-
SHA512
e01174d1e9465f39081f40f21b2afcdf09f69ce46714ae09385cab40dc0ca4606864d364e3ba75e19fdcc4ddec09b7d5960f79fb05a4239871dc78c31845cd1d
-
SSDEEP
12288:nMr9y90ZFKHhU0Flt2caD3RrQKvbwA/oTdQuNF:aytRIJ7bwfTNF
Malware Config
Extracted
redline
ronam
193.233.20.17:4139
-
auth_value
125421d19d14dd7fd211bc7f6d4aea6c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/5100-19-0x00000000023D0000-0x0000000002416000-memory.dmp family_redline behavioral1/memory/5100-21-0x0000000002480000-0x00000000024C4000-memory.dmp family_redline behavioral1/memory/5100-33-0x0000000002480000-0x00000000024BE000-memory.dmp family_redline behavioral1/memory/5100-71-0x0000000002480000-0x00000000024BE000-memory.dmp family_redline behavioral1/memory/5100-85-0x0000000002480000-0x00000000024BE000-memory.dmp family_redline behavioral1/memory/5100-83-0x0000000002480000-0x00000000024BE000-memory.dmp family_redline behavioral1/memory/5100-81-0x0000000002480000-0x00000000024BE000-memory.dmp family_redline behavioral1/memory/5100-79-0x0000000002480000-0x00000000024BE000-memory.dmp family_redline behavioral1/memory/5100-77-0x0000000002480000-0x00000000024BE000-memory.dmp family_redline behavioral1/memory/5100-75-0x0000000002480000-0x00000000024BE000-memory.dmp family_redline behavioral1/memory/5100-73-0x0000000002480000-0x00000000024BE000-memory.dmp family_redline behavioral1/memory/5100-69-0x0000000002480000-0x00000000024BE000-memory.dmp family_redline behavioral1/memory/5100-67-0x0000000002480000-0x00000000024BE000-memory.dmp family_redline behavioral1/memory/5100-65-0x0000000002480000-0x00000000024BE000-memory.dmp family_redline behavioral1/memory/5100-63-0x0000000002480000-0x00000000024BE000-memory.dmp family_redline behavioral1/memory/5100-61-0x0000000002480000-0x00000000024BE000-memory.dmp family_redline behavioral1/memory/5100-59-0x0000000002480000-0x00000000024BE000-memory.dmp family_redline behavioral1/memory/5100-57-0x0000000002480000-0x00000000024BE000-memory.dmp family_redline behavioral1/memory/5100-55-0x0000000002480000-0x00000000024BE000-memory.dmp family_redline behavioral1/memory/5100-53-0x0000000002480000-0x00000000024BE000-memory.dmp family_redline behavioral1/memory/5100-51-0x0000000002480000-0x00000000024BE000-memory.dmp family_redline behavioral1/memory/5100-49-0x0000000002480000-0x00000000024BE000-memory.dmp family_redline behavioral1/memory/5100-47-0x0000000002480000-0x00000000024BE000-memory.dmp family_redline behavioral1/memory/5100-45-0x0000000002480000-0x00000000024BE000-memory.dmp family_redline behavioral1/memory/5100-43-0x0000000002480000-0x00000000024BE000-memory.dmp family_redline behavioral1/memory/5100-41-0x0000000002480000-0x00000000024BE000-memory.dmp family_redline behavioral1/memory/5100-39-0x0000000002480000-0x00000000024BE000-memory.dmp family_redline behavioral1/memory/5100-37-0x0000000002480000-0x00000000024BE000-memory.dmp family_redline behavioral1/memory/5100-35-0x0000000002480000-0x00000000024BE000-memory.dmp family_redline behavioral1/memory/5100-31-0x0000000002480000-0x00000000024BE000-memory.dmp family_redline behavioral1/memory/5100-29-0x0000000002480000-0x00000000024BE000-memory.dmp family_redline behavioral1/memory/5100-27-0x0000000002480000-0x00000000024BE000-memory.dmp family_redline behavioral1/memory/5100-25-0x0000000002480000-0x00000000024BE000-memory.dmp family_redline behavioral1/memory/5100-23-0x0000000002480000-0x00000000024BE000-memory.dmp family_redline behavioral1/memory/5100-22-0x0000000002480000-0x00000000024BE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 3220 dmY9995.exe 5100 nQt91Jw.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 83b77cc8b30fe15803c2759046d3916e05739a4b4c90cc5b5a9d51ce39f6a321.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" dmY9995.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 83b77cc8b30fe15803c2759046d3916e05739a4b4c90cc5b5a9d51ce39f6a321.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dmY9995.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nQt91Jw.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5100 nQt91Jw.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4284 wrote to memory of 3220 4284 83b77cc8b30fe15803c2759046d3916e05739a4b4c90cc5b5a9d51ce39f6a321.exe 83 PID 4284 wrote to memory of 3220 4284 83b77cc8b30fe15803c2759046d3916e05739a4b4c90cc5b5a9d51ce39f6a321.exe 83 PID 4284 wrote to memory of 3220 4284 83b77cc8b30fe15803c2759046d3916e05739a4b4c90cc5b5a9d51ce39f6a321.exe 83 PID 3220 wrote to memory of 5100 3220 dmY9995.exe 84 PID 3220 wrote to memory of 5100 3220 dmY9995.exe 84 PID 3220 wrote to memory of 5100 3220 dmY9995.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\83b77cc8b30fe15803c2759046d3916e05739a4b4c90cc5b5a9d51ce39f6a321.exe"C:\Users\Admin\AppData\Local\Temp\83b77cc8b30fe15803c2759046d3916e05739a4b4c90cc5b5a9d51ce39f6a321.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dmY9995.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dmY9995.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nQt91Jw.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nQt91Jw.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5100
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
419KB
MD5d650ca1f468cc0e178b64fcccf4c2e02
SHA1ffb86208271546444e9b7eb91a5dd427dc282807
SHA256c02f69bf6a08f60ff212244701b52a15bef27e4052c9c04aae73526ae38bc483
SHA512c26423ec4573f67b46f45db04e6d0ed857c8252a16c50b28f42b7ca78bdb2eb2872b29ec5f63758bd7e3d364e3c44c9b7fd2d547259cad00183dc5ac61ab7165
-
Filesize
265KB
MD57a78f52edbea16ad7c9ba5d09f7aa32b
SHA1486aaf1b89a4dc78da8b73a75417d4d875efbe2a
SHA25600631c3b76c2cad95b50e997aa14945832db0283e512b7eac0229246a869b73b
SHA5120484461740ed7bfa0c11fbe7c2afc6db7984b892b086b0d36184d35f9baf3795d3ccdae14530813c11deaf33b73191e4477ff2004e99e1bde356a979bf40b550