Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 23:34
Static task
static1
Behavioral task
behavioral1
Sample
c3d62412dfa9ecc924ced3d296c30544fdebda337ef909c9aabf265f1d732105.exe
Resource
win10v2004-20241007-en
General
-
Target
c3d62412dfa9ecc924ced3d296c30544fdebda337ef909c9aabf265f1d732105.exe
-
Size
583KB
-
MD5
8d5ce5dbe1741ee8e955541f92ac3be5
-
SHA1
b4365d048f5be355a41537824c72b077b5a1d60d
-
SHA256
c3d62412dfa9ecc924ced3d296c30544fdebda337ef909c9aabf265f1d732105
-
SHA512
97c5f2cafc77e3ce4b4d0099530f66cb1c4e617c8419ec3e2fdd9e18b946826741ee0fa97f413969b62f232d23a319b68b06a02f87f58ef61fa16aa9f0276678
-
SSDEEP
12288:+Mr6y900KnIV/JQX378bIvxIc3Nq5H915qLD0ovQEprI1:My1VBQ78MvD3Y5H9152Djpc1
Malware Config
Extracted
redline
ronam
193.233.20.17:4139
-
auth_value
125421d19d14dd7fd211bc7f6d4aea6c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1092-19-0x0000000004B20000-0x0000000004B66000-memory.dmp family_redline behavioral1/memory/1092-21-0x0000000005150000-0x0000000005194000-memory.dmp family_redline behavioral1/memory/1092-22-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/1092-86-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/1092-83-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/1092-81-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/1092-80-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/1092-77-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/1092-75-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/1092-74-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/1092-71-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/1092-69-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/1092-68-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/1092-65-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/1092-63-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/1092-62-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/1092-59-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/1092-57-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/1092-55-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/1092-53-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/1092-51-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/1092-49-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/1092-47-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/1092-45-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/1092-43-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/1092-41-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/1092-39-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/1092-37-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/1092-35-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/1092-33-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/1092-31-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/1092-29-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/1092-27-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/1092-25-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/1092-23-0x0000000005150000-0x000000000518E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 3048 nOj85wX32.exe 1092 euD46qg.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c3d62412dfa9ecc924ced3d296c30544fdebda337ef909c9aabf265f1d732105.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nOj85wX32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nOj85wX32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language euD46qg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c3d62412dfa9ecc924ced3d296c30544fdebda337ef909c9aabf265f1d732105.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1092 euD46qg.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3448 wrote to memory of 3048 3448 c3d62412dfa9ecc924ced3d296c30544fdebda337ef909c9aabf265f1d732105.exe 82 PID 3448 wrote to memory of 3048 3448 c3d62412dfa9ecc924ced3d296c30544fdebda337ef909c9aabf265f1d732105.exe 82 PID 3448 wrote to memory of 3048 3448 c3d62412dfa9ecc924ced3d296c30544fdebda337ef909c9aabf265f1d732105.exe 82 PID 3048 wrote to memory of 1092 3048 nOj85wX32.exe 83 PID 3048 wrote to memory of 1092 3048 nOj85wX32.exe 83 PID 3048 wrote to memory of 1092 3048 nOj85wX32.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3d62412dfa9ecc924ced3d296c30544fdebda337ef909c9aabf265f1d732105.exe"C:\Users\Admin\AppData\Local\Temp\c3d62412dfa9ecc924ced3d296c30544fdebda337ef909c9aabf265f1d732105.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nOj85wX32.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nOj85wX32.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\euD46qg.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\euD46qg.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
438KB
MD51125117ab29a16c1fe6c15d591a09ff9
SHA11de76fe49d78672d1ebb43742f207ae9b04de61b
SHA2564281bad4b752fd278b9f7852118ca11cda955f68342f9dc6586eeadd4d9b2342
SHA51208a2e19f350b6ad719b279de9c80b6468ef771efe18c8f10e6393a7131631fa6f44e2055491f41da91a04c493fd24785b32c778cbd7a2c5e62abf978d23e320d
-
Filesize
301KB
MD5b7310010d403a432b2b24fbc525c2c27
SHA1b6ad682dea1b768201d9fa3d9c0a0be4df3aff8a
SHA256ac7685b8203387f790d8dab34f74a0218eb59367c86cf9467364afce9647d391
SHA512e1fe5f38e9e00f66b54e3f85c61808e7c0b4e5109368c555e0b8f20fded47fa9e05a8ac9420752128dad12bdccaa80126427b1cb15e6052018922d7ee29c2ca6