Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 23:40
Static task
static1
Behavioral task
behavioral1
Sample
e66151a47eb34d6dfcf4e5875f71bcdefc3899b0ad84e0483f116908ae8c269a.exe
Resource
win10v2004-20241007-en
General
-
Target
e66151a47eb34d6dfcf4e5875f71bcdefc3899b0ad84e0483f116908ae8c269a.exe
-
Size
564KB
-
MD5
64a5dd98f262f16b30ba5e47642e2776
-
SHA1
0765010b72522fbd7bddd09417fde437e8b3cb2a
-
SHA256
e66151a47eb34d6dfcf4e5875f71bcdefc3899b0ad84e0483f116908ae8c269a
-
SHA512
895c6b0611ba902763604a71f50e0803df74ca47485516a03a435a375f6a72ab72fef9fc9acd027ac28df0fa4a83d96abcb4db9a94e6ef7b217e5effaff34ac2
-
SSDEEP
12288:NMrUy90hNPNPGI1DASTaJ3m6s7pt2caL3RrVKvCXdrR:Jy6NPNH1DTaJ3fs7pIBwCZR
Malware Config
Extracted
redline
ronam
193.233.20.17:4139
-
auth_value
125421d19d14dd7fd211bc7f6d4aea6c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3364-19-0x0000000004B20000-0x0000000004B66000-memory.dmp family_redline behavioral1/memory/3364-21-0x0000000005180000-0x00000000051C4000-memory.dmp family_redline behavioral1/memory/3364-49-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/3364-85-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/3364-83-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/3364-81-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/3364-77-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/3364-75-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/3364-73-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/3364-71-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/3364-69-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/3364-67-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/3364-65-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/3364-63-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/3364-62-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/3364-59-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/3364-57-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/3364-55-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/3364-53-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/3364-51-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/3364-47-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/3364-45-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/3364-43-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/3364-41-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/3364-39-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/3364-37-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/3364-35-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/3364-33-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/3364-31-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/3364-79-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/3364-29-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/3364-27-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/3364-25-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/3364-23-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/3364-22-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 3420 nEq12wp48.exe 3364 emZ38TA.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e66151a47eb34d6dfcf4e5875f71bcdefc3899b0ad84e0483f116908ae8c269a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nEq12wp48.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e66151a47eb34d6dfcf4e5875f71bcdefc3899b0ad84e0483f116908ae8c269a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nEq12wp48.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language emZ38TA.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3364 emZ38TA.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3760 wrote to memory of 3420 3760 e66151a47eb34d6dfcf4e5875f71bcdefc3899b0ad84e0483f116908ae8c269a.exe 83 PID 3760 wrote to memory of 3420 3760 e66151a47eb34d6dfcf4e5875f71bcdefc3899b0ad84e0483f116908ae8c269a.exe 83 PID 3760 wrote to memory of 3420 3760 e66151a47eb34d6dfcf4e5875f71bcdefc3899b0ad84e0483f116908ae8c269a.exe 83 PID 3420 wrote to memory of 3364 3420 nEq12wp48.exe 84 PID 3420 wrote to memory of 3364 3420 nEq12wp48.exe 84 PID 3420 wrote to memory of 3364 3420 nEq12wp48.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\e66151a47eb34d6dfcf4e5875f71bcdefc3899b0ad84e0483f116908ae8c269a.exe"C:\Users\Admin\AppData\Local\Temp\e66151a47eb34d6dfcf4e5875f71bcdefc3899b0ad84e0483f116908ae8c269a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nEq12wp48.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nEq12wp48.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\emZ38TA.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\emZ38TA.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3364
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
419KB
MD5475a054daec284ff695cdc477602cb51
SHA18367970c8d50ea22e38e87b451ec9ac9ad5952f8
SHA256fa72ea1115cbeb212d5f2273c5b11f3e224847b2b146fde1adb18a69a8e5b9fd
SHA512b825647977969ac61b69aa0af90493d78b5ee2b433099d792ec26b989baec830d3c0510521d87036907e987add13100d59e8d5dfc2767c7612098ce6e60d223f
-
Filesize
265KB
MD57a78f52edbea16ad7c9ba5d09f7aa32b
SHA1486aaf1b89a4dc78da8b73a75417d4d875efbe2a
SHA25600631c3b76c2cad95b50e997aa14945832db0283e512b7eac0229246a869b73b
SHA5120484461740ed7bfa0c11fbe7c2afc6db7984b892b086b0d36184d35f9baf3795d3ccdae14530813c11deaf33b73191e4477ff2004e99e1bde356a979bf40b550