Analysis
-
max time kernel
136s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 23:42
Static task
static1
Behavioral task
behavioral1
Sample
6c6bfc5e45e4c253466ede2bd69a3a5eb205f50323623121d630ed97ca72669d.exe
Resource
win10v2004-20241007-en
General
-
Target
6c6bfc5e45e4c253466ede2bd69a3a5eb205f50323623121d630ed97ca72669d.exe
-
Size
774KB
-
MD5
025015cb5a6c57a111d9ba698939e112
-
SHA1
29d5af2dc20844d26802c603b4959054b9146afe
-
SHA256
6c6bfc5e45e4c253466ede2bd69a3a5eb205f50323623121d630ed97ca72669d
-
SHA512
c133c0a136bc1228329ffa903bf1d20858d7ccabaf77f416d53961343d9b6212afbcad8305ecb160eb1b8c226b2457fa1965fd52e7f3767eecebad6f71c27445
-
SSDEEP
24576:ZyVUL5jbD1BK3PdB4Soyq80cahDVwFxCrWx:MVUVjHK/dUd801hBMxCr
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dante
185.161.248.73:4164
-
auth_value
f4066af6b8a6f23125c8ee48288a3f90
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/3948-2169-0x0000000005610000-0x0000000005642000-memory.dmp family_redline behavioral1/files/0x0002000000022dcd-2174.dat family_redline behavioral1/memory/4200-2186-0x0000000000400000-0x000000000042E000-memory.dmp family_redline behavioral1/files/0x000a000000023b8b-2188.dat family_redline behavioral1/memory/2544-2191-0x0000000000FF0000-0x0000000001020000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation m99295296.exe -
Executes dropped EXE 4 IoCs
pid Process 1148 x57157763.exe 3948 m99295296.exe 4200 1.exe 2544 n65398622.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6c6bfc5e45e4c253466ede2bd69a3a5eb205f50323623121d630ed97ca72669d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x57157763.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6c6bfc5e45e4c253466ede2bd69a3a5eb205f50323623121d630ed97ca72669d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x57157763.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m99295296.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language n65398622.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3948 m99295296.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4568 wrote to memory of 1148 4568 6c6bfc5e45e4c253466ede2bd69a3a5eb205f50323623121d630ed97ca72669d.exe 83 PID 4568 wrote to memory of 1148 4568 6c6bfc5e45e4c253466ede2bd69a3a5eb205f50323623121d630ed97ca72669d.exe 83 PID 4568 wrote to memory of 1148 4568 6c6bfc5e45e4c253466ede2bd69a3a5eb205f50323623121d630ed97ca72669d.exe 83 PID 1148 wrote to memory of 3948 1148 x57157763.exe 84 PID 1148 wrote to memory of 3948 1148 x57157763.exe 84 PID 1148 wrote to memory of 3948 1148 x57157763.exe 84 PID 3948 wrote to memory of 4200 3948 m99295296.exe 88 PID 3948 wrote to memory of 4200 3948 m99295296.exe 88 PID 3948 wrote to memory of 4200 3948 m99295296.exe 88 PID 1148 wrote to memory of 2544 1148 x57157763.exe 89 PID 1148 wrote to memory of 2544 1148 x57157763.exe 89 PID 1148 wrote to memory of 2544 1148 x57157763.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c6bfc5e45e4c253466ede2bd69a3a5eb205f50323623121d630ed97ca72669d.exe"C:\Users\Admin\AppData\Local\Temp\6c6bfc5e45e4c253466ede2bd69a3a5eb205f50323623121d630ed97ca72669d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x57157763.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x57157763.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m99295296.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m99295296.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4200
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n65398622.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n65398622.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2544
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
570KB
MD51e5d5657fbfad0cbe75de2a97ca7f4c6
SHA153d54825e8b016f5919004e859c9cbdec4ee2090
SHA2569ec069204aae197f7420b6a08129a5e36c3a7b6fd6764aed6bba282a1126311d
SHA512f5427ba61320fc8cec74dba79bad38fd788ff13164779f110c0379528e8edfe4d72a1aeb84c83d83dd8901403ddcfee35d9553a838c0cebf6910c18fba0a0a3e
-
Filesize
476KB
MD5b92b4cdc2e1edfe7572050749c67ac8b
SHA190be51b502a6d82a4845c7499ae6aa54b846fb69
SHA256501cff4fc83c9acbd0c65325e725460d9c997d698271e562091cf841d0e1bc58
SHA5129c03738d4b7a1b5282ed135693acc01c7d0799a4e60547fa4f64b34ee43b127778c1b7dd0c2abcc8079c5738e9dd5c070cbf00cdbae3760dcab8d02467ffbc5d
-
Filesize
169KB
MD5667c10e2becfcf8f5c62c2a0700f3a34
SHA137ed79ca6631b59d8a915e091ad50dd3c61462f4
SHA256e5ca0e15f5d26a3a870e9fdb67d0fb14bd49f171adbc2b83d42499a9f2662ff0
SHA5124731bcf6c14f40ec6b5ed8a6cbd6c3dc7f9275898c52371398b77627c4568a1c263c56200b3596e685a750ae12cf7a86d7cf8a302b3be893df682ec0ab0a41b1
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf