Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 23:56
Static task
static1
Behavioral task
behavioral1
Sample
754807ff67ae26797c7e20285373350421db04351b130187710717bcca4ea330.exe
Resource
win10v2004-20241007-en
General
-
Target
754807ff67ae26797c7e20285373350421db04351b130187710717bcca4ea330.exe
-
Size
760KB
-
MD5
bdb4bbfb19e7b6e152763a5d911c7f22
-
SHA1
edd68a38d03e2f97c2c469f48c8a92697b070346
-
SHA256
754807ff67ae26797c7e20285373350421db04351b130187710717bcca4ea330
-
SHA512
de39fc23d7e523fa8049d48d9e9b044daa818629c826b32f9cddd399b4e8d04f332639152b49f4269766fb68526b98e4dcf88aea2f52e07dc18bdf7d272c0140
-
SSDEEP
12288:aMr5y90omARs1L+UtX8jCJfz/zyyTmjr2bjQ24mnQHDYevSONV9WZR6+Ik:TyJmARs1BKjC1Pyp2bjQ24myDDvS63Wd
Malware Config
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2740-22-0x0000000002930000-0x0000000002976000-memory.dmp family_redline behavioral1/memory/2740-24-0x0000000004EC0000-0x0000000004F04000-memory.dmp family_redline behavioral1/memory/2740-82-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/2740-52-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/2740-48-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/2740-34-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/2740-88-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/2740-86-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/2740-84-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/2740-80-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/2740-78-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/2740-76-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/2740-74-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/2740-72-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/2740-70-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/2740-68-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/2740-66-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/2740-64-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/2740-62-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/2740-60-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/2740-58-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/2740-56-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/2740-54-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/2740-50-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/2740-46-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/2740-44-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/2740-42-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/2740-41-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/2740-38-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/2740-36-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/2740-32-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/2740-30-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/2740-28-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/2740-26-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/2740-25-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4820 vFj16.exe 2788 vRX34.exe 2740 dmw79.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 754807ff67ae26797c7e20285373350421db04351b130187710717bcca4ea330.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vFj16.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vRX34.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dmw79.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 754807ff67ae26797c7e20285373350421db04351b130187710717bcca4ea330.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vFj16.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vRX34.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2740 dmw79.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2476 wrote to memory of 4820 2476 754807ff67ae26797c7e20285373350421db04351b130187710717bcca4ea330.exe 83 PID 2476 wrote to memory of 4820 2476 754807ff67ae26797c7e20285373350421db04351b130187710717bcca4ea330.exe 83 PID 2476 wrote to memory of 4820 2476 754807ff67ae26797c7e20285373350421db04351b130187710717bcca4ea330.exe 83 PID 4820 wrote to memory of 2788 4820 vFj16.exe 84 PID 4820 wrote to memory of 2788 4820 vFj16.exe 84 PID 4820 wrote to memory of 2788 4820 vFj16.exe 84 PID 2788 wrote to memory of 2740 2788 vRX34.exe 85 PID 2788 wrote to memory of 2740 2788 vRX34.exe 85 PID 2788 wrote to memory of 2740 2788 vRX34.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\754807ff67ae26797c7e20285373350421db04351b130187710717bcca4ea330.exe"C:\Users\Admin\AppData\Local\Temp\754807ff67ae26797c7e20285373350421db04351b130187710717bcca4ea330.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vFj16.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vFj16.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vRX34.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vRX34.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dmw79.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dmw79.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
656KB
MD558ee8adbb592b2158c2ec84c6b6604c8
SHA109f1f921dfdf262654c1ed8c6f16ac178985382d
SHA2568dededdaf4b052e2d40e427badb28c2797108fd4beccb8ea1c5674da66c8296a
SHA5129f927f492ba62d1a8441fcbb32308ea462086bab5a985478f800497137d2e30d6de64c9e8768293695258b3cb1e59caac1de10dc90b689a899db720f5364b438
-
Filesize
511KB
MD541abddd9840dd65402bc02efdaaf6d06
SHA13d0cf91efea2acb79883f0607178eb4aacf807e7
SHA256db8a4b2ebdf5b662262f2b72b41584605e6524e482e37cfb35899463fb511f4d
SHA5126695f688ac73853bd5f892a6c7102285d1f40b8cf6ec09082928c681aa38d4e23385a7d2118707c7d451e03daf2b2cc633f3d6516d1229be4e9b81ae3e3c8c0a
-
Filesize
287KB
MD5d8188b6e91a330ef924426abe7f1f9f8
SHA1980dad68e6d92724d8f3762ee094943390ed444a
SHA256b45b88fca18a6ca918d989de54ef418f9c4bc147df9c88f7d10fe8b85962f227
SHA51271e78e3d5ea8c1607c508ba8baa40ee66776530c452fd73e7fdbe30c6d0a738d28f9ddfb5f6cd8d6c8a9eabb3ebe9aa4aef269779b3b77cd908911e3ddcfb5b4