Analysis
-
max time kernel
135s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 02:15
Static task
static1
Behavioral task
behavioral1
Sample
adbd8b1a8efd26a69709f28c50621477784d5770e2aa48218f7b5d0bdde2260e.exe
Resource
win10v2004-20241007-en
General
-
Target
adbd8b1a8efd26a69709f28c50621477784d5770e2aa48218f7b5d0bdde2260e.exe
-
Size
850KB
-
MD5
a7d20a82d2d8d9ac0b3ba289943a943c
-
SHA1
24728f7bf049ecb81851da93a8844ebf91b5adda
-
SHA256
adbd8b1a8efd26a69709f28c50621477784d5770e2aa48218f7b5d0bdde2260e
-
SHA512
911be26637fc32566b63b03f35c6f4bc6555ce49e80c5fb667777ca89287e93a87d8fca7105ec42b24b8a9d827b1a572f9d38c2544d0d137b604ce576b3b0dbe
-
SSDEEP
24576:Dy/lbkqli1XtjnSoGZz7w5UxX+uTEG3wPjQ:W/6dtJQzcSdTEG3g
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dante
185.161.248.73:4164
-
auth_value
f4066af6b8a6f23125c8ee48288a3f90
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/1464-2168-0x0000000002A20000-0x0000000002A52000-memory.dmp family_redline behavioral1/files/0x0006000000023080-2173.dat family_redline behavioral1/memory/5236-2182-0x0000000000300000-0x000000000032E000-memory.dmp family_redline behavioral1/files/0x0007000000023c94-2187.dat family_redline behavioral1/memory/5396-2189-0x0000000000F40000-0x0000000000F70000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation p91339284.exe -
Executes dropped EXE 4 IoCs
pid Process 5008 y38978892.exe 1464 p91339284.exe 5236 1.exe 5396 r33972933.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" adbd8b1a8efd26a69709f28c50621477784d5770e2aa48218f7b5d0bdde2260e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y38978892.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adbd8b1a8efd26a69709f28c50621477784d5770e2aa48218f7b5d0bdde2260e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y38978892.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language p91339284.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language r33972933.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1464 p91339284.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1284 wrote to memory of 5008 1284 adbd8b1a8efd26a69709f28c50621477784d5770e2aa48218f7b5d0bdde2260e.exe 83 PID 1284 wrote to memory of 5008 1284 adbd8b1a8efd26a69709f28c50621477784d5770e2aa48218f7b5d0bdde2260e.exe 83 PID 1284 wrote to memory of 5008 1284 adbd8b1a8efd26a69709f28c50621477784d5770e2aa48218f7b5d0bdde2260e.exe 83 PID 5008 wrote to memory of 1464 5008 y38978892.exe 85 PID 5008 wrote to memory of 1464 5008 y38978892.exe 85 PID 5008 wrote to memory of 1464 5008 y38978892.exe 85 PID 1464 wrote to memory of 5236 1464 p91339284.exe 89 PID 1464 wrote to memory of 5236 1464 p91339284.exe 89 PID 1464 wrote to memory of 5236 1464 p91339284.exe 89 PID 5008 wrote to memory of 5396 5008 y38978892.exe 90 PID 5008 wrote to memory of 5396 5008 y38978892.exe 90 PID 5008 wrote to memory of 5396 5008 y38978892.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\adbd8b1a8efd26a69709f28c50621477784d5770e2aa48218f7b5d0bdde2260e.exe"C:\Users\Admin\AppData\Local\Temp\adbd8b1a8efd26a69709f28c50621477784d5770e2aa48218f7b5d0bdde2260e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y38978892.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y38978892.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p91339284.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p91339284.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5236
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r33972933.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r33972933.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5396
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
570KB
MD56d6b043a4c0f0f93c6207903354f39c4
SHA10ed4455da25bb77443ea423ec2e8340fb7cb3c2c
SHA256e9c59c76de924ca0d6e702262ecda7e26775c2879deacfd9ea8feee0eee339f7
SHA5122cb74a6f05c341b4134e42795db5f95d4364fd5bcbab5c06f8fe1e30ae089cb67efb0ea2b2ec0c7b4191e7bbffe9b0a9a004b7454f2bfafb20e2c0052ace0e49
-
Filesize
476KB
MD57e01529a7d51edad86c2bea54bdd51ef
SHA1f262d83d6894a73c560f4e3688d314653c85fea6
SHA25699bd46de2c18fc568c6b2e06a20eebfac9e50e316056003ee45f03401c1784fc
SHA512c89fa34da974a309ad969282237ecc4ebf4d48a7a5b895139079cf2935f67f9f618366d9e5f6905f3b54ee43dbf3e70ff9eae83fe749b51e554acc149b3c80dd
-
Filesize
169KB
MD50c012d1f825902259f68c3c5b619b30e
SHA17e663f8356b87c745de5780763215d76b26ce58c
SHA2565dddf3cdea04709ecf70e35568954d9ff8b6ebeb189003c2092b752f81ec6b02
SHA5128f74235b3d2c8e2793db339c776f4b43f48e5c647bf6afb4c1dfb7d5c58702e778f6c7ea5e51af297d3a9cd6d9aed0f376037ecf6a0f175ba509ea5a9afa68d0
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf