Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 02:49
Static task
static1
Behavioral task
behavioral1
Sample
0212bc339310ba9a92cdf372c5fca4a2541bbfa0c713314f2cdc4ad8fd3e65f0.exe
Resource
win10v2004-20241007-en
General
-
Target
0212bc339310ba9a92cdf372c5fca4a2541bbfa0c713314f2cdc4ad8fd3e65f0.exe
-
Size
851KB
-
MD5
de383be8197ac97d79b07722023c9119
-
SHA1
99fa3a7a4693579fc0e4108367eb30110f8b6cd7
-
SHA256
0212bc339310ba9a92cdf372c5fca4a2541bbfa0c713314f2cdc4ad8fd3e65f0
-
SHA512
74a5a1eb43515873f2baa2deaded2cec3348c3432643de2d03f5afc3c345422a9dff3c17f9b321beee859898a485c928114bde97e6c078c6244bf9c2ebad4968
-
SSDEEP
12288:Ry901a8cMx33qY0RV825mPHSvA9+/a/ao4/7Kv+MgvarYScGlkaUCjGOWrx4ZcVG:Ryql/JI55qSo9Lb+/valcGlkpCEecLI
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dante
185.161.248.73:4164
-
auth_value
f4066af6b8a6f23125c8ee48288a3f90
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/3912-2169-0x0000000005760000-0x0000000005792000-memory.dmp family_redline behavioral1/files/0x000a000000023b68-2174.dat family_redline behavioral1/memory/1516-2182-0x0000000000250000-0x000000000027E000-memory.dmp family_redline behavioral1/files/0x000a000000023b66-2189.dat family_redline behavioral1/memory/2352-2191-0x0000000000C90000-0x0000000000CC0000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation p61103691.exe -
Executes dropped EXE 4 IoCs
pid Process 4452 y95993759.exe 3912 p61103691.exe 1516 1.exe 2352 r23903567.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0212bc339310ba9a92cdf372c5fca4a2541bbfa0c713314f2cdc4ad8fd3e65f0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y95993759.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language r23903567.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0212bc339310ba9a92cdf372c5fca4a2541bbfa0c713314f2cdc4ad8fd3e65f0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y95993759.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language p61103691.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3912 p61103691.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4692 wrote to memory of 4452 4692 0212bc339310ba9a92cdf372c5fca4a2541bbfa0c713314f2cdc4ad8fd3e65f0.exe 83 PID 4692 wrote to memory of 4452 4692 0212bc339310ba9a92cdf372c5fca4a2541bbfa0c713314f2cdc4ad8fd3e65f0.exe 83 PID 4692 wrote to memory of 4452 4692 0212bc339310ba9a92cdf372c5fca4a2541bbfa0c713314f2cdc4ad8fd3e65f0.exe 83 PID 4452 wrote to memory of 3912 4452 y95993759.exe 84 PID 4452 wrote to memory of 3912 4452 y95993759.exe 84 PID 4452 wrote to memory of 3912 4452 y95993759.exe 84 PID 3912 wrote to memory of 1516 3912 p61103691.exe 88 PID 3912 wrote to memory of 1516 3912 p61103691.exe 88 PID 3912 wrote to memory of 1516 3912 p61103691.exe 88 PID 4452 wrote to memory of 2352 4452 y95993759.exe 89 PID 4452 wrote to memory of 2352 4452 y95993759.exe 89 PID 4452 wrote to memory of 2352 4452 y95993759.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\0212bc339310ba9a92cdf372c5fca4a2541bbfa0c713314f2cdc4ad8fd3e65f0.exe"C:\Users\Admin\AppData\Local\Temp\0212bc339310ba9a92cdf372c5fca4a2541bbfa0c713314f2cdc4ad8fd3e65f0.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y95993759.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y95993759.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p61103691.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p61103691.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1516
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r23903567.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r23903567.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2352
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
571KB
MD502f8087526a38bff6fa3685afe4bff90
SHA110d893a63c35046419dc99944e96204b669e8ec4
SHA2566cf5aacc8ca71d0c8117f98bf2c8830f865b1684fb2b7afc348b3625617fdf15
SHA5124999ae6b1ebf57fc572d1138fe472f5dba60fa9720e1d293cc904232f8020f8306c3226c567a9bea9a4b15cc962023cb0c1efdc1503af108ea9a89538ce8afee
-
Filesize
476KB
MD503515a784b3680fdccd5fcf412053a85
SHA1a65c87c97dd29a148e631fca91af2723074eefac
SHA2569c843063fea7de86feee3a6796ad7104f035e0df0c4ce110148feb3cccccaaff
SHA51295fc253753184e92fe6fa24c3085a250932ebcf03c2b104f4a84dba5bdc45ff586f8545fa93c0277d0d9fec8826cd7e7088f6f805368243eae9a2ac597619609
-
Filesize
169KB
MD5a94ed7b1e1776a90971feae2801ed16d
SHA16d57a92c8da1ff83eee4a5419bb4843a86dfa824
SHA256bcc0196bf3c96c178b698ea977de13a25ffcf159ab4bc43b9ac8fff81cc1ecea
SHA5123b92fb3937fe9e9edd8093e07434b3cb98fef8a0282d0e7c03af675778bd84ceed45f3235ccc405fd94f65d6ca3f562746a5dc2586df13098920eae67c7e066c
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf