Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 07:22
Static task
static1
Behavioral task
behavioral1
Sample
5e89e597ad75f0503c8fe5d495e39c836c5d8e12960c0b7dcb396f9829569054.exe
Resource
win10v2004-20241007-en
General
-
Target
5e89e597ad75f0503c8fe5d495e39c836c5d8e12960c0b7dcb396f9829569054.exe
-
Size
890KB
-
MD5
b0a709648e66ced4135978954cb072fa
-
SHA1
3e507e2c1d2b54404d45a0dfe31a7f0199065e4f
-
SHA256
5e89e597ad75f0503c8fe5d495e39c836c5d8e12960c0b7dcb396f9829569054
-
SHA512
bc8bfc1d8565e2637b686c6837ed5387687590379ed1a9a1912cbec30e152bb400d552261fbcf7e4807f6392327aa2fccc8b0ed93f563e2e91a8a4d19efdd56b
-
SSDEEP
24576:6ytsSPLQvnPR36AwEj/frWfcqjLWQlrVuXCSu:BtsTvPIkIBlxuXCS
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dante
185.161.248.73:4164
-
auth_value
f4066af6b8a6f23125c8ee48288a3f90
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3360-2168-0x00000000059E0000-0x0000000005A12000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5472-2181-0x0000000000FE0000-0x000000000100E000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r57897877.exe family_redline behavioral1/memory/3920-2195-0x0000000000560000-0x0000000000590000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
p88544742.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation p88544742.exe -
Executes dropped EXE 4 IoCs
Processes:
y38164610.exep88544742.exe1.exer57897877.exepid process 4880 y38164610.exe 3360 p88544742.exe 5472 1.exe 3920 r57897877.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
5e89e597ad75f0503c8fe5d495e39c836c5d8e12960c0b7dcb396f9829569054.exey38164610.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5e89e597ad75f0503c8fe5d495e39c836c5d8e12960c0b7dcb396f9829569054.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y38164610.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3720 3360 WerFault.exe p88544742.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
y38164610.exep88544742.exe1.exer57897877.exe5e89e597ad75f0503c8fe5d495e39c836c5d8e12960c0b7dcb396f9829569054.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y38164610.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language p88544742.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language r57897877.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5e89e597ad75f0503c8fe5d495e39c836c5d8e12960c0b7dcb396f9829569054.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
p88544742.exedescription pid process Token: SeDebugPrivilege 3360 p88544742.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
5e89e597ad75f0503c8fe5d495e39c836c5d8e12960c0b7dcb396f9829569054.exey38164610.exep88544742.exedescription pid process target process PID 4568 wrote to memory of 4880 4568 5e89e597ad75f0503c8fe5d495e39c836c5d8e12960c0b7dcb396f9829569054.exe y38164610.exe PID 4568 wrote to memory of 4880 4568 5e89e597ad75f0503c8fe5d495e39c836c5d8e12960c0b7dcb396f9829569054.exe y38164610.exe PID 4568 wrote to memory of 4880 4568 5e89e597ad75f0503c8fe5d495e39c836c5d8e12960c0b7dcb396f9829569054.exe y38164610.exe PID 4880 wrote to memory of 3360 4880 y38164610.exe p88544742.exe PID 4880 wrote to memory of 3360 4880 y38164610.exe p88544742.exe PID 4880 wrote to memory of 3360 4880 y38164610.exe p88544742.exe PID 3360 wrote to memory of 5472 3360 p88544742.exe 1.exe PID 3360 wrote to memory of 5472 3360 p88544742.exe 1.exe PID 3360 wrote to memory of 5472 3360 p88544742.exe 1.exe PID 4880 wrote to memory of 3920 4880 y38164610.exe r57897877.exe PID 4880 wrote to memory of 3920 4880 y38164610.exe r57897877.exe PID 4880 wrote to memory of 3920 4880 y38164610.exe r57897877.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e89e597ad75f0503c8fe5d495e39c836c5d8e12960c0b7dcb396f9829569054.exe"C:\Users\Admin\AppData\Local\Temp\5e89e597ad75f0503c8fe5d495e39c836c5d8e12960c0b7dcb396f9829569054.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y38164610.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y38164610.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p88544742.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p88544742.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 2364⤵
- Program crash
PID:3720
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r57897877.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r57897877.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3920
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3360 -ip 33601⤵PID:4996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
589KB
MD5a02c8229e1faf1caa4024efdcb247ea1
SHA1cdfcc8881ffb26c9704e6262b8e8a084f6101042
SHA256dd722533e867853d26710242f1085a24104cc36ec5d45fbfb2aa0eb32b4b1a05
SHA5121a8efc9d9eee2923f833fa59547ac17fd773f8442bb89dbea9487fbacc135feed9da465e976664c531b5206532cec3ec5a03adfc5794302259ad307601308ae1
-
Filesize
530KB
MD53cc26e66f757e31594f0f2fc02000b6a
SHA12cb302c3d9c705899693bac80e66ddf2de64e3b9
SHA25620e95794ac7280b426ff7b98839d1332fe92600a0831596fbe822dd29173f241
SHA512931fce6b0baa1a2af0f7bd85957fbb496f45456b27b5e3ddb5ff29fa4836fe27fab5b8c53d12d8cd9463543e849423b3b3db3096fb8d78251013d289c4a293a3
-
Filesize
168KB
MD5346006b59e187f94d8b325da1cbd34fd
SHA16bbfd0add0c925220b4629850b238b5c5267b83a
SHA256388548b73f1259ce448cd462746f2083252993e1f7e42eeeef544e9433eac083
SHA512a2455addf596e64c7b91da10306671bca14ea1b38b696b1fd07203bedc0770e74bd38a2031b389ebae0c5ccbac4e7d327cefeeef69f9051e11bd63d7ea85329d
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf