Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 07:00
Static task
static1
Behavioral task
behavioral1
Sample
910a3d319e91fdca3c9fbaacb818ab424e4b58c7c3e33ed8e626c5184ab99ccb.exe
Resource
win10v2004-20241007-en
General
-
Target
910a3d319e91fdca3c9fbaacb818ab424e4b58c7c3e33ed8e626c5184ab99ccb.exe
-
Size
849KB
-
MD5
dab948af7ae9df10213d204b8fd90d1f
-
SHA1
27fc872b5f01f3d90c8420341389f68b8adf5fa6
-
SHA256
910a3d319e91fdca3c9fbaacb818ab424e4b58c7c3e33ed8e626c5184ab99ccb
-
SHA512
26d521e0bb95549004021959cc0231794d8ff568f98532f153fe5874266e57d411146799cb8b4f72ca5f6f4e6be8e6d0eda9b8ddf6e2142161b875dbe866bf82
-
SSDEEP
12288:4y90gXBvZpM5dTSzjg0x4BkEeWWqL1qsgl7/kb4JdozWOZQUcNcDLB3Q9Ty:4y3XBhpMLTSTxWisssbioWToAly
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dante
185.161.248.73:4164
-
auth_value
f4066af6b8a6f23125c8ee48288a3f90
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/4284-2169-0x0000000005620000-0x0000000005652000-memory.dmp family_redline behavioral1/files/0x000c0000000006c3-2174.dat family_redline behavioral1/memory/5644-2182-0x0000000000740000-0x000000000076E000-memory.dmp family_redline behavioral1/files/0x0007000000023c74-2194.dat family_redline behavioral1/memory/6068-2196-0x0000000000F30000-0x0000000000F60000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation p99286809.exe -
Executes dropped EXE 4 IoCs
pid Process 2724 y95169117.exe 4284 p99286809.exe 5644 1.exe 6068 r60233193.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 910a3d319e91fdca3c9fbaacb818ab424e4b58c7c3e33ed8e626c5184ab99ccb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y95169117.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5844 4284 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 910a3d319e91fdca3c9fbaacb818ab424e4b58c7c3e33ed8e626c5184ab99ccb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y95169117.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language p99286809.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language r60233193.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4284 p99286809.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3764 wrote to memory of 2724 3764 910a3d319e91fdca3c9fbaacb818ab424e4b58c7c3e33ed8e626c5184ab99ccb.exe 83 PID 3764 wrote to memory of 2724 3764 910a3d319e91fdca3c9fbaacb818ab424e4b58c7c3e33ed8e626c5184ab99ccb.exe 83 PID 3764 wrote to memory of 2724 3764 910a3d319e91fdca3c9fbaacb818ab424e4b58c7c3e33ed8e626c5184ab99ccb.exe 83 PID 2724 wrote to memory of 4284 2724 y95169117.exe 84 PID 2724 wrote to memory of 4284 2724 y95169117.exe 84 PID 2724 wrote to memory of 4284 2724 y95169117.exe 84 PID 4284 wrote to memory of 5644 4284 p99286809.exe 87 PID 4284 wrote to memory of 5644 4284 p99286809.exe 87 PID 4284 wrote to memory of 5644 4284 p99286809.exe 87 PID 2724 wrote to memory of 6068 2724 y95169117.exe 93 PID 2724 wrote to memory of 6068 2724 y95169117.exe 93 PID 2724 wrote to memory of 6068 2724 y95169117.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\910a3d319e91fdca3c9fbaacb818ab424e4b58c7c3e33ed8e626c5184ab99ccb.exe"C:\Users\Admin\AppData\Local\Temp\910a3d319e91fdca3c9fbaacb818ab424e4b58c7c3e33ed8e626c5184ab99ccb.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y95169117.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y95169117.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p99286809.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p99286809.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 13724⤵
- Program crash
PID:5844
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r60233193.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r60233193.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6068
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4284 -ip 42841⤵PID:5804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
569KB
MD5daf290228ae110340084ade0c2ae7d7e
SHA1b7ef92d1dd51245b697b82d60d4c04fd8cbb7025
SHA256c421c4bcf7bb75d5fe69ffc02f99dddfad24190ab11712d1e910bbe538fa3423
SHA51238f1327f7da9b03b5e05706024fc3565e51fbbcdbb136cebe00d31c85dda39e8fbd9b3895933b4217ef66571dc25211110d8cf25ae4004d1960412cc643143bb
-
Filesize
479KB
MD5fc31900787cf262c9a1f89604cba72f8
SHA1bdb76b2e8faef9f81efc13a194ac944676913a75
SHA2565f3b4237ff60f2acf798ed616dd2921ee2b692af50b9e49d77b3cccfb55352a5
SHA512c3b2e4fc68748052c8cf91163782f50c5d19eb10a71950a21f313d33f3030e1a52f66b25a46107eedd33aacede5aa01e18f82dee6753f59a45e05c17b1ebb257
-
Filesize
169KB
MD546c9397eb7b46f643d18085be9fc38c5
SHA1e89b89412f9c8ec58f4154a0de47f68395025b40
SHA2565dfc37d737b7b14db5eafec95c1005b2dbd8c52640012623669cfc0cb3154e7c
SHA51264d3ab95539ae72e79b53eb706888ad33b96be1fc7fed53b6ccfc7b6c1be9ed09a89165a2e139123847bc2ade6fffb503da420fe97adb976acebc8b8083ef9e7
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf