Analysis
-
max time kernel
134s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 10:06
Static task
static1
Behavioral task
behavioral1
Sample
25480dc89d202c2d696d27081d6e965e4278a7191f7cb732520535cecbb8d44c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
25480dc89d202c2d696d27081d6e965e4278a7191f7cb732520535cecbb8d44c.exe
Resource
win10v2004-20241007-en
General
-
Target
25480dc89d202c2d696d27081d6e965e4278a7191f7cb732520535cecbb8d44c.exe
-
Size
2.1MB
-
MD5
dac6eda1fe997400f98cebc36aa13301
-
SHA1
4c589bbaa0ac59da4060db5452cc85f69aaa81f4
-
SHA256
25480dc89d202c2d696d27081d6e965e4278a7191f7cb732520535cecbb8d44c
-
SHA512
2f088a83f4ea6836b4bfbb56e19942ecaa513915044e630dd2b08b023080a94eefb53c3fcea4c4a662fd8825a1eb90b47ab27e441f2b5b460b8f4f170b121371
-
SSDEEP
49152:V5Oaj/gtjDQypipWLn2zFScR+DOeQEitnYb1m8whw:V5nj/gaypismN+DhVitnYm8z
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
51.89.207.166:47909
-
auth_value
3a050df92d0cf082b2cdaf87863616be
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/3228-19-0x0000000000580000-0x00000000005B2000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 25480dc89d202c2d696d27081d6e965e4278a7191f7cb732520535cecbb8d44c.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 864 123.exe 2992 321.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 864 set thread context of 3228 864 123.exe 93 PID 2992 set thread context of 3464 2992 321.exe 97 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1800 864 WerFault.exe 87 2116 2992 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 321.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 25480dc89d202c2d696d27081d6e965e4278a7191f7cb732520535cecbb8d44c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1048 cmd.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3020 wrote to memory of 864 3020 25480dc89d202c2d696d27081d6e965e4278a7191f7cb732520535cecbb8d44c.exe 87 PID 3020 wrote to memory of 864 3020 25480dc89d202c2d696d27081d6e965e4278a7191f7cb732520535cecbb8d44c.exe 87 PID 3020 wrote to memory of 864 3020 25480dc89d202c2d696d27081d6e965e4278a7191f7cb732520535cecbb8d44c.exe 87 PID 3020 wrote to memory of 2992 3020 25480dc89d202c2d696d27081d6e965e4278a7191f7cb732520535cecbb8d44c.exe 90 PID 3020 wrote to memory of 2992 3020 25480dc89d202c2d696d27081d6e965e4278a7191f7cb732520535cecbb8d44c.exe 90 PID 3020 wrote to memory of 2992 3020 25480dc89d202c2d696d27081d6e965e4278a7191f7cb732520535cecbb8d44c.exe 90 PID 864 wrote to memory of 3228 864 123.exe 93 PID 864 wrote to memory of 3228 864 123.exe 93 PID 864 wrote to memory of 3228 864 123.exe 93 PID 864 wrote to memory of 3228 864 123.exe 93 PID 864 wrote to memory of 3228 864 123.exe 93 PID 2992 wrote to memory of 3464 2992 321.exe 97 PID 2992 wrote to memory of 3464 2992 321.exe 97 PID 2992 wrote to memory of 3464 2992 321.exe 97 PID 2992 wrote to memory of 3464 2992 321.exe 97 PID 2992 wrote to memory of 3464 2992 321.exe 97 PID 3464 wrote to memory of 1048 3464 vbc.exe 102 PID 3464 wrote to memory of 1048 3464 vbc.exe 102 PID 3464 wrote to memory of 1048 3464 vbc.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\25480dc89d202c2d696d27081d6e965e4278a7191f7cb732520535cecbb8d44c.exe"C:\Users\Admin\AppData\Local\Temp\25480dc89d202c2d696d27081d6e965e4278a7191f7cb732520535cecbb8d44c.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\Temp\123.exe"C:\Windows\Temp\123.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 864 -s 2123⤵
- Program crash
PID:1800
-
-
-
C:\Windows\Temp\321.exe"C:\Windows\Temp\321.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\bebra.exe4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1048
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2992 -s 2403⤵
- Program crash
PID:2116
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 864 -ip 8641⤵PID:764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2992 -ip 29921⤵PID:2368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5528886eb080a687c38e4aea8bc760ced
SHA1777aef713f53cc4a3f580d301b64f3a26dfe3b04
SHA25630367c11ad9a8da6a3537fcd595979a45861abebdd3bbbc2fe5420fc39998edb
SHA512c9957d3bb235f1b25d447e86db0def97a1e84b4a7c96d702a8c8e961f68b0e384e7c0d2b9240a866a228441bb99c974075d844f68521b741ccc4a862c03c8362
-
Filesize
3.7MB
MD5c6412b4b3f614547677ec67caf32a28a
SHA1f2f05e899dc2c48e75851b6e296e8ef755db806a
SHA256c432d95fd646cf432aa2705683c76862eddfc65ece30790ed90d86391d124b03
SHA512ad586a95d18b043d91dbbec2833143e1c8aa1e49097d9b0509de87f853ef4479642d68b342bc8390d934b376fe885d1cb13a265a490739ae52252c8565f0b24f