Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 12:00
Static task
static1
Behavioral task
behavioral1
Sample
74a45de1a47ba70bf22e4fdce9f04cb844cfe63b2b251dd52f3c8041d631c0c4.exe
Resource
win10v2004-20241007-en
General
-
Target
74a45de1a47ba70bf22e4fdce9f04cb844cfe63b2b251dd52f3c8041d631c0c4.exe
-
Size
765KB
-
MD5
992e0f4911ea5b5b199072cf84bb735a
-
SHA1
cc9967dbf12f54305088b4ba5aea6f6c264d193d
-
SHA256
74a45de1a47ba70bf22e4fdce9f04cb844cfe63b2b251dd52f3c8041d631c0c4
-
SHA512
3626d69c05aa40f0efc310dbf548df98fd9059ec28baffd738bd5a35e2e7b2098b164a87acf09a0ef2f9280f423910cc025e22f9c15901715efb39dbfbee7cf3
-
SSDEEP
12288:gMray90BXz5ZV6y3exQeVREe+ULZvAqw0Gl8PyRGh6W5kTvtRe0/mABbsk9AztQC:KyuzbVHexLJnLZ9Gu0Ghcv+0ugsk9KWm
Malware Config
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3564-22-0x0000000002880000-0x00000000028C6000-memory.dmp family_redline behavioral1/memory/3564-24-0x0000000002920000-0x0000000002964000-memory.dmp family_redline behavioral1/memory/3564-25-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/3564-40-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/3564-88-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/3564-86-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/3564-84-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/3564-80-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/3564-78-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/3564-77-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/3564-75-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/3564-72-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/3564-70-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/3564-69-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/3564-66-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/3564-64-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/3564-63-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/3564-60-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/3564-58-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/3564-56-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/3564-54-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/3564-52-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/3564-50-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/3564-48-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/3564-44-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/3564-42-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/3564-38-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/3564-36-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/3564-34-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/3564-32-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/3564-30-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/3564-28-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/3564-26-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/3564-82-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/3564-46-0x0000000002920000-0x000000000295E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3424 vBN02.exe 1512 vBR03.exe 3564 dOt28.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 74a45de1a47ba70bf22e4fdce9f04cb844cfe63b2b251dd52f3c8041d631c0c4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vBN02.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vBR03.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 74a45de1a47ba70bf22e4fdce9f04cb844cfe63b2b251dd52f3c8041d631c0c4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vBN02.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vBR03.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dOt28.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3564 dOt28.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2132 wrote to memory of 3424 2132 74a45de1a47ba70bf22e4fdce9f04cb844cfe63b2b251dd52f3c8041d631c0c4.exe 83 PID 2132 wrote to memory of 3424 2132 74a45de1a47ba70bf22e4fdce9f04cb844cfe63b2b251dd52f3c8041d631c0c4.exe 83 PID 2132 wrote to memory of 3424 2132 74a45de1a47ba70bf22e4fdce9f04cb844cfe63b2b251dd52f3c8041d631c0c4.exe 83 PID 3424 wrote to memory of 1512 3424 vBN02.exe 84 PID 3424 wrote to memory of 1512 3424 vBN02.exe 84 PID 3424 wrote to memory of 1512 3424 vBN02.exe 84 PID 1512 wrote to memory of 3564 1512 vBR03.exe 86 PID 1512 wrote to memory of 3564 1512 vBR03.exe 86 PID 1512 wrote to memory of 3564 1512 vBR03.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\74a45de1a47ba70bf22e4fdce9f04cb844cfe63b2b251dd52f3c8041d631c0c4.exe"C:\Users\Admin\AppData\Local\Temp\74a45de1a47ba70bf22e4fdce9f04cb844cfe63b2b251dd52f3c8041d631c0c4.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vBN02.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vBN02.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vBR03.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vBR03.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dOt28.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dOt28.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3564
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
661KB
MD57ce1566954bd56e2d7c2232eb7b0cda4
SHA1f5d936f1aaaec15253ac858fd95c862f016845b4
SHA25647a5eb118d44cd29aea1249203ec9e4f7f5f99a0dd3e1c84871f0c56984ce244
SHA5128840dad2f21ad96ef6ceec3fd04060969b8a405f26cda38f835646e1a2cea6c42d59f338cf778a48ac48edc64fe386030b4ecbd61f9b0fceeed1e7195e60d0f9
-
Filesize
516KB
MD5ebe8f101bb63937b0ba054e65df69c96
SHA112e05fefa5d11c0fff80251a25353b4bbd19e103
SHA256bfe674d18f5ffd99ce36185e61d6ff03c332dbf0612c37a9b57dbb19ff388daf
SHA512b809d627efd45f1310d08b090093eb8e08f49c1806565830472eb6f5a279959d08e17965afd18b259fa43e4d8726b4bc44a725349bb0655a9f785b0f3a344a78
-
Filesize
296KB
MD539a31c690c4b02de4f1a661ffad29d08
SHA1fe6268fe60696e0b85015784fe0b77d1cffc7e3d
SHA256acb28abfb93e3a5e8c6686b995c13c07a40d77d8989d8bdf5ce92a23576583b1
SHA5123aabe421382a7b91e66e954490f9ca74d158d1d74c6ed3ff61c5f88a24de3e260619d7404f1b62f049d6f7611f89f0db17a5d30f8c76de8fb5ed9ee2ae16604c