Analysis
-
max time kernel
139s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 11:37
Static task
static1
Behavioral task
behavioral1
Sample
41dc70a31791550d0ef1dc91129904dc088a68ecbef38a4327e4c42daf7879ab.exe
Resource
win10v2004-20241007-en
General
-
Target
41dc70a31791550d0ef1dc91129904dc088a68ecbef38a4327e4c42daf7879ab.exe
-
Size
795KB
-
MD5
a6eba701620ca45d63ae957f5670b62e
-
SHA1
f24f9606ae0e2c51f010f2b1acc2facd60593e83
-
SHA256
41dc70a31791550d0ef1dc91129904dc088a68ecbef38a4327e4c42daf7879ab
-
SHA512
afb41ddea5da48718d05fb01c979093511f6ca3a9c7ff4afd4d1dfba1e77e396fc508613ee65fcfdbde6b64485afe6f5f19d71cc10bff8bcc631201ba3af154d
-
SSDEEP
12288:5y90M8dwSBpsAC/v9nMBMqkACqXFoTZq5Ip/p5BQ8QBb+3q6680kzuLP3:5yYwSBpU/vJCtOg9+xm
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dante
185.161.248.73:4164
-
auth_value
f4066af6b8a6f23125c8ee48288a3f90
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/940-2169-0x00000000059C0000-0x00000000059F2000-memory.dmp family_redline behavioral1/files/0x000c000000023b60-2174.dat family_redline behavioral1/memory/2596-2182-0x0000000000810000-0x000000000083E000-memory.dmp family_redline behavioral1/files/0x0007000000023ce5-2196.dat family_redline behavioral1/memory/800-2197-0x0000000000640000-0x0000000000670000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation m76092926.exe -
Executes dropped EXE 4 IoCs
pid Process 1256 x90562030.exe 940 m76092926.exe 2596 1.exe 800 n36303170.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 41dc70a31791550d0ef1dc91129904dc088a68ecbef38a4327e4c42daf7879ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x90562030.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4336 940 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x90562030.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m76092926.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language n36303170.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 41dc70a31791550d0ef1dc91129904dc088a68ecbef38a4327e4c42daf7879ab.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 940 m76092926.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4056 wrote to memory of 1256 4056 41dc70a31791550d0ef1dc91129904dc088a68ecbef38a4327e4c42daf7879ab.exe 85 PID 4056 wrote to memory of 1256 4056 41dc70a31791550d0ef1dc91129904dc088a68ecbef38a4327e4c42daf7879ab.exe 85 PID 4056 wrote to memory of 1256 4056 41dc70a31791550d0ef1dc91129904dc088a68ecbef38a4327e4c42daf7879ab.exe 85 PID 1256 wrote to memory of 940 1256 x90562030.exe 86 PID 1256 wrote to memory of 940 1256 x90562030.exe 86 PID 1256 wrote to memory of 940 1256 x90562030.exe 86 PID 940 wrote to memory of 2596 940 m76092926.exe 96 PID 940 wrote to memory of 2596 940 m76092926.exe 96 PID 940 wrote to memory of 2596 940 m76092926.exe 96 PID 1256 wrote to memory of 800 1256 x90562030.exe 100 PID 1256 wrote to memory of 800 1256 x90562030.exe 100 PID 1256 wrote to memory of 800 1256 x90562030.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\41dc70a31791550d0ef1dc91129904dc088a68ecbef38a4327e4c42daf7879ab.exe"C:\Users\Admin\AppData\Local\Temp\41dc70a31791550d0ef1dc91129904dc088a68ecbef38a4327e4c42daf7879ab.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x90562030.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x90562030.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m76092926.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m76092926.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 940 -s 13804⤵
- Program crash
PID:4336
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n36303170.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n36303170.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:800
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 940 -ip 9401⤵PID:4624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
590KB
MD5e00590076f13725be2240d2a399c412d
SHA15fea4e6d2f3caeaaaa772bb6888c9712748e8938
SHA256c265053469e73b594e903b8b17590071b5ce55bb7e7254da3a24dce302e006fb
SHA5125ade0a8026f2fac104408be271e4614f6a12d08e8415b8866ac668658f300f59be3dc4217c54e676f7163161906c8e4d1e962b1fdc41f57e512ddffacba4e9bc
-
Filesize
530KB
MD53116261ce592ec22e942c6cb58d37f72
SHA1b3581694249f5ca44b13a8cfb3fae00ecf785154
SHA2560eb5be0423bfbe7fe26de137961cda6653dbfba583bd2d5a4350ec802f474bee
SHA512f94407abe60838f1b0254d735d5b119826d1df88910a4bb568a3b12b3f89c44d63460cef570a907c61c03d34bc893a61b9966f954ff28856b5c7270d07a2b8c7
-
Filesize
168KB
MD544f66cbce9bbfc6cbb8e9b8676c91b17
SHA19c7aa48c02904d98b8ef52147ede71b401f0914d
SHA2567a4ae58a17e9030de31dcaa198cb392520432aa3a26901a3fadedb179389129b
SHA5126bec2955637b5a517f72f72a3f470654922e6265caeb83ac551e8e9a18b62890c62210da88fc74f31799baa6bc8d7ecb11c3fc28551323ac333698db26b9fc32
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf