Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 13:18
Static task
static1
Behavioral task
behavioral1
Sample
757b9a6897d05d302df281adc054ba8f246d9e4e372af2f406523784549d063a.exe
Resource
win10v2004-20241007-en
General
-
Target
757b9a6897d05d302df281adc054ba8f246d9e4e372af2f406523784549d063a.exe
-
Size
793KB
-
MD5
48d61137d9d0c706699520206ca40fa1
-
SHA1
5b07769b6cf7689fdf238ce9783e93360033db06
-
SHA256
757b9a6897d05d302df281adc054ba8f246d9e4e372af2f406523784549d063a
-
SHA512
b127e391fba8de0ea011287af9d49b52ba1d4b099fe796e27cbe421dc2330ca2c3ebcd0bb5d57a2777ccb09b0e9c1bb08757399a85e3aa84049ba4901b29303b
-
SSDEEP
24576:ryrP58ccwn7Rb5nhZHbU/0y5zXBTf0LOSI:erh8ccw7z2JzXBT8L
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dante
185.161.248.73:4164
-
auth_value
f4066af6b8a6f23125c8ee48288a3f90
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/3644-2168-0x00000000059C0000-0x00000000059F2000-memory.dmp family_redline behavioral1/files/0x0002000000022a9d-2173.dat family_redline behavioral1/memory/5768-2181-0x0000000000110000-0x000000000013E000-memory.dmp family_redline behavioral1/files/0x0007000000023cac-2195.dat family_redline behavioral1/memory/5352-2196-0x00000000000E0000-0x0000000000110000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation m69002920.exe -
Executes dropped EXE 4 IoCs
pid Process 3636 x55665231.exe 3644 m69002920.exe 5768 1.exe 5352 n31719791.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 757b9a6897d05d302df281adc054ba8f246d9e4e372af2f406523784549d063a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x55665231.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5588 3644 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 757b9a6897d05d302df281adc054ba8f246d9e4e372af2f406523784549d063a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x55665231.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m69002920.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language n31719791.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3644 m69002920.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4596 wrote to memory of 3636 4596 757b9a6897d05d302df281adc054ba8f246d9e4e372af2f406523784549d063a.exe 83 PID 4596 wrote to memory of 3636 4596 757b9a6897d05d302df281adc054ba8f246d9e4e372af2f406523784549d063a.exe 83 PID 4596 wrote to memory of 3636 4596 757b9a6897d05d302df281adc054ba8f246d9e4e372af2f406523784549d063a.exe 83 PID 3636 wrote to memory of 3644 3636 x55665231.exe 84 PID 3636 wrote to memory of 3644 3636 x55665231.exe 84 PID 3636 wrote to memory of 3644 3636 x55665231.exe 84 PID 3644 wrote to memory of 5768 3644 m69002920.exe 90 PID 3644 wrote to memory of 5768 3644 m69002920.exe 90 PID 3644 wrote to memory of 5768 3644 m69002920.exe 90 PID 3636 wrote to memory of 5352 3636 x55665231.exe 95 PID 3636 wrote to memory of 5352 3636 x55665231.exe 95 PID 3636 wrote to memory of 5352 3636 x55665231.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\757b9a6897d05d302df281adc054ba8f246d9e4e372af2f406523784549d063a.exe"C:\Users\Admin\AppData\Local\Temp\757b9a6897d05d302df281adc054ba8f246d9e4e372af2f406523784549d063a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x55665231.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x55665231.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m69002920.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m69002920.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 13844⤵
- Program crash
PID:5588
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n31719791.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n31719791.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5352
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3644 -ip 36441⤵PID:5644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
590KB
MD504f9063899cebdb8b7c48939c6a80d2f
SHA1569805066bc39359c98ce6ebd5e3c28666483090
SHA2561ea0adbea849471a75f29969bf6e9371a6e676bf85b015db6df9660870cbe174
SHA5120d76dbf1104c9b348c176f3105fdf988cbad33c9b114eca2b79fba0de8349b8d8565268e3124da25653e8e9eb92331a024b047967ca820cabbddef93ced9603e
-
Filesize
530KB
MD59d1e50608eea0ee82ed63fbeda3bcbdc
SHA1e5a71ac4b7c1537d99579f39e516c1dd8d8a2d50
SHA256aada5c66b2e93b36f057862a48b454737660f4f1979830b6ec569f5fdfc815fd
SHA512a71ab0fd139a11c8cf3cae9882389cc7c71d9f4c1cd0748b33e882381bc892d494509a15dfe258e43c13424ceefc3176d6cffca12d57a257442e72959bfd9997
-
Filesize
168KB
MD5db5ff12ee0d886bf5afccc8f12457e11
SHA1131778c0303b54707ceabb79f85bc312db1d14ce
SHA2561682ed9de6bc246b76ec5472d811c9d80c8185ff369fdfef4e78709ec0e39212
SHA512d6bb55085a6e8077be135278c019fc73afa0a21c332878deec566dd31b0a9dca7ecc3dc3d48d75b527ff5d3aea629580e7c8c86630966caa1b4cb7805e054e32
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf