Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 14:06
Static task
static1
Behavioral task
behavioral1
Sample
227f1b9b6541d56956a83dd913d6ee39a7f6b915ebdb8478afdf27827773b795.exe
Resource
win10v2004-20241007-en
General
-
Target
227f1b9b6541d56956a83dd913d6ee39a7f6b915ebdb8478afdf27827773b795.exe
-
Size
760KB
-
MD5
a053dec1e6e9b434f07e00068834cbb7
-
SHA1
c594130d116940f9b7682fc7f115db549ddc74de
-
SHA256
227f1b9b6541d56956a83dd913d6ee39a7f6b915ebdb8478afdf27827773b795
-
SHA512
c5ac47d4468bffd7cfe61a3ed156c3e5708a2385ed2c7e68c5f47dc4b48ea1e35662c5b531953e3b744d92573b543d32b6ca3ee8c08e38a27392fcbb9fd7c1d6
-
SSDEEP
12288:VMrHy90VUJJmVpeNrrD9bwtHh2q9uGYPorPvCQKomnAtDYevBxhV96ZR633SATp+:aykYAVpKrv+TFCIPvCQKomsDDvBP36ZR
Malware Config
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1532-22-0x0000000004D20000-0x0000000004D66000-memory.dmp family_redline behavioral1/memory/1532-24-0x0000000005350000-0x0000000005394000-memory.dmp family_redline behavioral1/memory/1532-88-0x0000000005350000-0x000000000538E000-memory.dmp family_redline behavioral1/memory/1532-86-0x0000000005350000-0x000000000538E000-memory.dmp family_redline behavioral1/memory/1532-84-0x0000000005350000-0x000000000538E000-memory.dmp family_redline behavioral1/memory/1532-83-0x0000000005350000-0x000000000538E000-memory.dmp family_redline behavioral1/memory/1532-80-0x0000000005350000-0x000000000538E000-memory.dmp family_redline behavioral1/memory/1532-79-0x0000000005350000-0x000000000538E000-memory.dmp family_redline behavioral1/memory/1532-76-0x0000000005350000-0x000000000538E000-memory.dmp family_redline behavioral1/memory/1532-74-0x0000000005350000-0x000000000538E000-memory.dmp family_redline behavioral1/memory/1532-72-0x0000000005350000-0x000000000538E000-memory.dmp family_redline behavioral1/memory/1532-70-0x0000000005350000-0x000000000538E000-memory.dmp family_redline behavioral1/memory/1532-69-0x0000000005350000-0x000000000538E000-memory.dmp family_redline behavioral1/memory/1532-66-0x0000000005350000-0x000000000538E000-memory.dmp family_redline behavioral1/memory/1532-64-0x0000000005350000-0x000000000538E000-memory.dmp family_redline behavioral1/memory/1532-62-0x0000000005350000-0x000000000538E000-memory.dmp family_redline behavioral1/memory/1532-60-0x0000000005350000-0x000000000538E000-memory.dmp family_redline behavioral1/memory/1532-58-0x0000000005350000-0x000000000538E000-memory.dmp family_redline behavioral1/memory/1532-56-0x0000000005350000-0x000000000538E000-memory.dmp family_redline behavioral1/memory/1532-54-0x0000000005350000-0x000000000538E000-memory.dmp family_redline behavioral1/memory/1532-53-0x0000000005350000-0x000000000538E000-memory.dmp family_redline behavioral1/memory/1532-50-0x0000000005350000-0x000000000538E000-memory.dmp family_redline behavioral1/memory/1532-48-0x0000000005350000-0x000000000538E000-memory.dmp family_redline behavioral1/memory/1532-46-0x0000000005350000-0x000000000538E000-memory.dmp family_redline behavioral1/memory/1532-44-0x0000000005350000-0x000000000538E000-memory.dmp family_redline behavioral1/memory/1532-43-0x0000000005350000-0x000000000538E000-memory.dmp family_redline behavioral1/memory/1532-40-0x0000000005350000-0x000000000538E000-memory.dmp family_redline behavioral1/memory/1532-39-0x0000000005350000-0x000000000538E000-memory.dmp family_redline behavioral1/memory/1532-36-0x0000000005350000-0x000000000538E000-memory.dmp family_redline behavioral1/memory/1532-34-0x0000000005350000-0x000000000538E000-memory.dmp family_redline behavioral1/memory/1532-32-0x0000000005350000-0x000000000538E000-memory.dmp family_redline behavioral1/memory/1532-30-0x0000000005350000-0x000000000538E000-memory.dmp family_redline behavioral1/memory/1532-28-0x0000000005350000-0x000000000538E000-memory.dmp family_redline behavioral1/memory/1532-26-0x0000000005350000-0x000000000538E000-memory.dmp family_redline behavioral1/memory/1532-25-0x0000000005350000-0x000000000538E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3416 vHe15.exe 2556 vEI01.exe 1532 ddY54.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 227f1b9b6541d56956a83dd913d6ee39a7f6b915ebdb8478afdf27827773b795.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vHe15.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vEI01.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 227f1b9b6541d56956a83dd913d6ee39a7f6b915ebdb8478afdf27827773b795.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vHe15.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vEI01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddY54.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1532 ddY54.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3424 wrote to memory of 3416 3424 227f1b9b6541d56956a83dd913d6ee39a7f6b915ebdb8478afdf27827773b795.exe 85 PID 3424 wrote to memory of 3416 3424 227f1b9b6541d56956a83dd913d6ee39a7f6b915ebdb8478afdf27827773b795.exe 85 PID 3424 wrote to memory of 3416 3424 227f1b9b6541d56956a83dd913d6ee39a7f6b915ebdb8478afdf27827773b795.exe 85 PID 3416 wrote to memory of 2556 3416 vHe15.exe 86 PID 3416 wrote to memory of 2556 3416 vHe15.exe 86 PID 3416 wrote to memory of 2556 3416 vHe15.exe 86 PID 2556 wrote to memory of 1532 2556 vEI01.exe 87 PID 2556 wrote to memory of 1532 2556 vEI01.exe 87 PID 2556 wrote to memory of 1532 2556 vEI01.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\227f1b9b6541d56956a83dd913d6ee39a7f6b915ebdb8478afdf27827773b795.exe"C:\Users\Admin\AppData\Local\Temp\227f1b9b6541d56956a83dd913d6ee39a7f6b915ebdb8478afdf27827773b795.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vHe15.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vHe15.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vEI01.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vEI01.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ddY54.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ddY54.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
656KB
MD5942c9bedad0bf1c067147770d0b2408d
SHA1eb4e273d82f44dc5394988888e473d7a3cf03943
SHA2569a71a3348dfcd50371301fa67431838c483f284853a1cc4239ab36f9884d5fa6
SHA51287e064bb9e6c7babcb1c9a2d952f4d68d9b3cba790d81ba87050d86230a076264038b66c1526abdcbdbb809c85df1f53049ab2caa07b161d1362ebba22a8ec0d
-
Filesize
511KB
MD504370587245f829f291d5152699c9d0d
SHA11cb1f75e5ff8faa215a1c62afacecbd40445bfd1
SHA25621378ae1b816186a21a897a26d943f488090eab06a97e9ed3b3a5c0bfbc2ab02
SHA512055090971db619a6ae92ee6677317619a3d1a6c1d4c3dc582f0ef5c6320d4972ccc9a4d639cf4e454d986f3813e739730169b144d93c0cc342dbee486c1a0960
-
Filesize
287KB
MD5d8188b6e91a330ef924426abe7f1f9f8
SHA1980dad68e6d92724d8f3762ee094943390ed444a
SHA256b45b88fca18a6ca918d989de54ef418f9c4bc147df9c88f7d10fe8b85962f227
SHA51271e78e3d5ea8c1607c508ba8baa40ee66776530c452fd73e7fdbe30c6d0a738d28f9ddfb5f6cd8d6c8a9eabb3ebe9aa4aef269779b3b77cd908911e3ddcfb5b4