Analysis
-
max time kernel
135s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 15:01
Static task
static1
Behavioral task
behavioral1
Sample
cfeec8bf555af14d308fd30d719d80d8e8d1b2c4626c7535b12a52bf701d2080.exe
Resource
win10v2004-20241007-en
General
-
Target
cfeec8bf555af14d308fd30d719d80d8e8d1b2c4626c7535b12a52bf701d2080.exe
-
Size
774KB
-
MD5
6263bfcc690186c0204d826bc7f3db9a
-
SHA1
56ed350b22e150312204b6c4209e8d9143526ec5
-
SHA256
cfeec8bf555af14d308fd30d719d80d8e8d1b2c4626c7535b12a52bf701d2080
-
SHA512
146e182988114ee0f745c195a1a640828ec85f13ef7d8a291f702745d6d967fd5a21d5df2f48ef0b9b58ec99c919f54eeb1ea2a954be944c4d668d82bef4c458
-
SSDEEP
12288:6y90RnxF8+A0C/k87O0NVmPOSvAIh/73aZ4K7Kv40uWc4bzqBCuR+8WYmQtSANWx:6ywnxm50CZ5NVDSoINDyB4bbuE8RWRL
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dante
185.161.248.73:4164
-
auth_value
f4066af6b8a6f23125c8ee48288a3f90
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/3324-2168-0x0000000005620000-0x0000000005652000-memory.dmp family_redline behavioral1/files/0x0002000000022ae8-2173.dat family_redline behavioral1/memory/2780-2184-0x0000000000A00000-0x0000000000A2E000-memory.dmp family_redline behavioral1/files/0x0008000000023c33-2187.dat family_redline behavioral1/memory/3692-2189-0x0000000000B90000-0x0000000000BC0000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation m52548086.exe -
Executes dropped EXE 4 IoCs
pid Process 824 x87660232.exe 3324 m52548086.exe 2780 1.exe 3692 n48326918.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cfeec8bf555af14d308fd30d719d80d8e8d1b2c4626c7535b12a52bf701d2080.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x87660232.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cfeec8bf555af14d308fd30d719d80d8e8d1b2c4626c7535b12a52bf701d2080.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x87660232.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m52548086.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language n48326918.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3324 m52548086.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2436 wrote to memory of 824 2436 cfeec8bf555af14d308fd30d719d80d8e8d1b2c4626c7535b12a52bf701d2080.exe 83 PID 2436 wrote to memory of 824 2436 cfeec8bf555af14d308fd30d719d80d8e8d1b2c4626c7535b12a52bf701d2080.exe 83 PID 2436 wrote to memory of 824 2436 cfeec8bf555af14d308fd30d719d80d8e8d1b2c4626c7535b12a52bf701d2080.exe 83 PID 824 wrote to memory of 3324 824 x87660232.exe 84 PID 824 wrote to memory of 3324 824 x87660232.exe 84 PID 824 wrote to memory of 3324 824 x87660232.exe 84 PID 3324 wrote to memory of 2780 3324 m52548086.exe 89 PID 3324 wrote to memory of 2780 3324 m52548086.exe 89 PID 3324 wrote to memory of 2780 3324 m52548086.exe 89 PID 824 wrote to memory of 3692 824 x87660232.exe 91 PID 824 wrote to memory of 3692 824 x87660232.exe 91 PID 824 wrote to memory of 3692 824 x87660232.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\cfeec8bf555af14d308fd30d719d80d8e8d1b2c4626c7535b12a52bf701d2080.exe"C:\Users\Admin\AppData\Local\Temp\cfeec8bf555af14d308fd30d719d80d8e8d1b2c4626c7535b12a52bf701d2080.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x87660232.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x87660232.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m52548086.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m52548086.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2780
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n48326918.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n48326918.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3692
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
570KB
MD5acb772c5713f0dc4f1751c033f4e01b3
SHA1e8d4a9daaafdc9e4824ea3745f3f9eb83a192cce
SHA256cdd9558d15f1611758b5dae0f3b0f7caea01431809b6a40c60fd7055646ab2a9
SHA51259631a6ce10738798f29160463a214e7eab76482b8c36098b3994ab6d1886222641fe5410c19bfd5f12b345edcbdd86c051312a9b41c1439196ed9108bea3e20
-
Filesize
476KB
MD5a31b3bd5fbf6b1f7eee96ed9c216fc50
SHA197e1699c68904d06ab053e0ad5703170da1f0339
SHA256a9b36517ecd2404b444261165913a35c61487c5a8b034ef2b479cec8d40116f3
SHA51232bf5a6e57ebcd26f3b851591e7454605e32c6d6ae0e8796c44e97aaf763c192ee431635ea52fe1b9d6cbfccccd8c7071d0aa40c53179160f63b5f285e5b63a1
-
Filesize
169KB
MD54b03d6510cc9c7fa86a8378c3d7b7a13
SHA1fd74c89f653f3f29820551ee35f4b72cc3859c80
SHA2567465193c17dbad142c3f86881fc09e129033a5fa861995e5fc307a16dde77751
SHA512ef3760e8b5f40afeb3760cbc764dae56c5f7cb87ff19af60b802b9d6b60e597c3358c07d7c197d9087b2dbbb2a0812e7e2ac5b2637c9e736a5c70abc636db252
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf