Analysis
-
max time kernel
136s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 16:40
Static task
static1
Behavioral task
behavioral1
Sample
d03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f.exe
Resource
win10v2004-20241007-en
General
-
Target
d03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f.exe
-
Size
793KB
-
MD5
f8f30664ab748bcd3257c54ad9730d90
-
SHA1
48fb7a8650a8c78e8663aacb48b0dd2ec5c95b2b
-
SHA256
d03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f
-
SHA512
4e677859813c2cbe2f20806e0796df70ed4d5767f1a02906903ad585a4402a9d887bf7ce0917c33c9ca9d16217fb178203890926a21c9006b5be18867a5d6cf1
-
SSDEEP
24576:7y8B4nQYkTwtnfRSHmLPOy8aoJGPJ+0TjE:u8inQYWwtfoQ+qg0Tj
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dante
185.161.248.73:4164
-
auth_value
f4066af6b8a6f23125c8ee48288a3f90
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3228-2169-0x00000000059D0000-0x0000000005A02000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/1108-2182-0x0000000000AB0000-0x0000000000ADE000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n35292321.exe family_redline behavioral1/memory/2376-2196-0x0000000000140000-0x0000000000170000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
m41589402.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation m41589402.exe -
Executes dropped EXE 4 IoCs
Processes:
x74298284.exem41589402.exe1.exen35292321.exepid process 3688 x74298284.exe 3228 m41589402.exe 1108 1.exe 2376 n35292321.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
d03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f.exex74298284.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x74298284.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5620 3228 WerFault.exe m41589402.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1.exen35292321.exed03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f.exex74298284.exem41589402.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language n35292321.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x74298284.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m41589402.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
m41589402.exedescription pid process Token: SeDebugPrivilege 3228 m41589402.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
d03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f.exex74298284.exem41589402.exedescription pid process target process PID 2696 wrote to memory of 3688 2696 d03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f.exe x74298284.exe PID 2696 wrote to memory of 3688 2696 d03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f.exe x74298284.exe PID 2696 wrote to memory of 3688 2696 d03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f.exe x74298284.exe PID 3688 wrote to memory of 3228 3688 x74298284.exe m41589402.exe PID 3688 wrote to memory of 3228 3688 x74298284.exe m41589402.exe PID 3688 wrote to memory of 3228 3688 x74298284.exe m41589402.exe PID 3228 wrote to memory of 1108 3228 m41589402.exe 1.exe PID 3228 wrote to memory of 1108 3228 m41589402.exe 1.exe PID 3228 wrote to memory of 1108 3228 m41589402.exe 1.exe PID 3688 wrote to memory of 2376 3688 x74298284.exe n35292321.exe PID 3688 wrote to memory of 2376 3688 x74298284.exe n35292321.exe PID 3688 wrote to memory of 2376 3688 x74298284.exe n35292321.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f.exe"C:\Users\Admin\AppData\Local\Temp\d03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x74298284.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x74298284.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m41589402.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m41589402.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3228 -s 13844⤵
- Program crash
PID:5620
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n35292321.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n35292321.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2376
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3228 -ip 32281⤵PID:1216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
589KB
MD5cb41c6e952481d4e96ba50bb3238801e
SHA13f17ec63a15c00d4817b1389125b2d2053c2214b
SHA2568f874483608cbefe8b0e4756d2910723da33f39e78517d5f836352de21b15f1d
SHA5125abcb76819f5ab2470c4d2541e2b6b1aacb4a36fc3f34fc07f905e8766415f76a09e4f3c0417955877834365a552f3d72c7a9c592376d2fd878d3bc9b1fed297
-
Filesize
530KB
MD5b6e710dc31b22a2ae7b95e608fbf0b49
SHA117c57aa64000101a6a07243dddcbfb7a40b6c7c7
SHA2562b5b193a586589d4859c51c7de90285fa7a2d67a41320815407b6728f6209c98
SHA512bf22415a119fe048976da31848885120ec8ff261aa2a9bec5783ff25a8a26d14985271771422dd4640f9860c1edace4504732238babfa54cc9cb71e149519988
-
Filesize
168KB
MD5a26df3463c07ca67c9ce51514ab74df7
SHA1368aea0bbc1210a7fb03c26c10648755c99a575d
SHA2564a987ff1d80f70211010889f3969863eccd2804d2b32424eae5a6af4a6a1d866
SHA512dca64ac7921b256ff9aa81722378655e7f709c8a4d2669bf49ef56ba591b64c28aea5c5035cd6bea15d1e8715f0a91553b7f00078bdfbc584817ea283ee8c451
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf