Analysis
-
max time kernel
132s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 21:10
Static task
static1
Behavioral task
behavioral1
Sample
84a46b45248d9574c67b244a675456730160b3e6f235df40178e3ce56957b3cc.exe
Resource
win10v2004-20241007-en
General
-
Target
84a46b45248d9574c67b244a675456730160b3e6f235df40178e3ce56957b3cc.exe
-
Size
480KB
-
MD5
128873a8aa140e222e79ca1b9a913f01
-
SHA1
d6b69c29ceeb681784d4eb0871f3c17c34d09ff7
-
SHA256
84a46b45248d9574c67b244a675456730160b3e6f235df40178e3ce56957b3cc
-
SHA512
6448b54630c3784029cf4e59f31846881b08f44db52631d1464fcc623554507ad247efd2eeecd9cdb1573597b9539201e4854f2be7cdfd852ce69ccc38680956
-
SSDEEP
12288:GMr2y90wRhs/aqj9yHTCXifKNfuDM38r5pxj6o9:cy1FVfa8rBj7
Malware Config
Extracted
redline
dariy
217.196.96.101:4132
-
auth_value
2f34aa0d1cb1023a826825b68ebedcc8
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023ca6-12.dat family_redline behavioral1/memory/3148-15-0x00000000007C0000-0x00000000007EE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 4900 x5060541.exe 3148 g2612912.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x5060541.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 84a46b45248d9574c67b244a675456730160b3e6f235df40178e3ce56957b3cc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84a46b45248d9574c67b244a675456730160b3e6f235df40178e3ce56957b3cc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x5060541.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g2612912.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1320 wrote to memory of 4900 1320 84a46b45248d9574c67b244a675456730160b3e6f235df40178e3ce56957b3cc.exe 83 PID 1320 wrote to memory of 4900 1320 84a46b45248d9574c67b244a675456730160b3e6f235df40178e3ce56957b3cc.exe 83 PID 1320 wrote to memory of 4900 1320 84a46b45248d9574c67b244a675456730160b3e6f235df40178e3ce56957b3cc.exe 83 PID 4900 wrote to memory of 3148 4900 x5060541.exe 84 PID 4900 wrote to memory of 3148 4900 x5060541.exe 84 PID 4900 wrote to memory of 3148 4900 x5060541.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\84a46b45248d9574c67b244a675456730160b3e6f235df40178e3ce56957b3cc.exe"C:\Users\Admin\AppData\Local\Temp\84a46b45248d9574c67b244a675456730160b3e6f235df40178e3ce56957b3cc.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5060541.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5060541.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g2612912.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g2612912.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3148
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD5dfce9a177627dca5652fd55eda99aa43
SHA1e529de037fd3308c7a5f454d709dc1d90a074605
SHA256a56476dfa902e939a54d2758a494a413c987d0a1705d2dbd200c1be3b059ab05
SHA512645b883dde5e9bd26aaab3ebeda2003756b88b3fe389f685d4b572f244c327bedf6eeab167d36458e27043734f517e0ba73541016f2159733070256f5f643346
-
Filesize
168KB
MD51ad875cc12c86e6cfa58fa3d96f444b0
SHA1c053414f6734217c90493c67bdcf96408e3ecda2
SHA2564639edc26f8561514a8049d3a8ab0ba5458458a222115c8d86bc3c85f1175c77
SHA51282fcb86548a4d7351e7098d998522b129205fd612027e00c5743c1a4bfb405c5d116e2b191f84a58ee456c53f7e97fbe776a7607b3d80fc392f057283d81ada3