Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 00:11
Static task
static1
Behavioral task
behavioral1
Sample
3d061fe6ea7c659f708b7a6362d091a7b66dc0e9b137d158a9708867dceacbcf.exe
Resource
win10v2004-20241007-en
General
-
Target
3d061fe6ea7c659f708b7a6362d091a7b66dc0e9b137d158a9708867dceacbcf.exe
-
Size
583KB
-
MD5
391519caabff32f6aecf1332a3c799a9
-
SHA1
5da5530fe60ce0fdea1fbf694ece966afc330e97
-
SHA256
3d061fe6ea7c659f708b7a6362d091a7b66dc0e9b137d158a9708867dceacbcf
-
SHA512
3539ed3feaeeb53d8de2c2cd2d0da3261e02727de735b87270a3e4f83d650758fcea7622819c3bd05429d0c0b638ab2b3c186bb60613e773c0e77dbb38d870cf
-
SSDEEP
12288:YMrgy903yDIZ8VrySr0c3N5iz91GajAJ3jhjoljbsU:oyG8IOV2+3riz91hi3jhKjN
Malware Config
Extracted
redline
ronam
193.233.20.17:4139
-
auth_value
125421d19d14dd7fd211bc7f6d4aea6c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2320-19-0x0000000002650000-0x0000000002696000-memory.dmp family_redline behavioral1/memory/2320-21-0x0000000004B80000-0x0000000004BC4000-memory.dmp family_redline behavioral1/memory/2320-83-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2320-85-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2320-81-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2320-77-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2320-75-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2320-74-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2320-71-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2320-69-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2320-67-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2320-65-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2320-63-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2320-61-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2320-59-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2320-55-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2320-53-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2320-51-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2320-49-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2320-47-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2320-45-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2320-43-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2320-41-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2320-39-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2320-37-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2320-35-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2320-33-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2320-31-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2320-29-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2320-27-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2320-25-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2320-23-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2320-22-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2320-79-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2320-57-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 2976 dRh8123.exe 2320 nKr30HV.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3d061fe6ea7c659f708b7a6362d091a7b66dc0e9b137d158a9708867dceacbcf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" dRh8123.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3d061fe6ea7c659f708b7a6362d091a7b66dc0e9b137d158a9708867dceacbcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dRh8123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nKr30HV.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2320 nKr30HV.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2976 2196 3d061fe6ea7c659f708b7a6362d091a7b66dc0e9b137d158a9708867dceacbcf.exe 83 PID 2196 wrote to memory of 2976 2196 3d061fe6ea7c659f708b7a6362d091a7b66dc0e9b137d158a9708867dceacbcf.exe 83 PID 2196 wrote to memory of 2976 2196 3d061fe6ea7c659f708b7a6362d091a7b66dc0e9b137d158a9708867dceacbcf.exe 83 PID 2976 wrote to memory of 2320 2976 dRh8123.exe 84 PID 2976 wrote to memory of 2320 2976 dRh8123.exe 84 PID 2976 wrote to memory of 2320 2976 dRh8123.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d061fe6ea7c659f708b7a6362d091a7b66dc0e9b137d158a9708867dceacbcf.exe"C:\Users\Admin\AppData\Local\Temp\3d061fe6ea7c659f708b7a6362d091a7b66dc0e9b137d158a9708867dceacbcf.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dRh8123.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dRh8123.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nKr30HV.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nKr30HV.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2320
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
438KB
MD58b50f9fa872eb105211adb32b500123d
SHA108d0c9522ae20de3da77b2ca8ac25ccd41001d91
SHA256f57d6db997d1ab17b5e10e7a256de46482c25b2351179f9053fd27e2e794e2a9
SHA5123ba1049ca584efb0969723d1ecca655f8aae06a97e5f44d64ac8b026719df2c959a37c2690713e4c8c68b3cdb6fc56c4f54628d3f5dc5abd7a355cea15ad182a
-
Filesize
301KB
MD5b7310010d403a432b2b24fbc525c2c27
SHA1b6ad682dea1b768201d9fa3d9c0a0be4df3aff8a
SHA256ac7685b8203387f790d8dab34f74a0218eb59367c86cf9467364afce9647d391
SHA512e1fe5f38e9e00f66b54e3f85c61808e7c0b4e5109368c555e0b8f20fded47fa9e05a8ac9420752128dad12bdccaa80126427b1cb15e6052018922d7ee29c2ca6