Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 00:14
Static task
static1
Behavioral task
behavioral1
Sample
70207c1fd2be3b308576f1ffe746b469398f0e043a2d1b540100f2e5e97970d5.exe
Resource
win10v2004-20241007-en
General
-
Target
70207c1fd2be3b308576f1ffe746b469398f0e043a2d1b540100f2e5e97970d5.exe
-
Size
585KB
-
MD5
a8d453e760ab21f380e96e86589923ef
-
SHA1
bfdbbe303b86e97eba49ff04e4d870647f9b504a
-
SHA256
70207c1fd2be3b308576f1ffe746b469398f0e043a2d1b540100f2e5e97970d5
-
SHA512
b61061efbd2b315ceb2ef3a7dd4c94ae3bad8a6a8ee768ee7f664ccb3bf55caf3a67f7eaa3a80caf6b0e06f1cd9b7a1a66b22e2794eeb164d2b00d6cf51de3d3
-
SSDEEP
12288:9Mrmy90+jL9+Vj5fS082Ly4WYv3EQpU1AMMEyaOAbTa3Nf38K:ryP9+VtfSA/Nv3EzNyaOAqN/n
Malware Config
Extracted
redline
ronur
193.233.20.20:4134
-
auth_value
f88f86755a528d4b25f6f3628c460965
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1056-19-0x00000000026B0000-0x00000000026F6000-memory.dmp family_redline behavioral1/memory/1056-21-0x0000000002760000-0x00000000027A4000-memory.dmp family_redline behavioral1/memory/1056-67-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1056-79-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1056-85-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1056-83-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1056-78-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1056-75-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1056-73-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1056-71-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1056-69-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1056-65-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1056-63-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1056-62-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1056-59-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1056-57-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1056-55-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1056-53-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1056-51-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1056-49-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1056-47-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1056-45-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1056-41-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1056-39-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1056-38-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1056-35-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1056-34-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1056-31-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1056-29-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1056-27-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1056-81-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1056-43-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1056-25-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1056-23-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1056-22-0x0000000002760000-0x000000000279E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 4896 stT4947.exe 1056 nGg16PW.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 70207c1fd2be3b308576f1ffe746b469398f0e043a2d1b540100f2e5e97970d5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" stT4947.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 70207c1fd2be3b308576f1ffe746b469398f0e043a2d1b540100f2e5e97970d5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stT4947.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nGg16PW.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1056 nGg16PW.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1272 wrote to memory of 4896 1272 70207c1fd2be3b308576f1ffe746b469398f0e043a2d1b540100f2e5e97970d5.exe 84 PID 1272 wrote to memory of 4896 1272 70207c1fd2be3b308576f1ffe746b469398f0e043a2d1b540100f2e5e97970d5.exe 84 PID 1272 wrote to memory of 4896 1272 70207c1fd2be3b308576f1ffe746b469398f0e043a2d1b540100f2e5e97970d5.exe 84 PID 4896 wrote to memory of 1056 4896 stT4947.exe 85 PID 4896 wrote to memory of 1056 4896 stT4947.exe 85 PID 4896 wrote to memory of 1056 4896 stT4947.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\70207c1fd2be3b308576f1ffe746b469398f0e043a2d1b540100f2e5e97970d5.exe"C:\Users\Admin\AppData\Local\Temp\70207c1fd2be3b308576f1ffe746b469398f0e043a2d1b540100f2e5e97970d5.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\stT4947.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\stT4947.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nGg16PW.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nGg16PW.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1056
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
439KB
MD5fe796cf28d88557cccd5fdb3572c10d9
SHA1b8befa70bc9c7a339318eb15ca3d9f550bef1017
SHA2569e05cb7ca1c48099815ff3763c67a9f5d20dcd2fa85eba596fdbfa0e9b4c9a1d
SHA51287b671317ec45089e675e6ac3c69d55448c9d78a7d0d167c1ba18fd0cee9a7b87415b2e93cdd8a6c16a2042c553baf1205b1f158dd69e117430963c077e7ea96
-
Filesize
313KB
MD5478141159f8781bd6901b5c2ec2a6e2f
SHA195732efeb6ff886a38cf81cd310f183587222e04
SHA256785755222a312d20469e673184727d6744809e9fadc13ed126a7c8d127f0d6f9
SHA512737611e19589fbb61b48f03a3de7cd205b73764a8b608c94c8f3eaf84afc00ededf30f7fa6dd16a9f0a1e7a60f48a7c78531b39ecb544c3dd9d94d8e978e9da9