Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:37
Static task
static1
Behavioral task
behavioral1
Sample
7e4c2237a70f78c195df57cef0ee08ddeee1d75a2e3c8a97cc0d7f03c4829e38.exe
Resource
win10v2004-20241007-en
General
-
Target
7e4c2237a70f78c195df57cef0ee08ddeee1d75a2e3c8a97cc0d7f03c4829e38.exe
-
Size
570KB
-
MD5
4a1b055750bde84fecd3e19ecd3b0076
-
SHA1
18cd0e3279bf35c79b0cfa73196649f04a219619
-
SHA256
7e4c2237a70f78c195df57cef0ee08ddeee1d75a2e3c8a97cc0d7f03c4829e38
-
SHA512
366cf0f8101940e07dd25d7a35676275e7f6c09831fcebf508e77a1927fe2ffca95349d88b96e2a335230e2eea98fe11ba375a88bd6f35c0adf7c0416eaf42c5
-
SSDEEP
12288:zMrLy90pYMhg1SDJvInR4oZQqGStRRpVC2VSiZTfsE:ky+ndtQR4oZQYfiqBZ7l
Malware Config
Extracted
redline
ronam
193.233.20.17:4139
-
auth_value
125421d19d14dd7fd211bc7f6d4aea6c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3252-19-0x00000000024B0000-0x00000000024F6000-memory.dmp family_redline behavioral1/memory/3252-21-0x00000000051B0000-0x00000000051F4000-memory.dmp family_redline behavioral1/memory/3252-85-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/3252-83-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/3252-82-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/3252-79-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/3252-77-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/3252-75-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/3252-73-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/3252-71-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/3252-69-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/3252-67-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/3252-65-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/3252-61-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/3252-59-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/3252-57-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/3252-55-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/3252-53-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/3252-51-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/3252-49-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/3252-47-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/3252-45-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/3252-43-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/3252-41-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/3252-39-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/3252-37-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/3252-35-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/3252-33-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/3252-31-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/3252-29-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/3252-27-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/3252-63-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/3252-25-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/3252-23-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/3252-22-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 2028 nNJ14Ur35.exe 3252 eZV83oW.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7e4c2237a70f78c195df57cef0ee08ddeee1d75a2e3c8a97cc0d7f03c4829e38.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nNJ14Ur35.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eZV83oW.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7e4c2237a70f78c195df57cef0ee08ddeee1d75a2e3c8a97cc0d7f03c4829e38.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nNJ14Ur35.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3252 eZV83oW.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4992 wrote to memory of 2028 4992 7e4c2237a70f78c195df57cef0ee08ddeee1d75a2e3c8a97cc0d7f03c4829e38.exe 85 PID 4992 wrote to memory of 2028 4992 7e4c2237a70f78c195df57cef0ee08ddeee1d75a2e3c8a97cc0d7f03c4829e38.exe 85 PID 4992 wrote to memory of 2028 4992 7e4c2237a70f78c195df57cef0ee08ddeee1d75a2e3c8a97cc0d7f03c4829e38.exe 85 PID 2028 wrote to memory of 3252 2028 nNJ14Ur35.exe 86 PID 2028 wrote to memory of 3252 2028 nNJ14Ur35.exe 86 PID 2028 wrote to memory of 3252 2028 nNJ14Ur35.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e4c2237a70f78c195df57cef0ee08ddeee1d75a2e3c8a97cc0d7f03c4829e38.exe"C:\Users\Admin\AppData\Local\Temp\7e4c2237a70f78c195df57cef0ee08ddeee1d75a2e3c8a97cc0d7f03c4829e38.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nNJ14Ur35.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nNJ14Ur35.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eZV83oW.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eZV83oW.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3252
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425KB
MD5257c2eb49f4e29cad1b948297399292d
SHA1408512332fdc15b1947e38896e48e09ce77b313b
SHA2560aeb02ab692cf91044390763c93d000c6c43e13dce95a17c951abcc2aea0b51a
SHA512fa6231d5f5e9b302e950db7b6cd878412e787ca4af874777493fd9059df6c5fec523b162eac90a308353f88ced2f3951d86918750c43f8f5f12dc778f0ae934b
-
Filesize
277KB
MD5444008956d19b2d37e0e2c25888548b0
SHA10b64e74e3c648f0a9023fe2308a3ab7b13607ad3
SHA256b4eedc40338b319b5527d55f9f50d8941fb4905a464a2babf2036492aaa4d94b
SHA5121a00813b1f3d64613b8d57f0e70c09980b07c3c23f86bfbbf3f677a2eac15405e150a512e542703d044f2713f98de91550c5dd2717cbec80ecbc1e59878cce74