Analysis
-
max time kernel
134s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:32
Static task
static1
Behavioral task
behavioral1
Sample
aa1478441fd4bc715338f2fd85b4dc85.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
aa1478441fd4bc715338f2fd85b4dc85.exe
Resource
win10v2004-20241007-en
General
-
Target
aa1478441fd4bc715338f2fd85b4dc85.exe
-
Size
719KB
-
MD5
aa1478441fd4bc715338f2fd85b4dc85
-
SHA1
32a1d11dab5a9e31f3f9c0bdf20d7aff83a671f4
-
SHA256
e1e5b0c1a6e6bd88494c11fe5e9db4d3c12d27c2ce909070eadb68f609bddf0b
-
SHA512
79c1fa2558653a9ca390d736538fec761694a5ab3f26e1cc45df2f94ab6452df5ef68da8e2e7efe9f8df307dee17696a28c202bd81db828e5994abab1217aa33
-
SSDEEP
12288:kgBtLZA7fsuwp1ZFNi2IEiCBq9TsfcXLnx0/TW5PudT+BZk0wrXfzOd2IBdKWT:kqtLZA7fjEiCBqx6gLoTW5nk0abOkQ
Malware Config
Extracted
redline
76
139.99.32.83:43199
-
auth_value
44d461325298129ed3c705440f57962c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/3692-3-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Redline family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4204 set thread context of 3692 4204 aa1478441fd4bc715338f2fd85b4dc85.exe 86 -
Program crash 1 IoCs
pid pid_target Process procid_target 4496 4204 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa1478441fd4bc715338f2fd85b4dc85.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4204 aa1478441fd4bc715338f2fd85b4dc85.exe 4204 aa1478441fd4bc715338f2fd85b4dc85.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4204 wrote to memory of 3692 4204 aa1478441fd4bc715338f2fd85b4dc85.exe 86 PID 4204 wrote to memory of 3692 4204 aa1478441fd4bc715338f2fd85b4dc85.exe 86 PID 4204 wrote to memory of 3692 4204 aa1478441fd4bc715338f2fd85b4dc85.exe 86 PID 4204 wrote to memory of 3692 4204 aa1478441fd4bc715338f2fd85b4dc85.exe 86 PID 4204 wrote to memory of 3692 4204 aa1478441fd4bc715338f2fd85b4dc85.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa1478441fd4bc715338f2fd85b4dc85.exe"C:\Users\Admin\AppData\Local\Temp\aa1478441fd4bc715338f2fd85b4dc85.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4204 -s 2882⤵
- Program crash
PID:4496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4204 -ip 42041⤵PID:2672