Analysis
-
max time kernel
137s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:35
Static task
static1
Behavioral task
behavioral1
Sample
ff829214af09a44d55ece9063aeca9e1feb4f92ea9d9d40930bc3513821ff757.exe
Resource
win10v2004-20241007-en
General
-
Target
ff829214af09a44d55ece9063aeca9e1feb4f92ea9d9d40930bc3513821ff757.exe
-
Size
850KB
-
MD5
f1a619e0dfcdb5bdd033ede25cbbf2b7
-
SHA1
574391da2eb837f04d184a3e2b110ee69d692dda
-
SHA256
ff829214af09a44d55ece9063aeca9e1feb4f92ea9d9d40930bc3513821ff757
-
SHA512
209f168ba7924fc650865817d02e2901401263bc52e22d5e5a8ad3f7cb4a0dd04876109860f5a5bc4640569187f18fb09b1a2eba0e79d64c54fb5fc12b38a64f
-
SSDEEP
12288:Qy90SFDMo0xLhG0GYapVO64ycI14erZloXxXaryQpe3TKjvfv+mmXF:QyjulLssfFI14erZlotay+vfv8XF
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dark
185.161.248.73:4164
-
auth_value
ae85b01f66afe8770afeed560513fc2d
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/4460-2170-0x0000000005740000-0x0000000005772000-memory.dmp family_redline behavioral1/files/0x0002000000022b11-2175.dat family_redline behavioral1/memory/4044-2183-0x00000000004B0000-0x00000000004DE000-memory.dmp family_redline behavioral1/files/0x000a000000023bb8-2194.dat family_redline behavioral1/memory/3516-2196-0x00000000002A0000-0x00000000002D0000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation p64008695.exe -
Executes dropped EXE 4 IoCs
pid Process 4608 y08230759.exe 4460 p64008695.exe 4044 1.exe 3516 r23073319.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ff829214af09a44d55ece9063aeca9e1feb4f92ea9d9d40930bc3513821ff757.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y08230759.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3576 4460 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff829214af09a44d55ece9063aeca9e1feb4f92ea9d9d40930bc3513821ff757.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y08230759.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language p64008695.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language r23073319.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4460 p64008695.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4484 wrote to memory of 4608 4484 ff829214af09a44d55ece9063aeca9e1feb4f92ea9d9d40930bc3513821ff757.exe 83 PID 4484 wrote to memory of 4608 4484 ff829214af09a44d55ece9063aeca9e1feb4f92ea9d9d40930bc3513821ff757.exe 83 PID 4484 wrote to memory of 4608 4484 ff829214af09a44d55ece9063aeca9e1feb4f92ea9d9d40930bc3513821ff757.exe 83 PID 4608 wrote to memory of 4460 4608 y08230759.exe 84 PID 4608 wrote to memory of 4460 4608 y08230759.exe 84 PID 4608 wrote to memory of 4460 4608 y08230759.exe 84 PID 4460 wrote to memory of 4044 4460 p64008695.exe 88 PID 4460 wrote to memory of 4044 4460 p64008695.exe 88 PID 4460 wrote to memory of 4044 4460 p64008695.exe 88 PID 4608 wrote to memory of 3516 4608 y08230759.exe 92 PID 4608 wrote to memory of 3516 4608 y08230759.exe 92 PID 4608 wrote to memory of 3516 4608 y08230759.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff829214af09a44d55ece9063aeca9e1feb4f92ea9d9d40930bc3513821ff757.exe"C:\Users\Admin\AppData\Local\Temp\ff829214af09a44d55ece9063aeca9e1feb4f92ea9d9d40930bc3513821ff757.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y08230759.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y08230759.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p64008695.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p64008695.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4460 -s 13804⤵
- Program crash
PID:3576
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r23073319.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r23073319.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3516
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4460 -ip 44601⤵PID:2592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
569KB
MD5a4b8b53792f8f589b50e7d5b374a9d65
SHA19579f55a9c7483cf4e2dc0c914a58076c5835330
SHA256d2f159bbe30d51e172dbe04f64b0baceb8e596450c4e06ffcf0c3bf7f0d9784d
SHA5129ed471bc7b2e9584ef5a6861a11a74da256323c0fdc3702a3de812b0abcf3804001f7fdd00cc2547e2cdea9020a5e46448cb5fb28a7c4e02984a1211ba0e24da
-
Filesize
488KB
MD5d82f9608fe80b602f5f1adf862349baa
SHA1d7e591a45daa4df84c11932ffc6e54b8aab33424
SHA25630f71fd57309cf681cde1c19cd9a516fda34a636c3c07766b599c5d25991d8d0
SHA512422f3e85888a805a05667a5db3d247f6072ff0e3373c93dc7d499b033c66b93fad8d823c9cf8d6105293e757dff8ac375fda910e040a9d486b343862d9119536
-
Filesize
172KB
MD52b4fbcae4f938443c8c531639a60841d
SHA12ce05cc80a6f8f7903af00d688da0d9762da77e3
SHA2561db0dd07425cbe33ca8e064115d4f0b852b036c5a58b46f3ce4842b722bcf05e
SHA5120e997dea1d73e4d5b2cc711be82e0d92a17cc708dd60d0856138163be1da5d4d2f6f745cf9e2087c03a9767dc7f59a657c010010619f77466dee6a9ea3919a68
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf