Analysis
-
max time kernel
132s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 02:33
Static task
static1
Behavioral task
behavioral1
Sample
ca21048767395905b9c6dd242c18cf05a86b0c70576d8a66e974f835648ee160.exe
Resource
win10v2004-20241007-en
General
-
Target
ca21048767395905b9c6dd242c18cf05a86b0c70576d8a66e974f835648ee160.exe
-
Size
479KB
-
MD5
ea3869096e4c36e76044fe77068064ef
-
SHA1
0b6359a24dc32a4684859f0bbb16aaf417d0394b
-
SHA256
ca21048767395905b9c6dd242c18cf05a86b0c70576d8a66e974f835648ee160
-
SHA512
e2d7cbb1073cde966124cd82b48303a50dffd279bf829cb3430f6a3d7bd9c85f6d5efcb328835cd09f6864bb920893cd761fd4f806cb02bf122da6f146800af9
-
SSDEEP
12288:JMrcy908ErXs4YGK9roGthHZ5HJeOaB0Ek:5yFErX9Yh9om5pJelBxk
Malware Config
Extracted
redline
diwer
217.196.96.101:4132
-
auth_value
42abfa9e4f2e290c8bdbc776fd9bb6ad
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023cbe-12.dat family_redline behavioral1/memory/4864-15-0x00000000005C0000-0x00000000005F0000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 4276 x6892095.exe 4864 g1504054.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ca21048767395905b9c6dd242c18cf05a86b0c70576d8a66e974f835648ee160.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x6892095.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x6892095.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g1504054.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ca21048767395905b9c6dd242c18cf05a86b0c70576d8a66e974f835648ee160.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 808 wrote to memory of 4276 808 ca21048767395905b9c6dd242c18cf05a86b0c70576d8a66e974f835648ee160.exe 83 PID 808 wrote to memory of 4276 808 ca21048767395905b9c6dd242c18cf05a86b0c70576d8a66e974f835648ee160.exe 83 PID 808 wrote to memory of 4276 808 ca21048767395905b9c6dd242c18cf05a86b0c70576d8a66e974f835648ee160.exe 83 PID 4276 wrote to memory of 4864 4276 x6892095.exe 84 PID 4276 wrote to memory of 4864 4276 x6892095.exe 84 PID 4276 wrote to memory of 4864 4276 x6892095.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca21048767395905b9c6dd242c18cf05a86b0c70576d8a66e974f835648ee160.exe"C:\Users\Admin\AppData\Local\Temp\ca21048767395905b9c6dd242c18cf05a86b0c70576d8a66e974f835648ee160.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6892095.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6892095.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g1504054.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g1504054.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4864
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD5b9afd3638633c2de4f0aed406e5d5800
SHA1b60898d5652874731935c64490ab26aeeb8c1066
SHA25614d1afa350dbc798dff9696c2f06d4453657b8588a9aa4bd875a4f996414c457
SHA5125b97d359f0cd80bb0d17b18f7d5c50374eb98f303b3313989b6e3cd8c3e97dcab6df55be582abe27ece479425fc2eb7bd798cccdd880b574e21631c8592bd310
-
Filesize
168KB
MD523d32f5946972aa9075f2e1e8ac1aa9d
SHA1e2775c594a9b307e1290f740354aba104ff5333a
SHA256e8440ef3f8fd8af68e87fa67daa55b41b8fc114c83b5bed94dd4dcd3b6254ca2
SHA512aedd4977e11fc6050ef99e4d697dc43a26a0fda100d5e2a8d953cde560a75e9a365f57b81aac68c70db5cf8bca352d71c304c7afb1051ef48e8f6ebb6aa0efad