Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 02:38
Static task
static1
Behavioral task
behavioral1
Sample
bc57b5cb39eb92c0e32de026c3845e3c1227bbc18510bd87464563db8a2d2252.exe
Resource
win10v2004-20241007-en
General
-
Target
bc57b5cb39eb92c0e32de026c3845e3c1227bbc18510bd87464563db8a2d2252.exe
-
Size
583KB
-
MD5
9ea5f36d55ccabbc67e2fe7221478768
-
SHA1
249ce089e1c60b08a3cd84007f8ff9991c241954
-
SHA256
bc57b5cb39eb92c0e32de026c3845e3c1227bbc18510bd87464563db8a2d2252
-
SHA512
dd84e1c8aee44ae40b7870f8b7553ba552db198890fcc9629280ce06eff62249b50e1c3785594cb0a1ca16f4b8a6437029573e92bfd068f5c8a49a385817b68d
-
SSDEEP
12288:sMr6y90ea3VpqNQTSWpJHiyOBn/Bf55ksR0sHQLXPvS:myP6V0WTrpJghks+t/vS
Malware Config
Extracted
redline
ronam
193.233.20.17:4139
-
auth_value
125421d19d14dd7fd211bc7f6d4aea6c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4624-19-0x00000000026A0000-0x00000000026E6000-memory.dmp family_redline behavioral1/memory/4624-21-0x0000000004B80000-0x0000000004BC4000-memory.dmp family_redline behavioral1/memory/4624-43-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/4624-63-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/4624-85-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/4624-83-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/4624-81-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/4624-77-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/4624-76-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/4624-73-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/4624-71-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/4624-69-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/4624-67-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/4624-65-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/4624-61-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/4624-59-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/4624-57-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/4624-55-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/4624-53-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/4624-51-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/4624-49-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/4624-47-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/4624-45-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/4624-41-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/4624-37-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/4624-35-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/4624-33-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/4624-31-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/4624-29-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/4624-27-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/4624-79-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/4624-25-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/4624-23-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/4624-22-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/4624-39-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 3092 dJU2755.exe 4624 nma23tD.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bc57b5cb39eb92c0e32de026c3845e3c1227bbc18510bd87464563db8a2d2252.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" dJU2755.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc57b5cb39eb92c0e32de026c3845e3c1227bbc18510bd87464563db8a2d2252.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dJU2755.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nma23tD.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4624 nma23tD.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4552 wrote to memory of 3092 4552 bc57b5cb39eb92c0e32de026c3845e3c1227bbc18510bd87464563db8a2d2252.exe 83 PID 4552 wrote to memory of 3092 4552 bc57b5cb39eb92c0e32de026c3845e3c1227bbc18510bd87464563db8a2d2252.exe 83 PID 4552 wrote to memory of 3092 4552 bc57b5cb39eb92c0e32de026c3845e3c1227bbc18510bd87464563db8a2d2252.exe 83 PID 3092 wrote to memory of 4624 3092 dJU2755.exe 84 PID 3092 wrote to memory of 4624 3092 dJU2755.exe 84 PID 3092 wrote to memory of 4624 3092 dJU2755.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc57b5cb39eb92c0e32de026c3845e3c1227bbc18510bd87464563db8a2d2252.exe"C:\Users\Admin\AppData\Local\Temp\bc57b5cb39eb92c0e32de026c3845e3c1227bbc18510bd87464563db8a2d2252.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dJU2755.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dJU2755.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nma23tD.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nma23tD.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4624
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
438KB
MD5ff4765e9177a8ac850c5d84f018ebb91
SHA1ca1660cd250e253ad51137ce4281d57e7e51bfc8
SHA2563eab0844bff7f8d902372d2037990bedb965b1503ce48bbacf501bd2b3acfe6e
SHA512ae0a516571b2ce40ee20eb8033704b56be34bdbee7d592bbc55c168787c5ffb4cb4eb5603295ed19f43a152fadb8305a10e3c5da202989a32de1095b1e39e21d
-
Filesize
311KB
MD53637cdcc4b9c12af816198239f22e8fd
SHA1dfee890f924daae3766693f05a4bf42a1db238c5
SHA2560044f6188d7991e823c5711df5b30b2f8f79feccf26d7eff1ba81463c45d5a24
SHA512b17fc11159b66e4f5573321c38b91fc742e9fe99212ba3dc25e2528c5754dc1192ac614738ede49e8204b12fde0c1b0275516cdd548980279ac8964edff97428