Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:46
Static task
static1
Behavioral task
behavioral1
Sample
9a0ec5b40399889ddf61368ee848626cdc5f98fb7264ab1a504e6afd2801b64b.exe
Resource
win10v2004-20241007-en
General
-
Target
9a0ec5b40399889ddf61368ee848626cdc5f98fb7264ab1a504e6afd2801b64b.exe
-
Size
565KB
-
MD5
2ea6d65da71fefcf0fc423b57ca36133
-
SHA1
2fa80a4aba428ae05d45b149cd159acd7b7acf98
-
SHA256
9a0ec5b40399889ddf61368ee848626cdc5f98fb7264ab1a504e6afd2801b64b
-
SHA512
779c278e0004d188a63f95f9fc3f7238d9c99e92cd3920e2cf0e7ffdbdf750e30f58e7aec797352694076dcd7f144c5aed783598f95286907cdf2496521497fd
-
SSDEEP
12288:TMrBy903gSN714+yGXnh4S10NFABghqNstu2UYw8KOPtJaRHkf2sPlcd:OyMgSNJ4mnhl1ZNstulnQfaRtag
Malware Config
Extracted
redline
ronur
193.233.20.20:4134
-
auth_value
f88f86755a528d4b25f6f3628c460965
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4488-19-0x00000000025A0000-0x00000000025E6000-memory.dmp family_redline behavioral1/memory/4488-21-0x0000000002760000-0x00000000027A4000-memory.dmp family_redline behavioral1/memory/4488-25-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4488-35-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4488-83-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4488-81-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4488-80-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4488-75-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4488-73-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4488-71-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4488-69-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4488-67-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4488-65-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4488-63-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4488-61-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4488-59-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4488-57-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4488-53-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4488-51-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4488-49-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4488-47-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4488-45-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4488-43-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4488-41-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4488-37-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4488-33-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4488-31-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4488-29-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4488-27-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4488-85-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4488-77-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4488-55-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4488-39-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4488-23-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4488-22-0x0000000002760000-0x000000000279E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 3588 dmU4622.exe 4488 nbe87mb.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9a0ec5b40399889ddf61368ee848626cdc5f98fb7264ab1a504e6afd2801b64b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" dmU4622.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9a0ec5b40399889ddf61368ee848626cdc5f98fb7264ab1a504e6afd2801b64b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dmU4622.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbe87mb.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4488 nbe87mb.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3804 wrote to memory of 3588 3804 9a0ec5b40399889ddf61368ee848626cdc5f98fb7264ab1a504e6afd2801b64b.exe 83 PID 3804 wrote to memory of 3588 3804 9a0ec5b40399889ddf61368ee848626cdc5f98fb7264ab1a504e6afd2801b64b.exe 83 PID 3804 wrote to memory of 3588 3804 9a0ec5b40399889ddf61368ee848626cdc5f98fb7264ab1a504e6afd2801b64b.exe 83 PID 3588 wrote to memory of 4488 3588 dmU4622.exe 84 PID 3588 wrote to memory of 4488 3588 dmU4622.exe 84 PID 3588 wrote to memory of 4488 3588 dmU4622.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a0ec5b40399889ddf61368ee848626cdc5f98fb7264ab1a504e6afd2801b64b.exe"C:\Users\Admin\AppData\Local\Temp\9a0ec5b40399889ddf61368ee848626cdc5f98fb7264ab1a504e6afd2801b64b.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dmU4622.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dmU4622.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nbe87mb.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nbe87mb.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4488
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
421KB
MD51f1577fc926b7e448358f223367f6fac
SHA1bf35e522de0e55713e96a518b35141bce5597ab9
SHA2569f2cd4a5a3d2a8f05a33587f31c005263518cbe1f429a1a2d6ff71d5cf72af9c
SHA512adb99ab4413e058cf8076aefd6d6206384fb8d0e698030241ee756f3718f00fe1de489d18db1bca2ed57b99b3c0ccb71edea2f771b8ef3339a674e088bdb8bbd
-
Filesize
267KB
MD5b097e9e8ba00491672d7c588f5a1dc6c
SHA1ca40fc57327e159e7f9ab633c492191896a2db6d
SHA256ea09554bb47d16149144d42b26d9022cdbe753b6026626ebd3ba99be8511777d
SHA512b9f75414a3b2ab352ca98d78f25e9c5715af6c37eb41b543c8d191c0c799ee4d482b962774b1f31dce340d780c49fa7b262da30e7e692bbb7fa98bbbac26dd63