Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:05
Static task
static1
Behavioral task
behavioral1
Sample
79d0d71beae6061be173c5764e0f8f3992d56a1088aa03b6a7f7e0fb3d8f58e5.exe
Resource
win10v2004-20241007-en
General
-
Target
79d0d71beae6061be173c5764e0f8f3992d56a1088aa03b6a7f7e0fb3d8f58e5.exe
-
Size
794KB
-
MD5
ed66cecb476e303afe8fb8bfb42454d5
-
SHA1
04db8d96824a6a66512baabcb19fad07fcb198f5
-
SHA256
79d0d71beae6061be173c5764e0f8f3992d56a1088aa03b6a7f7e0fb3d8f58e5
-
SHA512
5dcb4538cf6235a0e11abee0ccd8a05376e6667c9762e971ab42954e2c3b740293c779746127afa851897b458e334396da54dc323c0f2cf529f0b537ebe32977
-
SSDEEP
12288:oy90ZJl/+d+0aH9sYGgPkATaPp6iKsCQr8vIzQLWmDm5iYseC:oys//lJH6gPJTaPp6iKsCQkfWsm55C
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dork
185.161.248.73:4164
-
auth_value
e81be7d6cfb453cc812e1b4890eeadad
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/4420-2168-0x00000000059C0000-0x00000000059F2000-memory.dmp family_redline behavioral1/files/0x000f000000023af9-2173.dat family_redline behavioral1/memory/5400-2181-0x00000000005A0000-0x00000000005CE000-memory.dmp family_redline behavioral1/files/0x000a000000023b99-2194.dat family_redline behavioral1/memory/4028-2196-0x0000000000140000-0x0000000000170000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation m45289325.exe -
Executes dropped EXE 4 IoCs
pid Process 3092 x23266035.exe 4420 m45289325.exe 5400 1.exe 4028 n18887354.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 79d0d71beae6061be173c5764e0f8f3992d56a1088aa03b6a7f7e0fb3d8f58e5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x23266035.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5220 4420 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language n18887354.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 79d0d71beae6061be173c5764e0f8f3992d56a1088aa03b6a7f7e0fb3d8f58e5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x23266035.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m45289325.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4420 m45289325.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4600 wrote to memory of 3092 4600 79d0d71beae6061be173c5764e0f8f3992d56a1088aa03b6a7f7e0fb3d8f58e5.exe 83 PID 4600 wrote to memory of 3092 4600 79d0d71beae6061be173c5764e0f8f3992d56a1088aa03b6a7f7e0fb3d8f58e5.exe 83 PID 4600 wrote to memory of 3092 4600 79d0d71beae6061be173c5764e0f8f3992d56a1088aa03b6a7f7e0fb3d8f58e5.exe 83 PID 3092 wrote to memory of 4420 3092 x23266035.exe 84 PID 3092 wrote to memory of 4420 3092 x23266035.exe 84 PID 3092 wrote to memory of 4420 3092 x23266035.exe 84 PID 4420 wrote to memory of 5400 4420 m45289325.exe 91 PID 4420 wrote to memory of 5400 4420 m45289325.exe 91 PID 4420 wrote to memory of 5400 4420 m45289325.exe 91 PID 3092 wrote to memory of 4028 3092 x23266035.exe 96 PID 3092 wrote to memory of 4028 3092 x23266035.exe 96 PID 3092 wrote to memory of 4028 3092 x23266035.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\79d0d71beae6061be173c5764e0f8f3992d56a1088aa03b6a7f7e0fb3d8f58e5.exe"C:\Users\Admin\AppData\Local\Temp\79d0d71beae6061be173c5764e0f8f3992d56a1088aa03b6a7f7e0fb3d8f58e5.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x23266035.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x23266035.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m45289325.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m45289325.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4420 -s 11524⤵
- Program crash
PID:5220
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n18887354.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n18887354.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4028
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4420 -ip 44201⤵PID:5260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
590KB
MD5c1f553707b11ce3e4a48e4e0fd89aa02
SHA1eea4aa025558c3842454dcafc21656d5917a48bd
SHA2560f0350e7c559580458b8d89a8297dc1ad90109911b8483ca050e56aa14218487
SHA512b4cec6cd45b3a9e05b8bbe0cc3ac899e593781e54620723ac87164a65421004ae657c69bc9174bc89def4fffa4a2036eaaf9c113b7b71a74759c5e8cd91e2857
-
Filesize
530KB
MD5b9e1511dadaa123cce7fcffc056832a3
SHA13298408a358f7f5fcb332d00d4761167eadcb0ad
SHA256c16a2e0bcfa10349a5b1f56b4c5d5dad7ec67fe21e9657933243dafad9258759
SHA51290dbf3a140237b1cadd8ab6b34fb1917c2b83f0c44abf723049774c9b3c6fc2ded21ec49a4c5327e873b5a1e2c7b2982839edb7b493a36374644f56ebffa11f6
-
Filesize
168KB
MD5b6dcb976d913116efdc7e5f1a04bf312
SHA1fef325f67848110625feee90251fa88ed5cb80f8
SHA2564ac8fd82c9ccfc6885d1cd01bd04afa871496ecc34393945b3e9e59c999c5290
SHA5122d88e23d99a2ae539381d7e00b328e95ea9e0c0fb15c3491b4e2ec42836c4e8f10396d4a4a30420d9b76cc3e4bd3e09f1e3dfc56639a520998384d87320526c2
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf