Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:06
Static task
static1
Behavioral task
behavioral1
Sample
856494eaea6f98e8b8b57f40f07f37963cb41b969e63affee8a6bed70b4db15c.exe
Resource
win10v2004-20241007-en
General
-
Target
856494eaea6f98e8b8b57f40f07f37963cb41b969e63affee8a6bed70b4db15c.exe
-
Size
892KB
-
MD5
bda5619521302b7d977e5fd8497d5347
-
SHA1
7935dd9262db1b01479ceac7d2c289b7b717db2b
-
SHA256
856494eaea6f98e8b8b57f40f07f37963cb41b969e63affee8a6bed70b4db15c
-
SHA512
944482f87f7221f75f9d2356107b1ca8a06bc18c6626a7c36f888285342e685fa5a87caf238e4f281bf3b986cf5dcaa358d82f3749a0b23dd3573e31d60cf2bf
-
SSDEEP
12288:/y90p8ObVVJSCuLHk8J93FJ9TqRidGGNikyC2e2N/pRvolJzPCrDjKeYyq:/yZ2VPSCuFZdVDwrQ5PCrDOeNq
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
danko
185.161.248.73:4164
-
auth_value
784d42a6c1eb1a5060b8bcd3696f5f1e
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/1044-2169-0x00000000059B0000-0x00000000059E2000-memory.dmp family_redline behavioral1/files/0x0002000000022dc9-2174.dat family_redline behavioral1/memory/1552-2182-0x0000000000A10000-0x0000000000A3E000-memory.dmp family_redline behavioral1/files/0x0007000000023caf-2194.dat family_redline behavioral1/memory/5124-2196-0x0000000000F00000-0x0000000000F30000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation p43195365.exe -
Executes dropped EXE 4 IoCs
pid Process 1960 y81786116.exe 1044 p43195365.exe 1552 1.exe 5124 r11559332.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 856494eaea6f98e8b8b57f40f07f37963cb41b969e63affee8a6bed70b4db15c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y81786116.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1092 1044 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y81786116.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language p43195365.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language r11559332.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 856494eaea6f98e8b8b57f40f07f37963cb41b969e63affee8a6bed70b4db15c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1044 p43195365.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4804 wrote to memory of 1960 4804 856494eaea6f98e8b8b57f40f07f37963cb41b969e63affee8a6bed70b4db15c.exe 85 PID 4804 wrote to memory of 1960 4804 856494eaea6f98e8b8b57f40f07f37963cb41b969e63affee8a6bed70b4db15c.exe 85 PID 4804 wrote to memory of 1960 4804 856494eaea6f98e8b8b57f40f07f37963cb41b969e63affee8a6bed70b4db15c.exe 85 PID 1960 wrote to memory of 1044 1960 y81786116.exe 87 PID 1960 wrote to memory of 1044 1960 y81786116.exe 87 PID 1960 wrote to memory of 1044 1960 y81786116.exe 87 PID 1044 wrote to memory of 1552 1044 p43195365.exe 90 PID 1044 wrote to memory of 1552 1044 p43195365.exe 90 PID 1044 wrote to memory of 1552 1044 p43195365.exe 90 PID 1960 wrote to memory of 5124 1960 y81786116.exe 96 PID 1960 wrote to memory of 5124 1960 y81786116.exe 96 PID 1960 wrote to memory of 5124 1960 y81786116.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\856494eaea6f98e8b8b57f40f07f37963cb41b969e63affee8a6bed70b4db15c.exe"C:\Users\Admin\AppData\Local\Temp\856494eaea6f98e8b8b57f40f07f37963cb41b969e63affee8a6bed70b4db15c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y81786116.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y81786116.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p43195365.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p43195365.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 12124⤵
- Program crash
PID:1092
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r11559332.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r11559332.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5124
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1044 -ip 10441⤵PID:700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
590KB
MD5887462bb750895dc452f4162c58cf6ce
SHA1e64fb3cabf1903c7d7791ea610f8ba66b31f8711
SHA25668f0bf4c9748064f5e7d18105522dad6c0e52a7ff68d7b53908b22baf72ded7c
SHA512f353cceed0150d77ed510af4f21f98f6a76bda2acb8fd461a39f6e6cd83d492116f6d27757478272068d264b285868f26a106c47b67a88e4553a84dcb7d5cb98
-
Filesize
531KB
MD59806aceef91ef112d859d639bc467e1f
SHA1963059cc5c9a53f93478ef434e789bdfd6555efc
SHA2561da00d14cf1e2d70ad6e7b11f3cbb4df05adb6ee6aad0299e48bb888a2aacef8
SHA5127ef7994e5e6b4824d519775df7734153ccbf91b4dacd5553b69d9c7390c6c504e07ad754b45b83e3116e5036be870d31b03c70055f989b68ad298d52362665b2
-
Filesize
169KB
MD5020e119fbcc55390cf8237c4a8a263a4
SHA10493d874b40fc8dc67796e41b05bd2a720c2239a
SHA256684cf438a1fd4fc2c440f4da476a5470ea9f83430b394ca3f035994ae59e4067
SHA512f57efe08de3d89df63ab1c9ad37a5b524922f24f75f6166a616c6f04e579107bd4c7f0a8467ad51db994bda9cd7cdeefc2156f316be658cb66b546396a9e92d5
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf