Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:15
Static task
static1
Behavioral task
behavioral1
Sample
e7ab4d1228b88475a24cbe00294183b08ce42d7b7e5782abe2a81dd75adea67a.exe
Resource
win10v2004-20241007-en
General
-
Target
e7ab4d1228b88475a24cbe00294183b08ce42d7b7e5782abe2a81dd75adea67a.exe
-
Size
794KB
-
MD5
70a9cf1c3c14b0e1fde399ba1845aa9c
-
SHA1
ae8449c8bcd14d9d63ebfa3d85380ecae2146d0b
-
SHA256
e7ab4d1228b88475a24cbe00294183b08ce42d7b7e5782abe2a81dd75adea67a
-
SHA512
f6907fe3ed8559b5099fb2699b05a36f17d3348ac3da5873aef574928c7d7338bf6245fc13eb8137a3ad9e757a8a98006b56c8507b1c4c048c26a64a74c76e98
-
SSDEEP
24576:TygEgBwoFXrQ3vSFQW4n/7tikC0I3D/TKR:mgBBBsY4n/JikfI3LT
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
danko
185.161.248.73:4164
-
auth_value
784d42a6c1eb1a5060b8bcd3696f5f1e
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/1524-2168-0x00000000059C0000-0x00000000059F2000-memory.dmp family_redline behavioral1/files/0x0002000000022ab7-2174.dat family_redline behavioral1/memory/3684-2182-0x0000000000A60000-0x0000000000A8E000-memory.dmp family_redline behavioral1/files/0x0008000000023c52-2194.dat family_redline behavioral1/memory/6004-2196-0x0000000000180000-0x00000000001B0000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation m00494616.exe -
Executes dropped EXE 4 IoCs
pid Process 4800 x26759906.exe 1524 m00494616.exe 3684 1.exe 6004 n96927184.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e7ab4d1228b88475a24cbe00294183b08ce42d7b7e5782abe2a81dd75adea67a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x26759906.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5636 1524 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x26759906.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m00494616.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language n96927184.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e7ab4d1228b88475a24cbe00294183b08ce42d7b7e5782abe2a81dd75adea67a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1524 m00494616.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2264 wrote to memory of 4800 2264 e7ab4d1228b88475a24cbe00294183b08ce42d7b7e5782abe2a81dd75adea67a.exe 83 PID 2264 wrote to memory of 4800 2264 e7ab4d1228b88475a24cbe00294183b08ce42d7b7e5782abe2a81dd75adea67a.exe 83 PID 2264 wrote to memory of 4800 2264 e7ab4d1228b88475a24cbe00294183b08ce42d7b7e5782abe2a81dd75adea67a.exe 83 PID 4800 wrote to memory of 1524 4800 x26759906.exe 85 PID 4800 wrote to memory of 1524 4800 x26759906.exe 85 PID 4800 wrote to memory of 1524 4800 x26759906.exe 85 PID 1524 wrote to memory of 3684 1524 m00494616.exe 89 PID 1524 wrote to memory of 3684 1524 m00494616.exe 89 PID 1524 wrote to memory of 3684 1524 m00494616.exe 89 PID 4800 wrote to memory of 6004 4800 x26759906.exe 96 PID 4800 wrote to memory of 6004 4800 x26759906.exe 96 PID 4800 wrote to memory of 6004 4800 x26759906.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7ab4d1228b88475a24cbe00294183b08ce42d7b7e5782abe2a81dd75adea67a.exe"C:\Users\Admin\AppData\Local\Temp\e7ab4d1228b88475a24cbe00294183b08ce42d7b7e5782abe2a81dd75adea67a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x26759906.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x26759906.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m00494616.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m00494616.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1524 -s 15204⤵
- Program crash
PID:5636
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n96927184.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n96927184.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6004
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1524 -ip 15241⤵PID:5528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
590KB
MD5b89d16cafe8823609c676f717e9866a8
SHA1e45f7778901572f395014f9118eac87a44719027
SHA256f77912dc378b34e7b2ed3a816cbabd702315e1fb63e7a599182c9226b4aecb47
SHA512e9a23fe61a3d8fb12e29553ef90b9b4072d745f78cf62b6bea6fb2a898e35b4993f32486e578b6f0806b6b49c1858c01a2b046c8364775210cf4f3087743af0c
-
Filesize
530KB
MD59217d9348cce93bec04ac7835ad54900
SHA1f24ea1d5a72f19392142e5bf132fb05b9701736c
SHA2568ea71cd2ee5854f3491642e6545cbfbed4c3ba3959f921c735f4a97f247965c8
SHA512206b11a7fa36af157f8a478b40b1c6e405a432a201aca6578286e107f42d7209291c969c79ec9dab503856fa9222851a48712d56c9f3a98718fbd7c5229db5e4
-
Filesize
169KB
MD5cec75d0214524f46c1b0790ac647b534
SHA13773986ef025a2016bd4b95487321e1aeb4be565
SHA2562c5dcfb66c303e5e9424bebd5735402bc911a304c155ab53a7d91cb558ae6f94
SHA5121db75850f98fc277b57342349f87101cbf183a3b6da584a5f0099669fa5b0be0d9d26089044e434d1857af158003702c9acdcadfd159bb6ab01426a8e7b292fa
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf