Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:15
Static task
static1
Behavioral task
behavioral1
Sample
ad0a87bc58f52a7034d58cdbf018e948d39389545cd103176cd079fa65b45ec6.exe
Resource
win10v2004-20241007-en
General
-
Target
ad0a87bc58f52a7034d58cdbf018e948d39389545cd103176cd079fa65b45ec6.exe
-
Size
765KB
-
MD5
6e866baf65433fe9ccaa8ad78a4f8e16
-
SHA1
19fbb2ac8bc0a585bf251143aac5f6970bace3e7
-
SHA256
ad0a87bc58f52a7034d58cdbf018e948d39389545cd103176cd079fa65b45ec6
-
SHA512
8322bad6738b2c0ab67daace81ce10808fe0fa6a46d012ff218879e1096ef9c894b2fcf4a6ebafa4756f151d7863e315235fd62a26e53d81a391f0836bbdc093
-
SSDEEP
12288:iMrNy90TgfuKiKMdW6srhPFAOzxlLZtwbGpuD8QJwcyN2Ee2c:HyYgfuKi+hFAOfLZtwbGwDLwcfBt
Malware Config
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2964-22-0x0000000002920000-0x0000000002966000-memory.dmp family_redline behavioral1/memory/2964-24-0x0000000004DF0000-0x0000000004E34000-memory.dmp family_redline behavioral1/memory/2964-36-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/2964-48-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/2964-86-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/2964-84-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/2964-82-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/2964-80-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/2964-78-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/2964-76-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/2964-74-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/2964-72-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/2964-68-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/2964-66-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/2964-64-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/2964-62-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/2964-60-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/2964-58-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/2964-56-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/2964-54-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/2964-52-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/2964-46-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/2964-44-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/2964-42-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/2964-40-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/2964-38-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/2964-32-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/2964-30-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/2964-88-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/2964-28-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/2964-70-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/2964-26-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/2964-50-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/2964-25-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/2964-34-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 336 vVE40.exe 4108 vIR13.exe 2964 dRM32.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ad0a87bc58f52a7034d58cdbf018e948d39389545cd103176cd079fa65b45ec6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vVE40.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vIR13.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad0a87bc58f52a7034d58cdbf018e948d39389545cd103176cd079fa65b45ec6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vVE40.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vIR13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dRM32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2964 dRM32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4872 wrote to memory of 336 4872 ad0a87bc58f52a7034d58cdbf018e948d39389545cd103176cd079fa65b45ec6.exe 84 PID 4872 wrote to memory of 336 4872 ad0a87bc58f52a7034d58cdbf018e948d39389545cd103176cd079fa65b45ec6.exe 84 PID 4872 wrote to memory of 336 4872 ad0a87bc58f52a7034d58cdbf018e948d39389545cd103176cd079fa65b45ec6.exe 84 PID 336 wrote to memory of 4108 336 vVE40.exe 86 PID 336 wrote to memory of 4108 336 vVE40.exe 86 PID 336 wrote to memory of 4108 336 vVE40.exe 86 PID 4108 wrote to memory of 2964 4108 vIR13.exe 87 PID 4108 wrote to memory of 2964 4108 vIR13.exe 87 PID 4108 wrote to memory of 2964 4108 vIR13.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad0a87bc58f52a7034d58cdbf018e948d39389545cd103176cd079fa65b45ec6.exe"C:\Users\Admin\AppData\Local\Temp\ad0a87bc58f52a7034d58cdbf018e948d39389545cd103176cd079fa65b45ec6.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vVE40.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vVE40.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vIR13.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vIR13.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dRM32.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dRM32.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
661KB
MD5b60ab8f0a5c954513885964f10cfdec7
SHA1b37f84b0cf8c2d8d4e540672d1314eaff84cfed0
SHA256ad0428a60dc825aca122aeceb02060f2513ad0072f038899e1a338d279eacbff
SHA5122258268254f3c3b878ac3fd58c8146c035c015c12725faef210e9014121aaf44333fd53465caadc87065cfdfbb9bcbc31751a499532461eb4d01f2588afbba37
-
Filesize
516KB
MD51c503bf64e46dabb31703ad8a5b37257
SHA1ce7e55597b514830f9e1ecde2e3fb59a86847876
SHA25641fe0562da6fa16946708250430bc18e36ba21381903462526b9b034a63d8438
SHA512d549c23de60c0e39915dd1e49cd6274d96028df310f5c771ac759974d1adc8ab43f7da44b057563767dbc05739b98f8aea4edefdcc601693d13feb194f2c15d0
-
Filesize
296KB
MD51fac68ff822048c7d438408c40af955b
SHA18f6728720ee05f7972d7a5e99b3a71703e0e7db7
SHA25659175875cc49dbb1ebfd537ce345fd24462a5befdbbc81983acd164842966214
SHA512631887b4a57c30e7c25bf587f335b01cd3b12a9ba63cacc4f96fe313e93ee7039ece1d390a12d6ce62ee7f598b7c98a7debe72d686bcdbb53628d21f6d8d1dcc