Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:18
Static task
static1
Behavioral task
behavioral1
Sample
012ac082d2af1fa8e20baac2d255039dce7f9620d76d2392697224b3926c9772.exe
Resource
win10v2004-20241007-en
General
-
Target
012ac082d2af1fa8e20baac2d255039dce7f9620d76d2392697224b3926c9772.exe
-
Size
564KB
-
MD5
61a2114f0dcdf4043c7b1fa2cbf9c9ec
-
SHA1
fe67a175ef4b48eb89504df57f5f6c42656d13c7
-
SHA256
012ac082d2af1fa8e20baac2d255039dce7f9620d76d2392697224b3926c9772
-
SHA512
1aaa279fd94168a9cbbfb041ac427854394f17b77b38f673dbaa1dc63410a5fb66255fe6be5998194efc37a099d6cc28912e0443752a715e2a3989f452a5eb02
-
SSDEEP
12288:mMr9y906mBSApNFXzHc5bmkPDlzALocJ8SKTKCnHWLl:zypm/FIbmkOLrJ8SKGCHWLl
Malware Config
Extracted
redline
ronam
193.233.20.17:4139
-
auth_value
125421d19d14dd7fd211bc7f6d4aea6c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3740-19-0x0000000002380000-0x00000000023C6000-memory.dmp family_redline behavioral1/memory/3740-21-0x0000000002650000-0x0000000002694000-memory.dmp family_redline behavioral1/memory/3740-23-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3740-39-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3740-37-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3740-35-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3740-33-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3740-31-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3740-29-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3740-27-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3740-25-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3740-77-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3740-63-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3740-57-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3740-22-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3740-41-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3740-43-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3740-85-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3740-83-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3740-81-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3740-79-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3740-75-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3740-73-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3740-71-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3740-69-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3740-67-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3740-65-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3740-61-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3740-59-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3740-55-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3740-53-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3740-51-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3740-49-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3740-47-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3740-45-0x0000000002650000-0x000000000268E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 4140 dje3142.exe 3740 nmD19ry.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 012ac082d2af1fa8e20baac2d255039dce7f9620d76d2392697224b3926c9772.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" dje3142.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 012ac082d2af1fa8e20baac2d255039dce7f9620d76d2392697224b3926c9772.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dje3142.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nmD19ry.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3740 nmD19ry.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1140 wrote to memory of 4140 1140 012ac082d2af1fa8e20baac2d255039dce7f9620d76d2392697224b3926c9772.exe 84 PID 1140 wrote to memory of 4140 1140 012ac082d2af1fa8e20baac2d255039dce7f9620d76d2392697224b3926c9772.exe 84 PID 1140 wrote to memory of 4140 1140 012ac082d2af1fa8e20baac2d255039dce7f9620d76d2392697224b3926c9772.exe 84 PID 4140 wrote to memory of 3740 4140 dje3142.exe 85 PID 4140 wrote to memory of 3740 4140 dje3142.exe 85 PID 4140 wrote to memory of 3740 4140 dje3142.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\012ac082d2af1fa8e20baac2d255039dce7f9620d76d2392697224b3926c9772.exe"C:\Users\Admin\AppData\Local\Temp\012ac082d2af1fa8e20baac2d255039dce7f9620d76d2392697224b3926c9772.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dje3142.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dje3142.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nmD19ry.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nmD19ry.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3740
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
419KB
MD5a44253842b29e9d22d23e61d4e1a2b71
SHA1a0be868ee1e8b9cd643c0d5bd2504726e43db248
SHA256ae6df813321a9114ccc9961754b1ef84f0d274ed647ea14cd2de31289630bd9d
SHA512d381845c53a5959de431b773881a3840fd1c74a53bc72d952b8b2e8d8cdee7fc1be9af8748a4ddde09b757f177fe252c560e59f55f444bb3b84d585c6e84f663
-
Filesize
265KB
MD5f742494575da0401667b01c1f3e67001
SHA10660eabc4bf3eca706bbf55025c5a3824afe8c95
SHA25660897f881b155dfa9e9547aa0dcea82336b3a84e795e1bf7ae0fdd1a78176ccd
SHA512d3540ee2d0479738972b5e2b441fac6c2bf259dd83d8e666b65a5f3204c3f306297c4ae9e966d080fe7fa4bd3ad1ebf1bcae6a31f5507acfead4dda6ef700392