Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:19
Static task
static1
Behavioral task
behavioral1
Sample
dd449d2b03ddb0d94360dc48623e5eab79f39f7c50656a242520bde9204b9524.exe
Resource
win10v2004-20241007-en
General
-
Target
dd449d2b03ddb0d94360dc48623e5eab79f39f7c50656a242520bde9204b9524.exe
-
Size
874KB
-
MD5
8eb09642754bbe729c885cf9efd442e7
-
SHA1
8c083bc1bb32bad55f7a6fc126c964c8890b2b30
-
SHA256
dd449d2b03ddb0d94360dc48623e5eab79f39f7c50656a242520bde9204b9524
-
SHA512
006d449b2d65ede5dbc682a15aae0c4cf81624175fbf0bfd9fd78d475ec1e089f889fbeb9c34b92e3bc6027637a25e4a9eb5dd9c059afb69f57bc1bc96ae6215
-
SSDEEP
12288:oy90hvk2lcxLo0C4vQtFfkIUZJmyaskAc1RD6ss8+87qiZNkAdo8ofy6kKbq5alm:oycLaxkxr8INXf2sAAZXo8oikUaG9r7
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dark
185.161.248.73:4164
-
auth_value
ae85b01f66afe8770afeed560513fc2d
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/1372-2168-0x0000000005760000-0x0000000005792000-memory.dmp family_redline behavioral1/files/0x0006000000023080-2173.dat family_redline behavioral1/memory/5980-2182-0x0000000000A70000-0x0000000000A9E000-memory.dmp family_redline behavioral1/files/0x000a000000023b8b-2188.dat family_redline behavioral1/memory/6136-2190-0x0000000000910000-0x0000000000940000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation p96891457.exe -
Executes dropped EXE 4 IoCs
pid Process 4228 y37346625.exe 1372 p96891457.exe 5980 1.exe 6136 r33505634.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dd449d2b03ddb0d94360dc48623e5eab79f39f7c50656a242520bde9204b9524.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y37346625.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd449d2b03ddb0d94360dc48623e5eab79f39f7c50656a242520bde9204b9524.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y37346625.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language p96891457.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language r33505634.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1372 p96891457.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4932 wrote to memory of 4228 4932 dd449d2b03ddb0d94360dc48623e5eab79f39f7c50656a242520bde9204b9524.exe 83 PID 4932 wrote to memory of 4228 4932 dd449d2b03ddb0d94360dc48623e5eab79f39f7c50656a242520bde9204b9524.exe 83 PID 4932 wrote to memory of 4228 4932 dd449d2b03ddb0d94360dc48623e5eab79f39f7c50656a242520bde9204b9524.exe 83 PID 4228 wrote to memory of 1372 4228 y37346625.exe 84 PID 4228 wrote to memory of 1372 4228 y37346625.exe 84 PID 4228 wrote to memory of 1372 4228 y37346625.exe 84 PID 1372 wrote to memory of 5980 1372 p96891457.exe 88 PID 1372 wrote to memory of 5980 1372 p96891457.exe 88 PID 1372 wrote to memory of 5980 1372 p96891457.exe 88 PID 4228 wrote to memory of 6136 4228 y37346625.exe 89 PID 4228 wrote to memory of 6136 4228 y37346625.exe 89 PID 4228 wrote to memory of 6136 4228 y37346625.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd449d2b03ddb0d94360dc48623e5eab79f39f7c50656a242520bde9204b9524.exe"C:\Users\Admin\AppData\Local\Temp\dd449d2b03ddb0d94360dc48623e5eab79f39f7c50656a242520bde9204b9524.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y37346625.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y37346625.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p96891457.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p96891457.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5980
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r33505634.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r33505634.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6136
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
581KB
MD575523e3ae5c3b7a293df9cb8e3cf81c6
SHA1470a4dfd09ae6236f297df2dc72650d32154a380
SHA256f7ecf5f7de211a4be958d9d88aec6b413b1b07266642a17da9af21f5a66fe9e6
SHA5124d8b8b203d284331107cb0c755014d642cfdbb8d4bfd5526e33e1f0958c2085738d3d241e1b79fbe21f434c7a477a5730ed31290720fce55107d67b73abb11ac
-
Filesize
582KB
MD569c8f01ffb70d92a85100bf2c3b479b6
SHA1482066d48b2fc7794f1c882c57950780ea3a076c
SHA256c11aa58da84fbaf988d70468c92fc3aa4959ceb6e2820a86bd73ec0dc804595a
SHA51286d6d789fafd0ccef506ada345166bf66049f064c71b1028fa0cb00eebdf9011c63a8caa54c83aa82ee93914ec96fea48d186b70b0a70c8459ec08f51caba54b
-
Filesize
171KB
MD529247f061babbaf0909cac1ba330f942
SHA1956a107def471df65c098a7a3c4a716c6d4c13d1
SHA25637a5adb462ac9db35ffadd3cf9efb90da590b2567c2451617cbc9545c7f3aede
SHA51221b63cac80f4d31b5cd5006ad139c0a50ef7d85fc6a8c382a3a037b25a94857e908792127fa653c2bdb64403f24d83dcfb7a983c6967d2bb723875359d048cbf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf