Analysis
-
max time kernel
135s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 04:46
Static task
static1
Behavioral task
behavioral1
Sample
831f3afec7cf89e368447ff19c0548cbd9dd5237ab91f299f9dc4b7b7818079a.exe
Resource
win10v2004-20241007-en
General
-
Target
831f3afec7cf89e368447ff19c0548cbd9dd5237ab91f299f9dc4b7b7818079a.exe
-
Size
850KB
-
MD5
9e567edee19cf309ac3d2b2bf576aa8a
-
SHA1
76c447c61e956e681a30c9941362ffb7d3a71266
-
SHA256
831f3afec7cf89e368447ff19c0548cbd9dd5237ab91f299f9dc4b7b7818079a
-
SHA512
270b8f360e8d9a840f627c5393e3110fa6666212f1aa0b775167e1301497461b75c8b00510ae1a673f92ed981097c23321b78d161017f621d484d6e2e4363bc2
-
SSDEEP
12288:qy90DOSfhGdTx5ITUxIsKgsxQBkgeCWBLQcsxD//gb4JxxifYNGzFuzBRuexPxl6:qysLfhcMUzMxOys1obIiZF+DzxeR
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dante
185.161.248.73:4164
-
auth_value
f4066af6b8a6f23125c8ee48288a3f90
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/4680-2169-0x0000000005620000-0x0000000005652000-memory.dmp family_redline behavioral1/files/0x000e000000023b72-2174.dat family_redline behavioral1/memory/1904-2182-0x0000000000630000-0x000000000065E000-memory.dmp family_redline behavioral1/files/0x0007000000023cb7-2195.dat family_redline behavioral1/memory/1276-2196-0x00000000002B0000-0x00000000002E0000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation p27222602.exe -
Executes dropped EXE 4 IoCs
pid Process 2644 y21774017.exe 4680 p27222602.exe 1904 1.exe 1276 r91971209.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y21774017.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 831f3afec7cf89e368447ff19c0548cbd9dd5237ab91f299f9dc4b7b7818079a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 6016 4680 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language r91971209.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 831f3afec7cf89e368447ff19c0548cbd9dd5237ab91f299f9dc4b7b7818079a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y21774017.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language p27222602.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4680 p27222602.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4032 wrote to memory of 2644 4032 831f3afec7cf89e368447ff19c0548cbd9dd5237ab91f299f9dc4b7b7818079a.exe 83 PID 4032 wrote to memory of 2644 4032 831f3afec7cf89e368447ff19c0548cbd9dd5237ab91f299f9dc4b7b7818079a.exe 83 PID 4032 wrote to memory of 2644 4032 831f3afec7cf89e368447ff19c0548cbd9dd5237ab91f299f9dc4b7b7818079a.exe 83 PID 2644 wrote to memory of 4680 2644 y21774017.exe 85 PID 2644 wrote to memory of 4680 2644 y21774017.exe 85 PID 2644 wrote to memory of 4680 2644 y21774017.exe 85 PID 4680 wrote to memory of 1904 4680 p27222602.exe 88 PID 4680 wrote to memory of 1904 4680 p27222602.exe 88 PID 4680 wrote to memory of 1904 4680 p27222602.exe 88 PID 2644 wrote to memory of 1276 2644 y21774017.exe 92 PID 2644 wrote to memory of 1276 2644 y21774017.exe 92 PID 2644 wrote to memory of 1276 2644 y21774017.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\831f3afec7cf89e368447ff19c0548cbd9dd5237ab91f299f9dc4b7b7818079a.exe"C:\Users\Admin\AppData\Local\Temp\831f3afec7cf89e368447ff19c0548cbd9dd5237ab91f299f9dc4b7b7818079a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y21774017.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y21774017.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p27222602.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p27222602.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4680 -s 2484⤵
- Program crash
PID:6016
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r91971209.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r91971209.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1276
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4680 -ip 46801⤵PID:5872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
570KB
MD5025a291586e6ce72634be063a4cd81f6
SHA10a8ac0e272cf790296ab23b9246093ab25579c47
SHA256a3c3a57e108fbf390c4c0702c48dffd19bca708681612bb1b05e927a2b233a92
SHA512c24ecb21210e6271e8111aa4f4344eb7ea91ce4ba70e527d3896a8183fa20f6cc4d8b08d30f66465219f91a1fd10d97e64026fc68065ad0741a40d08b55b701c
-
Filesize
479KB
MD503cfadd3186b987d8c5e796ebc93d34a
SHA11f132b89d3a1f2d32fdc67a8a0794722aadcb008
SHA256448d26aa02def591d2de86210c227a18655219bee06d87543640dca27e16f90d
SHA5120c27c1a13a515b06892a2e71ef88ce7081c01ae12bc0ce76b288b4e6992798c1a0501337e2f5127ba2069be92ddd827985a4aa6f9498c8edda8538c5a99b6935
-
Filesize
169KB
MD59da61c9db87ae5c2904b943f7e032d27
SHA178b6e63b4e7b89ba175bc497573ad01f9da6903a
SHA2568cd624bda3e1e3ec356a2e8fb0cb0839bd06f467d0847adc11e9f1526efdf097
SHA512100ead0d2038bf0e65ffb2b46bff16d233f8d2ed98f29b0723b1f5fe3a7c565f4028d8751ac5d6e466d2a0668d20daaf075064edda3a4aff997341394a3e7968
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf