Analysis
-
max time kernel
131s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 04:52
Static task
static1
Behavioral task
behavioral1
Sample
f31d9030c5d189c69e04fdf53d1f930521dfda80cafd8467544da8f6a72bcb6d.exe
Resource
win10v2004-20241007-en
General
-
Target
f31d9030c5d189c69e04fdf53d1f930521dfda80cafd8467544da8f6a72bcb6d.exe
-
Size
567KB
-
MD5
e462b360679a4f91fc3f980179facaa1
-
SHA1
54cbcf297853c56f291de4cf62951dd3e8103ae1
-
SHA256
f31d9030c5d189c69e04fdf53d1f930521dfda80cafd8467544da8f6a72bcb6d
-
SHA512
54f9c178dcc1e4cad6c262aef57183d3c3a987939cd477c04d3d193a5af46916f86373880390ab4420e7ffa59acb8d83fb9b0ff1a4556f5ff3cd3b10db427c5b
-
SSDEEP
12288:jMr+y90kBzSAPv+sHgODNoPbTIAQ5L/FLJ7K0U4Di:By7BzXPI7DTIB/FLJ7KN2i
Malware Config
Extracted
redline
darm
217.196.96.56:4138
-
auth_value
d88ac8ccc04ab9979b04b46313db1648
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023ca3-12.dat family_redline behavioral1/memory/4432-15-0x00000000003A0000-0x00000000003D0000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 5060 y5814500.exe 4432 k7543287.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f31d9030c5d189c69e04fdf53d1f930521dfda80cafd8467544da8f6a72bcb6d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y5814500.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f31d9030c5d189c69e04fdf53d1f930521dfda80cafd8467544da8f6a72bcb6d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y5814500.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k7543287.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4960 wrote to memory of 5060 4960 f31d9030c5d189c69e04fdf53d1f930521dfda80cafd8467544da8f6a72bcb6d.exe 83 PID 4960 wrote to memory of 5060 4960 f31d9030c5d189c69e04fdf53d1f930521dfda80cafd8467544da8f6a72bcb6d.exe 83 PID 4960 wrote to memory of 5060 4960 f31d9030c5d189c69e04fdf53d1f930521dfda80cafd8467544da8f6a72bcb6d.exe 83 PID 5060 wrote to memory of 4432 5060 y5814500.exe 85 PID 5060 wrote to memory of 4432 5060 y5814500.exe 85 PID 5060 wrote to memory of 4432 5060 y5814500.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\f31d9030c5d189c69e04fdf53d1f930521dfda80cafd8467544da8f6a72bcb6d.exe"C:\Users\Admin\AppData\Local\Temp\f31d9030c5d189c69e04fdf53d1f930521dfda80cafd8467544da8f6a72bcb6d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5814500.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5814500.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7543287.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7543287.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4432
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD5aa081f9d22ec81b1f241715e752cd660
SHA1a2e6d820f3d653c801f8dc435a2e4e709bc79e4e
SHA256ece9e4ba7629dfba02c2078aa0161a0ed48cbfb4b717fed302952e52c30901f6
SHA512c163a1027a358cc3e451ac80440ed01a677445609f15b262dbd6f22847d417c705c6bf97b58c72ec4609ce3e5ef8c6d374d6e91e724f2a410cf3d77e4278842b
-
Filesize
168KB
MD5483e00f98eb4aa8de2cce99b4525b7a5
SHA155031d27f03928b96a14f8c752e5fa642813d629
SHA256a88871435492bccdd742aa6f85d7cbd969aa7a6a26c2143e08aa0774801fd7ff
SHA512938eadabd691220abfbd4254df285081531b8d7603c2634adef5a2836c0513766d230e0040ae0b97ab9c0980985e46a0790f3f0dc38bc16cbae8b703a914d63b