Analysis
-
max time kernel
136s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 06:50
Static task
static1
Behavioral task
behavioral1
Sample
fdfab83925fe5500b2ae7cb66c6cd06313729d16995dd84f222165082d33e3f5.exe
Resource
win10v2004-20241007-en
General
-
Target
fdfab83925fe5500b2ae7cb66c6cd06313729d16995dd84f222165082d33e3f5.exe
-
Size
851KB
-
MD5
aeae084282cecb5746fe0756e8541cdb
-
SHA1
6c9650b27e1358d5dfd62fe6c8a2dd7ee6a7049d
-
SHA256
fdfab83925fe5500b2ae7cb66c6cd06313729d16995dd84f222165082d33e3f5
-
SHA512
6274829da6317041ea4fffd3c4f512e6031f9826c579a94e6a177947e45d24fe8f96a3d0b7eb1b68abab4ee250f4c42ac71a41b5182a5fac1863b7a2859497c6
-
SSDEEP
24576:0y7xuxvveYbxxHsdAbnoYlUhHH4L//ah:DqvF1xCMlKHYL//a
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dante
185.161.248.73:4164
-
auth_value
f4066af6b8a6f23125c8ee48288a3f90
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/64-2168-0x0000000005620000-0x0000000005652000-memory.dmp family_redline behavioral1/files/0x0002000000022b11-2173.dat family_redline behavioral1/memory/4132-2181-0x0000000000AD0000-0x0000000000AFE000-memory.dmp family_redline behavioral1/files/0x0007000000023cb8-2193.dat family_redline behavioral1/memory/4964-2195-0x00000000005B0000-0x00000000005E0000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation p88366122.exe -
Executes dropped EXE 4 IoCs
pid Process 4216 y48371180.exe 64 p88366122.exe 4132 1.exe 4964 r55889319.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y48371180.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fdfab83925fe5500b2ae7cb66c6cd06313729d16995dd84f222165082d33e3f5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2516 64 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdfab83925fe5500b2ae7cb66c6cd06313729d16995dd84f222165082d33e3f5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y48371180.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language p88366122.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language r55889319.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 64 p88366122.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1124 wrote to memory of 4216 1124 fdfab83925fe5500b2ae7cb66c6cd06313729d16995dd84f222165082d33e3f5.exe 83 PID 1124 wrote to memory of 4216 1124 fdfab83925fe5500b2ae7cb66c6cd06313729d16995dd84f222165082d33e3f5.exe 83 PID 1124 wrote to memory of 4216 1124 fdfab83925fe5500b2ae7cb66c6cd06313729d16995dd84f222165082d33e3f5.exe 83 PID 4216 wrote to memory of 64 4216 y48371180.exe 85 PID 4216 wrote to memory of 64 4216 y48371180.exe 85 PID 4216 wrote to memory of 64 4216 y48371180.exe 85 PID 64 wrote to memory of 4132 64 p88366122.exe 88 PID 64 wrote to memory of 4132 64 p88366122.exe 88 PID 64 wrote to memory of 4132 64 p88366122.exe 88 PID 4216 wrote to memory of 4964 4216 y48371180.exe 92 PID 4216 wrote to memory of 4964 4216 y48371180.exe 92 PID 4216 wrote to memory of 4964 4216 y48371180.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdfab83925fe5500b2ae7cb66c6cd06313729d16995dd84f222165082d33e3f5.exe"C:\Users\Admin\AppData\Local\Temp\fdfab83925fe5500b2ae7cb66c6cd06313729d16995dd84f222165082d33e3f5.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y48371180.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y48371180.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p88366122.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p88366122.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 13764⤵
- Program crash
PID:2516
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r55889319.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r55889319.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4964
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 64 -ip 641⤵PID:2676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
570KB
MD50b6e44da8f8fbd5b169cc9e5fbb69f7b
SHA1deab15933265ab7c3ad80a4710ed06ee46b21a07
SHA256ac0c70eeeb7e1d84519423ce2323d1a016a4136d9e579be25a4fe05f70dd21e7
SHA512bfe835d3e6b54a54dc3b8f5c56b3142f6f820642197164e1909d033f7e744275c2c41d21779cb4f0f0b3cea93440ff23162a8e5c41a365471b083e66a2f71444
-
Filesize
479KB
MD5f52876f6c21d4eb1e32ff9f49faa73d8
SHA165ac5340cc6851c4f843a1bb10996425fe536dac
SHA256fea5d02b919c30b210cbd83931e21d95fcad514619141c23437c416d64119a26
SHA512635005a18968f417941cc19b0235fd757734fcd2093d56d05738c96239ba82487b57c7b3268e8d2997eb17f8225a07c06249cc8f6d5578505f701e4726d1f566
-
Filesize
169KB
MD5151aec2723baf0e17c77a9a1183cf6fb
SHA122bcd69062ce8766cd197449f371bdd215a907fe
SHA25619c30f97f63a9266c903526c1a76fc7f0ec15d3a155fbbc792c5ef57617fadb0
SHA5126fd86d9bcdc712cae0f51bc7fbde2df7df0c4620e1140c29d5f15c5fd5da9161980e35ac4240092468b4fbd748b9159ef62c681ae26fa64ed9873e69e173905f
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf