Analysis
-
max time kernel
132s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 06:53
Static task
static1
Behavioral task
behavioral1
Sample
7e620c2e24ed7ad30581ba40ff285ce844a62ccb3efef7226cb808fd8dc8b588.exe
Resource
win10v2004-20241007-en
General
-
Target
7e620c2e24ed7ad30581ba40ff285ce844a62ccb3efef7226cb808fd8dc8b588.exe
-
Size
1.1MB
-
MD5
9df9a4fca937582bc0f3391728c24d9e
-
SHA1
7061f83a1076d374b631ac9d2b61546135c78b32
-
SHA256
7e620c2e24ed7ad30581ba40ff285ce844a62ccb3efef7226cb808fd8dc8b588
-
SHA512
c6cc7b120559a85e9f4dd8d054f9cf939efbf55c37933f549bf387a0d0ce3c0c8410b2ef0aaed4ae1a0ad577424c5e8c3eff8c80f7008e8cdfd0464f890dafad
-
SSDEEP
24576:YyMAwislcRvZ50AVxqMJqvLHr0yNUeBYHHJ2Mj7:fMgicRH0AVx6vLwypYZ
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3489535.exe family_redline behavioral1/memory/1008-21-0x00000000005F0000-0x000000000061A000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
x4539141.exex0707021.exef3489535.exepid process 3300 x4539141.exe 3208 x0707021.exe 1008 f3489535.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
7e620c2e24ed7ad30581ba40ff285ce844a62ccb3efef7226cb808fd8dc8b588.exex4539141.exex0707021.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7e620c2e24ed7ad30581ba40ff285ce844a62ccb3efef7226cb808fd8dc8b588.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x4539141.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x0707021.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
x0707021.exef3489535.exe7e620c2e24ed7ad30581ba40ff285ce844a62ccb3efef7226cb808fd8dc8b588.exex4539141.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x0707021.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3489535.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7e620c2e24ed7ad30581ba40ff285ce844a62ccb3efef7226cb808fd8dc8b588.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x4539141.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
7e620c2e24ed7ad30581ba40ff285ce844a62ccb3efef7226cb808fd8dc8b588.exex4539141.exex0707021.exedescription pid process target process PID 5020 wrote to memory of 3300 5020 7e620c2e24ed7ad30581ba40ff285ce844a62ccb3efef7226cb808fd8dc8b588.exe x4539141.exe PID 5020 wrote to memory of 3300 5020 7e620c2e24ed7ad30581ba40ff285ce844a62ccb3efef7226cb808fd8dc8b588.exe x4539141.exe PID 5020 wrote to memory of 3300 5020 7e620c2e24ed7ad30581ba40ff285ce844a62ccb3efef7226cb808fd8dc8b588.exe x4539141.exe PID 3300 wrote to memory of 3208 3300 x4539141.exe x0707021.exe PID 3300 wrote to memory of 3208 3300 x4539141.exe x0707021.exe PID 3300 wrote to memory of 3208 3300 x4539141.exe x0707021.exe PID 3208 wrote to memory of 1008 3208 x0707021.exe f3489535.exe PID 3208 wrote to memory of 1008 3208 x0707021.exe f3489535.exe PID 3208 wrote to memory of 1008 3208 x0707021.exe f3489535.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e620c2e24ed7ad30581ba40ff285ce844a62ccb3efef7226cb808fd8dc8b588.exe"C:\Users\Admin\AppData\Local\Temp\7e620c2e24ed7ad30581ba40ff285ce844a62ccb3efef7226cb808fd8dc8b588.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4539141.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4539141.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0707021.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0707021.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3489535.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3489535.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1008
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
749KB
MD5221aca187070d31fa2812834f36cfc10
SHA16bd43da252817b1cbce98eb6a435b532d74bfd53
SHA2569efc10b8fa8b7dc785f08e49b41b534a1389b7bfc47a30f21c75c6549ae35b89
SHA5122feb5cfc9375f3027ea1a20dc1496363778546bc40854aeefb9494ab997606a884b1dd0d8a5dcca1ae7cf382bb4c2eac58166cb3460789b84ad654e41685954d
-
Filesize
305KB
MD576ae79cecca91446a1e168e3c06caa6b
SHA14ef3a1232e77012312ad9edea920982d0e8aefcf
SHA256ede9af7f535c9063070c03c4e0f2937994b8e8d0d62d3c933d22b2dd5e935a0d
SHA5129f3b20445fec57b60d3b64667d14d4807bd2bbfc9027d0ffdacd5bc2552cd94e317ea4f3e1a767c0c50a6c41dcdcbcc50ebca6b98d7331e1d4aa6784db849cf9
-
Filesize
145KB
MD5564c5d7ff7b4fc639235831faf1fd1fb
SHA1942eaec2c26a2c6b1baa726a8f488a85e7de3ff5
SHA256ef598670ff1990a9f9b06097399ee6afad35b8cb4806195d0f7ba9cff55a93af
SHA5122553ee338cf729606f4a1adc858aa37b94a5148414555a23999957397ce96acb86503a713864965595f599afd17aa89af9286f1e70d4c9fb2f88c939a157b156