Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 09:18
Static task
static1
Behavioral task
behavioral1
Sample
d85dc709abc242e98cae942533c1f437246b12e10ffd8231a0e95ed47447bdda.exe
Resource
win10v2004-20241007-en
General
-
Target
d85dc709abc242e98cae942533c1f437246b12e10ffd8231a0e95ed47447bdda.exe
-
Size
760KB
-
MD5
ff49c586096bb765a7bb3b43dd43af10
-
SHA1
eb262ba6b77663bf8a258a6fd08d91673cc5a907
-
SHA256
d85dc709abc242e98cae942533c1f437246b12e10ffd8231a0e95ed47447bdda
-
SHA512
abf391af1793efc34e6e94ddc7da3ac75b9262fc6b9545b00c3ed8c62b1aab301f56bda2ad7c952496addd57e2cac6125c3a65d17c9ec0939ba6dfdbf945df8b
-
SSDEEP
12288:VMrqy90bF0wvS0TnLXT5ZyvXjZRpUpL2dp0Ugmn0cDYevgPeV9rZR6rZwNxft:fyxwvS0TLXlZORpq2dp0UgmJDDvg23rb
Malware Config
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3164-22-0x0000000002970000-0x00000000029B6000-memory.dmp family_redline behavioral1/memory/3164-24-0x00000000054E0000-0x0000000005524000-memory.dmp family_redline behavioral1/memory/3164-25-0x00000000054E0000-0x000000000551E000-memory.dmp family_redline behavioral1/memory/3164-46-0x00000000054E0000-0x000000000551E000-memory.dmp family_redline behavioral1/memory/3164-86-0x00000000054E0000-0x000000000551E000-memory.dmp family_redline behavioral1/memory/3164-85-0x00000000054E0000-0x000000000551E000-memory.dmp family_redline behavioral1/memory/3164-80-0x00000000054E0000-0x000000000551E000-memory.dmp family_redline behavioral1/memory/3164-78-0x00000000054E0000-0x000000000551E000-memory.dmp family_redline behavioral1/memory/3164-76-0x00000000054E0000-0x000000000551E000-memory.dmp family_redline behavioral1/memory/3164-74-0x00000000054E0000-0x000000000551E000-memory.dmp family_redline behavioral1/memory/3164-72-0x00000000054E0000-0x000000000551E000-memory.dmp family_redline behavioral1/memory/3164-68-0x00000000054E0000-0x000000000551E000-memory.dmp family_redline behavioral1/memory/3164-64-0x00000000054E0000-0x000000000551E000-memory.dmp family_redline behavioral1/memory/3164-62-0x00000000054E0000-0x000000000551E000-memory.dmp family_redline behavioral1/memory/3164-60-0x00000000054E0000-0x000000000551E000-memory.dmp family_redline behavioral1/memory/3164-58-0x00000000054E0000-0x000000000551E000-memory.dmp family_redline behavioral1/memory/3164-54-0x00000000054E0000-0x000000000551E000-memory.dmp family_redline behavioral1/memory/3164-52-0x00000000054E0000-0x000000000551E000-memory.dmp family_redline behavioral1/memory/3164-50-0x00000000054E0000-0x000000000551E000-memory.dmp family_redline behavioral1/memory/3164-44-0x00000000054E0000-0x000000000551E000-memory.dmp family_redline behavioral1/memory/3164-42-0x00000000054E0000-0x000000000551E000-memory.dmp family_redline behavioral1/memory/3164-40-0x00000000054E0000-0x000000000551E000-memory.dmp family_redline behavioral1/memory/3164-38-0x00000000054E0000-0x000000000551E000-memory.dmp family_redline behavioral1/memory/3164-36-0x00000000054E0000-0x000000000551E000-memory.dmp family_redline behavioral1/memory/3164-34-0x00000000054E0000-0x000000000551E000-memory.dmp family_redline behavioral1/memory/3164-32-0x00000000054E0000-0x000000000551E000-memory.dmp family_redline behavioral1/memory/3164-30-0x00000000054E0000-0x000000000551E000-memory.dmp family_redline behavioral1/memory/3164-28-0x00000000054E0000-0x000000000551E000-memory.dmp family_redline behavioral1/memory/3164-26-0x00000000054E0000-0x000000000551E000-memory.dmp family_redline behavioral1/memory/3164-88-0x00000000054E0000-0x000000000551E000-memory.dmp family_redline behavioral1/memory/3164-82-0x00000000054E0000-0x000000000551E000-memory.dmp family_redline behavioral1/memory/3164-70-0x00000000054E0000-0x000000000551E000-memory.dmp family_redline behavioral1/memory/3164-66-0x00000000054E0000-0x000000000551E000-memory.dmp family_redline behavioral1/memory/3164-56-0x00000000054E0000-0x000000000551E000-memory.dmp family_redline behavioral1/memory/3164-48-0x00000000054E0000-0x000000000551E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3348 vQF31.exe 1480 vwi96.exe 3164 dhN62.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d85dc709abc242e98cae942533c1f437246b12e10ffd8231a0e95ed47447bdda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vQF31.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vwi96.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d85dc709abc242e98cae942533c1f437246b12e10ffd8231a0e95ed47447bdda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vQF31.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vwi96.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dhN62.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3164 dhN62.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2172 wrote to memory of 3348 2172 d85dc709abc242e98cae942533c1f437246b12e10ffd8231a0e95ed47447bdda.exe 83 PID 2172 wrote to memory of 3348 2172 d85dc709abc242e98cae942533c1f437246b12e10ffd8231a0e95ed47447bdda.exe 83 PID 2172 wrote to memory of 3348 2172 d85dc709abc242e98cae942533c1f437246b12e10ffd8231a0e95ed47447bdda.exe 83 PID 3348 wrote to memory of 1480 3348 vQF31.exe 84 PID 3348 wrote to memory of 1480 3348 vQF31.exe 84 PID 3348 wrote to memory of 1480 3348 vQF31.exe 84 PID 1480 wrote to memory of 3164 1480 vwi96.exe 85 PID 1480 wrote to memory of 3164 1480 vwi96.exe 85 PID 1480 wrote to memory of 3164 1480 vwi96.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\d85dc709abc242e98cae942533c1f437246b12e10ffd8231a0e95ed47447bdda.exe"C:\Users\Admin\AppData\Local\Temp\d85dc709abc242e98cae942533c1f437246b12e10ffd8231a0e95ed47447bdda.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vQF31.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vQF31.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vwi96.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vwi96.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dhN62.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dhN62.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3164
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
656KB
MD5e3b4ba43bd889c10dc0812aaf6df04d0
SHA10ebd7394a4be580c27e5f823095e03b22924a8c0
SHA256efb5724339b1300db8f7c52c14c0f72b03f55714d7f78223282107e67a5e04d6
SHA512efdc90b1ab7d94c5af49059df93191b8854db73559f925bfbe039b016fafe7128f54e5219fa1411b1fb3bc78e257e3b109ff69f2a0d2b0b26444e7a995401ad8
-
Filesize
511KB
MD5313b842b7a7c2afa399eb9d4e96c936f
SHA15e2e49d7a099458d9bd3bed2ab71941fe65cf026
SHA256c7715672dc0251ca0c72b366c5343d778d3e4039c866051c223c4804a40aba30
SHA512a1458f2bccd80539fdf56497039dec15c4e80c4ccecd1f228fd08a67c1cff6c10ab0b96ee63d563c54c934c4c34abd253efba64eee7910a172d63f754e936405
-
Filesize
287KB
MD5d8188b6e91a330ef924426abe7f1f9f8
SHA1980dad68e6d92724d8f3762ee094943390ed444a
SHA256b45b88fca18a6ca918d989de54ef418f9c4bc147df9c88f7d10fe8b85962f227
SHA51271e78e3d5ea8c1607c508ba8baa40ee66776530c452fd73e7fdbe30c6d0a738d28f9ddfb5f6cd8d6c8a9eabb3ebe9aa4aef269779b3b77cd908911e3ddcfb5b4