Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 11:04
Static task
static1
Behavioral task
behavioral1
Sample
7737d039a714c7cea8ae63a69766b9155b902d0e1660d2fb45ab86e94b525380.exe
Resource
win10v2004-20241007-en
General
-
Target
7737d039a714c7cea8ae63a69766b9155b902d0e1660d2fb45ab86e94b525380.exe
-
Size
759KB
-
MD5
95dbdcc55dbc500642b7ca63975883f0
-
SHA1
29bd749792863370bf07cac1d98766f3c4839711
-
SHA256
7737d039a714c7cea8ae63a69766b9155b902d0e1660d2fb45ab86e94b525380
-
SHA512
7eea95e65f7596cde0de4ee5b837d8ffff21a0416d5a198fff54cf0d386f9437306692954ea68100a637630ca7fefb6df960698c93047b02cf76bdf55533816f
-
SSDEEP
12288:vMr0y90FmgGN0mV6n9Ii2Ial69xMghb6TPISPwHae6uaLA0RP53:HyAmgqVV6n9X2I66cggTVw6jR1
Malware Config
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3044-22-0x0000000004CC0000-0x0000000004D06000-memory.dmp family_redline behavioral1/memory/3044-24-0x0000000004D80000-0x0000000004DC4000-memory.dmp family_redline behavioral1/memory/3044-82-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3044-62-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3044-40-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3044-25-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3044-88-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3044-86-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3044-84-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3044-80-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3044-78-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3044-76-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3044-74-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3044-72-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3044-70-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3044-68-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3044-66-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3044-64-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3044-60-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3044-58-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3044-56-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3044-54-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3044-52-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3044-50-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3044-48-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3044-46-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3044-44-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3044-42-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3044-38-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3044-36-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3044-34-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3044-32-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3044-30-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3044-28-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/3044-26-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3068 vND20.exe 1424 vYX44.exe 3044 dRg36.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vYX44.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7737d039a714c7cea8ae63a69766b9155b902d0e1660d2fb45ab86e94b525380.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vND20.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vYX44.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dRg36.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7737d039a714c7cea8ae63a69766b9155b902d0e1660d2fb45ab86e94b525380.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vND20.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3044 dRg36.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4928 wrote to memory of 3068 4928 7737d039a714c7cea8ae63a69766b9155b902d0e1660d2fb45ab86e94b525380.exe 83 PID 4928 wrote to memory of 3068 4928 7737d039a714c7cea8ae63a69766b9155b902d0e1660d2fb45ab86e94b525380.exe 83 PID 4928 wrote to memory of 3068 4928 7737d039a714c7cea8ae63a69766b9155b902d0e1660d2fb45ab86e94b525380.exe 83 PID 3068 wrote to memory of 1424 3068 vND20.exe 84 PID 3068 wrote to memory of 1424 3068 vND20.exe 84 PID 3068 wrote to memory of 1424 3068 vND20.exe 84 PID 1424 wrote to memory of 3044 1424 vYX44.exe 85 PID 1424 wrote to memory of 3044 1424 vYX44.exe 85 PID 1424 wrote to memory of 3044 1424 vYX44.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\7737d039a714c7cea8ae63a69766b9155b902d0e1660d2fb45ab86e94b525380.exe"C:\Users\Admin\AppData\Local\Temp\7737d039a714c7cea8ae63a69766b9155b902d0e1660d2fb45ab86e94b525380.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vND20.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vND20.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vYX44.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vYX44.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dRg36.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dRg36.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
655KB
MD5810de4b46fc72cea9ca7cdf5fb467c1e
SHA179b8fe88a283cec988b71d83d3be52ff21be2416
SHA2564d542ff42d0b9086149088dbae686e5e7c6bf89ec54b61ee11a3438c6ce579e7
SHA512c202aaf1c900d7b8b4f779a90f7da42a3e4a3ed247ed25cb871424a2904bc31995e96c1658329e9e008bfa79c2aa911bc2e0877829cffd52e7aea3f6a6b2f5bb
-
Filesize
509KB
MD53ceabd97c62d1b118f0c53bb9ed8d644
SHA17b084aba1250e71b060c5e7e8697a1f14cc9a256
SHA256133a6299d74175632455580553ff7df2667a1b1d637513289a5e5b892c896de2
SHA512e8b07bb4cf3fb27a0df8b93f337a4dab22f5586b26dc2af67796da844679d5cd695677de8b083ec01a4962a208984938a7537809d6796678ed41d74cbe693106
-
Filesize
280KB
MD57d909ade41361092545c6e8718ef0458
SHA136b2753a4c3275635178e80d71a86bcd04ad4c98
SHA25606e3026c306e867e5c77594df9c6bc687d1567416f014fba65ec1121eaf78591
SHA512063b2020da84aad453254dd62fc3b6d2d6fa29966dfd88ad2af175514fad0a45a808123bd1619fae162190449cbdb8521873b4839e101ea0bb3622b4c1a03dce