Analysis
-
max time kernel
140s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 11:10
Static task
static1
Behavioral task
behavioral1
Sample
9c87ae8aa139f78d048e64fef780cef440b87e3ac7f583cbda8f530995cd1de2.exe
Resource
win10v2004-20241007-en
General
-
Target
9c87ae8aa139f78d048e64fef780cef440b87e3ac7f583cbda8f530995cd1de2.exe
-
Size
764KB
-
MD5
e2a61c0aa82ebee86dc6a8171cce0f1d
-
SHA1
5dbb3199637a8b207329ed97205923eaaa2e45ac
-
SHA256
9c87ae8aa139f78d048e64fef780cef440b87e3ac7f583cbda8f530995cd1de2
-
SHA512
ef9289acfb4203a575f305d7d303a54d968803442b3193c1553d23554e62d4e63e0d9f3a42c66e0712f04b9bf878ee6e86e803008f1d894ad0b07299983d814b
-
SSDEEP
12288:WMrMy90fd9SaQVNc4MinjPF5efIEpv2emOSbEiH3KkvI+yw45u/GTB4Od:CySd9SzVN5XF5j+2emOSbEiH3lvPN45B
Malware Config
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1548-25-0x0000000004A90000-0x0000000004AD6000-memory.dmp family_redline behavioral1/memory/1548-27-0x0000000004B50000-0x0000000004B94000-memory.dmp family_redline behavioral1/memory/1548-29-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1548-35-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1548-33-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1548-31-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1548-89-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1548-77-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1548-65-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1548-37-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1548-28-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1548-91-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1548-87-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1548-86-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1548-83-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1548-81-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1548-79-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1548-75-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1548-73-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1548-71-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1548-69-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1548-67-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1548-63-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1548-61-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1548-59-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1548-57-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1548-55-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1548-53-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1548-51-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1548-49-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1548-47-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1548-45-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1548-43-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1548-41-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1548-39-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3708 vGu18.exe 1420 vJl17.exe 1548 dkS63.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9c87ae8aa139f78d048e64fef780cef440b87e3ac7f583cbda8f530995cd1de2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vGu18.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vJl17.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9c87ae8aa139f78d048e64fef780cef440b87e3ac7f583cbda8f530995cd1de2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vGu18.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vJl17.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dkS63.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1548 dkS63.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4380 wrote to memory of 3708 4380 9c87ae8aa139f78d048e64fef780cef440b87e3ac7f583cbda8f530995cd1de2.exe 83 PID 4380 wrote to memory of 3708 4380 9c87ae8aa139f78d048e64fef780cef440b87e3ac7f583cbda8f530995cd1de2.exe 83 PID 4380 wrote to memory of 3708 4380 9c87ae8aa139f78d048e64fef780cef440b87e3ac7f583cbda8f530995cd1de2.exe 83 PID 3708 wrote to memory of 1420 3708 vGu18.exe 84 PID 3708 wrote to memory of 1420 3708 vGu18.exe 84 PID 3708 wrote to memory of 1420 3708 vGu18.exe 84 PID 1420 wrote to memory of 1548 1420 vJl17.exe 85 PID 1420 wrote to memory of 1548 1420 vJl17.exe 85 PID 1420 wrote to memory of 1548 1420 vJl17.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c87ae8aa139f78d048e64fef780cef440b87e3ac7f583cbda8f530995cd1de2.exe"C:\Users\Admin\AppData\Local\Temp\9c87ae8aa139f78d048e64fef780cef440b87e3ac7f583cbda8f530995cd1de2.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vGu18.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vGu18.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vJl17.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vJl17.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dkS63.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dkS63.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
660KB
MD51c03cf581d0b202e326d177106dce492
SHA1e53f111b16694713dc233e2a53f9f3de317cb802
SHA256621a683bbf03c7b907a5a84d18a971d3c033eb0cee9ffb51b6ebe1e795b21f1a
SHA5122b189d85934f9c9e5ffba05f0ae8b13b9351b5c9c6f0926197c8c53ce07359ea3a3fa256ba802b7ebf3e73b7e574af21c9aaa30ec5d64e24a90a0dd41fe9175a
-
Filesize
516KB
MD5b9e5e108c15efadef1247987402118e5
SHA17f6bb289ba9b7de7efd48f7294f1d18e8c149669
SHA25614a7e1de2c732d95b5f661b897cd4aa7dd97287679bc7cb2962544ff2309e3e6
SHA51223c6bc3ac0438096a54bef8c61c300410a32ec1d06d9115ba1b214703406ae10cb7269c5736a12ca8a5a76d66b9ed22b7f1cb9913f965bec28a67d0105701370
-
Filesize
293KB
MD505cec4f107653cd20a093e2ab3255796
SHA13ea89b1cf7fc3a40d3a8c06d7e3082b39ad67f85
SHA256f8f4ea19cff74a70ef2cc653515d2512d6caf81f7cff71774ae8978718039326
SHA5127553f277177d5025c4346ce5d727073c83c224b12540908bf6d8b75e229ec25b5ad0ef1ce6569ecb59661ef7e16926c3a5bfad477979f9b9d0ab55cc80091b65