Analysis
-
max time kernel
110s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-11-2024 22:08
Static task
static1
Behavioral task
behavioral1
Sample
3994a93685e9c77df5404ad6dfc06c559cb7e2017f6763d6685942ce7cedea73.exe
Resource
win10v2004-20241007-en
General
-
Target
3994a93685e9c77df5404ad6dfc06c559cb7e2017f6763d6685942ce7cedea73.exe
-
Size
569KB
-
MD5
a360b55405c1988ea4ed3bd10454be3d
-
SHA1
98604119d1b77ca2672d92d72a24a4e4974d0fba
-
SHA256
3994a93685e9c77df5404ad6dfc06c559cb7e2017f6763d6685942ce7cedea73
-
SHA512
27a1f686d9dc2fcfb07f8bcd35b15e6e9aecfeac1bb629d24c30c82095e2f8ccf8c450d0c408768f825116827ec09d83872717a7a31ad21ce05963d93627d711
-
SSDEEP
12288:5y90jAmCH4vGgA3Y8FdjPhOKkD0BsKxuL0o5XkOiwk7d5:5yqlCYvnkPhOKfBbVSX/itd5
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dante
185.161.248.73:4164
-
auth_value
f4066af6b8a6f23125c8ee48288a3f90
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1844-2162-0x0000000005760000-0x0000000005792000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5424-2175-0x0000000000C80000-0x0000000000CAE000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n71110944.exe family_redline behavioral1/memory/5656-2191-0x00000000001D0000-0x0000000000200000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
m55074846.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation m55074846.exe -
Executes dropped EXE 3 IoCs
Processes:
m55074846.exe1.exen71110944.exepid process 1844 m55074846.exe 5424 1.exe 5656 n71110944.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
3994a93685e9c77df5404ad6dfc06c559cb7e2017f6763d6685942ce7cedea73.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3994a93685e9c77df5404ad6dfc06c559cb7e2017f6763d6685942ce7cedea73.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 6056 1844 WerFault.exe m55074846.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
3994a93685e9c77df5404ad6dfc06c559cb7e2017f6763d6685942ce7cedea73.exem55074846.exe1.exen71110944.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3994a93685e9c77df5404ad6dfc06c559cb7e2017f6763d6685942ce7cedea73.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m55074846.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language n71110944.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
m55074846.exedescription pid process Token: SeDebugPrivilege 1844 m55074846.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
3994a93685e9c77df5404ad6dfc06c559cb7e2017f6763d6685942ce7cedea73.exem55074846.exedescription pid process target process PID 5080 wrote to memory of 1844 5080 3994a93685e9c77df5404ad6dfc06c559cb7e2017f6763d6685942ce7cedea73.exe m55074846.exe PID 5080 wrote to memory of 1844 5080 3994a93685e9c77df5404ad6dfc06c559cb7e2017f6763d6685942ce7cedea73.exe m55074846.exe PID 5080 wrote to memory of 1844 5080 3994a93685e9c77df5404ad6dfc06c559cb7e2017f6763d6685942ce7cedea73.exe m55074846.exe PID 1844 wrote to memory of 5424 1844 m55074846.exe 1.exe PID 1844 wrote to memory of 5424 1844 m55074846.exe 1.exe PID 1844 wrote to memory of 5424 1844 m55074846.exe 1.exe PID 5080 wrote to memory of 5656 5080 3994a93685e9c77df5404ad6dfc06c559cb7e2017f6763d6685942ce7cedea73.exe n71110944.exe PID 5080 wrote to memory of 5656 5080 3994a93685e9c77df5404ad6dfc06c559cb7e2017f6763d6685942ce7cedea73.exe n71110944.exe PID 5080 wrote to memory of 5656 5080 3994a93685e9c77df5404ad6dfc06c559cb7e2017f6763d6685942ce7cedea73.exe n71110944.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3994a93685e9c77df5404ad6dfc06c559cb7e2017f6763d6685942ce7cedea73.exe"C:\Users\Admin\AppData\Local\Temp\3994a93685e9c77df5404ad6dfc06c559cb7e2017f6763d6685942ce7cedea73.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m55074846.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m55074846.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1844 -s 13763⤵
- Program crash
PID:6056
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n71110944.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n71110944.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1844 -ip 18441⤵PID:6128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
479KB
MD500cb38d342a1c443f83de64ab3df0628
SHA152655d532a4497d809d68194b6b4f0b526c55170
SHA256c24c25951db24d0dd3b109eaca70e32c621d8c5d6d115d5c605f12d721314f5e
SHA51247a220f0d81884e20d44e03acc7674dc93483dc0f433a7df78910b607d55bc9b959c0d4ceba14b3b6fda80f3930c1a76abd2a5f0ae7545065d8d738d4271278a
-
Filesize
169KB
MD5e62e4bb9734b2212a4c351307ef7c4e8
SHA193fb97a8d6332fcbd80e13289e2a3c8afe029997
SHA25698c9c93155a3cff8a49d3045975a7f7fd9f5ee4702e1414eb049d799b60b2856
SHA512486e3e145333e33259799d36da1f91b0fee8f9debe4ce81de8ab505b591f31b75f76d44dfa32c787689a0c7213a1b011018ecebe49c1397f98e8b9c455307e76
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf