Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/11/2024, 22:14
Static task
static1
Behavioral task
behavioral1
Sample
3994a93685e9c77df5404ad6dfc06c559cb7e2017f6763d6685942ce7cedea73.exe
Resource
win10v2004-20241007-en
General
-
Target
3994a93685e9c77df5404ad6dfc06c559cb7e2017f6763d6685942ce7cedea73.exe
-
Size
569KB
-
MD5
a360b55405c1988ea4ed3bd10454be3d
-
SHA1
98604119d1b77ca2672d92d72a24a4e4974d0fba
-
SHA256
3994a93685e9c77df5404ad6dfc06c559cb7e2017f6763d6685942ce7cedea73
-
SHA512
27a1f686d9dc2fcfb07f8bcd35b15e6e9aecfeac1bb629d24c30c82095e2f8ccf8c450d0c408768f825116827ec09d83872717a7a31ad21ce05963d93627d711
-
SSDEEP
12288:5y90jAmCH4vGgA3Y8FdjPhOKkD0BsKxuL0o5XkOiwk7d5:5yqlCYvnkPhOKfBbVSX/itd5
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dante
185.161.248.73:4164
-
auth_value
f4066af6b8a6f23125c8ee48288a3f90
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/2132-2161-0x0000000004E60000-0x0000000004E92000-memory.dmp family_redline behavioral1/files/0x0007000000023c98-2166.dat family_redline behavioral1/memory/5056-2174-0x00000000004C0000-0x00000000004EE000-memory.dmp family_redline behavioral1/files/0x0007000000023c96-2188.dat family_redline behavioral1/memory/4896-2190-0x0000000000E90000-0x0000000000EC0000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation m55074846.exe -
Executes dropped EXE 3 IoCs
pid Process 2132 m55074846.exe 5056 1.exe 4896 n71110944.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3994a93685e9c77df5404ad6dfc06c559cb7e2017f6763d6685942ce7cedea73.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4912 2132 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m55074846.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language n71110944.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3994a93685e9c77df5404ad6dfc06c559cb7e2017f6763d6685942ce7cedea73.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2132 m55074846.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2132 2692 3994a93685e9c77df5404ad6dfc06c559cb7e2017f6763d6685942ce7cedea73.exe 83 PID 2692 wrote to memory of 2132 2692 3994a93685e9c77df5404ad6dfc06c559cb7e2017f6763d6685942ce7cedea73.exe 83 PID 2692 wrote to memory of 2132 2692 3994a93685e9c77df5404ad6dfc06c559cb7e2017f6763d6685942ce7cedea73.exe 83 PID 2132 wrote to memory of 5056 2132 m55074846.exe 87 PID 2132 wrote to memory of 5056 2132 m55074846.exe 87 PID 2132 wrote to memory of 5056 2132 m55074846.exe 87 PID 2692 wrote to memory of 4896 2692 3994a93685e9c77df5404ad6dfc06c559cb7e2017f6763d6685942ce7cedea73.exe 91 PID 2692 wrote to memory of 4896 2692 3994a93685e9c77df5404ad6dfc06c559cb7e2017f6763d6685942ce7cedea73.exe 91 PID 2692 wrote to memory of 4896 2692 3994a93685e9c77df5404ad6dfc06c559cb7e2017f6763d6685942ce7cedea73.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\3994a93685e9c77df5404ad6dfc06c559cb7e2017f6763d6685942ce7cedea73.exe"C:\Users\Admin\AppData\Local\Temp\3994a93685e9c77df5404ad6dfc06c559cb7e2017f6763d6685942ce7cedea73.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m55074846.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m55074846.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2132 -s 13803⤵
- Program crash
PID:4912
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n71110944.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n71110944.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2132 -ip 21321⤵PID:2448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
479KB
MD500cb38d342a1c443f83de64ab3df0628
SHA152655d532a4497d809d68194b6b4f0b526c55170
SHA256c24c25951db24d0dd3b109eaca70e32c621d8c5d6d115d5c605f12d721314f5e
SHA51247a220f0d81884e20d44e03acc7674dc93483dc0f433a7df78910b607d55bc9b959c0d4ceba14b3b6fda80f3930c1a76abd2a5f0ae7545065d8d738d4271278a
-
Filesize
169KB
MD5e62e4bb9734b2212a4c351307ef7c4e8
SHA193fb97a8d6332fcbd80e13289e2a3c8afe029997
SHA25698c9c93155a3cff8a49d3045975a7f7fd9f5ee4702e1414eb049d799b60b2856
SHA512486e3e145333e33259799d36da1f91b0fee8f9debe4ce81de8ab505b591f31b75f76d44dfa32c787689a0c7213a1b011018ecebe49c1397f98e8b9c455307e76
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf