Analysis
-
max time kernel
138s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-11-2024 01:17
Static task
static1
Behavioral task
behavioral1
Sample
9aa7243931558732b3b7608da1755ef2cf4a5040194011a48fd5384bfa9e55c9.exe
Resource
win10v2004-20241007-en
General
-
Target
9aa7243931558732b3b7608da1755ef2cf4a5040194011a48fd5384bfa9e55c9.exe
-
Size
589KB
-
MD5
06dde792f3bb213745bed4ff6a1be687
-
SHA1
2c689775445de07eb1d0ea720971f8a5323aec9d
-
SHA256
9aa7243931558732b3b7608da1755ef2cf4a5040194011a48fd5384bfa9e55c9
-
SHA512
3cbaa2f923b26a8d3853b85aaab07f2e226c31228feda98f6bdb4d8567496c091197e24bb05c61bd9257b9052f5c3a546c332566996dd7999735296d97d42a16
-
SSDEEP
12288:xy90vTRRa+nn6nThR50wqePIqGnezV7hKm7qXiKR2:xy2NnyRPqeQq9zRhKmMU
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dante
185.161.248.73:4164
-
auth_value
f4066af6b8a6f23125c8ee48288a3f90
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/3036-2162-0x00000000059C0000-0x00000000059F2000-memory.dmp family_redline behavioral1/files/0x0002000000022b11-2167.dat family_redline behavioral1/memory/1592-2175-0x00000000004C0000-0x00000000004EE000-memory.dmp family_redline behavioral1/files/0x000a000000023bac-2189.dat family_redline behavioral1/memory/5608-2191-0x0000000000470000-0x00000000004A0000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation m34905672.exe -
Executes dropped EXE 3 IoCs
pid Process 3036 m34905672.exe 1592 1.exe 5608 n89841977.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9aa7243931558732b3b7608da1755ef2cf4a5040194011a48fd5384bfa9e55c9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3648 3036 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9aa7243931558732b3b7608da1755ef2cf4a5040194011a48fd5384bfa9e55c9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m34905672.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language n89841977.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3036 m34905672.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2784 wrote to memory of 3036 2784 9aa7243931558732b3b7608da1755ef2cf4a5040194011a48fd5384bfa9e55c9.exe 83 PID 2784 wrote to memory of 3036 2784 9aa7243931558732b3b7608da1755ef2cf4a5040194011a48fd5384bfa9e55c9.exe 83 PID 2784 wrote to memory of 3036 2784 9aa7243931558732b3b7608da1755ef2cf4a5040194011a48fd5384bfa9e55c9.exe 83 PID 3036 wrote to memory of 1592 3036 m34905672.exe 88 PID 3036 wrote to memory of 1592 3036 m34905672.exe 88 PID 3036 wrote to memory of 1592 3036 m34905672.exe 88 PID 2784 wrote to memory of 5608 2784 9aa7243931558732b3b7608da1755ef2cf4a5040194011a48fd5384bfa9e55c9.exe 95 PID 2784 wrote to memory of 5608 2784 9aa7243931558732b3b7608da1755ef2cf4a5040194011a48fd5384bfa9e55c9.exe 95 PID 2784 wrote to memory of 5608 2784 9aa7243931558732b3b7608da1755ef2cf4a5040194011a48fd5384bfa9e55c9.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\9aa7243931558732b3b7608da1755ef2cf4a5040194011a48fd5384bfa9e55c9.exe"C:\Users\Admin\AppData\Local\Temp\9aa7243931558732b3b7608da1755ef2cf4a5040194011a48fd5384bfa9e55c9.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m34905672.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m34905672.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3036 -s 11963⤵
- Program crash
PID:3648
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n89841977.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n89841977.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3036 -ip 30361⤵PID:2440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
530KB
MD5a88ee0b689c20be74d42c4d596d55bf9
SHA1f4be54f07f51e5cd4c6663a23cfa080f83dafa6a
SHA256a34b1dc19dd23bd3be8b412c12527a4316ea0cf605112fee63fdf1431688f109
SHA512750a60d32de39aa86e0bd9803094d7172c04e0172ae14e495bef112efebd7a29df3283e6d2e7bada7e008bea7ba503c3a355ddcb4bfc88a821d6889fd47a89e0
-
Filesize
168KB
MD55bef6692cc9f090581eca5ad68b2f88d
SHA1f18f79ce81b0d9bc38c21499db81a9e9e0f7a82b
SHA256689fb4397e849bf0755ab0ec98ccf381b14b837bb61648c7eb3738f912f1d8a3
SHA5124d2b29888330d960d03c6ea5ae0b8441484ad53c9f7cf347a75ef467f81051a026a3cc4ff18e6159d575803bcfdcd167bdc9d6678d37471645051cb015edb8cd
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf