Analysis
-
max time kernel
111s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-11-2024 13:43
Static task
static1
Behavioral task
behavioral1
Sample
4e53245dab6c6907bbef1e4dc596cdc91baa0407e5880275d5ad7f542b64324bN.exe
Resource
win10v2004-20241007-en
General
-
Target
4e53245dab6c6907bbef1e4dc596cdc91baa0407e5880275d5ad7f542b64324bN.exe
-
Size
839KB
-
MD5
2eccb85e20ad715b45f1789cd5cda2ed
-
SHA1
0ec9820d975ed23a55713ed006162eebd39db07e
-
SHA256
494778ecd2bb10d56f988c137352df14347a73ae9b18712e7c2efbd9b5954686
-
SHA512
4a07e3b5a07f7c0c6faac4d1a53bb73295405a946faddedf15034db2a1d1dcadd51c4e9184bdff586b972cd49d7b52bee82228ed45b90b1ee17f3ae897597f9d
-
SSDEEP
12288:WMrry9060V6EVq03sOs01Df04/sHOMrvefNHqigCq7FGzzZNYpA+Mv:JyuVrls01704kHOM6oCI0zz9zv
Malware Config
Extracted
redline
crypt1
176.113.115.17:4132
-
auth_value
2e2ca7bbceaa9f98252a6f9fc0e6fa86
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
resource yara_rule behavioral1/memory/1160-24-0x0000000000400000-0x0000000000432000-memory.dmp family_redline behavioral1/memory/1032-37-0x0000000002640000-0x0000000002686000-memory.dmp family_redline behavioral1/memory/1032-39-0x00000000026C0000-0x0000000002704000-memory.dmp family_redline behavioral1/memory/1032-40-0x00000000026C0000-0x00000000026FE000-memory.dmp family_redline behavioral1/memory/1032-53-0x00000000026C0000-0x00000000026FE000-memory.dmp family_redline behavioral1/memory/1032-99-0x00000000026C0000-0x00000000026FE000-memory.dmp family_redline behavioral1/memory/1032-98-0x00000000026C0000-0x00000000026FE000-memory.dmp family_redline behavioral1/memory/1032-93-0x00000000026C0000-0x00000000026FE000-memory.dmp family_redline behavioral1/memory/1032-91-0x00000000026C0000-0x00000000026FE000-memory.dmp family_redline behavioral1/memory/1032-89-0x00000000026C0000-0x00000000026FE000-memory.dmp family_redline behavioral1/memory/1032-87-0x00000000026C0000-0x00000000026FE000-memory.dmp family_redline behavioral1/memory/1032-85-0x00000000026C0000-0x00000000026FE000-memory.dmp family_redline behavioral1/memory/1032-83-0x00000000026C0000-0x00000000026FE000-memory.dmp family_redline behavioral1/memory/1032-81-0x00000000026C0000-0x00000000026FE000-memory.dmp family_redline behavioral1/memory/1032-79-0x00000000026C0000-0x00000000026FE000-memory.dmp family_redline behavioral1/memory/1032-77-0x00000000026C0000-0x00000000026FE000-memory.dmp family_redline behavioral1/memory/1032-73-0x00000000026C0000-0x00000000026FE000-memory.dmp family_redline behavioral1/memory/1032-72-0x00000000026C0000-0x00000000026FE000-memory.dmp family_redline behavioral1/memory/1032-69-0x00000000026C0000-0x00000000026FE000-memory.dmp family_redline behavioral1/memory/1032-67-0x00000000026C0000-0x00000000026FE000-memory.dmp family_redline behavioral1/memory/1032-63-0x00000000026C0000-0x00000000026FE000-memory.dmp family_redline behavioral1/memory/1032-61-0x00000000026C0000-0x00000000026FE000-memory.dmp family_redline behavioral1/memory/1032-60-0x00000000026C0000-0x00000000026FE000-memory.dmp family_redline behavioral1/memory/1032-57-0x00000000026C0000-0x00000000026FE000-memory.dmp family_redline behavioral1/memory/1032-56-0x00000000026C0000-0x00000000026FE000-memory.dmp family_redline behavioral1/memory/1032-51-0x00000000026C0000-0x00000000026FE000-memory.dmp family_redline behavioral1/memory/1032-49-0x00000000026C0000-0x00000000026FE000-memory.dmp family_redline behavioral1/memory/1032-47-0x00000000026C0000-0x00000000026FE000-memory.dmp family_redline behavioral1/memory/1032-45-0x00000000026C0000-0x00000000026FE000-memory.dmp family_redline behavioral1/memory/1032-43-0x00000000026C0000-0x00000000026FE000-memory.dmp family_redline behavioral1/memory/1032-41-0x00000000026C0000-0x00000000026FE000-memory.dmp family_redline behavioral1/memory/1032-95-0x00000000026C0000-0x00000000026FE000-memory.dmp family_redline behavioral1/memory/1032-75-0x00000000026C0000-0x00000000026FE000-memory.dmp family_redline behavioral1/memory/1032-65-0x00000000026C0000-0x00000000026FE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 3028 dDU03.exe 2232 ddL52.exe 2236 dWn47.exe 1032 lSG31.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ddL52.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4e53245dab6c6907bbef1e4dc596cdc91baa0407e5880275d5ad7f542b64324bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" dDU03.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2236 set thread context of 1160 2236 dWn47.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e53245dab6c6907bbef1e4dc596cdc91baa0407e5880275d5ad7f542b64324bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dDU03.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddL52.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dWn47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lSG31.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1032 lSG31.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4248 wrote to memory of 3028 4248 4e53245dab6c6907bbef1e4dc596cdc91baa0407e5880275d5ad7f542b64324bN.exe 85 PID 4248 wrote to memory of 3028 4248 4e53245dab6c6907bbef1e4dc596cdc91baa0407e5880275d5ad7f542b64324bN.exe 85 PID 4248 wrote to memory of 3028 4248 4e53245dab6c6907bbef1e4dc596cdc91baa0407e5880275d5ad7f542b64324bN.exe 85 PID 3028 wrote to memory of 2232 3028 dDU03.exe 86 PID 3028 wrote to memory of 2232 3028 dDU03.exe 86 PID 3028 wrote to memory of 2232 3028 dDU03.exe 86 PID 2232 wrote to memory of 2236 2232 ddL52.exe 87 PID 2232 wrote to memory of 2236 2232 ddL52.exe 87 PID 2232 wrote to memory of 2236 2232 ddL52.exe 87 PID 2236 wrote to memory of 1160 2236 dWn47.exe 90 PID 2236 wrote to memory of 1160 2236 dWn47.exe 90 PID 2236 wrote to memory of 1160 2236 dWn47.exe 90 PID 2236 wrote to memory of 1160 2236 dWn47.exe 90 PID 2236 wrote to memory of 1160 2236 dWn47.exe 90 PID 2232 wrote to memory of 1032 2232 ddL52.exe 91 PID 2232 wrote to memory of 1032 2232 ddL52.exe 91 PID 2232 wrote to memory of 1032 2232 ddL52.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e53245dab6c6907bbef1e4dc596cdc91baa0407e5880275d5ad7f542b64324bN.exe"C:\Users\Admin\AppData\Local\Temp\4e53245dab6c6907bbef1e4dc596cdc91baa0407e5880275d5ad7f542b64324bN.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dDU03.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dDU03.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ddL52.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ddL52.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dWn47.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dWn47.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- System Location Discovery: System Language Discovery
PID:1160
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lSG31.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lSG31.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1032
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
735KB
MD592c28bdb6c273bdeb72e707c7f19d1ea
SHA1e2fa90a0817b17fd0e3a03544781fa570cdef9d6
SHA256fd9fefb7f0fb8e9c03a35cacdcc01852fe8d127a96e2ffe3464447e07437b08a
SHA512cba72293059238c44142f001b6b8d7a978645668d0fac9f2d2bf5b020ea77ac9b703f2fcce87bc663cace7b49b89ecf39b90c31b9c02bf4ed29d13ea8d3fdb3f
-
Filesize
589KB
MD5e1d9026694ed73beb542d42be9543817
SHA1476e3c1f66c8e6ea203df56f9b0a962d9ded5d9f
SHA256f5d6e518f0655f0fa920c9393d439491344cfde10b660ab8dd8eed1c9c1d100e
SHA51291b910ebc5eba5610cb54028a75bb550e6bdb13e8628abef1fe253dd244795ed57e906616be9ee8b63eab8829402116026f1b3b9cf957330055a068b7df2b2c7
-
Filesize
277KB
MD53bc6ecb7d1f35f3171383f88879659b7
SHA1e82887b3d6ab38ae3b8880d6c904244495dcf0cc
SHA256c95f1ca2230edb615f3365e4c3ad09e4e1940a2c554eaf27c0df2d5bc4fc1068
SHA512709eb1c1c322c70a2a377324fa1766bfff9a3e1d37db04da240aaab36317d813b6f32f5c0d0a3f8d30f196f132985fce0ec030d5783df3c7bff76a4ccfb4431c
-
Filesize
485KB
MD52ccd01c92399fe932126e1ce38c62565
SHA1316e0ec4f0c22a6eb4095cfb03ddb9a38aed8cdc
SHA25642cfcf278f98d0cb0268be1fbc5eb602dd06a83deca627e3b46942dcb678a6ed
SHA512acdad4be559fa272111a72647f8f7c7501de42192b570520a91695d170c41b6d62f7cdb99b583a106514a648ba7b27ede0095028b965502fd7ba7c5e32c01aa5