Analysis
-
max time kernel
108s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-11-2024 19:32
Static task
static1
Behavioral task
behavioral1
Sample
6cf5aacc8ca71d0c8117f98bf2c8830f865b1684fb2b7afc348b3625617fdf15N.exe
Resource
win10v2004-20241007-en
General
-
Target
6cf5aacc8ca71d0c8117f98bf2c8830f865b1684fb2b7afc348b3625617fdf15N.exe
-
Size
571KB
-
MD5
02f8087526a38bff6fa3685afe4bff90
-
SHA1
10d893a63c35046419dc99944e96204b669e8ec4
-
SHA256
6cf5aacc8ca71d0c8117f98bf2c8830f865b1684fb2b7afc348b3625617fdf15
-
SHA512
4999ae6b1ebf57fc572d1138fe472f5dba60fa9720e1d293cc904232f8020f8306c3226c567a9bea9a4b15cc962023cb0c1efdc1503af108ea9a89538ce8afee
-
SSDEEP
12288:Zy907uZ+GR785TmPUSvA8I/h/an457Kv/n74arYBa8H:ZygEQTNSo8e8/74aSa8H
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dante
185.161.248.73:4164
-
auth_value
f4066af6b8a6f23125c8ee48288a3f90
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/2428-2161-0x0000000005620000-0x0000000005652000-memory.dmp family_redline behavioral1/files/0x000d000000023ae5-2167.dat family_redline behavioral1/memory/720-2178-0x0000000000D00000-0x0000000000D2E000-memory.dmp family_redline behavioral1/files/0x000a000000023b99-2184.dat family_redline behavioral1/memory/3492-2185-0x0000000000EE0000-0x0000000000F10000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation p61103691.exe -
Executes dropped EXE 3 IoCs
pid Process 2428 p61103691.exe 720 1.exe 3492 r23903567.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6cf5aacc8ca71d0c8117f98bf2c8830f865b1684fb2b7afc348b3625617fdf15N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6cf5aacc8ca71d0c8117f98bf2c8830f865b1684fb2b7afc348b3625617fdf15N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language p61103691.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language r23903567.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2428 p61103691.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2428 2292 6cf5aacc8ca71d0c8117f98bf2c8830f865b1684fb2b7afc348b3625617fdf15N.exe 83 PID 2292 wrote to memory of 2428 2292 6cf5aacc8ca71d0c8117f98bf2c8830f865b1684fb2b7afc348b3625617fdf15N.exe 83 PID 2292 wrote to memory of 2428 2292 6cf5aacc8ca71d0c8117f98bf2c8830f865b1684fb2b7afc348b3625617fdf15N.exe 83 PID 2428 wrote to memory of 720 2428 p61103691.exe 87 PID 2428 wrote to memory of 720 2428 p61103691.exe 87 PID 2428 wrote to memory of 720 2428 p61103691.exe 87 PID 2292 wrote to memory of 3492 2292 6cf5aacc8ca71d0c8117f98bf2c8830f865b1684fb2b7afc348b3625617fdf15N.exe 88 PID 2292 wrote to memory of 3492 2292 6cf5aacc8ca71d0c8117f98bf2c8830f865b1684fb2b7afc348b3625617fdf15N.exe 88 PID 2292 wrote to memory of 3492 2292 6cf5aacc8ca71d0c8117f98bf2c8830f865b1684fb2b7afc348b3625617fdf15N.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\6cf5aacc8ca71d0c8117f98bf2c8830f865b1684fb2b7afc348b3625617fdf15N.exe"C:\Users\Admin\AppData\Local\Temp\6cf5aacc8ca71d0c8117f98bf2c8830f865b1684fb2b7afc348b3625617fdf15N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\p61103691.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\p61103691.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:720
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r23903567.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r23903567.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
476KB
MD503515a784b3680fdccd5fcf412053a85
SHA1a65c87c97dd29a148e631fca91af2723074eefac
SHA2569c843063fea7de86feee3a6796ad7104f035e0df0c4ce110148feb3cccccaaff
SHA51295fc253753184e92fe6fa24c3085a250932ebcf03c2b104f4a84dba5bdc45ff586f8545fa93c0277d0d9fec8826cd7e7088f6f805368243eae9a2ac597619609
-
Filesize
169KB
MD5a94ed7b1e1776a90971feae2801ed16d
SHA16d57a92c8da1ff83eee4a5419bb4843a86dfa824
SHA256bcc0196bf3c96c178b698ea977de13a25ffcf159ab4bc43b9ac8fff81cc1ecea
SHA5123b92fb3937fe9e9edd8093e07434b3cb98fef8a0282d0e7c03af675778bd84ceed45f3235ccc405fd94f65d6ca3f562746a5dc2586df13098920eae67c7e066c
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf