Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2024 06:17
Static task
static1
Behavioral task
behavioral1
Sample
a81972d22bbec6d5d7a194144907b7af3582920740dd262e75ad2f1498778f33N.exe
Resource
win10v2004-20241007-en
General
-
Target
a81972d22bbec6d5d7a194144907b7af3582920740dd262e75ad2f1498778f33N.exe
-
Size
583KB
-
MD5
763f94bb2d757bfb041fa56f6844ed20
-
SHA1
ecaa536a49f57cfa3f4abbe167cd8c3301c6d2d7
-
SHA256
a81972d22bbec6d5d7a194144907b7af3582920740dd262e75ad2f1498778f33
-
SHA512
7e24d57735e15a68ebed02ceaab485b588d968ea788470fc7603a1f57a537c18acd48884fd9add42b28ff6d789b4248adbc4c12dedc796161d229a7c3f1f7173
-
SSDEEP
12288:8MrOy9033s5s9CRNv5HjbmclwkLwKi5cBWDmAmX74kN:SyKc5s9Ov5Hjbpfi5jmJVN
Malware Config
Extracted
redline
ronam
193.233.20.17:4139
-
auth_value
125421d19d14dd7fd211bc7f6d4aea6c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2316-19-0x0000000004C90000-0x0000000004CD6000-memory.dmp family_redline behavioral1/memory/2316-21-0x0000000005300000-0x0000000005344000-memory.dmp family_redline behavioral1/memory/2316-23-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/2316-63-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/2316-85-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/2316-83-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/2316-81-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/2316-79-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/2316-77-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/2316-75-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/2316-73-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/2316-71-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/2316-69-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/2316-67-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/2316-61-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/2316-59-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/2316-57-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/2316-55-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/2316-53-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/2316-51-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/2316-49-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/2316-47-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/2316-45-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/2316-43-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/2316-41-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/2316-39-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/2316-37-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/2316-35-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/2316-33-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/2316-31-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/2316-29-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/2316-27-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/2316-25-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/2316-65-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/2316-22-0x0000000005300000-0x000000000533E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
Processes:
nbK36VY20.exeevq49tF.exepid process 2724 nbK36VY20.exe 2316 evq49tF.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
a81972d22bbec6d5d7a194144907b7af3582920740dd262e75ad2f1498778f33N.exenbK36VY20.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a81972d22bbec6d5d7a194144907b7af3582920740dd262e75ad2f1498778f33N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nbK36VY20.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
nbK36VY20.exeevq49tF.exea81972d22bbec6d5d7a194144907b7af3582920740dd262e75ad2f1498778f33N.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbK36VY20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language evq49tF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a81972d22bbec6d5d7a194144907b7af3582920740dd262e75ad2f1498778f33N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
evq49tF.exedescription pid process Token: SeDebugPrivilege 2316 evq49tF.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
a81972d22bbec6d5d7a194144907b7af3582920740dd262e75ad2f1498778f33N.exenbK36VY20.exedescription pid process target process PID 2180 wrote to memory of 2724 2180 a81972d22bbec6d5d7a194144907b7af3582920740dd262e75ad2f1498778f33N.exe nbK36VY20.exe PID 2180 wrote to memory of 2724 2180 a81972d22bbec6d5d7a194144907b7af3582920740dd262e75ad2f1498778f33N.exe nbK36VY20.exe PID 2180 wrote to memory of 2724 2180 a81972d22bbec6d5d7a194144907b7af3582920740dd262e75ad2f1498778f33N.exe nbK36VY20.exe PID 2724 wrote to memory of 2316 2724 nbK36VY20.exe evq49tF.exe PID 2724 wrote to memory of 2316 2724 nbK36VY20.exe evq49tF.exe PID 2724 wrote to memory of 2316 2724 nbK36VY20.exe evq49tF.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a81972d22bbec6d5d7a194144907b7af3582920740dd262e75ad2f1498778f33N.exe"C:\Users\Admin\AppData\Local\Temp\a81972d22bbec6d5d7a194144907b7af3582920740dd262e75ad2f1498778f33N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nbK36VY20.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nbK36VY20.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\evq49tF.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\evq49tF.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2316
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
439KB
MD593d7995a7a8e36c5cb4e1c5dbb79b85d
SHA154ee45b6d665d2fd4d6a3ac90fdb328db961e93b
SHA256f27d60940eae68cd1f2654da255d579e423214f6c58e8c49e5f8fb88a1527e88
SHA5125eba5b9fc4e7f8d91fea29320d26a02d3e5bff1f6aa07f02f5145aa529aaad619cc696b5667e0ef0ac650a8c0ed96b9bec4bba30b34ee6d64ceabcc1bbdeb177
-
Filesize
302KB
MD53ae325b7e23ade83ec4a82f60599bbd2
SHA15dc22cc013fc250e419ac826ef7cb1fcb3728ef5
SHA256271a51784a7210356ba70dfd7e82d0c7c46316b6911925e1e6c955d5b3ecaa74
SHA512a10c5bc435513e0583d9e5227347e1e62a5b1a6a25116f3a609b8d93d797c402ecc88041156f337b66ead158d9fe1a0000b71c1f114efd14c95d28cc26e026d3