Analysis
-
max time kernel
110s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2024 12:33
Static task
static1
Behavioral task
behavioral1
Sample
e225104547f7cd3e002ae69ac88c2ff8515afd54a835f9d6d1bdb528d32f50cdN.exe
Resource
win10v2004-20241007-en
General
-
Target
e225104547f7cd3e002ae69ac88c2ff8515afd54a835f9d6d1bdb528d32f50cdN.exe
-
Size
773KB
-
MD5
4294bf15de1e13315f9cc13f9365b2c0
-
SHA1
6009cc4a472a8011e2d69ec18cc8d9d7ab26a2cc
-
SHA256
e225104547f7cd3e002ae69ac88c2ff8515afd54a835f9d6d1bdb528d32f50cd
-
SHA512
6bdc2a28016690e9a68590ae16e443067261b3d91ea863a3c5614f5e3f59f6d604ec085405d2fd72ae5f1cafff736fddbe313a3a299ffa05a25c7b5a14acc87c
-
SSDEEP
12288:Wy90Td+yErsNNoMvHZ/Tl9gOxJBkneTWyLnPscUo/Pb4JVgCkxk/0JXllSxRiNlU:WyzINNlHZtxrZsQHb86W
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dante
185.161.248.73:4164
-
auth_value
f4066af6b8a6f23125c8ee48288a3f90
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3644-2168-0x0000000005620000-0x0000000005652000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5468-2181-0x0000000000AB0000-0x0000000000ADE000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n88531525.exe family_redline behavioral1/memory/640-2194-0x0000000000010000-0x0000000000040000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
m96984294.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation m96984294.exe -
Executes dropped EXE 4 IoCs
Processes:
x75502218.exem96984294.exe1.exen88531525.exepid process 5084 x75502218.exe 3644 m96984294.exe 5468 1.exe 640 n88531525.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
e225104547f7cd3e002ae69ac88c2ff8515afd54a835f9d6d1bdb528d32f50cdN.exex75502218.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e225104547f7cd3e002ae69ac88c2ff8515afd54a835f9d6d1bdb528d32f50cdN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x75502218.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4384 3644 WerFault.exe m96984294.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
e225104547f7cd3e002ae69ac88c2ff8515afd54a835f9d6d1bdb528d32f50cdN.exex75502218.exem96984294.exe1.exen88531525.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e225104547f7cd3e002ae69ac88c2ff8515afd54a835f9d6d1bdb528d32f50cdN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x75502218.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m96984294.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language n88531525.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
m96984294.exedescription pid process Token: SeDebugPrivilege 3644 m96984294.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
e225104547f7cd3e002ae69ac88c2ff8515afd54a835f9d6d1bdb528d32f50cdN.exex75502218.exem96984294.exedescription pid process target process PID 3140 wrote to memory of 5084 3140 e225104547f7cd3e002ae69ac88c2ff8515afd54a835f9d6d1bdb528d32f50cdN.exe x75502218.exe PID 3140 wrote to memory of 5084 3140 e225104547f7cd3e002ae69ac88c2ff8515afd54a835f9d6d1bdb528d32f50cdN.exe x75502218.exe PID 3140 wrote to memory of 5084 3140 e225104547f7cd3e002ae69ac88c2ff8515afd54a835f9d6d1bdb528d32f50cdN.exe x75502218.exe PID 5084 wrote to memory of 3644 5084 x75502218.exe m96984294.exe PID 5084 wrote to memory of 3644 5084 x75502218.exe m96984294.exe PID 5084 wrote to memory of 3644 5084 x75502218.exe m96984294.exe PID 3644 wrote to memory of 5468 3644 m96984294.exe 1.exe PID 3644 wrote to memory of 5468 3644 m96984294.exe 1.exe PID 3644 wrote to memory of 5468 3644 m96984294.exe 1.exe PID 5084 wrote to memory of 640 5084 x75502218.exe n88531525.exe PID 5084 wrote to memory of 640 5084 x75502218.exe n88531525.exe PID 5084 wrote to memory of 640 5084 x75502218.exe n88531525.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e225104547f7cd3e002ae69ac88c2ff8515afd54a835f9d6d1bdb528d32f50cdN.exe"C:\Users\Admin\AppData\Local\Temp\e225104547f7cd3e002ae69ac88c2ff8515afd54a835f9d6d1bdb528d32f50cdN.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x75502218.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x75502218.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m96984294.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m96984294.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 13884⤵
- Program crash
PID:4384
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n88531525.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n88531525.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:640
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3644 -ip 36441⤵PID:3100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
569KB
MD5f6e27d6e6208efda71984675bbd72805
SHA177ed6de7b3cb90a8fe63c1546e633fbf6ec7a374
SHA256544e91c02a8bc73e567d4d1b8a0af1fe17d202af61ebb88b8fc4c456c44d0517
SHA512a4388263491f53e3210832f53a65d1fcb9acd7721e0a8050ce9b5dfdf46bf964bf4217df2f030f12dc0275d59616060b9faced43bc38ff9d98118407ca4472fc
-
Filesize
479KB
MD5a1ff95ae8256737de7ad09062bb8f4b5
SHA1bbc6e09bc004eede244d388336b49e8771ea9383
SHA256fce3e2f8c136cb3c57bd39441f8b6c3fcebf06d59bc6b6a3ac91857dd7f92392
SHA5125f162897456d9d9def93a0752b5526628f8508e3e9d3dba37b5f035f0cdbcf06ffc4de0a7526426d978244a559548da6d41a1c8d139d903f21b393fc99d52f6d
-
Filesize
169KB
MD52d21e315f96fa4bc6f94d109abc4cb3a
SHA167f3d02f37e671c269b06cff3d1a2c08fb56578a
SHA2564d677b50d4bca9b01bd8b324877a303524a3d8cf5c586e68c738ab9ca17004e9
SHA512a1f521378a512adeeb2e7b30909d6679e3dca7466572ecfb88d8ac5c68fddc0da1048ae29a49201000710729906a5956f01b160bbeb7161c8c8e4b65f0e42ab8
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf