Analysis
-
max time kernel
111s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2024 17:08
Static task
static1
Behavioral task
behavioral1
Sample
4647018fd0cc7e12aacb554146066e70d9257927fcd14134e75f0135528388d7N.exe
Resource
win10v2004-20241007-en
General
-
Target
4647018fd0cc7e12aacb554146066e70d9257927fcd14134e75f0135528388d7N.exe
-
Size
774KB
-
MD5
663047274164615b5795ab8e9df35a70
-
SHA1
4825cdf16cc3fe1e7c57c27d6fc0301d8f8e74af
-
SHA256
4647018fd0cc7e12aacb554146066e70d9257927fcd14134e75f0135528388d7
-
SHA512
25dc1dd3940538d9593c593419ef6aaed18fbe13e005be614542b3b79d5cc80d60156089a883977357237cd93c85e16e38ee149a0466275bbec4cbd9b1e5cf10
-
SSDEEP
24576:qyBnjaRSYg/Xb/91Ox2tMc2v400TYiybxD0:xljwS5Xz91OxqMc2w7AJ
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dark
185.161.248.73:4164
-
auth_value
ae85b01f66afe8770afeed560513fc2d
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4268-2168-0x0000000005020000-0x0000000005052000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5656-2181-0x0000000000860000-0x000000000088E000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n01820223.exe family_redline behavioral1/memory/4548-2195-0x0000000000260000-0x0000000000290000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
m62439622.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation m62439622.exe -
Executes dropped EXE 4 IoCs
Processes:
x20453441.exem62439622.exe1.exen01820223.exepid process 3192 x20453441.exe 4268 m62439622.exe 5656 1.exe 4548 n01820223.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
4647018fd0cc7e12aacb554146066e70d9257927fcd14134e75f0135528388d7N.exex20453441.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4647018fd0cc7e12aacb554146066e70d9257927fcd14134e75f0135528388d7N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x20453441.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3928 4268 WerFault.exe m62439622.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
4647018fd0cc7e12aacb554146066e70d9257927fcd14134e75f0135528388d7N.exex20453441.exem62439622.exe1.exen01820223.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4647018fd0cc7e12aacb554146066e70d9257927fcd14134e75f0135528388d7N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x20453441.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m62439622.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language n01820223.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
m62439622.exedescription pid process Token: SeDebugPrivilege 4268 m62439622.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
4647018fd0cc7e12aacb554146066e70d9257927fcd14134e75f0135528388d7N.exex20453441.exem62439622.exedescription pid process target process PID 348 wrote to memory of 3192 348 4647018fd0cc7e12aacb554146066e70d9257927fcd14134e75f0135528388d7N.exe x20453441.exe PID 348 wrote to memory of 3192 348 4647018fd0cc7e12aacb554146066e70d9257927fcd14134e75f0135528388d7N.exe x20453441.exe PID 348 wrote to memory of 3192 348 4647018fd0cc7e12aacb554146066e70d9257927fcd14134e75f0135528388d7N.exe x20453441.exe PID 3192 wrote to memory of 4268 3192 x20453441.exe m62439622.exe PID 3192 wrote to memory of 4268 3192 x20453441.exe m62439622.exe PID 3192 wrote to memory of 4268 3192 x20453441.exe m62439622.exe PID 4268 wrote to memory of 5656 4268 m62439622.exe 1.exe PID 4268 wrote to memory of 5656 4268 m62439622.exe 1.exe PID 4268 wrote to memory of 5656 4268 m62439622.exe 1.exe PID 3192 wrote to memory of 4548 3192 x20453441.exe n01820223.exe PID 3192 wrote to memory of 4548 3192 x20453441.exe n01820223.exe PID 3192 wrote to memory of 4548 3192 x20453441.exe n01820223.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4647018fd0cc7e12aacb554146066e70d9257927fcd14134e75f0135528388d7N.exe"C:\Users\Admin\AppData\Local\Temp\4647018fd0cc7e12aacb554146066e70d9257927fcd14134e75f0135528388d7N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x20453441.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x20453441.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m62439622.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m62439622.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 12044⤵
- Program crash
PID:3928
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n01820223.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n01820223.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4548
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4268 -ip 42681⤵PID:2452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
570KB
MD54252fa09915d1c71dc80bbae54e26ae7
SHA1b97dd0094370ded129d226abe33b28ffff0c351d
SHA256586cf4ccc7b42dbc45838c06cc056a6533d1b10c3d2f64f6f1a23148ca330233
SHA51257a4d245b2f80f3bacb67156d14f5916fe73c83718f845e3df7bd3df4e4f4415f970a3569b0d335ee65c5802e2e5242d15e30cd917e1b6e840e165fad9dcd98c
-
Filesize
488KB
MD5b399f7dc9f36b189b065225d7fe4813f
SHA18f47ec88602c0fa9044021b203fdbb2fa14b412f
SHA256b68d436becd44b6886c16ac82eb51115ff06a418d382a78f16ef303613bb5d96
SHA512b23e1c176b334a43036e9445c1b239227837eff13fd780e34ae3022e5c673aac33314c5e2e0db02760b19474967d695eb3f63749ed338508e3c7599fdf8e4a4f
-
Filesize
172KB
MD5ecc42f99f8fd034712263eff36404ae1
SHA11e2a64aca2d76c080c6b90a1a90ee72ed688c81e
SHA256669c3c1c1cf76d7f5689c873f0a258ca608fb318408b3c1d6bfaf93aab4f760b
SHA5123e61ddce895c559e0c580c2718c69a20dc647a757cc8f7d110f240b9179439098884e7e8f9f8a3393e775df390047411529075af427cf03cacd0a6905ca77d5c
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf