Analysis
-
max time kernel
110s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2024 05:20
Static task
static1
Behavioral task
behavioral1
Sample
3fdc6cfae2a10b7e6a24d75df8fbed83b345644d0b97ff5a979e660d197c4c38.exe
Resource
win10v2004-20241007-en
General
-
Target
3fdc6cfae2a10b7e6a24d75df8fbed83b345644d0b97ff5a979e660d197c4c38.exe
-
Size
773KB
-
MD5
31474e244f60b78507a16e70b56de0c0
-
SHA1
5fdb8fc72a58241f444700414db3dc29dde4854d
-
SHA256
3fdc6cfae2a10b7e6a24d75df8fbed83b345644d0b97ff5a979e660d197c4c38
-
SHA512
dbabaff72507ee505f1aed809a2f7652a9fd9ab8756838e6b92ac090c6cea2bcf6566962caab82ae369545a0b533cab97b55c191f1e0bcde75c4c922786d5f15
-
SSDEEP
12288:Wy90Td+yErsNNoMvHZ/Tl9gOxJBkneTWyLnPscUo/Pb4JVgCkxk/0JXllSxRiNlG:WyzINNlHZtxrZsQHb86WP
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dante
185.161.248.73:4164
-
auth_value
f4066af6b8a6f23125c8ee48288a3f90
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1188-2169-0x0000000005770000-0x00000000057A2000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5784-2182-0x0000000000910000-0x000000000093E000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n88531525.exe family_redline behavioral1/memory/3408-2196-0x00000000003F0000-0x0000000000420000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
m96984294.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation m96984294.exe -
Executes dropped EXE 4 IoCs
Processes:
x75502218.exem96984294.exe1.exen88531525.exepid process 1848 x75502218.exe 1188 m96984294.exe 5784 1.exe 3408 n88531525.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
3fdc6cfae2a10b7e6a24d75df8fbed83b345644d0b97ff5a979e660d197c4c38.exex75502218.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3fdc6cfae2a10b7e6a24d75df8fbed83b345644d0b97ff5a979e660d197c4c38.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x75502218.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1408 1188 WerFault.exe m96984294.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1.exen88531525.exe3fdc6cfae2a10b7e6a24d75df8fbed83b345644d0b97ff5a979e660d197c4c38.exex75502218.exem96984294.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language n88531525.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3fdc6cfae2a10b7e6a24d75df8fbed83b345644d0b97ff5a979e660d197c4c38.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x75502218.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m96984294.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
m96984294.exedescription pid process Token: SeDebugPrivilege 1188 m96984294.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
3fdc6cfae2a10b7e6a24d75df8fbed83b345644d0b97ff5a979e660d197c4c38.exex75502218.exem96984294.exedescription pid process target process PID 1108 wrote to memory of 1848 1108 3fdc6cfae2a10b7e6a24d75df8fbed83b345644d0b97ff5a979e660d197c4c38.exe x75502218.exe PID 1108 wrote to memory of 1848 1108 3fdc6cfae2a10b7e6a24d75df8fbed83b345644d0b97ff5a979e660d197c4c38.exe x75502218.exe PID 1108 wrote to memory of 1848 1108 3fdc6cfae2a10b7e6a24d75df8fbed83b345644d0b97ff5a979e660d197c4c38.exe x75502218.exe PID 1848 wrote to memory of 1188 1848 x75502218.exe m96984294.exe PID 1848 wrote to memory of 1188 1848 x75502218.exe m96984294.exe PID 1848 wrote to memory of 1188 1848 x75502218.exe m96984294.exe PID 1188 wrote to memory of 5784 1188 m96984294.exe 1.exe PID 1188 wrote to memory of 5784 1188 m96984294.exe 1.exe PID 1188 wrote to memory of 5784 1188 m96984294.exe 1.exe PID 1848 wrote to memory of 3408 1848 x75502218.exe n88531525.exe PID 1848 wrote to memory of 3408 1848 x75502218.exe n88531525.exe PID 1848 wrote to memory of 3408 1848 x75502218.exe n88531525.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fdc6cfae2a10b7e6a24d75df8fbed83b345644d0b97ff5a979e660d197c4c38.exe"C:\Users\Admin\AppData\Local\Temp\3fdc6cfae2a10b7e6a24d75df8fbed83b345644d0b97ff5a979e660d197c4c38.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x75502218.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x75502218.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m96984294.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m96984294.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1188 -s 15284⤵
- Program crash
PID:1408
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n88531525.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n88531525.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3408
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1188 -ip 11881⤵PID:868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
569KB
MD5f6e27d6e6208efda71984675bbd72805
SHA177ed6de7b3cb90a8fe63c1546e633fbf6ec7a374
SHA256544e91c02a8bc73e567d4d1b8a0af1fe17d202af61ebb88b8fc4c456c44d0517
SHA512a4388263491f53e3210832f53a65d1fcb9acd7721e0a8050ce9b5dfdf46bf964bf4217df2f030f12dc0275d59616060b9faced43bc38ff9d98118407ca4472fc
-
Filesize
479KB
MD5a1ff95ae8256737de7ad09062bb8f4b5
SHA1bbc6e09bc004eede244d388336b49e8771ea9383
SHA256fce3e2f8c136cb3c57bd39441f8b6c3fcebf06d59bc6b6a3ac91857dd7f92392
SHA5125f162897456d9d9def93a0752b5526628f8508e3e9d3dba37b5f035f0cdbcf06ffc4de0a7526426d978244a559548da6d41a1c8d139d903f21b393fc99d52f6d
-
Filesize
169KB
MD52d21e315f96fa4bc6f94d109abc4cb3a
SHA167f3d02f37e671c269b06cff3d1a2c08fb56578a
SHA2564d677b50d4bca9b01bd8b324877a303524a3d8cf5c586e68c738ab9ca17004e9
SHA512a1f521378a512adeeb2e7b30909d6679e3dca7466572ecfb88d8ac5c68fddc0da1048ae29a49201000710729906a5956f01b160bbeb7161c8c8e4b65f0e42ab8
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf