Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-11-2024 00:33
Static task
static1
Behavioral task
behavioral1
Sample
99a18f1e8d43e165ed87f83e3fe86a93902645657e784be2cc376c45c048462d.exe
Resource
win10v2004-20241007-en
General
-
Target
99a18f1e8d43e165ed87f83e3fe86a93902645657e784be2cc376c45c048462d.exe
-
Size
581KB
-
MD5
8313dbea7d5ce458dd15d4e80e206416
-
SHA1
b5bdcc44f91566bba61df16d29de5554d7102ad8
-
SHA256
99a18f1e8d43e165ed87f83e3fe86a93902645657e784be2cc376c45c048462d
-
SHA512
8eb83319d4dc9550965f5066ca4d0c10c0b2d278b40d0fe2f3621a396c5bd277a2dab7e569eba03355f4d56703d8b773da8299026731805fe4e1bb240b5cb76a
-
SSDEEP
12288:ty900sXDohCadSM9bKtEZ6EvDU3MFyDS4HtEh:ty/sDadS2Kt26GU3MM+qEh
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dark
185.161.248.73:4164
-
auth_value
ae85b01f66afe8770afeed560513fc2d
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3704-2161-0x00000000058A0000-0x00000000058D2000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/2440-2174-0x0000000000960000-0x000000000098E000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r17991696.exe family_redline behavioral1/memory/6108-2191-0x0000000000140000-0x0000000000170000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
p68504443.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation p68504443.exe -
Executes dropped EXE 3 IoCs
Processes:
p68504443.exe1.exer17991696.exepid process 3704 p68504443.exe 2440 1.exe 6108 r17991696.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
99a18f1e8d43e165ed87f83e3fe86a93902645657e784be2cc376c45c048462d.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 99a18f1e8d43e165ed87f83e3fe86a93902645657e784be2cc376c45c048462d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 724 3704 WerFault.exe p68504443.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1.exer17991696.exe99a18f1e8d43e165ed87f83e3fe86a93902645657e784be2cc376c45c048462d.exep68504443.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language r17991696.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 99a18f1e8d43e165ed87f83e3fe86a93902645657e784be2cc376c45c048462d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language p68504443.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
p68504443.exedescription pid process Token: SeDebugPrivilege 3704 p68504443.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
99a18f1e8d43e165ed87f83e3fe86a93902645657e784be2cc376c45c048462d.exep68504443.exedescription pid process target process PID 4296 wrote to memory of 3704 4296 99a18f1e8d43e165ed87f83e3fe86a93902645657e784be2cc376c45c048462d.exe p68504443.exe PID 4296 wrote to memory of 3704 4296 99a18f1e8d43e165ed87f83e3fe86a93902645657e784be2cc376c45c048462d.exe p68504443.exe PID 4296 wrote to memory of 3704 4296 99a18f1e8d43e165ed87f83e3fe86a93902645657e784be2cc376c45c048462d.exe p68504443.exe PID 3704 wrote to memory of 2440 3704 p68504443.exe 1.exe PID 3704 wrote to memory of 2440 3704 p68504443.exe 1.exe PID 3704 wrote to memory of 2440 3704 p68504443.exe 1.exe PID 4296 wrote to memory of 6108 4296 99a18f1e8d43e165ed87f83e3fe86a93902645657e784be2cc376c45c048462d.exe r17991696.exe PID 4296 wrote to memory of 6108 4296 99a18f1e8d43e165ed87f83e3fe86a93902645657e784be2cc376c45c048462d.exe r17991696.exe PID 4296 wrote to memory of 6108 4296 99a18f1e8d43e165ed87f83e3fe86a93902645657e784be2cc376c45c048462d.exe r17991696.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\99a18f1e8d43e165ed87f83e3fe86a93902645657e784be2cc376c45c048462d.exe"C:\Users\Admin\AppData\Local\Temp\99a18f1e8d43e165ed87f83e3fe86a93902645657e784be2cc376c45c048462d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\p68504443.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\p68504443.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3704 -s 13723⤵
- Program crash
PID:724
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r17991696.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r17991696.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3704 -ip 37041⤵PID:2520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
580KB
MD5199cc131418474f679aa27274f9f1a30
SHA108d0e0a6b27ea76d7881c2853502c1226f2dc92c
SHA25624158b3a5387ef0f18c9942cdb8d2a5f1be5353299780c7d61015ada1087383d
SHA51230a02fc16bcade7fc055a8f164fa628e7ad37b3da24aa4ddeedc6387587e5c4016c868810d55eef60d40ebffc573e0a957ed08643057f2e1a0bbe7bc248a955e
-
Filesize
171KB
MD5c1e91bb132499c5c174d54ba393446ea
SHA122011855bab8b494d309b1bbbf8737e5c575c2fe
SHA256826ec1b6ddeb10f62e9f26b78182f55d8417084ce8174674cf68dad7bfb97673
SHA5129c8a9a964edc4af2726ec055ec5b16c7ec9d7be0d9fac1e633585ecbad4d26274e62717ea8477e59881d5ff29853db2bd7b68778b6d035dadb971e0876f25714
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf