Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-11-2024 03:12
Static task
static1
Behavioral task
behavioral1
Sample
e626ea9d960d3c23acae2ff4ff3b8e741ae68d81a99a3c712b5e16adf8e5b897.exe
Resource
win10v2004-20241007-en
General
-
Target
e626ea9d960d3c23acae2ff4ff3b8e741ae68d81a99a3c712b5e16adf8e5b897.exe
-
Size
569KB
-
MD5
490d473327f08963488bd6cd8e2aaef7
-
SHA1
ff3eb0bb895ada9f68323ad2b0cbe5d889cce88d
-
SHA256
e626ea9d960d3c23acae2ff4ff3b8e741ae68d81a99a3c712b5e16adf8e5b897
-
SHA512
26c462a8076b31c8cb41b2b131467f9c7a6dfa5b142ce30666519304d9b1283f349f667e7fe504d3950ef8f7083b902740143a76277af92e88975ee7f1ade640
-
SSDEEP
12288:by90MFeX93J5oIdSecp489l2gUzIJJOqSApxbXhr14TVeJrTi7Cf2:byzeX/pdSzhchziMqVPj4T4uCf2
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
danko
185.161.248.73:4164
-
auth_value
784d42a6c1eb1a5060b8bcd3696f5f1e
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1700-2161-0x0000000005880000-0x00000000058B2000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/4040-2175-0x0000000000170000-0x000000000019E000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r92401805.exe family_redline behavioral1/memory/3124-2191-0x0000000000BE0000-0x0000000000C10000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
p70455684.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation p70455684.exe -
Executes dropped EXE 3 IoCs
Processes:
p70455684.exe1.exer92401805.exepid process 1700 p70455684.exe 4040 1.exe 3124 r92401805.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
e626ea9d960d3c23acae2ff4ff3b8e741ae68d81a99a3c712b5e16adf8e5b897.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e626ea9d960d3c23acae2ff4ff3b8e741ae68d81a99a3c712b5e16adf8e5b897.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2140 1700 WerFault.exe p70455684.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
r92401805.exee626ea9d960d3c23acae2ff4ff3b8e741ae68d81a99a3c712b5e16adf8e5b897.exep70455684.exe1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language r92401805.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e626ea9d960d3c23acae2ff4ff3b8e741ae68d81a99a3c712b5e16adf8e5b897.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language p70455684.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
p70455684.exedescription pid process Token: SeDebugPrivilege 1700 p70455684.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
e626ea9d960d3c23acae2ff4ff3b8e741ae68d81a99a3c712b5e16adf8e5b897.exep70455684.exedescription pid process target process PID 4232 wrote to memory of 1700 4232 e626ea9d960d3c23acae2ff4ff3b8e741ae68d81a99a3c712b5e16adf8e5b897.exe p70455684.exe PID 4232 wrote to memory of 1700 4232 e626ea9d960d3c23acae2ff4ff3b8e741ae68d81a99a3c712b5e16adf8e5b897.exe p70455684.exe PID 4232 wrote to memory of 1700 4232 e626ea9d960d3c23acae2ff4ff3b8e741ae68d81a99a3c712b5e16adf8e5b897.exe p70455684.exe PID 1700 wrote to memory of 4040 1700 p70455684.exe 1.exe PID 1700 wrote to memory of 4040 1700 p70455684.exe 1.exe PID 1700 wrote to memory of 4040 1700 p70455684.exe 1.exe PID 4232 wrote to memory of 3124 4232 e626ea9d960d3c23acae2ff4ff3b8e741ae68d81a99a3c712b5e16adf8e5b897.exe r92401805.exe PID 4232 wrote to memory of 3124 4232 e626ea9d960d3c23acae2ff4ff3b8e741ae68d81a99a3c712b5e16adf8e5b897.exe r92401805.exe PID 4232 wrote to memory of 3124 4232 e626ea9d960d3c23acae2ff4ff3b8e741ae68d81a99a3c712b5e16adf8e5b897.exe r92401805.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e626ea9d960d3c23acae2ff4ff3b8e741ae68d81a99a3c712b5e16adf8e5b897.exe"C:\Users\Admin\AppData\Local\Temp\e626ea9d960d3c23acae2ff4ff3b8e741ae68d81a99a3c712b5e16adf8e5b897.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\p70455684.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\p70455684.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1700 -s 13803⤵
- Program crash
PID:2140
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r92401805.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r92401805.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1700 -ip 17001⤵PID:2244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
479KB
MD5b9231643c324e7fa0d0cfe58a0c89d2a
SHA1c5fac59b7a016ce4298777d13103fadba74e1792
SHA256894a475bd165a838a1818af23b713fbdac49af318ae3e85f6fade1fc65b873c2
SHA512b2319c99d17990fdeab71ac6348466d1cc7a82cc129e50786b82e5a7b3722c0517f8f84596dfa0b1f88c99d2c0c12adaf3d95e53f7f08828c473aedecd7b3cb2
-
Filesize
168KB
MD596cf98f00581cbaa705dad9bc7075074
SHA1373b0c4dd395f043fc65d7d754db8c612378bd0f
SHA2564485bd74f3254d2ab6a373206d2ebae01ed83fa6f532d74a425e0bf0013fb3a4
SHA512b69b5abe1d0c2a3abed18ac2eef0f52011c42ba25941ddb0bd5ec2be73762e49528f8c92f8cb1c7f6cc0aad7a6ae0fa839612432758486494ce44dfe5f26d2a4
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf