Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-11-2024 22:31
Static task
static1
Behavioral task
behavioral1
Sample
339450e18291913d51e65f272fbb5beecd062d633fbbcf7b53325f710d28f9f4.exe
Resource
win10v2004-20241007-en
General
-
Target
339450e18291913d51e65f272fbb5beecd062d633fbbcf7b53325f710d28f9f4.exe
-
Size
666KB
-
MD5
fc3118b147113fb44bc89f0060ca28c8
-
SHA1
5ff4662eb7f089b319feed58ae56b0b0b6b22127
-
SHA256
339450e18291913d51e65f272fbb5beecd062d633fbbcf7b53325f710d28f9f4
-
SHA512
67f66df691b340617d5583a3562d3635ddfe06391a05b8d5f3fa0c0e5603d45de70778319be020065f6c24bb6a2e1d4b5c372c2d95a1d86c03253f112d8773f7
-
SSDEEP
12288:YMrgy90OJc1I9Xu+F/s4S+H88CEnXrPrLyrOdaJIhj06YP7:YysalnnH88JXfo6hj1Yj
Malware Config
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1260-19-0x0000000002640000-0x0000000002686000-memory.dmp family_redline behavioral1/memory/1260-21-0x0000000004B80000-0x0000000004BC4000-memory.dmp family_redline behavioral1/memory/1260-25-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1260-31-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1260-85-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1260-81-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1260-79-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1260-77-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1260-75-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1260-73-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1260-71-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1260-69-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1260-67-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1260-65-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1260-61-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1260-59-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1260-57-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1260-56-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1260-53-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1260-51-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1260-49-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1260-47-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1260-43-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1260-41-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1260-39-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1260-37-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1260-35-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1260-33-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1260-30-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1260-28-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1260-83-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1260-63-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1260-23-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1260-45-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1260-22-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 3616 vZW44.exe 1260 dSr38.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 339450e18291913d51e65f272fbb5beecd062d633fbbcf7b53325f710d28f9f4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vZW44.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 339450e18291913d51e65f272fbb5beecd062d633fbbcf7b53325f710d28f9f4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vZW44.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dSr38.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1260 dSr38.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3288 wrote to memory of 3616 3288 339450e18291913d51e65f272fbb5beecd062d633fbbcf7b53325f710d28f9f4.exe 83 PID 3288 wrote to memory of 3616 3288 339450e18291913d51e65f272fbb5beecd062d633fbbcf7b53325f710d28f9f4.exe 83 PID 3288 wrote to memory of 3616 3288 339450e18291913d51e65f272fbb5beecd062d633fbbcf7b53325f710d28f9f4.exe 83 PID 3616 wrote to memory of 1260 3616 vZW44.exe 84 PID 3616 wrote to memory of 1260 3616 vZW44.exe 84 PID 3616 wrote to memory of 1260 3616 vZW44.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\339450e18291913d51e65f272fbb5beecd062d633fbbcf7b53325f710d28f9f4.exe"C:\Users\Admin\AppData\Local\Temp\339450e18291913d51e65f272fbb5beecd062d633fbbcf7b53325f710d28f9f4.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vZW44.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vZW44.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dSr38.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dSr38.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1260
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
521KB
MD5d9fe06668279ff46e7128184b68c6395
SHA162178d57765230c4474ffa73c001074bbe345ef9
SHA256b12efe55cc8c424a4a44ebd81bebb4e741c62b1103ac14993aafc9567accde1b
SHA512648213ad1d784a8e297051b7c5adefdcf72010bef583bd53d5c14eb70dfee4aef6b52e5bb17c4ab71d81fa9c51c063d0fa9c924678acff92566559c0002f5502
-
Filesize
306KB
MD545f8bfc8d5eb5084fd616df3f7e055af
SHA1bed0d63374a425e922b18f243c699239ba0f6bfb
SHA256e36e5a2972ffa26a5453108e0385fbe371045fafb60ca0fafd0a7fe1e557a0c9
SHA5120e4ae78d96fe6e89929806a7716770563cab588ce1f724abffd046b6671f8f46e78007a8d6b74c0c034f6ddaebc646359810075e2e6fdf3fa66c8e343cbba1e4