Analysis
-
max time kernel
137s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-11-2024 01:01
Static task
static1
Behavioral task
behavioral1
Sample
24401e611679390c636fadd7f845bbfb9c943e18610e90bac6ef6675b66a7eaaN.exe
Resource
win10v2004-20241007-en
General
-
Target
24401e611679390c636fadd7f845bbfb9c943e18610e90bac6ef6675b66a7eaaN.exe
-
Size
850KB
-
MD5
f4c1b46f03ade3298bc24c1c13e88440
-
SHA1
099bbaccb9401244e53c985c57a22e7c32ad80c1
-
SHA256
24401e611679390c636fadd7f845bbfb9c943e18610e90bac6ef6675b66a7eaa
-
SHA512
55b3105bb3a6623247ebaee84d90fd36ddddbc0e30c14521a02d49b55f6a91fecc902fb7b6b8702d80e215e02317567a40fa5b0528fa5d45a4703301649d4340
-
SSDEEP
24576:QygnLgaiy9m0izAzDFxT4TNc3T27U30noxgIm:XggWmIzJeNGmoX
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
danko
185.161.248.73:4164
-
auth_value
784d42a6c1eb1a5060b8bcd3696f5f1e
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2968-2169-0x0000000005750000-0x0000000005782000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/4108-2182-0x0000000000C00000-0x0000000000C2E000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r08849167.exe family_redline behavioral1/memory/4536-2196-0x0000000000A60000-0x0000000000A90000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
p44559407.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation p44559407.exe -
Executes dropped EXE 4 IoCs
Processes:
y53029847.exep44559407.exe1.exer08849167.exepid process 2512 y53029847.exe 2968 p44559407.exe 4108 1.exe 4536 r08849167.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
24401e611679390c636fadd7f845bbfb9c943e18610e90bac6ef6675b66a7eaaN.exey53029847.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 24401e611679390c636fadd7f845bbfb9c943e18610e90bac6ef6675b66a7eaaN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y53029847.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3120 2968 WerFault.exe p44559407.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
p44559407.exe1.exer08849167.exe24401e611679390c636fadd7f845bbfb9c943e18610e90bac6ef6675b66a7eaaN.exey53029847.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language p44559407.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language r08849167.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24401e611679390c636fadd7f845bbfb9c943e18610e90bac6ef6675b66a7eaaN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y53029847.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
p44559407.exedescription pid process Token: SeDebugPrivilege 2968 p44559407.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
24401e611679390c636fadd7f845bbfb9c943e18610e90bac6ef6675b66a7eaaN.exey53029847.exep44559407.exedescription pid process target process PID 224 wrote to memory of 2512 224 24401e611679390c636fadd7f845bbfb9c943e18610e90bac6ef6675b66a7eaaN.exe y53029847.exe PID 224 wrote to memory of 2512 224 24401e611679390c636fadd7f845bbfb9c943e18610e90bac6ef6675b66a7eaaN.exe y53029847.exe PID 224 wrote to memory of 2512 224 24401e611679390c636fadd7f845bbfb9c943e18610e90bac6ef6675b66a7eaaN.exe y53029847.exe PID 2512 wrote to memory of 2968 2512 y53029847.exe p44559407.exe PID 2512 wrote to memory of 2968 2512 y53029847.exe p44559407.exe PID 2512 wrote to memory of 2968 2512 y53029847.exe p44559407.exe PID 2968 wrote to memory of 4108 2968 p44559407.exe 1.exe PID 2968 wrote to memory of 4108 2968 p44559407.exe 1.exe PID 2968 wrote to memory of 4108 2968 p44559407.exe 1.exe PID 2512 wrote to memory of 4536 2512 y53029847.exe r08849167.exe PID 2512 wrote to memory of 4536 2512 y53029847.exe r08849167.exe PID 2512 wrote to memory of 4536 2512 y53029847.exe r08849167.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\24401e611679390c636fadd7f845bbfb9c943e18610e90bac6ef6675b66a7eaaN.exe"C:\Users\Admin\AppData\Local\Temp\24401e611679390c636fadd7f845bbfb9c943e18610e90bac6ef6675b66a7eaaN.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y53029847.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y53029847.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p44559407.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p44559407.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 13844⤵
- Program crash
PID:3120
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r08849167.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r08849167.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4536
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2968 -ip 29681⤵PID:804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
569KB
MD5e01c8f5006d4d7110f205ed071dbacd1
SHA1a7a146da49624806de8ea905ae5c451d1bda827b
SHA2567fe2c45ea3e31e189e55353b2b6ca440640107bcaefbccf82478aa02f833ffce
SHA512ebb7748f0f089b9f8517e31882671873791000244e93be896c6cc0589fa2fc5cc32a2a0ce559a1ee126e274149ba22717e4c839acc71561a19244293c292cc92
-
Filesize
479KB
MD5ac1e2bd21303e3e274385d3723e42f87
SHA14b0bca62528c40037806e7661fa292583ff8eade
SHA256afe87196b50b310b73a7b839aaa60d1f96c62d57174b330a21d07631c911b8d6
SHA512f528108d648411dc6a169193e3a37d30468309cc82005f7cd7ca819f9aa0aea6c6653167104615318a81423a9aabfa7242b655ce4147f4981115579ac9e4ef8f
-
Filesize
169KB
MD5fbe2a83165647b2af4828871adfcbea6
SHA1d8e5522c81d1564c072d8431d76d03198684b41e
SHA25672ce94369d859fddb663a0ee46ff6fc67c48c37df68256b46669e02414709511
SHA5126f6ebc5d61605de54b0887912c72f73a6cc354af723574d42794a978624ce386f37068c4ea5550b2bcb89c536950aff2af0f90e4dbaed14113c57dfd021ce47f
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf