Analysis
-
max time kernel
138s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-11-2024 03:14
Static task
static1
Behavioral task
behavioral1
Sample
1d53e9ffce0a07dac0c5d78b6f85f736ae2cf90d680583d7a7e7a4d477deaac7.exe
Resource
win10v2004-20241007-en
General
-
Target
1d53e9ffce0a07dac0c5d78b6f85f736ae2cf90d680583d7a7e7a4d477deaac7.exe
-
Size
570KB
-
MD5
6c15f3d62b6ad8a4907113c5cdad57d6
-
SHA1
f67031ef6ef5af1d8c97ec147a9c09b508173d4d
-
SHA256
1d53e9ffce0a07dac0c5d78b6f85f736ae2cf90d680583d7a7e7a4d477deaac7
-
SHA512
640e99c4561a80a62dfe745c0690b2437c9a218d4172bebe88aa5ae812c85b77a3c12af7c953d16b4b901692827f9ba5d80a3ec5f91cdc8f0f2ba7f82866880c
-
SSDEEP
12288:cy90ZpRE0CATmPzSvA3I/L/aJ4w7Kv8eVah1FarJFtV2:cymsVATGSo3Md8OahDaNF/2
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dante
185.161.248.73:4164
-
auth_value
f4066af6b8a6f23125c8ee48288a3f90
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3244-2162-0x0000000005760000-0x0000000005792000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5468-2179-0x0000000000D30000-0x0000000000D5E000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n03966812.exe family_redline behavioral1/memory/3520-2184-0x0000000000100000-0x0000000000130000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
m27489873.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation m27489873.exe -
Executes dropped EXE 3 IoCs
Processes:
m27489873.exe1.exen03966812.exepid process 3244 m27489873.exe 5468 1.exe 3520 n03966812.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
1d53e9ffce0a07dac0c5d78b6f85f736ae2cf90d680583d7a7e7a4d477deaac7.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1d53e9ffce0a07dac0c5d78b6f85f736ae2cf90d680583d7a7e7a4d477deaac7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1d53e9ffce0a07dac0c5d78b6f85f736ae2cf90d680583d7a7e7a4d477deaac7.exem27489873.exe1.exen03966812.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1d53e9ffce0a07dac0c5d78b6f85f736ae2cf90d680583d7a7e7a4d477deaac7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m27489873.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language n03966812.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
m27489873.exedescription pid process Token: SeDebugPrivilege 3244 m27489873.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
1d53e9ffce0a07dac0c5d78b6f85f736ae2cf90d680583d7a7e7a4d477deaac7.exem27489873.exedescription pid process target process PID 764 wrote to memory of 3244 764 1d53e9ffce0a07dac0c5d78b6f85f736ae2cf90d680583d7a7e7a4d477deaac7.exe m27489873.exe PID 764 wrote to memory of 3244 764 1d53e9ffce0a07dac0c5d78b6f85f736ae2cf90d680583d7a7e7a4d477deaac7.exe m27489873.exe PID 764 wrote to memory of 3244 764 1d53e9ffce0a07dac0c5d78b6f85f736ae2cf90d680583d7a7e7a4d477deaac7.exe m27489873.exe PID 3244 wrote to memory of 5468 3244 m27489873.exe 1.exe PID 3244 wrote to memory of 5468 3244 m27489873.exe 1.exe PID 3244 wrote to memory of 5468 3244 m27489873.exe 1.exe PID 764 wrote to memory of 3520 764 1d53e9ffce0a07dac0c5d78b6f85f736ae2cf90d680583d7a7e7a4d477deaac7.exe n03966812.exe PID 764 wrote to memory of 3520 764 1d53e9ffce0a07dac0c5d78b6f85f736ae2cf90d680583d7a7e7a4d477deaac7.exe n03966812.exe PID 764 wrote to memory of 3520 764 1d53e9ffce0a07dac0c5d78b6f85f736ae2cf90d680583d7a7e7a4d477deaac7.exe n03966812.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d53e9ffce0a07dac0c5d78b6f85f736ae2cf90d680583d7a7e7a4d477deaac7.exe"C:\Users\Admin\AppData\Local\Temp\1d53e9ffce0a07dac0c5d78b6f85f736ae2cf90d680583d7a7e7a4d477deaac7.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m27489873.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m27489873.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5468
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n03966812.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n03966812.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
476KB
MD54e2542b4e8701d76ad726f81cc310752
SHA1b5e069ecb22ecc919a488050354d7a4bed689c82
SHA2564ec03d945ee04b5ee844b0483d773ee408fe0668cef6e0021782153cbb41b833
SHA512071f4b8632a9ad5c0587d530dfee4a86a88a5b481cf62798b5c975ebb44564f328222b2b4487313738d6b034e340230cd61810bdcc19282ab620cf0d7695be8d
-
Filesize
169KB
MD5be12ae9f77acc227d2d7bd475d3fecfb
SHA1ddb5d3a1d7efc620d56c9f2481f6804abc184d47
SHA256b92cbbe170189e09fe3c66ed7efd6b883c3b7d3c98b11213b1026b8e2c22102c
SHA5124cf5d7fc2faa9f0ae52e23bbd03cad69e904ae62bebdb9221c8f0f12d56ae39cc5d8ea2cfd43ea10d521e632613cc615dd684cd5552da6b079750b596b10839a
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf