Analysis
-
max time kernel
106s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 23:48
Static task
static1
Behavioral task
behavioral1
Sample
9efc10b8fa8b7dc785f08e49b41b534a1389b7bfc47a30f21c75c6549ae35b89N.exe
Resource
win10v2004-20241007-en
General
-
Target
9efc10b8fa8b7dc785f08e49b41b534a1389b7bfc47a30f21c75c6549ae35b89N.exe
-
Size
749KB
-
MD5
221aca187070d31fa2812834f36cfc10
-
SHA1
6bd43da252817b1cbce98eb6a435b532d74bfd53
-
SHA256
9efc10b8fa8b7dc785f08e49b41b534a1389b7bfc47a30f21c75c6549ae35b89
-
SHA512
2feb5cfc9375f3027ea1a20dc1496363778546bc40854aeefb9494ab997606a884b1dd0d8a5dcca1ae7cf382bb4c2eac58166cb3460789b84ad654e41685954d
-
SSDEEP
12288:OMrEy90iIdX8fZO30Uwh9c/rTA/Iw9VRHZX7H1Qv+Jv9RxPAaCReJKnsyNk:uytI9iZU0UKUwHp7ajR3syNk
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f3489535.exe family_redline behavioral1/memory/2248-15-0x0000000000810000-0x000000000083A000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
Processes:
x0707021.exef3489535.exepid process 2936 x0707021.exe 2248 f3489535.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
9efc10b8fa8b7dc785f08e49b41b534a1389b7bfc47a30f21c75c6549ae35b89N.exex0707021.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9efc10b8fa8b7dc785f08e49b41b534a1389b7bfc47a30f21c75c6549ae35b89N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x0707021.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
x0707021.exef3489535.exe9efc10b8fa8b7dc785f08e49b41b534a1389b7bfc47a30f21c75c6549ae35b89N.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x0707021.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3489535.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9efc10b8fa8b7dc785f08e49b41b534a1389b7bfc47a30f21c75c6549ae35b89N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
9efc10b8fa8b7dc785f08e49b41b534a1389b7bfc47a30f21c75c6549ae35b89N.exex0707021.exedescription pid process target process PID 824 wrote to memory of 2936 824 9efc10b8fa8b7dc785f08e49b41b534a1389b7bfc47a30f21c75c6549ae35b89N.exe x0707021.exe PID 824 wrote to memory of 2936 824 9efc10b8fa8b7dc785f08e49b41b534a1389b7bfc47a30f21c75c6549ae35b89N.exe x0707021.exe PID 824 wrote to memory of 2936 824 9efc10b8fa8b7dc785f08e49b41b534a1389b7bfc47a30f21c75c6549ae35b89N.exe x0707021.exe PID 2936 wrote to memory of 2248 2936 x0707021.exe f3489535.exe PID 2936 wrote to memory of 2248 2936 x0707021.exe f3489535.exe PID 2936 wrote to memory of 2248 2936 x0707021.exe f3489535.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9efc10b8fa8b7dc785f08e49b41b534a1389b7bfc47a30f21c75c6549ae35b89N.exe"C:\Users\Admin\AppData\Local\Temp\9efc10b8fa8b7dc785f08e49b41b534a1389b7bfc47a30f21c75c6549ae35b89N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0707021.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0707021.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f3489535.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f3489535.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2248
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
305KB
MD576ae79cecca91446a1e168e3c06caa6b
SHA14ef3a1232e77012312ad9edea920982d0e8aefcf
SHA256ede9af7f535c9063070c03c4e0f2937994b8e8d0d62d3c933d22b2dd5e935a0d
SHA5129f3b20445fec57b60d3b64667d14d4807bd2bbfc9027d0ffdacd5bc2552cd94e317ea4f3e1a767c0c50a6c41dcdcbcc50ebca6b98d7331e1d4aa6784db849cf9
-
Filesize
145KB
MD5564c5d7ff7b4fc639235831faf1fd1fb
SHA1942eaec2c26a2c6b1baa726a8f488a85e7de3ff5
SHA256ef598670ff1990a9f9b06097399ee6afad35b8cb4806195d0f7ba9cff55a93af
SHA5122553ee338cf729606f4a1adc858aa37b94a5148414555a23999957397ce96acb86503a713864965595f599afd17aa89af9286f1e70d4c9fb2f88c939a157b156