Analysis
-
max time kernel
575s -
max time network
592s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
30-11-2024 18:31
Static task
static1
Behavioral task
behavioral1
Sample
604fa32b76dbe266da3979b7a49e3100301da56f0b58c13041ab5febe55354d2.exe
Resource
win11-20241007-en
General
-
Target
604fa32b76dbe266da3979b7a49e3100301da56f0b58c13041ab5febe55354d2.exe
-
Size
565KB
-
MD5
9bd3fecfb842b3d4d7f02500e78211b2
-
SHA1
9687e3b7ca67baf2a82f76919d2b254dedc1e762
-
SHA256
604fa32b76dbe266da3979b7a49e3100301da56f0b58c13041ab5febe55354d2
-
SHA512
a4e522a8c057ad4443afededb93c66a5a8a085d6c5c677b917c626b3c20f3f40672501faa37149feb193228cea0901f77b7ff3d90044d7781ae510a498b9cc2f
-
SSDEEP
12288:sLd8DrZlpM93KiItqAsoVbxJjkosKrvgyzgZ15zKWtbeSufdzKQZn2pPm2hAC41s:swv9qISu
Malware Config
Extracted
redline
185.196.9.26:6302
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/1940-8-0x0000000000400000-0x0000000000452000-memory.dmp family_redline -
Redline family
-
Loads dropped DLL 1 IoCs
pid Process 3928 604fa32b76dbe266da3979b7a49e3100301da56f0b58c13041ab5febe55354d2.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3928 set thread context of 1940 3928 604fa32b76dbe266da3979b7a49e3100301da56f0b58c13041ab5febe55354d2.exe 79 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 604fa32b76dbe266da3979b7a49e3100301da56f0b58c13041ab5febe55354d2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1604 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3928 wrote to memory of 1940 3928 604fa32b76dbe266da3979b7a49e3100301da56f0b58c13041ab5febe55354d2.exe 79 PID 3928 wrote to memory of 1940 3928 604fa32b76dbe266da3979b7a49e3100301da56f0b58c13041ab5febe55354d2.exe 79 PID 3928 wrote to memory of 1940 3928 604fa32b76dbe266da3979b7a49e3100301da56f0b58c13041ab5febe55354d2.exe 79 PID 3928 wrote to memory of 1940 3928 604fa32b76dbe266da3979b7a49e3100301da56f0b58c13041ab5febe55354d2.exe 79 PID 3928 wrote to memory of 1940 3928 604fa32b76dbe266da3979b7a49e3100301da56f0b58c13041ab5febe55354d2.exe 79 PID 3928 wrote to memory of 1940 3928 604fa32b76dbe266da3979b7a49e3100301da56f0b58c13041ab5febe55354d2.exe 79 PID 3928 wrote to memory of 1940 3928 604fa32b76dbe266da3979b7a49e3100301da56f0b58c13041ab5febe55354d2.exe 79 PID 3928 wrote to memory of 1940 3928 604fa32b76dbe266da3979b7a49e3100301da56f0b58c13041ab5febe55354d2.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\604fa32b76dbe266da3979b7a49e3100301da56f0b58c13041ab5febe55354d2.exe"C:\Users\Admin\AppData\Local\Temp\604fa32b76dbe266da3979b7a49e3100301da56f0b58c13041ab5febe55354d2.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1940
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD5ad7a569bafd3a938fe348f531b8ef332
SHA17fdd2f52d07640047bb62e0f3d3c946ddd85c227
SHA256f0e06109256d5577e9f62db2c398974c5002bd6d08892f20517760601b705309
SHA512b762bae338690082d817b3008144926498a1bd2d6d99be33e513c43515808f9a3184bd10254e5c6a1ff90a9211653f066050249030ad9fe0460ec88335b3d423
-
Filesize
507KB
MD55292b9265f32e744fceeac9d2ecbdfb7
SHA1a8aa69d691f3f7423fd1bec870233f577fe9510b
SHA25635096a698e01c0ef0d14cfd2f0a536936f065eb4994387094f05e83e17a2a457
SHA5127b7f42bcf8b2006b1186888856e76e9b9a4c013483d81afb4e63caffcac2a85e238595edca28145429486f7e907e700f2bd7a7875480e384609fe73c9604fc57