Analysis

  • max time kernel
    157s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-05-2024 12:25

General

  • Target

    3931c3ca01cc35353f3a071c6ef787511253396b8e24e12cdf7dbbe451ac80c1.exe

  • Size

    769KB

  • MD5

    173ce39c7f3c5a40e98f2dba7b2bd47e

  • SHA1

    5565bb09baf037dfc79a68eb6a74d05dadbbac92

  • SHA256

    3931c3ca01cc35353f3a071c6ef787511253396b8e24e12cdf7dbbe451ac80c1

  • SHA512

    5fa0ba08f4dee61fa64836a6738e35a24e89fbd68accaeb93f78e2016ec33319d3d487531c60bf0327ef1da78183f5a43c5dca2ce91195cc24ff49a33d923cbe

  • SSDEEP

    12288:XMr8y906F6kccByXDZiyDAHQec61kznMvAb5bWCAS7zYXaOwa:zyRFsDUyDkXIMcB1ASHYXqa

Malware Config

Extracted

Family

redline

Botnet

lamp

C2

77.91.68.56:19071

Attributes
  • auth_value

    ee1df63bcdbe3de70f52810d94eaff7d

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3931c3ca01cc35353f3a071c6ef787511253396b8e24e12cdf7dbbe451ac80c1.exe
    "C:\Users\Admin\AppData\Local\Temp\3931c3ca01cc35353f3a071c6ef787511253396b8e24e12cdf7dbbe451ac80c1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3264
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5932766.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5932766.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3176
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5938639.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5938639.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:372
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g0342307.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g0342307.exe
          4⤵
          • Executes dropped EXE
          PID:2776
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1340 --field-trial-handle=2292,i,2103142837140538807,15881446839139365070,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:2276

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5932766.exe

      Filesize

      614KB

      MD5

      593ede5a8738e03045fbdd8749a6e243

      SHA1

      3a1a88e094044fc01fbb0f3c021f605a0bf205e5

      SHA256

      5bd93810d14d1d53c1b01da14ad20d1678b35121b1b79a99d80d6f142b042b35

      SHA512

      885dea94e1bc48fb33e6a7d090760405d66ddbe870b26bcc6698f7e5cc9be3afa2a8230d221fa5b5e0153186db8f1d8a4f3d39e6a453d3fb483af15f9726628f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5938639.exe

      Filesize

      512KB

      MD5

      4034b1065af3735c533fb7decd29832e

      SHA1

      5143cee7c773b6aaee56881d9fa835fd74d1f8b9

      SHA256

      755bb37818f1d16c04a5eea3ee3c2b89d15241d56de769f48a1ca5944cfdca30

      SHA512

      54bafe1aa2c50c7947cc31455337f6eea06cfc272353856be15fe10923d6bff89ff141bd5d106e63817f46958d99f29f2fa1805d19d7ec0577a041e50e210fad

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g0342307.exe

      Filesize

      491KB

      MD5

      e76acee1a8aec03021a19b513b2840eb

      SHA1

      0f7f101568ba939c3dde1bbee456ef558e005960

      SHA256

      11d122567336ec2641f0f38b47fb9f469d9b4ffee8a017f996a028b8989a597b

      SHA512

      dcd6da202bbcf52fadfd1d12a25eb88383e76274dbd09044e9dc40e36542b4c0791234bbb3101e1e61f48958b00dac26e7c266a65bf3bd54ddec37e2fcd8a3eb

    • memory/2776-21-0x0000000000401000-0x0000000000404000-memory.dmp

      Filesize

      12KB

    • memory/2776-22-0x00000000005B0000-0x000000000063C000-memory.dmp

      Filesize

      560KB

    • memory/2776-28-0x00000000005B0000-0x000000000063C000-memory.dmp

      Filesize

      560KB

    • memory/2776-29-0x0000000006B30000-0x0000000006B31000-memory.dmp

      Filesize

      4KB

    • memory/2776-30-0x0000000004540000-0x0000000004546000-memory.dmp

      Filesize

      24KB

    • memory/2776-31-0x00000000053C0000-0x00000000059D8000-memory.dmp

      Filesize

      6.1MB

    • memory/2776-32-0x0000000004DF0000-0x0000000004EFA000-memory.dmp

      Filesize

      1.0MB

    • memory/2776-33-0x0000000004F20000-0x0000000004F32000-memory.dmp

      Filesize

      72KB

    • memory/2776-34-0x0000000004F40000-0x0000000004F7C000-memory.dmp

      Filesize

      240KB

    • memory/2776-35-0x00000000050F0000-0x000000000513C000-memory.dmp

      Filesize

      304KB