Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 23:18
Static task
static1
Behavioral task
behavioral1
Sample
RedGiant Activation Unlock.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
RedGiant Activation Unlock.exe
Resource
win10v2004-20240709-en
General
-
Target
RedGiant Activation Unlock.exe
-
Size
5.4MB
-
MD5
af5c350cc0f7e4f2bbd39a9cc706fe10
-
SHA1
77e563d392a8de25053d6db2a26fa2924fc22710
-
SHA256
71c1f5f4ad3e24e0bbaf5943a191f4dd7c49b80c14633593e7cb38d0ef9d4c3a
-
SHA512
f8c37e3039df7f860e693a06d784472f61e30a1dbe4242f53e16f20387a0b666cc35bb640aecb0aa7c2168844cc79c4dd93a08ba230811ec7446f65772e952ca
-
SSDEEP
98304:lSiSXHx6vD5XtXkNoSr8kvZ16/wit4cFEk76g8W5Zje3M0ea245o:Igxt06O8kbD+EhgNTe3sIo
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 448 RedGiant Activation Unlock.tmp -
Loads dropped DLL 1 IoCs
pid Process 448 RedGiant Activation Unlock.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RedGiant Activation Unlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RedGiant Activation Unlock.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5048 wrote to memory of 448 5048 RedGiant Activation Unlock.exe 84 PID 5048 wrote to memory of 448 5048 RedGiant Activation Unlock.exe 84 PID 5048 wrote to memory of 448 5048 RedGiant Activation Unlock.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\RedGiant Activation Unlock.exe"C:\Users\Admin\AppData\Local\Temp\RedGiant Activation Unlock.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\is-RHMME.tmp\RedGiant Activation Unlock.tmp"C:\Users\Admin\AppData\Local\Temp\is-RHMME.tmp\RedGiant Activation Unlock.tmp" /SL5="$8003C,4730505,799744,C:\Users\Admin\AppData\Local\Temp\RedGiant Activation Unlock.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
3.0MB
MD5d09b1325888beea51e5bcb494a35f409
SHA10445b94e631d095077732c5e8be06ea8fe65b750
SHA256d03d365124865647889e1b75ae68dad5fd216b3c8448de8ebeb826e05c689bfe
SHA512142ab50d024d670f3c968587cda784a443982ee242482654cb566d8c81c05c2688323a9264fbedba16a88e792943a810f7a74f82313d91f5a556860cf10d139d