Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    13-10-2024 22:55

General

  • Target

    log sender/logs bot.exe

  • Size

    894KB

  • MD5

    ac2c05fb13ae53e3d6d38ef3a8815b0d

  • SHA1

    baaf57949abcad93a9247a55746fa517e495f048

  • SHA256

    efed9ff5c81d6d2a63f057e9fc5ee2d15b85a2c51df4a92c17d87cc8b529a2c3

  • SHA512

    5d55fb685ce2bf5d3769a8c8cf48efdd961a4c8609cdeadea1a3062bb5dfddd0e97da414290daea2798733b8815dcd33786a27c300cc7aa578c6ba3b746b05ed

  • SSDEEP

    12288:sMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9Q2BVko8kufuAj:snsJ39LyjbJkQFMhmC+6GD9TBVkNt

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 2 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\log sender\logs bot.exe
    "C:\Users\Admin\AppData\Local\Temp\log sender\logs bot.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3200
    • C:\Users\Admin\AppData\Local\Temp\log sender\._cache_logs bot.exe
      "C:\Users\Admin\AppData\Local\Temp\log sender\._cache_logs bot.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4452
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /C taskkill /F /PID 4452 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\log sender\._cache_logs bot.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2288
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /PID 4452
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2352
        • C:\Windows\SysWOW64\choice.exe
          choice /C Y /N /D Y /T 3
          4⤵
          • System Location Discovery: System Language Discovery
          PID:928
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4592
      • C:\Users\Admin\AppData\Local\Temp\log sender\._cache_Synaptics.exe
        "C:\Users\Admin\AppData\Local\Temp\log sender\._cache_Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3556
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /C taskkill /F /PID 3556 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\log sender\._cache_Synaptics.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4572
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /PID 3556
            5⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4560
          • C:\Windows\SysWOW64\choice.exe
            choice /C Y /N /D Y /T 3
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1144
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    894KB

    MD5

    ac2c05fb13ae53e3d6d38ef3a8815b0d

    SHA1

    baaf57949abcad93a9247a55746fa517e495f048

    SHA256

    efed9ff5c81d6d2a63f057e9fc5ee2d15b85a2c51df4a92c17d87cc8b529a2c3

    SHA512

    5d55fb685ce2bf5d3769a8c8cf48efdd961a4c8609cdeadea1a3062bb5dfddd0e97da414290daea2798733b8815dcd33786a27c300cc7aa578c6ba3b746b05ed

  • C:\Users\Admin\AppData\Local\Temp\1AA75E00

    Filesize

    23KB

    MD5

    bc229651fdf9fca87e95033f0a394ae4

    SHA1

    47db3ed13516f30aa4adc24d22b86a96d5608e72

    SHA256

    cbcc1eb8b5d42c55f819df407b1b6d5ac586892edffcbb839cdd00223acb600f

    SHA512

    61cd506da288546758dc49199c3d555d97d26d1824f7b20a222de36c9a0c14661c9ed6e4911439c59cca2182c2910d255809a159ac534dd8e8fd4dcc4fc1ec2e

  • C:\Users\Admin\AppData\Local\Temp\log sender\._cache_logs bot.exe

    Filesize

    141KB

    MD5

    f008bbd1ebe31a75bcfdd521f231c5ad

    SHA1

    c70b5fd20d0ee74ba1a0963da1d751cd36669572

    SHA256

    b313386e5d12e8a34f346f2ced1e94912351533282d337a95812131959c72c83

    SHA512

    da9168b7492cd2d5fcd91fe99525f06ba1d1ae4cfde2a40d837290aee591a974ffa86c9977c07e42b31472b696b37017c7bad98de3138bd3afee7c7cb1648e56

  • C:\Users\Admin\AppData\Local\Temp\ylkqOsv1.xlsm

    Filesize

    17KB

    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • memory/788-203-0x00007FFA971D0000-0x00007FFA971E0000-memory.dmp

    Filesize

    64KB

  • memory/788-202-0x00007FFA971D0000-0x00007FFA971E0000-memory.dmp

    Filesize

    64KB

  • memory/788-200-0x00007FFA996D0000-0x00007FFA996E0000-memory.dmp

    Filesize

    64KB

  • memory/788-199-0x00007FFA996D0000-0x00007FFA996E0000-memory.dmp

    Filesize

    64KB

  • memory/788-196-0x00007FFA996D0000-0x00007FFA996E0000-memory.dmp

    Filesize

    64KB

  • memory/788-197-0x00007FFA996D0000-0x00007FFA996E0000-memory.dmp

    Filesize

    64KB

  • memory/788-198-0x00007FFA996D0000-0x00007FFA996E0000-memory.dmp

    Filesize

    64KB

  • memory/3200-0-0x0000000002390000-0x0000000002391000-memory.dmp

    Filesize

    4KB

  • memory/3200-129-0x0000000000400000-0x00000000004E6000-memory.dmp

    Filesize

    920KB

  • memory/4452-130-0x0000000000CF0000-0x0000000000D1A000-memory.dmp

    Filesize

    168KB

  • memory/4452-134-0x0000000005F20000-0x0000000006538000-memory.dmp

    Filesize

    6.1MB

  • memory/4452-201-0x0000000005AB0000-0x0000000005BBA000-memory.dmp

    Filesize

    1.0MB

  • memory/4452-185-0x0000000005830000-0x000000000587C000-memory.dmp

    Filesize

    304KB

  • memory/4452-136-0x0000000005790000-0x00000000057A2000-memory.dmp

    Filesize

    72KB

  • memory/4452-178-0x00000000057F0000-0x000000000582C000-memory.dmp

    Filesize

    240KB

  • memory/4452-118-0x0000000072DCE000-0x0000000072DCF000-memory.dmp

    Filesize

    4KB

  • memory/4592-131-0x0000000002160000-0x0000000002161000-memory.dmp

    Filesize

    4KB

  • memory/4592-245-0x0000000000400000-0x00000000004E6000-memory.dmp

    Filesize

    920KB

  • memory/4592-246-0x0000000002160000-0x0000000002161000-memory.dmp

    Filesize

    4KB

  • memory/4592-277-0x0000000000400000-0x00000000004E6000-memory.dmp

    Filesize

    920KB