Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-10-2024 16:13

General

  • Target

    G K M 9 5.rar

  • Size

    9.6MB

  • MD5

    39eaf06aff90c74b0fb6b2d98c939f6f

  • SHA1

    48af9760de8234c93d7f7b2af5d429950ece6190

  • SHA256

    314166f9dde25b13c5cca86e65a67b26dbae5dcf17dccf7c5a5eb21d3ff76316

  • SHA512

    69aabefdf3438a004b49ee0ec04571d072e7e2df93b1925e997e25d8cc25c02fa960d025bf1cdcddf428437835f6a75f8d50c7dc5420ea61a7571bfbd628696c

  • SSDEEP

    196608:+9D+lduWOcYQXeOVzkB9ASy6rSniS6SAxAm4y5G/VqMpb7LS8D8nY:+AEctXvVzkB9xyESQhfPw/wY

Malware Config

Extracted

Family

redline

C2

185.196.9.26:6302

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\G K M 9 5.rar"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1744
    • C:\Users\Admin\AppData\Local\Temp\7zO0D6D1AA7\GTA 5 Mod Menu.exe
      "C:\Users\Admin\AppData\Local\Temp\7zO0D6D1AA7\GTA 5 Mod Menu.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4816
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5100

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zO0D6D1AA7\GTA 5 Mod Menu.exe

    Filesize

    312KB

    MD5

    46796db8acd3ff52d5daa757a0acc12d

    SHA1

    090afe3863790f1e8d9420309538aa5fa846b29d

    SHA256

    b38f4158c414aace2b77f2743822d2b05b1b456f4b339192c48804fdae25a184

    SHA512

    5b3647b1f2963177513f5a336563e3a8563fe4e6d1c8e00ad4e554f298fca03c200f99a384b24672daed897bed9eef15442dd99afacd5e9992dd27d053f151bb

  • C:\Users\Admin\AppData\Roaming\msvcp110.dll

    Filesize

    572KB

    MD5

    1a3e6dcd6b446b86f6cc2c11efe0bf35

    SHA1

    39d1b7a080d0d8149b68ac7a459a7b8d512204cd

    SHA256

    d64e6e381b5341fd164b2bd8435dce7db1f622ea947242e96ba5696eb0095b5b

    SHA512

    769982e0c23aecd622c6efd77773c8836325fe3a71e9e8cc33cc956e4ae23811f1a82d8dc7406a3fc3405b83656fba670334297f3414d0f708d8438d85112814

  • memory/4816-12-0x00000000747DE000-0x00000000747DF000-memory.dmp

    Filesize

    4KB

  • memory/4816-13-0x00000000002F0000-0x0000000000348000-memory.dmp

    Filesize

    352KB

  • memory/4816-14-0x00000000026F0000-0x00000000026F6000-memory.dmp

    Filesize

    24KB

  • memory/4816-15-0x00000000747D0000-0x0000000074F80000-memory.dmp

    Filesize

    7.7MB

  • memory/4816-23-0x00000000747D0000-0x0000000074F80000-memory.dmp

    Filesize

    7.7MB

  • memory/4816-29-0x00000000747D0000-0x0000000074F80000-memory.dmp

    Filesize

    7.7MB

  • memory/5100-27-0x0000000005280000-0x0000000005312000-memory.dmp

    Filesize

    584KB

  • memory/5100-32-0x00000000054F0000-0x0000000005502000-memory.dmp

    Filesize

    72KB

  • memory/5100-25-0x00000000006F0000-0x0000000000742000-memory.dmp

    Filesize

    328KB

  • memory/5100-28-0x0000000005410000-0x000000000541A000-memory.dmp

    Filesize

    40KB

  • memory/5100-30-0x0000000006360000-0x0000000006978000-memory.dmp

    Filesize

    6.1MB

  • memory/5100-22-0x00000000006F0000-0x0000000000751000-memory.dmp

    Filesize

    388KB

  • memory/5100-31-0x0000000005D40000-0x0000000005E4A000-memory.dmp

    Filesize

    1.0MB

  • memory/5100-26-0x0000000005790000-0x0000000005D34000-memory.dmp

    Filesize

    5.6MB

  • memory/5100-33-0x0000000005590000-0x00000000055CC000-memory.dmp

    Filesize

    240KB

  • memory/5100-34-0x00000000055D0000-0x000000000561C000-memory.dmp

    Filesize

    304KB

  • memory/5100-35-0x0000000005E50000-0x0000000005EB6000-memory.dmp

    Filesize

    408KB

  • memory/5100-36-0x0000000006DB0000-0x0000000006F72000-memory.dmp

    Filesize

    1.8MB

  • memory/5100-37-0x00000000074B0000-0x00000000079DC000-memory.dmp

    Filesize

    5.2MB

  • memory/5100-38-0x0000000006D60000-0x0000000006DB0000-memory.dmp

    Filesize

    320KB