Analysis Overview
SHA256
e86219958e9a80778a4017f25bcba54b1bcecaa2a5d5502bc77ee6e1f4804d60
Threat Level: Known bad
The file e86219958e9a80778a4017f25bcba54b1bcecaa2a5d5502bc77ee6e1f4804d60 was found to be: Known bad.
Malicious Activity Summary
RedLine
RedLine payload
Redline family
Executes dropped EXE
Adds Run key to start application
System Location Discovery: System Language Discovery
Unsigned PE
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-11-07 03:21
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-11-07 03:21
Reported
2024-11-07 03:24
Platform
win10v2004-20241007-en
Max time kernel
137s
Max time network
148s
Command Line
Signatures
RedLine
RedLine payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Redline family
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ntG73.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\byH61.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" | C:\Users\Admin\AppData\Local\Temp\e86219958e9a80778a4017f25bcba54b1bcecaa2a5d5502bc77ee6e1f4804d60.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" | C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ntG73.exe | N/A |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ntG73.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\byH61.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\e86219958e9a80778a4017f25bcba54b1bcecaa2a5d5502bc77ee6e1f4804d60.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\e86219958e9a80778a4017f25bcba54b1bcecaa2a5d5502bc77ee6e1f4804d60.exe
"C:\Users\Admin\AppData\Local\Temp\e86219958e9a80778a4017f25bcba54b1bcecaa2a5d5502bc77ee6e1f4804d60.exe"
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ntG73.exe
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ntG73.exe
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\byH61.exe
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\byH61.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| RU | 193.233.20.13:4136 | tcp | |
| US | 8.8.8.8:53 | 68.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| RU | 193.233.20.13:4136 | tcp | |
| US | 8.8.8.8:53 | 56.163.245.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 75.117.19.2.in-addr.arpa | udp |
| RU | 193.233.20.13:4136 | tcp | |
| RU | 193.233.20.13:4136 | tcp | |
| US | 8.8.8.8:53 | 14.227.111.52.in-addr.arpa | udp |
| RU | 193.233.20.13:4136 | tcp | |
| RU | 193.233.20.13:4136 | tcp |
Files
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ntG73.exe
| MD5 | 93d751ecaef07da2e95688cf5db22982 |
| SHA1 | e7e1ab16edd60677d87aff4ae2fcb67513ab4c16 |
| SHA256 | dbc511733a93ad972bfb9f2476103e6664e0c1386640ff7afc499891f149eb93 |
| SHA512 | eb32e3293fb9a438f8b9bed9da2f2fab7db87fa5f3371f9670d23e1ac56f70b49f47c514d7fe8002f42f9f9fed0a15f5c272ce288dcb412e69294c4dfb3ef381 |
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\byH61.exe
| MD5 | a5f5c5d6291c7ae9e1d1b7ed1e551490 |
| SHA1 | 3d06413341893b838549939e15f8f1eec423d71a |
| SHA256 | 1a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e |
| SHA512 | d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2 |
memory/4264-14-0x0000000073C1E000-0x0000000073C1F000-memory.dmp
memory/4264-15-0x0000000000240000-0x0000000000272000-memory.dmp
memory/4264-16-0x00000000051B0000-0x00000000057C8000-memory.dmp
memory/4264-17-0x0000000004D20000-0x0000000004E2A000-memory.dmp
memory/4264-18-0x0000000004C70000-0x0000000004C82000-memory.dmp
memory/4264-19-0x0000000004C90000-0x0000000004CCC000-memory.dmp
memory/4264-20-0x0000000004CD0000-0x0000000004D1C000-memory.dmp
memory/4264-21-0x0000000073C1E000-0x0000000073C1F000-memory.dmp