Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/11/2024, 21:41

General

  • Target

    4a9e1c7d8047242a7e39a0468aa60b362bc9b0b219229902d1f855254e9fe6ce.exe

  • Size

    1.1MB

  • MD5

    9c001ed62a2b63cb1f3d32867c26962c

  • SHA1

    bf65d16e9c64adc0e888093d941401ae4e203625

  • SHA256

    4a9e1c7d8047242a7e39a0468aa60b362bc9b0b219229902d1f855254e9fe6ce

  • SHA512

    b5780eb22352c0cb5f0cca33c4df4c06e4f33a8fd7f26fc0400f5d1b5b2a509dd6ea11b1ed18ffde51c6c5148794229800670ad470dbcc84d7e6bb2993dbacdb

  • SSDEEP

    24576:wyTsNHziTfFkX31FiBAXnLULiNqxQD13N0fZhQhTy4oACdIwoD:3g50fFkX3KBAXLUxQD1Ev8ePO

Malware Config

Extracted

Family

redline

Botnet

masta

C2

185.161.248.75:4132

Attributes
  • auth_value

    57f23b6b74d0f680c5a0c8ac9f52bd75

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 4 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4a9e1c7d8047242a7e39a0468aa60b362bc9b0b219229902d1f855254e9fe6ce.exe
    "C:\Users\Admin\AppData\Local\Temp\4a9e1c7d8047242a7e39a0468aa60b362bc9b0b219229902d1f855254e9fe6ce.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3848
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5679298.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5679298.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3484
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6840782.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6840782.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3232
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6396647.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6396647.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1668
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8839076.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8839076.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:5008

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5679298.exe

    Filesize

    749KB

    MD5

    8d035d67a03718eae9cd788b6ca249c3

    SHA1

    7331e66bde3d3c67d8fe0cb8ece78ab47f324835

    SHA256

    0179fddfa7fc43a18852d9d000b4e1ea40974667ceec5e70c258d18049a5178c

    SHA512

    ea59a42e40ae95d11222de1919cce116134c5294fe7ac94d57f3d4fbc6fe7cf8e4fa7c91467aa539d08291b3b7949d7cbd7ad2b41a1a33fa6dafbcc7b9817cfc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6840782.exe

    Filesize

    304KB

    MD5

    a5695e536aed62a7fc9df47a4fa7773d

    SHA1

    a2bf1ef97fc64b049c0408a7aeb3edefcd22c9ce

    SHA256

    ec7af1d73852d697634ed900e4ff3c321eff0b671c41bac329e88114e1d246c9

    SHA512

    7e50370d701d831a1f64c41bb4a23079184b949c158eb6d6bab36dea32461bdfec17ef11edf7bcc97720ccfa3c0c96163f7afda94044c86de67700c62a9d5dee

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6396647.exe

    Filesize

    183KB

    MD5

    75df6a4aaf5c63bc4f42ac5ec8ecc76a

    SHA1

    8d9da11aa11364c1b580b12faa446403f527ff83

    SHA256

    d1d13ff4eabb541a9cfc225beeb1c27d9cd85c8f9849e8d0fece0a4503c63f05

    SHA512

    72d34a4770cf9885993630f04e83831f4ded666af58cb705c7b1ca4cd7ca95911dec7247e4987c64afc13fee10bcf94fc913bd9a7790edb65c75b01a89bbe8fe

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8839076.exe

    Filesize

    145KB

    MD5

    55b53b233afa1061b409ec921fa429f3

    SHA1

    4bf0e73b4fafce9448bbb429174290b9568561ba

    SHA256

    3f2c8375ef47579e5295717e4d9deaa7572dcdc2174617dc4f5d7b72305c02b8

    SHA512

    33ed98707b1ddd3568218f50c17fd1a740689a359b6b5501a18c7cc078121e219b3b02cde88bfe453100a3458ff8b9ace8e486a295b4652b8d51821ff455994c

  • memory/1668-33-0x0000000002210000-0x0000000002226000-memory.dmp

    Filesize

    88KB

  • memory/1668-35-0x0000000002210000-0x0000000002226000-memory.dmp

    Filesize

    88KB

  • memory/1668-29-0x0000000002210000-0x0000000002226000-memory.dmp

    Filesize

    88KB

  • memory/1668-22-0x0000000004B70000-0x0000000005114000-memory.dmp

    Filesize

    5.6MB

  • memory/1668-51-0x0000000002210000-0x0000000002226000-memory.dmp

    Filesize

    88KB

  • memory/1668-47-0x0000000002210000-0x0000000002226000-memory.dmp

    Filesize

    88KB

  • memory/1668-45-0x0000000002210000-0x0000000002226000-memory.dmp

    Filesize

    88KB

  • memory/1668-43-0x0000000002210000-0x0000000002226000-memory.dmp

    Filesize

    88KB

  • memory/1668-41-0x0000000002210000-0x0000000002226000-memory.dmp

    Filesize

    88KB

  • memory/1668-39-0x0000000002210000-0x0000000002226000-memory.dmp

    Filesize

    88KB

  • memory/1668-37-0x0000000002210000-0x0000000002226000-memory.dmp

    Filesize

    88KB

  • memory/1668-23-0x0000000002210000-0x000000000222C000-memory.dmp

    Filesize

    112KB

  • memory/1668-31-0x0000000002210000-0x0000000002226000-memory.dmp

    Filesize

    88KB

  • memory/1668-25-0x0000000002210000-0x0000000002226000-memory.dmp

    Filesize

    88KB

  • memory/1668-49-0x0000000002210000-0x0000000002226000-memory.dmp

    Filesize

    88KB

  • memory/1668-24-0x0000000002210000-0x0000000002226000-memory.dmp

    Filesize

    88KB

  • memory/1668-27-0x0000000002210000-0x0000000002226000-memory.dmp

    Filesize

    88KB

  • memory/1668-21-0x0000000002160000-0x000000000217E000-memory.dmp

    Filesize

    120KB

  • memory/5008-56-0x0000000000860000-0x000000000088A000-memory.dmp

    Filesize

    168KB

  • memory/5008-57-0x0000000005690000-0x0000000005CA8000-memory.dmp

    Filesize

    6.1MB

  • memory/5008-58-0x00000000051F0000-0x00000000052FA000-memory.dmp

    Filesize

    1.0MB

  • memory/5008-59-0x0000000005130000-0x0000000005142000-memory.dmp

    Filesize

    72KB

  • memory/5008-60-0x0000000005190000-0x00000000051CC000-memory.dmp

    Filesize

    240KB

  • memory/5008-61-0x0000000005300000-0x000000000534C000-memory.dmp

    Filesize

    304KB