Analysis

  • max time kernel
    140s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/11/2024, 21:43

General

  • Target

    3d9a18e09c1146887f4c1214aa722a5571a9ffc741a40f4cc5e22a97e5bbedd4.exe

  • Size

    589KB

  • MD5

    f55a2ac9b8b8b367edf480a6d28b28f1

  • SHA1

    4a1106b3aa08b58cd6c1385afbe5e9672102c059

  • SHA256

    3d9a18e09c1146887f4c1214aa722a5571a9ffc741a40f4cc5e22a97e5bbedd4

  • SHA512

    934a78f241586e65d69fb5f177fa26af7e13191dfc731773e0b6f3c11d63329e8319cc23ffe2102160c52078031ac701c3d8adba0b265598f64246ca18753822

  • SSDEEP

    12288:BMr1y90OlIo7NOFrOgOug766KhjbAHUdjgOU82uG:MyF57NOFJO5KpZd8F82uG

Malware Config

Extracted

Family

redline

Botnet

crypt1

C2

176.113.115.17:4132

Attributes
  • auth_value

    2e2ca7bbceaa9f98252a6f9fc0e6fa86

Extracted

Family

redline

Botnet

romka

C2

193.233.20.11:4131

Attributes
  • auth_value

    fcbb3247051f5290e8ac5b1a841af67b

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d9a18e09c1146887f4c1214aa722a5571a9ffc741a40f4cc5e22a97e5bbedd4.exe
    "C:\Users\Admin\AppData\Local\Temp\3d9a18e09c1146887f4c1214aa722a5571a9ffc741a40f4cc5e22a97e5bbedd4.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dek56.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dek56.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2536
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:592
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lUB30.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lUB30.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:4880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dek56.exe

    Filesize

    277KB

    MD5

    3bc6ecb7d1f35f3171383f88879659b7

    SHA1

    e82887b3d6ab38ae3b8880d6c904244495dcf0cc

    SHA256

    c95f1ca2230edb615f3365e4c3ad09e4e1940a2c554eaf27c0df2d5bc4fc1068

    SHA512

    709eb1c1c322c70a2a377324fa1766bfff9a3e1d37db04da240aaab36317d813b6f32f5c0d0a3f8d30f196f132985fce0ec030d5783df3c7bff76a4ccfb4431c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lUB30.exe

    Filesize

    485KB

    MD5

    59d1fe48a024d26b75b47e87b12195f3

    SHA1

    bc746791776a8149262fb3a64e6ffdc5bebc493c

    SHA256

    214086dee69e38aa1794161d531a8f5b4c1a37fccc469986ae254873d4b21a40

    SHA512

    1930e7924d54e80d9a73b2d7cbfc20ce82948bf6912fa4df6be400810d9249f5e866806b1e3df63e596d50f3f8e677251558005fa69dceac9d67afee2a4328ce

  • memory/592-9-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/592-17-0x000000007451E000-0x000000007451F000-memory.dmp

    Filesize

    4KB

  • memory/592-19-0x0000000005DB0000-0x00000000063C8000-memory.dmp

    Filesize

    6.1MB

  • memory/592-20-0x0000000005930000-0x0000000005A3A000-memory.dmp

    Filesize

    1.0MB

  • memory/592-21-0x0000000005860000-0x0000000005872000-memory.dmp

    Filesize

    72KB

  • memory/592-22-0x00000000058C0000-0x00000000058FC000-memory.dmp

    Filesize

    240KB

  • memory/592-23-0x0000000005A40000-0x0000000005A8C000-memory.dmp

    Filesize

    304KB

  • memory/592-934-0x000000007451E000-0x000000007451F000-memory.dmp

    Filesize

    4KB

  • memory/2536-8-0x00000000000A0000-0x00000000001A0000-memory.dmp

    Filesize

    1024KB

  • memory/4880-73-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/4880-57-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/4880-27-0x0000000004B20000-0x0000000004B64000-memory.dmp

    Filesize

    272KB

  • memory/4880-63-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/4880-71-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/4880-85-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/4880-83-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/4880-81-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/4880-79-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/4880-77-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/4880-75-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/4880-25-0x0000000002500000-0x0000000002546000-memory.dmp

    Filesize

    280KB

  • memory/4880-69-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/4880-67-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/4880-65-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/4880-61-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/4880-59-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/4880-26-0x0000000004C70000-0x0000000005214000-memory.dmp

    Filesize

    5.6MB

  • memory/4880-55-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/4880-53-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/4880-51-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/4880-49-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/4880-47-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/4880-45-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/4880-43-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/4880-41-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/4880-39-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/4880-37-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/4880-35-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/4880-33-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/4880-31-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/4880-29-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/4880-28-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/4880-24-0x0000000000630000-0x0000000000730000-memory.dmp

    Filesize

    1024KB

  • memory/4880-936-0x0000000000630000-0x0000000000730000-memory.dmp

    Filesize

    1024KB