Analysis

  • max time kernel
    116s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/11/2024, 22:26

General

  • Target

    ec67fdd78f722e8e1fcb1788300fe71d4ed9b8a58203e920a95a09ca90015550N.exe

  • Size

    316KB

  • MD5

    4c63d672e0334e8b80b64bdf39a4e360

  • SHA1

    16076404a98d62e0122b883269262d71d2cdb68f

  • SHA256

    ec67fdd78f722e8e1fcb1788300fe71d4ed9b8a58203e920a95a09ca90015550

  • SHA512

    95dd12136005162b7e3ec7095078ebb9b9f7868792095d235a87eec79b213895d1a104c390c3caf4495751509feab6b35ff3e11c9f48c8ee8fa207b5fd99eca2

  • SSDEEP

    6144:K2y+bnr+Fp0yN90QEN6vZrMgXGma0+qSNF1liGHpXZ7G:qMrRy90PmNRGfN3pk

Malware Config

Extracted

Family

redline

Botnet

mixa

C2

185.161.248.75:4132

Attributes
  • auth_value

    9d14534b25ac495ab25b59800acf3bb2

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec67fdd78f722e8e1fcb1788300fe71d4ed9b8a58203e920a95a09ca90015550N.exe
    "C:\Users\Admin\AppData\Local\Temp\ec67fdd78f722e8e1fcb1788300fe71d4ed9b8a58203e920a95a09ca90015550N.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2500
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a7985599.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a7985599.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4400
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b1981600.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b1981600.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a7985599.exe

    Filesize

    184KB

    MD5

    d4c640fb500618ad6c9fc5fe7d3e784d

    SHA1

    850df0880e1685ce709b44afbbb365cab4f0fec4

    SHA256

    a511ae2083565f7f66afa9902f2d6aaa5bdf56c8a148609bfe949880a74ff44b

    SHA512

    a28a51e937a11c9d72f7450b86469609d972a1e65c176bf92a47922eaf9cf72d3a49f0d40702f6f22bfd3f2c9f9e36edfefecdd263e1d49f3546f44d4817cecd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b1981600.exe

    Filesize

    168KB

    MD5

    14d48c774e2c2dda97cc1c1a43a571e0

    SHA1

    5a7f86a24d066270b0151f5654e478713970c4a3

    SHA256

    ca661c5c80b2262a6dc50aa04fed11a756537d44daf8ebdc729c1bc73cef6bdf

    SHA512

    62932b7c21d1ee3ab7c73bf950c8f15cf9ae730354d12258b77e32239cc6be028807388b71bef0b9c3cb0ca6eb1d334e10a575b3af7cf1336b204b82d6bfb9db

  • memory/636-57-0x0000000004F40000-0x0000000004F8C000-memory.dmp

    Filesize

    304KB

  • memory/636-56-0x0000000004DD0000-0x0000000004E0C000-memory.dmp

    Filesize

    240KB

  • memory/636-55-0x0000000074970000-0x0000000074A1B000-memory.dmp

    Filesize

    684KB

  • memory/636-54-0x0000000004D70000-0x0000000004D82000-memory.dmp

    Filesize

    72KB

  • memory/636-53-0x0000000005050000-0x000000000515A000-memory.dmp

    Filesize

    1.0MB

  • memory/636-52-0x0000000005560000-0x0000000005B78000-memory.dmp

    Filesize

    6.1MB

  • memory/636-51-0x0000000000F70000-0x0000000000F76000-memory.dmp

    Filesize

    24KB

  • memory/636-50-0x00000000004F0000-0x000000000051E000-memory.dmp

    Filesize

    184KB

  • memory/636-49-0x0000000074970000-0x0000000074A1B000-memory.dmp

    Filesize

    684KB

  • memory/4400-38-0x0000000004990000-0x00000000049A6000-memory.dmp

    Filesize

    88KB

  • memory/4400-43-0x00000000749C0000-0x0000000075170000-memory.dmp

    Filesize

    7.7MB

  • memory/4400-33-0x0000000004990000-0x00000000049A6000-memory.dmp

    Filesize

    88KB

  • memory/4400-31-0x0000000004990000-0x00000000049A6000-memory.dmp

    Filesize

    88KB

  • memory/4400-28-0x0000000004990000-0x00000000049A6000-memory.dmp

    Filesize

    88KB

  • memory/4400-26-0x0000000004990000-0x00000000049A6000-memory.dmp

    Filesize

    88KB

  • memory/4400-24-0x0000000004990000-0x00000000049A6000-memory.dmp

    Filesize

    88KB

  • memory/4400-22-0x0000000004990000-0x00000000049A6000-memory.dmp

    Filesize

    88KB

  • memory/4400-20-0x0000000004990000-0x00000000049A6000-memory.dmp

    Filesize

    88KB

  • memory/4400-16-0x0000000004990000-0x00000000049A6000-memory.dmp

    Filesize

    88KB

  • memory/4400-14-0x0000000004990000-0x00000000049A6000-memory.dmp

    Filesize

    88KB

  • memory/4400-13-0x0000000004990000-0x00000000049A6000-memory.dmp

    Filesize

    88KB

  • memory/4400-42-0x00000000749CE000-0x00000000749CF000-memory.dmp

    Filesize

    4KB

  • memory/4400-34-0x0000000004990000-0x00000000049A6000-memory.dmp

    Filesize

    88KB

  • memory/4400-45-0x00000000749C0000-0x0000000075170000-memory.dmp

    Filesize

    7.7MB

  • memory/4400-36-0x0000000004990000-0x00000000049A6000-memory.dmp

    Filesize

    88KB

  • memory/4400-41-0x00000000749C0000-0x0000000075170000-memory.dmp

    Filesize

    7.7MB

  • memory/4400-40-0x0000000004990000-0x00000000049A6000-memory.dmp

    Filesize

    88KB

  • memory/4400-18-0x0000000004990000-0x00000000049A6000-memory.dmp

    Filesize

    88KB

  • memory/4400-12-0x0000000004990000-0x00000000049AC000-memory.dmp

    Filesize

    112KB

  • memory/4400-11-0x00000000749C0000-0x0000000075170000-memory.dmp

    Filesize

    7.7MB

  • memory/4400-10-0x00000000049F0000-0x0000000004F94000-memory.dmp

    Filesize

    5.6MB

  • memory/4400-9-0x00000000749C0000-0x0000000075170000-memory.dmp

    Filesize

    7.7MB

  • memory/4400-8-0x0000000002380000-0x000000000239E000-memory.dmp

    Filesize

    120KB

  • memory/4400-7-0x00000000749CE000-0x00000000749CF000-memory.dmp

    Filesize

    4KB