Analysis

  • max time kernel
    140s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/11/2024, 22:29

General

  • Target

    83b77cc8b30fe15803c2759046d3916e05739a4b4c90cc5b5a9d51ce39f6a321.exe

  • Size

    564KB

  • MD5

    dd796866e1d545a43f3b7b362528307d

  • SHA1

    5a62c3041d9928c8992ff1b7ae27506b208ad710

  • SHA256

    83b77cc8b30fe15803c2759046d3916e05739a4b4c90cc5b5a9d51ce39f6a321

  • SHA512

    e01174d1e9465f39081f40f21b2afcdf09f69ce46714ae09385cab40dc0ca4606864d364e3ba75e19fdcc4ddec09b7d5960f79fb05a4239871dc78c31845cd1d

  • SSDEEP

    12288:nMr9y90ZFKHhU0Flt2caD3RrQKvbwA/oTdQuNF:aytRIJ7bwfTNF

Malware Config

Extracted

Family

redline

Botnet

ronam

C2

193.233.20.17:4139

Attributes
  • auth_value

    125421d19d14dd7fd211bc7f6d4aea6c

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\83b77cc8b30fe15803c2759046d3916e05739a4b4c90cc5b5a9d51ce39f6a321.exe
    "C:\Users\Admin\AppData\Local\Temp\83b77cc8b30fe15803c2759046d3916e05739a4b4c90cc5b5a9d51ce39f6a321.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4284
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dmY9995.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dmY9995.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3220
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nQt91Jw.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nQt91Jw.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:5100

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dmY9995.exe

    Filesize

    419KB

    MD5

    d650ca1f468cc0e178b64fcccf4c2e02

    SHA1

    ffb86208271546444e9b7eb91a5dd427dc282807

    SHA256

    c02f69bf6a08f60ff212244701b52a15bef27e4052c9c04aae73526ae38bc483

    SHA512

    c26423ec4573f67b46f45db04e6d0ed857c8252a16c50b28f42b7ca78bdb2eb2872b29ec5f63758bd7e3d364e3c44c9b7fd2d547259cad00183dc5ac61ab7165

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nQt91Jw.exe

    Filesize

    265KB

    MD5

    7a78f52edbea16ad7c9ba5d09f7aa32b

    SHA1

    486aaf1b89a4dc78da8b73a75417d4d875efbe2a

    SHA256

    00631c3b76c2cad95b50e997aa14945832db0283e512b7eac0229246a869b73b

    SHA512

    0484461740ed7bfa0c11fbe7c2afc6db7984b892b086b0d36184d35f9baf3795d3ccdae14530813c11deaf33b73191e4477ff2004e99e1bde356a979bf40b550

  • memory/5100-15-0x0000000000850000-0x0000000000950000-memory.dmp

    Filesize

    1024KB

  • memory/5100-16-0x0000000000710000-0x000000000075B000-memory.dmp

    Filesize

    300KB

  • memory/5100-17-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/5100-18-0x0000000000400000-0x0000000000589000-memory.dmp

    Filesize

    1.5MB

  • memory/5100-19-0x00000000023D0000-0x0000000002416000-memory.dmp

    Filesize

    280KB

  • memory/5100-20-0x0000000004E20000-0x00000000053C4000-memory.dmp

    Filesize

    5.6MB

  • memory/5100-21-0x0000000002480000-0x00000000024C4000-memory.dmp

    Filesize

    272KB

  • memory/5100-33-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/5100-71-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/5100-85-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/5100-83-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/5100-81-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/5100-79-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/5100-77-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/5100-75-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/5100-73-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/5100-69-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/5100-67-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/5100-65-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/5100-63-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/5100-61-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/5100-59-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/5100-57-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/5100-55-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/5100-53-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/5100-51-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/5100-49-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/5100-47-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/5100-45-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/5100-43-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/5100-41-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/5100-39-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/5100-37-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/5100-35-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/5100-31-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/5100-29-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/5100-27-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/5100-25-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/5100-23-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/5100-22-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/5100-928-0x00000000053D0000-0x00000000059E8000-memory.dmp

    Filesize

    6.1MB

  • memory/5100-929-0x0000000004C80000-0x0000000004D8A000-memory.dmp

    Filesize

    1.0MB

  • memory/5100-930-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

    Filesize

    72KB

  • memory/5100-931-0x00000000059F0000-0x0000000005A2C000-memory.dmp

    Filesize

    240KB

  • memory/5100-932-0x0000000005B30000-0x0000000005B7C000-memory.dmp

    Filesize

    304KB

  • memory/5100-933-0x0000000000850000-0x0000000000950000-memory.dmp

    Filesize

    1024KB

  • memory/5100-934-0x0000000000710000-0x000000000075B000-memory.dmp

    Filesize

    300KB

  • memory/5100-935-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB