Analysis

  • max time kernel
    135s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-11-2024 02:15

General

  • Target

    adbd8b1a8efd26a69709f28c50621477784d5770e2aa48218f7b5d0bdde2260e.exe

  • Size

    850KB

  • MD5

    a7d20a82d2d8d9ac0b3ba289943a943c

  • SHA1

    24728f7bf049ecb81851da93a8844ebf91b5adda

  • SHA256

    adbd8b1a8efd26a69709f28c50621477784d5770e2aa48218f7b5d0bdde2260e

  • SHA512

    911be26637fc32566b63b03f35c6f4bc6555ce49e80c5fb667777ca89287e93a87d8fca7105ec42b24b8a9d827b1a572f9d38c2544d0d137b604ce576b3b0dbe

  • SSDEEP

    24576:Dy/lbkqli1XtjnSoGZz7w5UxX+uTEG3wPjQ:W/6dtJQzcSdTEG3g

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dante

C2

185.161.248.73:4164

Attributes
  • auth_value

    f4066af6b8a6f23125c8ee48288a3f90

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\adbd8b1a8efd26a69709f28c50621477784d5770e2aa48218f7b5d0bdde2260e.exe
    "C:\Users\Admin\AppData\Local\Temp\adbd8b1a8efd26a69709f28c50621477784d5770e2aa48218f7b5d0bdde2260e.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1284
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y38978892.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y38978892.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5008
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p91339284.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p91339284.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1464
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:5236
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r33972933.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r33972933.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:5396

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y38978892.exe

    Filesize

    570KB

    MD5

    6d6b043a4c0f0f93c6207903354f39c4

    SHA1

    0ed4455da25bb77443ea423ec2e8340fb7cb3c2c

    SHA256

    e9c59c76de924ca0d6e702262ecda7e26775c2879deacfd9ea8feee0eee339f7

    SHA512

    2cb74a6f05c341b4134e42795db5f95d4364fd5bcbab5c06f8fe1e30ae089cb67efb0ea2b2ec0c7b4191e7bbffe9b0a9a004b7454f2bfafb20e2c0052ace0e49

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p91339284.exe

    Filesize

    476KB

    MD5

    7e01529a7d51edad86c2bea54bdd51ef

    SHA1

    f262d83d6894a73c560f4e3688d314653c85fea6

    SHA256

    99bd46de2c18fc568c6b2e06a20eebfac9e50e316056003ee45f03401c1784fc

    SHA512

    c89fa34da974a309ad969282237ecc4ebf4d48a7a5b895139079cf2935f67f9f618366d9e5f6905f3b54ee43dbf3e70ff9eae83fe749b51e554acc149b3c80dd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r33972933.exe

    Filesize

    169KB

    MD5

    0c012d1f825902259f68c3c5b619b30e

    SHA1

    7e663f8356b87c745de5780763215d76b26ce58c

    SHA256

    5dddf3cdea04709ecf70e35568954d9ff8b6ebeb189003c2092b752f81ec6b02

    SHA512

    8f74235b3d2c8e2793db339c776f4b43f48e5c647bf6afb4c1dfb7d5c58702e778f6c7ea5e51af297d3a9cd6d9aed0f376037ecf6a0f175ba509ea5a9afa68d0

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • memory/1464-47-0x00000000026F0000-0x0000000002750000-memory.dmp

    Filesize

    384KB

  • memory/1464-20-0x0000000005140000-0x00000000056E4000-memory.dmp

    Filesize

    5.6MB

  • memory/1464-19-0x00000000024F0000-0x0000000002558000-memory.dmp

    Filesize

    416KB

  • memory/1464-39-0x00000000026F0000-0x0000000002750000-memory.dmp

    Filesize

    384KB

  • memory/1464-45-0x00000000026F0000-0x0000000002750000-memory.dmp

    Filesize

    384KB

  • memory/1464-41-0x00000000026F0000-0x0000000002750000-memory.dmp

    Filesize

    384KB

  • memory/1464-43-0x00000000026F0000-0x0000000002750000-memory.dmp

    Filesize

    384KB

  • memory/1464-83-0x00000000026F0000-0x0000000002750000-memory.dmp

    Filesize

    384KB

  • memory/1464-81-0x00000000026F0000-0x0000000002750000-memory.dmp

    Filesize

    384KB

  • memory/1464-79-0x00000000026F0000-0x0000000002750000-memory.dmp

    Filesize

    384KB

  • memory/1464-77-0x00000000026F0000-0x0000000002750000-memory.dmp

    Filesize

    384KB

  • memory/1464-75-0x00000000026F0000-0x0000000002750000-memory.dmp

    Filesize

    384KB

  • memory/1464-73-0x00000000026F0000-0x0000000002750000-memory.dmp

    Filesize

    384KB

  • memory/1464-71-0x00000000026F0000-0x0000000002750000-memory.dmp

    Filesize

    384KB

  • memory/1464-67-0x00000000026F0000-0x0000000002750000-memory.dmp

    Filesize

    384KB

  • memory/1464-65-0x00000000026F0000-0x0000000002750000-memory.dmp

    Filesize

    384KB

  • memory/1464-63-0x00000000026F0000-0x0000000002750000-memory.dmp

    Filesize

    384KB

  • memory/1464-61-0x00000000026F0000-0x0000000002750000-memory.dmp

    Filesize

    384KB

  • memory/1464-59-0x00000000026F0000-0x0000000002750000-memory.dmp

    Filesize

    384KB

  • memory/1464-57-0x00000000026F0000-0x0000000002750000-memory.dmp

    Filesize

    384KB

  • memory/1464-55-0x00000000026F0000-0x0000000002750000-memory.dmp

    Filesize

    384KB

  • memory/1464-53-0x00000000026F0000-0x0000000002750000-memory.dmp

    Filesize

    384KB

  • memory/1464-51-0x00000000026F0000-0x0000000002750000-memory.dmp

    Filesize

    384KB

  • memory/1464-49-0x00000000026F0000-0x0000000002750000-memory.dmp

    Filesize

    384KB

  • memory/1464-16-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/1464-21-0x00000000026F0000-0x0000000002756000-memory.dmp

    Filesize

    408KB

  • memory/1464-18-0x0000000000400000-0x00000000006F8000-memory.dmp

    Filesize

    3.0MB

  • memory/1464-37-0x00000000026F0000-0x0000000002750000-memory.dmp

    Filesize

    384KB

  • memory/1464-33-0x00000000026F0000-0x0000000002750000-memory.dmp

    Filesize

    384KB

  • memory/1464-31-0x00000000026F0000-0x0000000002750000-memory.dmp

    Filesize

    384KB

  • memory/1464-29-0x00000000026F0000-0x0000000002750000-memory.dmp

    Filesize

    384KB

  • memory/1464-27-0x00000000026F0000-0x0000000002750000-memory.dmp

    Filesize

    384KB

  • memory/1464-25-0x00000000026F0000-0x0000000002750000-memory.dmp

    Filesize

    384KB

  • memory/1464-85-0x00000000026F0000-0x0000000002750000-memory.dmp

    Filesize

    384KB

  • memory/1464-69-0x00000000026F0000-0x0000000002750000-memory.dmp

    Filesize

    384KB

  • memory/1464-35-0x00000000026F0000-0x0000000002750000-memory.dmp

    Filesize

    384KB

  • memory/1464-23-0x00000000026F0000-0x0000000002750000-memory.dmp

    Filesize

    384KB

  • memory/1464-22-0x00000000026F0000-0x0000000002750000-memory.dmp

    Filesize

    384KB

  • memory/1464-2168-0x0000000002A20000-0x0000000002A52000-memory.dmp

    Filesize

    200KB

  • memory/1464-17-0x0000000000400000-0x00000000006F8000-memory.dmp

    Filesize

    3.0MB

  • memory/1464-15-0x0000000000950000-0x0000000000A50000-memory.dmp

    Filesize

    1024KB

  • memory/1464-2183-0x0000000000400000-0x00000000006F8000-memory.dmp

    Filesize

    3.0MB

  • memory/1464-2184-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/5236-2185-0x00000000023D0000-0x00000000023D6000-memory.dmp

    Filesize

    24KB

  • memory/5236-2182-0x0000000000300000-0x000000000032E000-memory.dmp

    Filesize

    184KB

  • memory/5396-2189-0x0000000000F40000-0x0000000000F70000-memory.dmp

    Filesize

    192KB

  • memory/5396-2190-0x0000000003090000-0x0000000003096000-memory.dmp

    Filesize

    24KB

  • memory/5396-2191-0x0000000005F30000-0x0000000006548000-memory.dmp

    Filesize

    6.1MB

  • memory/5396-2192-0x0000000005A20000-0x0000000005B2A000-memory.dmp

    Filesize

    1.0MB

  • memory/5396-2193-0x00000000057B0000-0x00000000057C2000-memory.dmp

    Filesize

    72KB

  • memory/5396-2194-0x0000000005950000-0x000000000598C000-memory.dmp

    Filesize

    240KB

  • memory/5396-2195-0x0000000005990000-0x00000000059DC000-memory.dmp

    Filesize

    304KB