Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-11-2024 13:38

General

  • Target

    c538730e4a76a33af6e56ffcd8fde615fa5003ce7164dbb0527fd38924659ed2.exe

  • Size

    1.1MB

  • MD5

    734d5c6de2a90c1cb9a277de49c6056b

  • SHA1

    2703adb2643c72a0b6e70f7eeb11fc8e73539776

  • SHA256

    c538730e4a76a33af6e56ffcd8fde615fa5003ce7164dbb0527fd38924659ed2

  • SHA512

    af3cb918843239781f147114601d7129f767dd409d9f1a8361644f905c2378f8f5ec999baeefce3858d64a48f00d9b0ed2629041f7230b83f75d3cceb0acb840

  • SSDEEP

    24576:qyFuSgO9UAl3jfiFkDnWKR2Fh6n8vze+5D/dgL6L4KnadU5g:xFu1O9UOjfiFkDWKILe+5D+L68KnaG

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 4 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c538730e4a76a33af6e56ffcd8fde615fa5003ce7164dbb0527fd38924659ed2.exe
    "C:\Users\Admin\AppData\Local\Temp\c538730e4a76a33af6e56ffcd8fde615fa5003ce7164dbb0527fd38924659ed2.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2252
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1601082.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1601082.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4092
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6193474.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6193474.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2156
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k2465319.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k2465319.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1860
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9581358.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9581358.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1601082.exe

    Filesize

    750KB

    MD5

    406570fa9372fc514549c192aaf60e3c

    SHA1

    68883be96790fb202f03a9db793b19053af93863

    SHA256

    4f9d0bc0f4ed58a60eb368bb12cf479bc5888864f4d1f2f31788e82ddeff05d8

    SHA512

    fec2c29ad5b650fabb7ac7bec9499557f6d5e07f941bd503193fb13cb7b0a7721dd556415c4a2ad6eafb3a79c5131ded8bbc1b0543d567c4e197c79156c2cd3c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6193474.exe

    Filesize

    304KB

    MD5

    64ceec218f01b1b05f4558d85648f98e

    SHA1

    95f75e2c70f2d1d9de384a7e75dc246e8911b531

    SHA256

    6b11e2be19fe7b129c4d9b4c52e7e014d9b65550ccd5037b07aea40c06c7690b

    SHA512

    a46cebb03d395063fbdb926f29ee89e0713df036e3c9e4ab9890ab80ef02db68e60a253b0278c348406c1778f51f5edf814417953e12df53e1c655409c788ec5

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k2465319.exe

    Filesize

    183KB

    MD5

    75df6a4aaf5c63bc4f42ac5ec8ecc76a

    SHA1

    8d9da11aa11364c1b580b12faa446403f527ff83

    SHA256

    d1d13ff4eabb541a9cfc225beeb1c27d9cd85c8f9849e8d0fece0a4503c63f05

    SHA512

    72d34a4770cf9885993630f04e83831f4ded666af58cb705c7b1ca4cd7ca95911dec7247e4987c64afc13fee10bcf94fc913bd9a7790edb65c75b01a89bbe8fe

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9581358.exe

    Filesize

    145KB

    MD5

    2a490205a842eba517518bab160d0607

    SHA1

    152b6ed86d9c97e918ec2cd24916fdd3c6f22282

    SHA256

    6136e31cd3803c1c04d7cf9b80149719f144da94f5e6ec06ee2faa0ea69e7723

    SHA512

    df3e3680edaf006625f6abd9efbd03472bda9a5dc9cf9cc8fa58d31a8dfe8eb6a5538e8d853e4573ac290a89ad63b8d0020e858822ef056f65ebf78ba7a7854d

  • memory/1860-49-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

    Filesize

    88KB

  • memory/1860-35-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

    Filesize

    88KB

  • memory/1860-29-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

    Filesize

    88KB

  • memory/1860-22-0x0000000004B50000-0x00000000050F4000-memory.dmp

    Filesize

    5.6MB

  • memory/1860-47-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

    Filesize

    88KB

  • memory/1860-45-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

    Filesize

    88KB

  • memory/1860-25-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

    Filesize

    88KB

  • memory/1860-43-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

    Filesize

    88KB

  • memory/1860-41-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

    Filesize

    88KB

  • memory/1860-39-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

    Filesize

    88KB

  • memory/1860-37-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

    Filesize

    88KB

  • memory/1860-23-0x0000000004AD0000-0x0000000004AEC000-memory.dmp

    Filesize

    112KB

  • memory/1860-33-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

    Filesize

    88KB

  • memory/1860-31-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

    Filesize

    88KB

  • memory/1860-27-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

    Filesize

    88KB

  • memory/1860-51-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

    Filesize

    88KB

  • memory/1860-24-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

    Filesize

    88KB

  • memory/1860-21-0x0000000002480000-0x000000000249E000-memory.dmp

    Filesize

    120KB

  • memory/4628-56-0x0000000000D90000-0x0000000000DBA000-memory.dmp

    Filesize

    168KB

  • memory/4628-57-0x0000000005CE0000-0x00000000062F8000-memory.dmp

    Filesize

    6.1MB

  • memory/4628-58-0x0000000005860000-0x000000000596A000-memory.dmp

    Filesize

    1.0MB

  • memory/4628-59-0x0000000005790000-0x00000000057A2000-memory.dmp

    Filesize

    72KB

  • memory/4628-60-0x00000000057F0000-0x000000000582C000-memory.dmp

    Filesize

    240KB

  • memory/4628-61-0x0000000005970000-0x00000000059BC000-memory.dmp

    Filesize

    304KB