Analysis

  • max time kernel
    135s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/11/2024, 15:35

General

  • Target

    b13c9a5aea918bb14b9e8626092f91c9b574886842cb3c1ea7333a5c033969ec.exe

  • Size

    794KB

  • MD5

    ca9a241f0ee9d51d04e47b5bf566b11a

  • SHA1

    64bb71290652a2f0b0893ba0b81979a0d4c8371c

  • SHA256

    b13c9a5aea918bb14b9e8626092f91c9b574886842cb3c1ea7333a5c033969ec

  • SHA512

    3cd044eced5ce68ad91f7afa89c44c866972a381ed8569031905cae2c626a97c4488a193eea5159bc4237b4600a73d464f82478005fc3965e236a3d87622db8e

  • SSDEEP

    24576:VycKurZevJebcrHmOnoRS2fJI+T/Nn36uG1KBf:wu1evaczmOov7Nn1

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dante

C2

185.161.248.73:4164

Attributes
  • auth_value

    f4066af6b8a6f23125c8ee48288a3f90

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b13c9a5aea918bb14b9e8626092f91c9b574886842cb3c1ea7333a5c033969ec.exe
    "C:\Users\Admin\AppData\Local\Temp\b13c9a5aea918bb14b9e8626092f91c9b574886842cb3c1ea7333a5c033969ec.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3280
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x05182568.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x05182568.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3844
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m93246188.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m93246188.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2304
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:732
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 1496
          4⤵
          • Program crash
          PID:1768
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n62596788.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n62596788.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1284
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2304 -ip 2304
    1⤵
      PID:4060

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x05182568.exe

            Filesize

            590KB

            MD5

            192dae529c491bbec65ce56b38fb391a

            SHA1

            9ea10c55f12cb0b9f1dc8164f49fed0946d4d7e2

            SHA256

            26dac33b458afc14311fd16ce9c5bbf59fe91906b815371a2cf9e19dc30fab73

            SHA512

            2c672cad14af3c97ab9263eaec458b42b865a136c9d937ca544ff8b71e4810a501be16b4c5c1856135ea69d5bd7b86f907ed037517f69dfac8c525fdb3dd2fe8

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m93246188.exe

            Filesize

            530KB

            MD5

            b42a0c38861c1918be5522fb8445c8e1

            SHA1

            fb9f1c043fcd6f566831eff4c18e9b69fd4a8e04

            SHA256

            ef74aa2794461f19a30e81306e8f23ec55e2f7c185d7e857c4048d45585298a8

            SHA512

            cb6176216b60529051667d79838205ca1539cdbce50224ea6d1cbb5c67b13eef06024bf47e19e27151a8661a48f5c9d4be52199b12b63b38939848323328c129

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n62596788.exe

            Filesize

            168KB

            MD5

            3040ab1879160ebb33d6c66fb76aac98

            SHA1

            df79544ae7bacce447ee37c72d7c53a2b94864ac

            SHA256

            45bacdf387f5fc34be82edc7f0711cf4de98b1849376bf28553111a422249abe

            SHA512

            2ec1c5a21b536b89395d5b6f039ff2b4ff92e29bed59a77d261ff304564c412a13c42e9cc0c542ef03ebee6f9de95cf49bce783ad73fae261c1b9b936ce64986

          • C:\Windows\Temp\1.exe

            Filesize

            168KB

            MD5

            f16fb63d4e551d3808e8f01f2671b57e

            SHA1

            781153ad6235a1152da112de1fb39a6f2d063575

            SHA256

            8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

            SHA512

            fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

          • memory/732-2185-0x0000000004B80000-0x0000000004C8A000-memory.dmp

            Filesize

            1.0MB

          • memory/732-2184-0x0000000005090000-0x00000000056A8000-memory.dmp

            Filesize

            6.1MB

          • memory/732-2183-0x0000000002250000-0x0000000002256000-memory.dmp

            Filesize

            24KB

          • memory/732-2182-0x0000000000110000-0x000000000013E000-memory.dmp

            Filesize

            184KB

          • memory/732-2188-0x0000000004C90000-0x0000000004CDC000-memory.dmp

            Filesize

            304KB

          • memory/732-2187-0x0000000004AF0000-0x0000000004B2C000-memory.dmp

            Filesize

            240KB

          • memory/732-2186-0x0000000004A90000-0x0000000004AA2000-memory.dmp

            Filesize

            72KB

          • memory/1284-2197-0x0000000000AE0000-0x0000000000AE6000-memory.dmp

            Filesize

            24KB

          • memory/1284-2196-0x0000000000230000-0x0000000000260000-memory.dmp

            Filesize

            192KB

          • memory/2304-57-0x0000000005790000-0x00000000057F0000-memory.dmp

            Filesize

            384KB

          • memory/2304-39-0x0000000005790000-0x00000000057F0000-memory.dmp

            Filesize

            384KB

          • memory/2304-63-0x0000000005790000-0x00000000057F0000-memory.dmp

            Filesize

            384KB

          • memory/2304-69-0x0000000005790000-0x00000000057F0000-memory.dmp

            Filesize

            384KB

          • memory/2304-85-0x0000000005790000-0x00000000057F0000-memory.dmp

            Filesize

            384KB

          • memory/2304-83-0x0000000005790000-0x00000000057F0000-memory.dmp

            Filesize

            384KB

          • memory/2304-81-0x0000000005790000-0x00000000057F0000-memory.dmp

            Filesize

            384KB

          • memory/2304-77-0x0000000005790000-0x00000000057F0000-memory.dmp

            Filesize

            384KB

          • memory/2304-75-0x0000000005790000-0x00000000057F0000-memory.dmp

            Filesize

            384KB

          • memory/2304-73-0x0000000005790000-0x00000000057F0000-memory.dmp

            Filesize

            384KB

          • memory/2304-71-0x0000000005790000-0x00000000057F0000-memory.dmp

            Filesize

            384KB

          • memory/2304-67-0x0000000005790000-0x00000000057F0000-memory.dmp

            Filesize

            384KB

          • memory/2304-65-0x0000000005790000-0x00000000057F0000-memory.dmp

            Filesize

            384KB

          • memory/2304-61-0x0000000005790000-0x00000000057F0000-memory.dmp

            Filesize

            384KB

          • memory/2304-59-0x0000000005790000-0x00000000057F0000-memory.dmp

            Filesize

            384KB

          • memory/2304-21-0x0000000005790000-0x00000000057F6000-memory.dmp

            Filesize

            408KB

          • memory/2304-55-0x0000000005790000-0x00000000057F0000-memory.dmp

            Filesize

            384KB

          • memory/2304-53-0x0000000005790000-0x00000000057F0000-memory.dmp

            Filesize

            384KB

          • memory/2304-49-0x0000000005790000-0x00000000057F0000-memory.dmp

            Filesize

            384KB

          • memory/2304-47-0x0000000005790000-0x00000000057F0000-memory.dmp

            Filesize

            384KB

          • memory/2304-45-0x0000000005790000-0x00000000057F0000-memory.dmp

            Filesize

            384KB

          • memory/2304-43-0x0000000005790000-0x00000000057F0000-memory.dmp

            Filesize

            384KB

          • memory/2304-41-0x0000000005790000-0x00000000057F0000-memory.dmp

            Filesize

            384KB

          • memory/2304-22-0x0000000005790000-0x00000000057F0000-memory.dmp

            Filesize

            384KB

          • memory/2304-37-0x0000000005790000-0x00000000057F0000-memory.dmp

            Filesize

            384KB

          • memory/2304-35-0x0000000005790000-0x00000000057F0000-memory.dmp

            Filesize

            384KB

          • memory/2304-33-0x0000000005790000-0x00000000057F0000-memory.dmp

            Filesize

            384KB

          • memory/2304-79-0x0000000005790000-0x00000000057F0000-memory.dmp

            Filesize

            384KB

          • memory/2304-31-0x0000000005790000-0x00000000057F0000-memory.dmp

            Filesize

            384KB

          • memory/2304-29-0x0000000005790000-0x00000000057F0000-memory.dmp

            Filesize

            384KB

          • memory/2304-27-0x0000000005790000-0x00000000057F0000-memory.dmp

            Filesize

            384KB

          • memory/2304-20-0x00000000051A0000-0x0000000005744000-memory.dmp

            Filesize

            5.6MB

          • memory/2304-19-0x0000000005130000-0x0000000005198000-memory.dmp

            Filesize

            416KB

          • memory/2304-18-0x0000000000400000-0x0000000000A95000-memory.dmp

            Filesize

            6.6MB

          • memory/2304-51-0x0000000005790000-0x00000000057F0000-memory.dmp

            Filesize

            384KB

          • memory/2304-25-0x0000000005790000-0x00000000057F0000-memory.dmp

            Filesize

            384KB

          • memory/2304-23-0x0000000005790000-0x00000000057F0000-memory.dmp

            Filesize

            384KB

          • memory/2304-2168-0x0000000000D30000-0x0000000000E30000-memory.dmp

            Filesize

            1024KB

          • memory/2304-2169-0x00000000059C0000-0x00000000059F2000-memory.dmp

            Filesize

            200KB

          • memory/2304-2192-0x0000000000400000-0x0000000000A95000-memory.dmp

            Filesize

            6.6MB

          • memory/2304-2191-0x0000000000400000-0x000000000045E000-memory.dmp

            Filesize

            376KB

          • memory/2304-2190-0x0000000000C00000-0x0000000000C5B000-memory.dmp

            Filesize

            364KB

          • memory/2304-17-0x0000000000400000-0x000000000045E000-memory.dmp

            Filesize

            376KB

          • memory/2304-16-0x0000000000C00000-0x0000000000C5B000-memory.dmp

            Filesize

            364KB

          • memory/2304-15-0x0000000000D30000-0x0000000000E30000-memory.dmp

            Filesize

            1024KB