Analysis

  • max time kernel
    110s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/11/2024, 20:03

General

  • Target

    03bece8cef42e09db6b8fd7c2b7654d490583b4837a7d414a4f64da519ea7eae.exe

  • Size

    570KB

  • MD5

    f27e976dbe07c14dba6191c821da9064

  • SHA1

    1e5b87fcacb60a4dcbdd2c9adb981d47fd2c1624

  • SHA256

    03bece8cef42e09db6b8fd7c2b7654d490583b4837a7d414a4f64da519ea7eae

  • SHA512

    32609f8c73184fb4e80e87948918e9c32950612b8584c013ed2d86580541a8865515b6af0967884ab0e497b3a28d7fb5d5d0f8aaadb62e65aa62c8b00627de78

  • SSDEEP

    12288:xy90SQ0dRTmPHSvAbI/9/a74L7KvF0tYBwX4Ng/dVh:xylQuRTeSobOCFoz4eVh

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dante

C2

185.161.248.73:4164

Attributes
  • auth_value

    f4066af6b8a6f23125c8ee48288a3f90

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03bece8cef42e09db6b8fd7c2b7654d490583b4837a7d414a4f64da519ea7eae.exe
    "C:\Users\Admin\AppData\Local\Temp\03bece8cef42e09db6b8fd7c2b7654d490583b4837a7d414a4f64da519ea7eae.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2272
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m42974613.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m42974613.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4672
      • C:\Windows\Temp\1.exe
        "C:\Windows\Temp\1.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:5468
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n23671177.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n23671177.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1368

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m42974613.exe

          Filesize

          476KB

          MD5

          9a64e73103c441d16845194295351085

          SHA1

          4801e160c2067651af6efa28bc715c1d0731ece7

          SHA256

          2d17bd94c2cbcd922c47e24b7209cbee50c9a9563164c798c65fe157a169ef94

          SHA512

          3682903c1cadfb05ec2f5f6b9e3a739d8ab17c5e65948c09f3ac65f3e8e0d691db01f8343f3b7e1b5fb0041297e5db7e88d5a9e0218729bbc337a43c39f0cac6

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n23671177.exe

          Filesize

          169KB

          MD5

          e95bd1405954b689a753ec6b5cfb3f2c

          SHA1

          af529a71b4e83a08f0ea0ec7a989b222183fc339

          SHA256

          2e323f3d434ccf95d1a236113f973ec1bf547d07a0e02f5b42b4d3ea03682f85

          SHA512

          43d4a5e9fa8de04dd0ad4abd77dfc8024d643495f384301cb17b2a6bd244f38c7d10d60c41a5f0fe29f11fe70a61ecd7ba8db2303c621b310e02921e9ea429db

        • C:\Windows\Temp\1.exe

          Filesize

          168KB

          MD5

          f16fb63d4e551d3808e8f01f2671b57e

          SHA1

          781153ad6235a1152da112de1fb39a6f2d063575

          SHA256

          8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

          SHA512

          fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

        • memory/1368-2187-0x0000000005650000-0x0000000005662000-memory.dmp

          Filesize

          72KB

        • memory/1368-2186-0x0000000005720000-0x000000000582A000-memory.dmp

          Filesize

          1.0MB

        • memory/1368-2184-0x0000000002CA0000-0x0000000002CA6000-memory.dmp

          Filesize

          24KB

        • memory/1368-2183-0x0000000000B90000-0x0000000000BC0000-memory.dmp

          Filesize

          192KB

        • memory/4672-34-0x0000000002850000-0x00000000028B0000-memory.dmp

          Filesize

          384KB

        • memory/4672-24-0x0000000002850000-0x00000000028B0000-memory.dmp

          Filesize

          384KB

        • memory/4672-40-0x0000000002850000-0x00000000028B0000-memory.dmp

          Filesize

          384KB

        • memory/4672-78-0x0000000002850000-0x00000000028B0000-memory.dmp

          Filesize

          384KB

        • memory/4672-76-0x0000000002850000-0x00000000028B0000-memory.dmp

          Filesize

          384KB

        • memory/4672-74-0x0000000002850000-0x00000000028B0000-memory.dmp

          Filesize

          384KB

        • memory/4672-72-0x0000000002850000-0x00000000028B0000-memory.dmp

          Filesize

          384KB

        • memory/4672-68-0x0000000002850000-0x00000000028B0000-memory.dmp

          Filesize

          384KB

        • memory/4672-66-0x0000000002850000-0x00000000028B0000-memory.dmp

          Filesize

          384KB

        • memory/4672-64-0x0000000002850000-0x00000000028B0000-memory.dmp

          Filesize

          384KB

        • memory/4672-62-0x0000000002850000-0x00000000028B0000-memory.dmp

          Filesize

          384KB

        • memory/4672-60-0x0000000002850000-0x00000000028B0000-memory.dmp

          Filesize

          384KB

        • memory/4672-58-0x0000000002850000-0x00000000028B0000-memory.dmp

          Filesize

          384KB

        • memory/4672-56-0x0000000002850000-0x00000000028B0000-memory.dmp

          Filesize

          384KB

        • memory/4672-52-0x0000000002850000-0x00000000028B0000-memory.dmp

          Filesize

          384KB

        • memory/4672-50-0x0000000002850000-0x00000000028B0000-memory.dmp

          Filesize

          384KB

        • memory/4672-48-0x0000000002850000-0x00000000028B0000-memory.dmp

          Filesize

          384KB

        • memory/4672-46-0x0000000002850000-0x00000000028B0000-memory.dmp

          Filesize

          384KB

        • memory/4672-42-0x0000000002850000-0x00000000028B0000-memory.dmp

          Filesize

          384KB

        • memory/4672-38-0x0000000002850000-0x00000000028B0000-memory.dmp

          Filesize

          384KB

        • memory/4672-36-0x0000000002850000-0x00000000028B0000-memory.dmp

          Filesize

          384KB

        • memory/4672-14-0x0000000002850000-0x00000000028B6000-memory.dmp

          Filesize

          408KB

        • memory/4672-32-0x0000000002850000-0x00000000028B0000-memory.dmp

          Filesize

          384KB

        • memory/4672-28-0x0000000002850000-0x00000000028B0000-memory.dmp

          Filesize

          384KB

        • memory/4672-26-0x0000000002850000-0x00000000028B0000-memory.dmp

          Filesize

          384KB

        • memory/4672-30-0x0000000002850000-0x00000000028B0000-memory.dmp

          Filesize

          384KB

        • memory/4672-20-0x0000000002850000-0x00000000028B0000-memory.dmp

          Filesize

          384KB

        • memory/4672-18-0x0000000002850000-0x00000000028B0000-memory.dmp

          Filesize

          384KB

        • memory/4672-70-0x0000000002850000-0x00000000028B0000-memory.dmp

          Filesize

          384KB

        • memory/4672-54-0x0000000002850000-0x00000000028B0000-memory.dmp

          Filesize

          384KB

        • memory/4672-44-0x0000000002850000-0x00000000028B0000-memory.dmp

          Filesize

          384KB

        • memory/4672-22-0x0000000002850000-0x00000000028B0000-memory.dmp

          Filesize

          384KB

        • memory/4672-17-0x0000000002850000-0x00000000028B0000-memory.dmp

          Filesize

          384KB

        • memory/4672-15-0x0000000002850000-0x00000000028B0000-memory.dmp

          Filesize

          384KB

        • memory/4672-2161-0x0000000002B50000-0x0000000002B82000-memory.dmp

          Filesize

          200KB

        • memory/4672-13-0x0000000005100000-0x00000000056A4000-memory.dmp

          Filesize

          5.6MB

        • memory/4672-8-0x0000000000870000-0x0000000000970000-memory.dmp

          Filesize

          1024KB

        • memory/4672-9-0x0000000000700000-0x000000000075B000-memory.dmp

          Filesize

          364KB

        • memory/4672-10-0x0000000000400000-0x000000000045E000-memory.dmp

          Filesize

          376KB

        • memory/4672-2176-0x0000000000400000-0x00000000006F8000-memory.dmp

          Filesize

          3.0MB

        • memory/4672-12-0x00000000027E0000-0x0000000002848000-memory.dmp

          Filesize

          416KB

        • memory/4672-2175-0x0000000000400000-0x000000000045E000-memory.dmp

          Filesize

          376KB

        • memory/4672-11-0x0000000000400000-0x00000000006F8000-memory.dmp

          Filesize

          3.0MB

        • memory/5468-2180-0x0000000002350000-0x0000000002356000-memory.dmp

          Filesize

          24KB

        • memory/5468-2185-0x00000000051E0000-0x00000000057F8000-memory.dmp

          Filesize

          6.1MB

        • memory/5468-2178-0x00000000744BE000-0x00000000744BF000-memory.dmp

          Filesize

          4KB

        • memory/5468-2177-0x0000000000200000-0x000000000022E000-memory.dmp

          Filesize

          184KB

        • memory/5468-2188-0x00000000744B0000-0x0000000074C60000-memory.dmp

          Filesize

          7.7MB

        • memory/5468-2189-0x0000000004C00000-0x0000000004C3C000-memory.dmp

          Filesize

          240KB

        • memory/5468-2190-0x0000000004C40000-0x0000000004C8C000-memory.dmp

          Filesize

          304KB

        • memory/5468-2191-0x00000000744BE000-0x00000000744BF000-memory.dmp

          Filesize

          4KB

        • memory/5468-2192-0x00000000744B0000-0x0000000074C60000-memory.dmp

          Filesize

          7.7MB