Malware Analysis Report

2024-12-01 01:21

Sample ID 241111-2whx4axpb1
Target 605076ba2b261386960619f2b9c1209ccff6d92523005a0ba93c4ab401cc01fc
SHA256 605076ba2b261386960619f2b9c1209ccff6d92523005a0ba93c4ab401cc01fc
Tags
redline romik discovery infostealer persistence
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

605076ba2b261386960619f2b9c1209ccff6d92523005a0ba93c4ab401cc01fc

Threat Level: Known bad

The file 605076ba2b261386960619f2b9c1209ccff6d92523005a0ba93c4ab401cc01fc was found to be: Known bad.

Malicious Activity Summary

redline romik discovery infostealer persistence

RedLine

RedLine payload

Redline family

Executes dropped EXE

Adds Run key to start application

System Location Discovery: System Language Discovery

Unsigned PE

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-11 22:55

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-11 22:55

Reported

2024-11-11 22:58

Platform

win10v2004-20241007-en

Max time kernel

141s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\605076ba2b261386960619f2b9c1209ccff6d92523005a0ba93c4ab401cc01fc.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Redline family

redline

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vSr38.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dwR93.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\605076ba2b261386960619f2b9c1209ccff6d92523005a0ba93c4ab401cc01fc.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vSr38.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\605076ba2b261386960619f2b9c1209ccff6d92523005a0ba93c4ab401cc01fc.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vSr38.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dwR93.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dwR93.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\605076ba2b261386960619f2b9c1209ccff6d92523005a0ba93c4ab401cc01fc.exe

"C:\Users\Admin\AppData\Local\Temp\605076ba2b261386960619f2b9c1209ccff6d92523005a0ba93c4ab401cc01fc.exe"

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vSr38.exe

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vSr38.exe

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dwR93.exe

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dwR93.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 71.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
RU 193.233.20.12:4132 tcp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 197.87.175.4.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 75.209.201.84.in-addr.arpa udp
RU 193.233.20.12:4132 tcp
RU 193.233.20.12:4132 tcp
RU 193.233.20.12:4132 tcp
US 8.8.8.8:53 30.243.111.52.in-addr.arpa udp
RU 193.233.20.12:4132 tcp
RU 193.233.20.12:4132 tcp

Files

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vSr38.exe

MD5 9a3581b4ce390f5f78d1b2a183f42fd2
SHA1 bbbf4e21fc1e2c52709355ce0632907e1a8d4048
SHA256 d3ab04dca55c93fc04b21e6dc797f87070b3260cbdd385bd1c9e43f52c2a794e
SHA512 6268cd2a23fd20fa9d4d2a8d491deec14fdb5d69136efe68d99639e23c61c9dd6adba0f3916dedb9e9eef9e0058a943972aaa7c0fc20e2011b2db6d95fc5ca06

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dwR93.exe

MD5 34c8db70ca3e7fa5ff713e6d0322767f
SHA1 b52b7734d5deceaf101279cd98fccfc26c9614e4
SHA256 dc89d449b00405be637c1c7932b01606709d7ecbc51b6c82f7c04cb1794f75f0
SHA512 58727d312967aa8c54b5826cf4edf22d62a3412526a09fac606e10d6136650314fff8338811f30a4980529c58071c981abb8e70c24bd7f37a992e7a26992aa5a

memory/4840-15-0x0000000000800000-0x0000000000900000-memory.dmp

memory/4840-16-0x0000000000400000-0x000000000044E000-memory.dmp

memory/4840-17-0x0000000000400000-0x00000000007B1000-memory.dmp

memory/4840-18-0x0000000000400000-0x00000000007B1000-memory.dmp

memory/4840-19-0x00000000027D0000-0x0000000002816000-memory.dmp

memory/4840-20-0x0000000004EA0000-0x0000000005444000-memory.dmp

memory/4840-21-0x0000000002860000-0x00000000028A4000-memory.dmp

memory/4840-51-0x0000000002860000-0x000000000289E000-memory.dmp

memory/4840-53-0x0000000002860000-0x000000000289E000-memory.dmp

memory/4840-85-0x0000000002860000-0x000000000289E000-memory.dmp

memory/4840-83-0x0000000002860000-0x000000000289E000-memory.dmp

memory/4840-81-0x0000000002860000-0x000000000289E000-memory.dmp

memory/4840-77-0x0000000002860000-0x000000000289E000-memory.dmp

memory/4840-75-0x0000000002860000-0x000000000289E000-memory.dmp

memory/4840-73-0x0000000002860000-0x000000000289E000-memory.dmp

memory/4840-71-0x0000000002860000-0x000000000289E000-memory.dmp

memory/4840-69-0x0000000002860000-0x000000000289E000-memory.dmp

memory/4840-67-0x0000000002860000-0x000000000289E000-memory.dmp

memory/4840-65-0x0000000002860000-0x000000000289E000-memory.dmp

memory/4840-61-0x0000000002860000-0x000000000289E000-memory.dmp

memory/4840-59-0x0000000002860000-0x000000000289E000-memory.dmp

memory/4840-57-0x0000000002860000-0x000000000289E000-memory.dmp

memory/4840-55-0x0000000002860000-0x000000000289E000-memory.dmp

memory/4840-49-0x0000000002860000-0x000000000289E000-memory.dmp

memory/4840-47-0x0000000002860000-0x000000000289E000-memory.dmp

memory/4840-43-0x0000000002860000-0x000000000289E000-memory.dmp

memory/4840-41-0x0000000002860000-0x000000000289E000-memory.dmp

memory/4840-39-0x0000000002860000-0x000000000289E000-memory.dmp

memory/4840-37-0x0000000002860000-0x000000000289E000-memory.dmp

memory/4840-35-0x0000000002860000-0x000000000289E000-memory.dmp

memory/4840-33-0x0000000002860000-0x000000000289E000-memory.dmp

memory/4840-31-0x0000000002860000-0x000000000289E000-memory.dmp

memory/4840-29-0x0000000002860000-0x000000000289E000-memory.dmp

memory/4840-27-0x0000000002860000-0x000000000289E000-memory.dmp

memory/4840-25-0x0000000002860000-0x000000000289E000-memory.dmp

memory/4840-79-0x0000000002860000-0x000000000289E000-memory.dmp

memory/4840-23-0x0000000002860000-0x000000000289E000-memory.dmp

memory/4840-22-0x0000000002860000-0x000000000289E000-memory.dmp

memory/4840-63-0x0000000002860000-0x000000000289E000-memory.dmp

memory/4840-45-0x0000000002860000-0x000000000289E000-memory.dmp

memory/4840-928-0x0000000005450000-0x0000000005A68000-memory.dmp

memory/4840-929-0x0000000005A90000-0x0000000005B9A000-memory.dmp

memory/4840-930-0x0000000005BD0000-0x0000000005BE2000-memory.dmp

memory/4840-931-0x0000000005BF0000-0x0000000005C2C000-memory.dmp

memory/4840-932-0x0000000005D40000-0x0000000005D8C000-memory.dmp

memory/4840-933-0x0000000000800000-0x0000000000900000-memory.dmp

memory/4840-934-0x0000000000400000-0x000000000044E000-memory.dmp