Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 00:53

General

  • Target

    b90dd1a5a3d01929e66c49052a366b547bb67702ea702b831fe9e99a20f67828.exe

  • Size

    480KB

  • MD5

    5aebcd05bcb121c12f4eb51d243c53c7

  • SHA1

    f7388b9f70c0786e5e96b8614dc59323f9f6e859

  • SHA256

    b90dd1a5a3d01929e66c49052a366b547bb67702ea702b831fe9e99a20f67828

  • SHA512

    469461a1d282eba1d763d46a46b9280eeab46914455e4588e8c810313bcc02910b9204f3adfedf3e50e69e77a53d3fb435ca7e655118f28370ccd87cf90e21f7

  • SSDEEP

    12288:6MrSy90sKcQ52uqy1MYVs7yj7Log2mvDL75:MywcXuPOYpj7LD/75

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b90dd1a5a3d01929e66c49052a366b547bb67702ea702b831fe9e99a20f67828.exe
    "C:\Users\Admin\AppData\Local\Temp\b90dd1a5a3d01929e66c49052a366b547bb67702ea702b831fe9e99a20f67828.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3412
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5674209.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5674209.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:748
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8023405.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8023405.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5674209.exe

    Filesize

    307KB

    MD5

    b99e104004e670628f38cb493ace1add

    SHA1

    776fd975c7f5da4286197bcfb3ac14db3461adab

    SHA256

    fa80b4949a31d952a56c47210ac52ff7ee38e6c502be9aaf440370a5a6690fd6

    SHA512

    8ca69c3a83d8bf79e5a359f5f74d89eaabd492b2fe538821992684e20f12cd7aeb7a767b9aec62c73daf210cb3d8c6e161121ec8297740e033ed50623747f6cd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8023405.exe

    Filesize

    137KB

    MD5

    bca2683587dca60df204b4b4a14bbdc3

    SHA1

    222084801804c7e25536a3c76a6de0946f77fe7a

    SHA256

    395b3907d432544d34ecb9b901b1cfd0f895a3c0ea1a1d7d2ab6362e77c71652

    SHA512

    1235fd365ecbeaf53238ff6c2ca81eee020658acc466053803a38d8e9a2b5d591a41d9e8be65c5181500b47b64fa0daef501c9ad22349d50eb5920c5f5f0189c

  • memory/2640-14-0x0000000074A6E000-0x0000000074A6F000-memory.dmp

    Filesize

    4KB

  • memory/2640-15-0x0000000000DB0000-0x0000000000DD8000-memory.dmp

    Filesize

    160KB

  • memory/2640-16-0x0000000008070000-0x0000000008688000-memory.dmp

    Filesize

    6.1MB

  • memory/2640-17-0x0000000007B10000-0x0000000007B22000-memory.dmp

    Filesize

    72KB

  • memory/2640-18-0x0000000007C40000-0x0000000007D4A000-memory.dmp

    Filesize

    1.0MB

  • memory/2640-19-0x0000000007B70000-0x0000000007BAC000-memory.dmp

    Filesize

    240KB

  • memory/2640-20-0x0000000074A60000-0x0000000075210000-memory.dmp

    Filesize

    7.7MB

  • memory/2640-21-0x0000000007BB0000-0x0000000007BFC000-memory.dmp

    Filesize

    304KB

  • memory/2640-22-0x0000000074A6E000-0x0000000074A6F000-memory.dmp

    Filesize

    4KB

  • memory/2640-23-0x0000000074A60000-0x0000000075210000-memory.dmp

    Filesize

    7.7MB