Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 00:54

General

  • Target

    619baed46463e6b433241eb3db80117aeab761fbfd83addedae0c4cffd5fe1dc.exe

  • Size

    782KB

  • MD5

    aec3821dfa9ff68bbba94e9d271b6753

  • SHA1

    04373331892f2fdb305dd5ec91179212c4e33106

  • SHA256

    619baed46463e6b433241eb3db80117aeab761fbfd83addedae0c4cffd5fe1dc

  • SHA512

    e52d71a64533d43392f88f21a334ce829878ba03f31a00e10460bbe6d4022f3278849fcf7bf5d733d021f86a9496a115425ad8bf48afcebb541f23cf09d46bfa

  • SSDEEP

    12288:my90nsF/3UOHwPrPo/ZHN4jGq5wi5t5sJS2B3iNT1BxaOn1wrzIWvF0:my5/3UOQPr2ZHOj5t2JDgJRn1+UWq

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dark

C2

185.161.248.73:4164

Attributes
  • auth_value

    ae85b01f66afe8770afeed560513fc2d

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\619baed46463e6b433241eb3db80117aeab761fbfd83addedae0c4cffd5fe1dc.exe
    "C:\Users\Admin\AppData\Local\Temp\619baed46463e6b433241eb3db80117aeab761fbfd83addedae0c4cffd5fe1dc.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2588
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x52396072.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x52396072.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5052
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m57178579.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m57178579.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4884
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1324
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4884 -s 1332
          4⤵
          • Program crash
          PID:2944
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n34747555.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n34747555.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:5212
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4884 -ip 4884
    1⤵
      PID:6040

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x52396072.exe

      Filesize

      578KB

      MD5

      95ebb3ae1a323e0a0d2df412e3b81085

      SHA1

      b88a554aaab676bdcd1a318d3e57791c17a6950e

      SHA256

      9f52a9cc5073ebaf7ab967d47d919f38c2e3624a807e8ae43364934901974ed2

      SHA512

      27f287c81c2af90558137f9ee1360b53e8676731ea50aec7fe83566afef8785bafe6d7dbe2f4ea78f9a9eebc19a7f88b57c315b8ba08300db53683486f626468

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m57178579.exe

      Filesize

      580KB

      MD5

      ba50cc9c25cc360f9cdcb30c0b0b8856

      SHA1

      90c112b51bc25d0be4d3b7ad3f889af3da32d48b

      SHA256

      d6113f632e63e75bf8b650d787ae229b5be2e06639572c539f17310580b02040

      SHA512

      994ccc1214ece7ccebb957ddc4210393872927e36dadbad0ba1478adcbda4e87a9f78853e0a1de88fad90b88c2391ae9d18499ad4708386c787b6b25ad113730

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n34747555.exe

      Filesize

      172KB

      MD5

      da1e6a7ce50825f458decca1b56906fb

      SHA1

      65ae3fab553e9b3b0c898c189831828d5552bcc2

      SHA256

      a00cbe39a95986c5142a8b9676703571382cc9eb8fb1d425bf420ef997583860

      SHA512

      53230a901f839d18b9a6f5263b34aa91f745320d20329bea9617da507e0b99fa6b50460d67b1625e3f30951b4eb0afd8723035b351048a42c974929472acdb06

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • memory/1324-2182-0x0000000000F70000-0x0000000000F9E000-memory.dmp

      Filesize

      184KB

    • memory/1324-2183-0x0000000005790000-0x0000000005796000-memory.dmp

      Filesize

      24KB

    • memory/1324-2184-0x0000000005F10000-0x0000000006528000-memory.dmp

      Filesize

      6.1MB

    • memory/1324-2185-0x0000000005A00000-0x0000000005B0A000-memory.dmp

      Filesize

      1.0MB

    • memory/1324-2188-0x00000000059A0000-0x00000000059EC000-memory.dmp

      Filesize

      304KB

    • memory/1324-2187-0x0000000005950000-0x000000000598C000-memory.dmp

      Filesize

      240KB

    • memory/1324-2186-0x00000000058F0000-0x0000000005902000-memory.dmp

      Filesize

      72KB

    • memory/4884-58-0x0000000005690000-0x00000000056F0000-memory.dmp

      Filesize

      384KB

    • memory/4884-43-0x0000000005690000-0x00000000056F0000-memory.dmp

      Filesize

      384KB

    • memory/4884-21-0x0000000005690000-0x00000000056F6000-memory.dmp

      Filesize

      408KB

    • memory/4884-63-0x0000000005690000-0x00000000056F0000-memory.dmp

      Filesize

      384KB

    • memory/4884-81-0x0000000005690000-0x00000000056F0000-memory.dmp

      Filesize

      384KB

    • memory/4884-85-0x0000000005690000-0x00000000056F0000-memory.dmp

      Filesize

      384KB

    • memory/4884-84-0x0000000005690000-0x00000000056F0000-memory.dmp

      Filesize

      384KB

    • memory/4884-79-0x0000000005690000-0x00000000056F0000-memory.dmp

      Filesize

      384KB

    • memory/4884-77-0x0000000005690000-0x00000000056F0000-memory.dmp

      Filesize

      384KB

    • memory/4884-75-0x0000000005690000-0x00000000056F0000-memory.dmp

      Filesize

      384KB

    • memory/4884-73-0x0000000005690000-0x00000000056F0000-memory.dmp

      Filesize

      384KB

    • memory/4884-71-0x0000000005690000-0x00000000056F0000-memory.dmp

      Filesize

      384KB

    • memory/4884-69-0x0000000005690000-0x00000000056F0000-memory.dmp

      Filesize

      384KB

    • memory/4884-67-0x0000000005690000-0x00000000056F0000-memory.dmp

      Filesize

      384KB

    • memory/4884-65-0x0000000005690000-0x00000000056F0000-memory.dmp

      Filesize

      384KB

    • memory/4884-61-0x0000000005690000-0x00000000056F0000-memory.dmp

      Filesize

      384KB

    • memory/4884-59-0x0000000005690000-0x00000000056F0000-memory.dmp

      Filesize

      384KB

    • memory/4884-19-0x0000000005030000-0x0000000005098000-memory.dmp

      Filesize

      416KB

    • memory/4884-53-0x0000000005690000-0x00000000056F0000-memory.dmp

      Filesize

      384KB

    • memory/4884-51-0x0000000005690000-0x00000000056F0000-memory.dmp

      Filesize

      384KB

    • memory/4884-49-0x0000000005690000-0x00000000056F0000-memory.dmp

      Filesize

      384KB

    • memory/4884-47-0x0000000005690000-0x00000000056F0000-memory.dmp

      Filesize

      384KB

    • memory/4884-45-0x0000000005690000-0x00000000056F0000-memory.dmp

      Filesize

      384KB

    • memory/4884-20-0x00000000050A0000-0x0000000005644000-memory.dmp

      Filesize

      5.6MB

    • memory/4884-41-0x0000000005690000-0x00000000056F0000-memory.dmp

      Filesize

      384KB

    • memory/4884-39-0x0000000005690000-0x00000000056F0000-memory.dmp

      Filesize

      384KB

    • memory/4884-37-0x0000000005690000-0x00000000056F0000-memory.dmp

      Filesize

      384KB

    • memory/4884-33-0x0000000005690000-0x00000000056F0000-memory.dmp

      Filesize

      384KB

    • memory/4884-31-0x0000000005690000-0x00000000056F0000-memory.dmp

      Filesize

      384KB

    • memory/4884-30-0x0000000005690000-0x00000000056F0000-memory.dmp

      Filesize

      384KB

    • memory/4884-27-0x0000000005690000-0x00000000056F0000-memory.dmp

      Filesize

      384KB

    • memory/4884-25-0x0000000005690000-0x00000000056F0000-memory.dmp

      Filesize

      384KB

    • memory/4884-23-0x0000000005690000-0x00000000056F0000-memory.dmp

      Filesize

      384KB

    • memory/4884-18-0x0000000000400000-0x0000000000837000-memory.dmp

      Filesize

      4.2MB

    • memory/4884-17-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/4884-16-0x0000000000840000-0x000000000089B000-memory.dmp

      Filesize

      364KB

    • memory/4884-22-0x0000000005690000-0x00000000056F0000-memory.dmp

      Filesize

      384KB

    • memory/4884-55-0x0000000005690000-0x00000000056F0000-memory.dmp

      Filesize

      384KB

    • memory/4884-35-0x0000000005690000-0x00000000056F0000-memory.dmp

      Filesize

      384KB

    • memory/4884-2168-0x0000000000A90000-0x0000000000B90000-memory.dmp

      Filesize

      1024KB

    • memory/4884-2169-0x00000000058A0000-0x00000000058D2000-memory.dmp

      Filesize

      200KB

    • memory/4884-2190-0x0000000000840000-0x000000000089B000-memory.dmp

      Filesize

      364KB

    • memory/4884-2191-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/4884-2192-0x0000000000400000-0x0000000000837000-memory.dmp

      Filesize

      4.2MB

    • memory/4884-15-0x0000000000A90000-0x0000000000B90000-memory.dmp

      Filesize

      1024KB

    • memory/5212-2196-0x00000000005F0000-0x0000000000620000-memory.dmp

      Filesize

      192KB

    • memory/5212-2197-0x0000000002690000-0x0000000002696000-memory.dmp

      Filesize

      24KB