Analysis

  • max time kernel
    140s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/11/2024, 00:11

General

  • Target

    3d061fe6ea7c659f708b7a6362d091a7b66dc0e9b137d158a9708867dceacbcf.exe

  • Size

    583KB

  • MD5

    391519caabff32f6aecf1332a3c799a9

  • SHA1

    5da5530fe60ce0fdea1fbf694ece966afc330e97

  • SHA256

    3d061fe6ea7c659f708b7a6362d091a7b66dc0e9b137d158a9708867dceacbcf

  • SHA512

    3539ed3feaeeb53d8de2c2cd2d0da3261e02727de735b87270a3e4f83d650758fcea7622819c3bd05429d0c0b638ab2b3c186bb60613e773c0e77dbb38d870cf

  • SSDEEP

    12288:YMrgy903yDIZ8VrySr0c3N5iz91GajAJ3jhjoljbsU:oyG8IOV2+3riz91hi3jhKjN

Malware Config

Extracted

Family

redline

Botnet

ronam

C2

193.233.20.17:4139

Attributes
  • auth_value

    125421d19d14dd7fd211bc7f6d4aea6c

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d061fe6ea7c659f708b7a6362d091a7b66dc0e9b137d158a9708867dceacbcf.exe
    "C:\Users\Admin\AppData\Local\Temp\3d061fe6ea7c659f708b7a6362d091a7b66dc0e9b137d158a9708867dceacbcf.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dRh8123.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dRh8123.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2976
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nKr30HV.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nKr30HV.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2320

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dRh8123.exe

    Filesize

    438KB

    MD5

    8b50f9fa872eb105211adb32b500123d

    SHA1

    08d0c9522ae20de3da77b2ca8ac25ccd41001d91

    SHA256

    f57d6db997d1ab17b5e10e7a256de46482c25b2351179f9053fd27e2e794e2a9

    SHA512

    3ba1049ca584efb0969723d1ecca655f8aae06a97e5f44d64ac8b026719df2c959a37c2690713e4c8c68b3cdb6fc56c4f54628d3f5dc5abd7a355cea15ad182a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nKr30HV.exe

    Filesize

    301KB

    MD5

    b7310010d403a432b2b24fbc525c2c27

    SHA1

    b6ad682dea1b768201d9fa3d9c0a0be4df3aff8a

    SHA256

    ac7685b8203387f790d8dab34f74a0218eb59367c86cf9467364afce9647d391

    SHA512

    e1fe5f38e9e00f66b54e3f85c61808e7c0b4e5109368c555e0b8f20fded47fa9e05a8ac9420752128dad12bdccaa80126427b1cb15e6052018922d7ee29c2ca6

  • memory/2320-15-0x00000000006A0000-0x00000000007A0000-memory.dmp

    Filesize

    1024KB

  • memory/2320-16-0x00000000007A0000-0x00000000007EB000-memory.dmp

    Filesize

    300KB

  • memory/2320-17-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2320-18-0x0000000000400000-0x000000000057E000-memory.dmp

    Filesize

    1.5MB

  • memory/2320-19-0x0000000002650000-0x0000000002696000-memory.dmp

    Filesize

    280KB

  • memory/2320-20-0x0000000004D30000-0x00000000052D4000-memory.dmp

    Filesize

    5.6MB

  • memory/2320-21-0x0000000004B80000-0x0000000004BC4000-memory.dmp

    Filesize

    272KB

  • memory/2320-83-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2320-85-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2320-81-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2320-77-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2320-75-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2320-74-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2320-71-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2320-69-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2320-67-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2320-65-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2320-63-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2320-61-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2320-59-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2320-55-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2320-53-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2320-51-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2320-49-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2320-47-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2320-45-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2320-43-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2320-41-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2320-39-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2320-37-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2320-35-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2320-33-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2320-31-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2320-29-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2320-27-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2320-25-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2320-23-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2320-22-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2320-79-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2320-57-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2320-928-0x00000000052E0000-0x00000000058F8000-memory.dmp

    Filesize

    6.1MB

  • memory/2320-929-0x0000000005900000-0x0000000005A0A000-memory.dmp

    Filesize

    1.0MB

  • memory/2320-930-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

    Filesize

    72KB

  • memory/2320-931-0x0000000004CC0000-0x0000000004CFC000-memory.dmp

    Filesize

    240KB

  • memory/2320-932-0x0000000005B10000-0x0000000005B5C000-memory.dmp

    Filesize

    304KB

  • memory/2320-933-0x00000000006A0000-0x00000000007A0000-memory.dmp

    Filesize

    1024KB

  • memory/2320-934-0x00000000007A0000-0x00000000007EB000-memory.dmp

    Filesize

    300KB

  • memory/2320-935-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB