Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 01:43

General

  • Target

    693c7db29495147f787046f3dffa6cdfb0ab66e078de6b9e87a5375260e9f476.exe

  • Size

    479KB

  • MD5

    ca231fb0ac9a744e303c3b67f1d0b390

  • SHA1

    87803be516dee03aed13f9c9a84066df4b9ba4b8

  • SHA256

    693c7db29495147f787046f3dffa6cdfb0ab66e078de6b9e87a5375260e9f476

  • SHA512

    053d32a68fea4b846d59606eb878291a697e4d6577ee7dd2e24165a23e77eb7a1b5075e2eee1fb45ed269922964ca0766f8228aede57d1d1f0f7e20c66687c15

  • SSDEEP

    12288:lMr2y90ljlhFZK7yUzOJ3fVN9SjqiSihfLJiXj:7yiZhFZKLOJ3kjqibfV+j

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\693c7db29495147f787046f3dffa6cdfb0ab66e078de6b9e87a5375260e9f476.exe
    "C:\Users\Admin\AppData\Local\Temp\693c7db29495147f787046f3dffa6cdfb0ab66e078de6b9e87a5375260e9f476.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0486279.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0486279.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:908
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9320325.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9320325.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0486279.exe

    Filesize

    307KB

    MD5

    200b463b25129add74d748b7c788762b

    SHA1

    f9105872a630679e732dbebca5354fe68bb3b629

    SHA256

    33043c153af6e69375621ff33e409d1775624cfbb838912bf360e8910e49176e

    SHA512

    9d24162265535deff6f5a7d1c9d931f4f29063a07286edd70bcf71cf583f86e61d2ef5e6f29ce58f6e2d9db0bea764df42a45b327c0a718f1204ef7d181f90be

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9320325.exe

    Filesize

    137KB

    MD5

    1af942dd097d4eb4445278017ad3c693

    SHA1

    62ab9890459530546aad99a693add7c6060328ca

    SHA256

    030b9b14a2e754701b074563e3369d8b07c2e8f1631ad423c23e088ed7909b40

    SHA512

    8f0fa18051c4417aa63264a4c046a112a1aeea002255f38a535730e49160a8365e57044b499541b3d3a38744d08398baf9d2fbfad936241876b207e3a56e64ea

  • memory/3616-14-0x000000007435E000-0x000000007435F000-memory.dmp

    Filesize

    4KB

  • memory/3616-15-0x0000000000CD0000-0x0000000000CF8000-memory.dmp

    Filesize

    160KB

  • memory/3616-16-0x00000000080A0000-0x00000000086B8000-memory.dmp

    Filesize

    6.1MB

  • memory/3616-17-0x0000000007B30000-0x0000000007B42000-memory.dmp

    Filesize

    72KB

  • memory/3616-18-0x0000000007CA0000-0x0000000007DAA000-memory.dmp

    Filesize

    1.0MB

  • memory/3616-19-0x0000000007BD0000-0x0000000007C0C000-memory.dmp

    Filesize

    240KB

  • memory/3616-20-0x0000000074350000-0x0000000074B00000-memory.dmp

    Filesize

    7.7MB

  • memory/3616-21-0x0000000002FA0000-0x0000000002FEC000-memory.dmp

    Filesize

    304KB

  • memory/3616-22-0x000000007435E000-0x000000007435F000-memory.dmp

    Filesize

    4KB

  • memory/3616-23-0x0000000074350000-0x0000000074B00000-memory.dmp

    Filesize

    7.7MB