Analysis

  • max time kernel
    140s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 02:46

General

  • Target

    9a0ec5b40399889ddf61368ee848626cdc5f98fb7264ab1a504e6afd2801b64b.exe

  • Size

    565KB

  • MD5

    2ea6d65da71fefcf0fc423b57ca36133

  • SHA1

    2fa80a4aba428ae05d45b149cd159acd7b7acf98

  • SHA256

    9a0ec5b40399889ddf61368ee848626cdc5f98fb7264ab1a504e6afd2801b64b

  • SHA512

    779c278e0004d188a63f95f9fc3f7238d9c99e92cd3920e2cf0e7ffdbdf750e30f58e7aec797352694076dcd7f144c5aed783598f95286907cdf2496521497fd

  • SSDEEP

    12288:TMrBy903gSN714+yGXnh4S10NFABghqNstu2UYw8KOPtJaRHkf2sPlcd:OyMgSNJ4mnhl1ZNstulnQfaRtag

Malware Config

Extracted

Family

redline

Botnet

ronur

C2

193.233.20.20:4134

Attributes
  • auth_value

    f88f86755a528d4b25f6f3628c460965

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9a0ec5b40399889ddf61368ee848626cdc5f98fb7264ab1a504e6afd2801b64b.exe
    "C:\Users\Admin\AppData\Local\Temp\9a0ec5b40399889ddf61368ee848626cdc5f98fb7264ab1a504e6afd2801b64b.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3804
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dmU4622.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dmU4622.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3588
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nbe87mb.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nbe87mb.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dmU4622.exe

    Filesize

    421KB

    MD5

    1f1577fc926b7e448358f223367f6fac

    SHA1

    bf35e522de0e55713e96a518b35141bce5597ab9

    SHA256

    9f2cd4a5a3d2a8f05a33587f31c005263518cbe1f429a1a2d6ff71d5cf72af9c

    SHA512

    adb99ab4413e058cf8076aefd6d6206384fb8d0e698030241ee756f3718f00fe1de489d18db1bca2ed57b99b3c0ccb71edea2f771b8ef3339a674e088bdb8bbd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nbe87mb.exe

    Filesize

    267KB

    MD5

    b097e9e8ba00491672d7c588f5a1dc6c

    SHA1

    ca40fc57327e159e7f9ab633c492191896a2db6d

    SHA256

    ea09554bb47d16149144d42b26d9022cdbe753b6026626ebd3ba99be8511777d

    SHA512

    b9f75414a3b2ab352ca98d78f25e9c5715af6c37eb41b543c8d191c0c799ee4d482b962774b1f31dce340d780c49fa7b262da30e7e692bbb7fa98bbbac26dd63

  • memory/4488-15-0x0000000000600000-0x0000000000700000-memory.dmp

    Filesize

    1024KB

  • memory/4488-16-0x0000000002200000-0x000000000224B000-memory.dmp

    Filesize

    300KB

  • memory/4488-17-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/4488-18-0x0000000000400000-0x000000000058A000-memory.dmp

    Filesize

    1.5MB

  • memory/4488-19-0x00000000025A0000-0x00000000025E6000-memory.dmp

    Filesize

    280KB

  • memory/4488-20-0x0000000004C60000-0x0000000005204000-memory.dmp

    Filesize

    5.6MB

  • memory/4488-21-0x0000000002760000-0x00000000027A4000-memory.dmp

    Filesize

    272KB

  • memory/4488-25-0x0000000002760000-0x000000000279E000-memory.dmp

    Filesize

    248KB

  • memory/4488-35-0x0000000002760000-0x000000000279E000-memory.dmp

    Filesize

    248KB

  • memory/4488-83-0x0000000002760000-0x000000000279E000-memory.dmp

    Filesize

    248KB

  • memory/4488-81-0x0000000002760000-0x000000000279E000-memory.dmp

    Filesize

    248KB

  • memory/4488-80-0x0000000002760000-0x000000000279E000-memory.dmp

    Filesize

    248KB

  • memory/4488-75-0x0000000002760000-0x000000000279E000-memory.dmp

    Filesize

    248KB

  • memory/4488-73-0x0000000002760000-0x000000000279E000-memory.dmp

    Filesize

    248KB

  • memory/4488-71-0x0000000002760000-0x000000000279E000-memory.dmp

    Filesize

    248KB

  • memory/4488-69-0x0000000002760000-0x000000000279E000-memory.dmp

    Filesize

    248KB

  • memory/4488-67-0x0000000002760000-0x000000000279E000-memory.dmp

    Filesize

    248KB

  • memory/4488-65-0x0000000002760000-0x000000000279E000-memory.dmp

    Filesize

    248KB

  • memory/4488-63-0x0000000002760000-0x000000000279E000-memory.dmp

    Filesize

    248KB

  • memory/4488-61-0x0000000002760000-0x000000000279E000-memory.dmp

    Filesize

    248KB

  • memory/4488-59-0x0000000002760000-0x000000000279E000-memory.dmp

    Filesize

    248KB

  • memory/4488-57-0x0000000002760000-0x000000000279E000-memory.dmp

    Filesize

    248KB

  • memory/4488-53-0x0000000002760000-0x000000000279E000-memory.dmp

    Filesize

    248KB

  • memory/4488-51-0x0000000002760000-0x000000000279E000-memory.dmp

    Filesize

    248KB

  • memory/4488-49-0x0000000002760000-0x000000000279E000-memory.dmp

    Filesize

    248KB

  • memory/4488-47-0x0000000002760000-0x000000000279E000-memory.dmp

    Filesize

    248KB

  • memory/4488-45-0x0000000002760000-0x000000000279E000-memory.dmp

    Filesize

    248KB

  • memory/4488-43-0x0000000002760000-0x000000000279E000-memory.dmp

    Filesize

    248KB

  • memory/4488-41-0x0000000002760000-0x000000000279E000-memory.dmp

    Filesize

    248KB

  • memory/4488-37-0x0000000002760000-0x000000000279E000-memory.dmp

    Filesize

    248KB

  • memory/4488-33-0x0000000002760000-0x000000000279E000-memory.dmp

    Filesize

    248KB

  • memory/4488-31-0x0000000002760000-0x000000000279E000-memory.dmp

    Filesize

    248KB

  • memory/4488-29-0x0000000002760000-0x000000000279E000-memory.dmp

    Filesize

    248KB

  • memory/4488-27-0x0000000002760000-0x000000000279E000-memory.dmp

    Filesize

    248KB

  • memory/4488-85-0x0000000002760000-0x000000000279E000-memory.dmp

    Filesize

    248KB

  • memory/4488-77-0x0000000002760000-0x000000000279E000-memory.dmp

    Filesize

    248KB

  • memory/4488-55-0x0000000002760000-0x000000000279E000-memory.dmp

    Filesize

    248KB

  • memory/4488-39-0x0000000002760000-0x000000000279E000-memory.dmp

    Filesize

    248KB

  • memory/4488-23-0x0000000002760000-0x000000000279E000-memory.dmp

    Filesize

    248KB

  • memory/4488-22-0x0000000002760000-0x000000000279E000-memory.dmp

    Filesize

    248KB

  • memory/4488-928-0x0000000005210000-0x0000000005828000-memory.dmp

    Filesize

    6.1MB

  • memory/4488-929-0x0000000005860000-0x000000000596A000-memory.dmp

    Filesize

    1.0MB

  • memory/4488-930-0x00000000059A0000-0x00000000059B2000-memory.dmp

    Filesize

    72KB

  • memory/4488-931-0x00000000059C0000-0x00000000059FC000-memory.dmp

    Filesize

    240KB

  • memory/4488-932-0x0000000005B10000-0x0000000005B5C000-memory.dmp

    Filesize

    304KB

  • memory/4488-933-0x0000000000600000-0x0000000000700000-memory.dmp

    Filesize

    1024KB

  • memory/4488-934-0x0000000002200000-0x000000000224B000-memory.dmp

    Filesize

    300KB

  • memory/4488-935-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB