Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 02:02

General

  • Target

    229931e582ec3d64b8fa894473f20ebc26c2a4c3fe9e10b88474c27a940776fe.exe

  • Size

    1.1MB

  • MD5

    c489250546c52acfcf779a85438268e3

  • SHA1

    1b3aff474b0e99cbf601267c51bced2e75f2e7d6

  • SHA256

    229931e582ec3d64b8fa894473f20ebc26c2a4c3fe9e10b88474c27a940776fe

  • SHA512

    f672e64a2e1e9ff3aec39490b990acd3861bb6da942f35701073b5e0e8d0a53712f1e535773a926cdf86a548a75ea4b020c48f426ea2c942a00a63dc2435d7f4

  • SSDEEP

    24576:Sy0HYCYwC9xnbovU36tycZx5/8v78cdBR/Lvz3ooO5b1YReiTWIdI:504CBCj8vU3HcGzRRTjybA

Malware Config

Extracted

Family

redline

Botnet

miran

C2

185.161.248.75:4132

Attributes
  • auth_value

    f1084732cb99b2cbe314a2a565371e6c

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 4 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\229931e582ec3d64b8fa894473f20ebc26c2a4c3fe9e10b88474c27a940776fe.exe
    "C:\Users\Admin\AppData\Local\Temp\229931e582ec3d64b8fa894473f20ebc26c2a4c3fe9e10b88474c27a940776fe.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:824
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8763368.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8763368.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:468
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9509541.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9509541.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:956
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2736219.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2736219.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4544
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1521037.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1521037.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8763368.exe

    Filesize

    749KB

    MD5

    f86ceda38eab81878d10f34fabd4c163

    SHA1

    eab24e773f9cd540ab7c02cfbb3ee63c9f85445b

    SHA256

    eca43756536212c1a7bdf647251d789ba2f226b78b295ed70b4a79be6865b26c

    SHA512

    379cda0304afa2a5fccfb051ff148d5dc3ce9af3c4ab3b21435d44ab33f30bcc9c245eb3c1a333a9b37dd42352170704eb84ccb568462e9561dac10bbd7a15e6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9509541.exe

    Filesize

    305KB

    MD5

    23dc4aefc08fd2c7025d9d2258f07cce

    SHA1

    9b8d149653e3172fff361e32605588e4efc72a3e

    SHA256

    c836d4b1a618440bd4e74cfb35e92b9afff665e99d9250af21b14073c4cbf5b7

    SHA512

    bc1e54c81f6e7ddfd5c262caeed8902e604549139e83fb06ed1afd5578352902e63a554dfb7c9615200a259c676b0eebd0334127ae63e72d5a589c36cb1017a0

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2736219.exe

    Filesize

    183KB

    MD5

    e554091714347ee5dd0e0a184e79ad8e

    SHA1

    c01b24796f81b6abf993b2ec72693e9c36299bb1

    SHA256

    c4785c996c72ee27276f99c87a5b2aa930337c56f60e55f6443d5f0035bb8970

    SHA512

    21324f9744e7f3084efa2b446d317a8c8401eeae71c04663843134cd2449b81f645eb0a67c68b76d9d05d160217d2fae08027a4d0cb2b872cf240cf4b3755979

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1521037.exe

    Filesize

    145KB

    MD5

    7aabbcbb85c0ecc44d68d9b9eecc8a80

    SHA1

    2c3af136ad46b455088e720b67f606451a2942eb

    SHA256

    7da85f4c5701db6ed8849f815143a9df416846ad1e6992e6fd030702aa14c492

    SHA512

    c5cf695011c7130aa9e62a1e921eefdf71763b143732a88202659ad575ab9ff96a4bf54ff2ddb1b9c5c7dab2c54660dcf35a4b1d537094458c0c2bee4819dc41

  • memory/2400-61-0x0000000005270000-0x00000000052BC000-memory.dmp

    Filesize

    304KB

  • memory/2400-60-0x00000000050F0000-0x000000000512C000-memory.dmp

    Filesize

    240KB

  • memory/2400-59-0x0000000005090000-0x00000000050A2000-memory.dmp

    Filesize

    72KB

  • memory/2400-58-0x0000000005160000-0x000000000526A000-memory.dmp

    Filesize

    1.0MB

  • memory/2400-57-0x0000000005620000-0x0000000005C38000-memory.dmp

    Filesize

    6.1MB

  • memory/2400-56-0x0000000000690000-0x00000000006BA000-memory.dmp

    Filesize

    168KB

  • memory/4544-51-0x00000000022E0000-0x00000000022F6000-memory.dmp

    Filesize

    88KB

  • memory/4544-29-0x00000000022E0000-0x00000000022F6000-memory.dmp

    Filesize

    88KB

  • memory/4544-41-0x00000000022E0000-0x00000000022F6000-memory.dmp

    Filesize

    88KB

  • memory/4544-37-0x00000000022E0000-0x00000000022F6000-memory.dmp

    Filesize

    88KB

  • memory/4544-35-0x00000000022E0000-0x00000000022F6000-memory.dmp

    Filesize

    88KB

  • memory/4544-33-0x00000000022E0000-0x00000000022F6000-memory.dmp

    Filesize

    88KB

  • memory/4544-31-0x00000000022E0000-0x00000000022F6000-memory.dmp

    Filesize

    88KB

  • memory/4544-27-0x00000000022E0000-0x00000000022F6000-memory.dmp

    Filesize

    88KB

  • memory/4544-24-0x00000000022E0000-0x00000000022F6000-memory.dmp

    Filesize

    88KB

  • memory/4544-43-0x00000000022E0000-0x00000000022F6000-memory.dmp

    Filesize

    88KB

  • memory/4544-25-0x00000000022E0000-0x00000000022F6000-memory.dmp

    Filesize

    88KB

  • memory/4544-45-0x00000000022E0000-0x00000000022F6000-memory.dmp

    Filesize

    88KB

  • memory/4544-47-0x00000000022E0000-0x00000000022F6000-memory.dmp

    Filesize

    88KB

  • memory/4544-49-0x00000000022E0000-0x00000000022F6000-memory.dmp

    Filesize

    88KB

  • memory/4544-39-0x00000000022E0000-0x00000000022F6000-memory.dmp

    Filesize

    88KB

  • memory/4544-23-0x00000000022E0000-0x00000000022FC000-memory.dmp

    Filesize

    112KB

  • memory/4544-22-0x0000000004B10000-0x00000000050B4000-memory.dmp

    Filesize

    5.6MB

  • memory/4544-21-0x0000000002230000-0x000000000224E000-memory.dmp

    Filesize

    120KB