Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 02:06

General

  • Target

    856494eaea6f98e8b8b57f40f07f37963cb41b969e63affee8a6bed70b4db15c.exe

  • Size

    892KB

  • MD5

    bda5619521302b7d977e5fd8497d5347

  • SHA1

    7935dd9262db1b01479ceac7d2c289b7b717db2b

  • SHA256

    856494eaea6f98e8b8b57f40f07f37963cb41b969e63affee8a6bed70b4db15c

  • SHA512

    944482f87f7221f75f9d2356107b1ca8a06bc18c6626a7c36f888285342e685fa5a87caf238e4f281bf3b986cf5dcaa358d82f3749a0b23dd3573e31d60cf2bf

  • SSDEEP

    12288:/y90p8ObVVJSCuLHk8J93FJ9TqRidGGNikyC2e2N/pRvolJzPCrDjKeYyq:/yZ2VPSCuFZdVDwrQ5PCrDOeNq

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

danko

C2

185.161.248.73:4164

Attributes
  • auth_value

    784d42a6c1eb1a5060b8bcd3696f5f1e

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\856494eaea6f98e8b8b57f40f07f37963cb41b969e63affee8a6bed70b4db15c.exe
    "C:\Users\Admin\AppData\Local\Temp\856494eaea6f98e8b8b57f40f07f37963cb41b969e63affee8a6bed70b4db15c.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4804
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y81786116.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y81786116.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1960
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p43195365.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p43195365.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1044
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1552
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 1212
          4⤵
          • Program crash
          PID:1092
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r11559332.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r11559332.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:5124
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1044 -ip 1044
    1⤵
      PID:700

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y81786116.exe

      Filesize

      590KB

      MD5

      887462bb750895dc452f4162c58cf6ce

      SHA1

      e64fb3cabf1903c7d7791ea610f8ba66b31f8711

      SHA256

      68f0bf4c9748064f5e7d18105522dad6c0e52a7ff68d7b53908b22baf72ded7c

      SHA512

      f353cceed0150d77ed510af4f21f98f6a76bda2acb8fd461a39f6e6cd83d492116f6d27757478272068d264b285868f26a106c47b67a88e4553a84dcb7d5cb98

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p43195365.exe

      Filesize

      531KB

      MD5

      9806aceef91ef112d859d639bc467e1f

      SHA1

      963059cc5c9a53f93478ef434e789bdfd6555efc

      SHA256

      1da00d14cf1e2d70ad6e7b11f3cbb4df05adb6ee6aad0299e48bb888a2aacef8

      SHA512

      7ef7994e5e6b4824d519775df7734153ccbf91b4dacd5553b69d9c7390c6c504e07ad754b45b83e3116e5036be870d31b03c70055f989b68ad298d52362665b2

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r11559332.exe

      Filesize

      169KB

      MD5

      020e119fbcc55390cf8237c4a8a263a4

      SHA1

      0493d874b40fc8dc67796e41b05bd2a720c2239a

      SHA256

      684cf438a1fd4fc2c440f4da476a5470ea9f83430b394ca3f035994ae59e4067

      SHA512

      f57efe08de3d89df63ab1c9ad37a5b524922f24f75f6166a616c6f04e579107bd4c7f0a8467ad51db994bda9cd7cdeefc2156f316be658cb66b546396a9e92d5

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • memory/1044-55-0x0000000002AD0000-0x0000000002B30000-memory.dmp

      Filesize

      384KB

    • memory/1044-2192-0x0000000000400000-0x0000000000A95000-memory.dmp

      Filesize

      6.6MB

    • memory/1044-49-0x0000000002AD0000-0x0000000002B30000-memory.dmp

      Filesize

      384KB

    • memory/1044-18-0x0000000000400000-0x0000000000A95000-memory.dmp

      Filesize

      6.6MB

    • memory/1044-19-0x0000000002C40000-0x0000000002CA8000-memory.dmp

      Filesize

      416KB

    • memory/1044-20-0x0000000005260000-0x0000000005804000-memory.dmp

      Filesize

      5.6MB

    • memory/1044-21-0x0000000002AD0000-0x0000000002B36000-memory.dmp

      Filesize

      408KB

    • memory/1044-29-0x0000000002AD0000-0x0000000002B30000-memory.dmp

      Filesize

      384KB

    • memory/1044-53-0x0000000002AD0000-0x0000000002B30000-memory.dmp

      Filesize

      384KB

    • memory/1044-75-0x0000000002AD0000-0x0000000002B30000-memory.dmp

      Filesize

      384KB

    • memory/1044-85-0x0000000002AD0000-0x0000000002B30000-memory.dmp

      Filesize

      384KB

    • memory/1044-83-0x0000000002AD0000-0x0000000002B30000-memory.dmp

      Filesize

      384KB

    • memory/1044-81-0x0000000002AD0000-0x0000000002B30000-memory.dmp

      Filesize

      384KB

    • memory/1044-79-0x0000000002AD0000-0x0000000002B30000-memory.dmp

      Filesize

      384KB

    • memory/1044-77-0x0000000002AD0000-0x0000000002B30000-memory.dmp

      Filesize

      384KB

    • memory/1044-73-0x0000000002AD0000-0x0000000002B30000-memory.dmp

      Filesize

      384KB

    • memory/1044-71-0x0000000002AD0000-0x0000000002B30000-memory.dmp

      Filesize

      384KB

    • memory/1044-69-0x0000000002AD0000-0x0000000002B30000-memory.dmp

      Filesize

      384KB

    • memory/1044-67-0x0000000002AD0000-0x0000000002B30000-memory.dmp

      Filesize

      384KB

    • memory/1044-65-0x0000000002AD0000-0x0000000002B30000-memory.dmp

      Filesize

      384KB

    • memory/1044-63-0x0000000002AD0000-0x0000000002B30000-memory.dmp

      Filesize

      384KB

    • memory/1044-61-0x0000000002AD0000-0x0000000002B30000-memory.dmp

      Filesize

      384KB

    • memory/1044-59-0x0000000002AD0000-0x0000000002B30000-memory.dmp

      Filesize

      384KB

    • memory/1044-57-0x0000000002AD0000-0x0000000002B30000-memory.dmp

      Filesize

      384KB

    • memory/1044-15-0x0000000000C50000-0x0000000000D50000-memory.dmp

      Filesize

      1024KB

    • memory/1044-51-0x0000000002AD0000-0x0000000002B30000-memory.dmp

      Filesize

      384KB

    • memory/1044-17-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/1044-47-0x0000000002AD0000-0x0000000002B30000-memory.dmp

      Filesize

      384KB

    • memory/1044-16-0x0000000002640000-0x000000000269B000-memory.dmp

      Filesize

      364KB

    • memory/1044-43-0x0000000002AD0000-0x0000000002B30000-memory.dmp

      Filesize

      384KB

    • memory/1044-41-0x0000000002AD0000-0x0000000002B30000-memory.dmp

      Filesize

      384KB

    • memory/1044-39-0x0000000002AD0000-0x0000000002B30000-memory.dmp

      Filesize

      384KB

    • memory/1044-37-0x0000000002AD0000-0x0000000002B30000-memory.dmp

      Filesize

      384KB

    • memory/1044-35-0x0000000002AD0000-0x0000000002B30000-memory.dmp

      Filesize

      384KB

    • memory/1044-33-0x0000000002AD0000-0x0000000002B30000-memory.dmp

      Filesize

      384KB

    • memory/1044-31-0x0000000002AD0000-0x0000000002B30000-memory.dmp

      Filesize

      384KB

    • memory/1044-27-0x0000000002AD0000-0x0000000002B30000-memory.dmp

      Filesize

      384KB

    • memory/1044-25-0x0000000002AD0000-0x0000000002B30000-memory.dmp

      Filesize

      384KB

    • memory/1044-23-0x0000000002AD0000-0x0000000002B30000-memory.dmp

      Filesize

      384KB

    • memory/1044-22-0x0000000002AD0000-0x0000000002B30000-memory.dmp

      Filesize

      384KB

    • memory/1044-2168-0x0000000000C50000-0x0000000000D50000-memory.dmp

      Filesize

      1024KB

    • memory/1044-2169-0x00000000059B0000-0x00000000059E2000-memory.dmp

      Filesize

      200KB

    • memory/1044-2191-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/1044-2190-0x0000000002640000-0x000000000269B000-memory.dmp

      Filesize

      364KB

    • memory/1044-45-0x0000000002AD0000-0x0000000002B30000-memory.dmp

      Filesize

      384KB

    • memory/1552-2182-0x0000000000A10000-0x0000000000A3E000-memory.dmp

      Filesize

      184KB

    • memory/1552-2183-0x0000000005320000-0x0000000005326000-memory.dmp

      Filesize

      24KB

    • memory/1552-2184-0x0000000005990000-0x0000000005FA8000-memory.dmp

      Filesize

      6.1MB

    • memory/1552-2185-0x0000000005480000-0x000000000558A000-memory.dmp

      Filesize

      1.0MB

    • memory/1552-2186-0x0000000005390000-0x00000000053A2000-memory.dmp

      Filesize

      72KB

    • memory/1552-2187-0x00000000053F0000-0x000000000542C000-memory.dmp

      Filesize

      240KB

    • memory/1552-2188-0x0000000005430000-0x000000000547C000-memory.dmp

      Filesize

      304KB

    • memory/5124-2196-0x0000000000F00000-0x0000000000F30000-memory.dmp

      Filesize

      192KB

    • memory/5124-2197-0x0000000002FA0000-0x0000000002FA6000-memory.dmp

      Filesize

      24KB