Analysis

  • max time kernel
    140s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 04:54

General

  • Target

    f1fa728270e9987a99db1d520ae61c3e05703445c5867c8ecc52b768608653c0.exe

  • Size

    660KB

  • MD5

    0c7236df17f350afcf62339053ac91d3

  • SHA1

    979141cadb1ae6444812b1ae4df6a6b8668f7945

  • SHA256

    f1fa728270e9987a99db1d520ae61c3e05703445c5867c8ecc52b768608653c0

  • SHA512

    fce02d0f7bdaea6cad39b9bac5bf19fffdffd98815d04a3912d3aeea369e5ebe522be5a93eeba0946528c11d1d4a381c542e38317ba6b7fd635b6567729b1ec1

  • SSDEEP

    12288:TMrZy90WMmPQGktxw3OyxrCZtVoG5uD6wJw7u6tF/MB:SyyAQzxw3OgCZtVoGgDdw7u68

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f1fa728270e9987a99db1d520ae61c3e05703445c5867c8ecc52b768608653c0.exe
    "C:\Users\Admin\AppData\Local\Temp\f1fa728270e9987a99db1d520ae61c3e05703445c5867c8ecc52b768608653c0.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4792
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vnA70.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vnA70.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2644
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dmi76.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dmi76.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vnA70.exe

    Filesize

    516KB

    MD5

    58d00454dcf7c63a6784cf0994c4e55c

    SHA1

    c809dbdccebdbbf7ce5ce2db6c4fba41c977dca8

    SHA256

    a3844ca201d16aa7143e08fede624dd25d09482a6a4abd7d82d3436aca0bebdd

    SHA512

    130dd4e2c617f74e4ad93d2935882b4398eb5ed0701176c709b87cba7a2295af792255b6a727a3d869182abecc6edece00dbc42e67d5f53eeca7a40dd3f33b99

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dmi76.exe

    Filesize

    296KB

    MD5

    1fac68ff822048c7d438408c40af955b

    SHA1

    8f6728720ee05f7972d7a5e99b3a71703e0e7db7

    SHA256

    59175875cc49dbb1ebfd537ce345fd24462a5befdbbc81983acd164842966214

    SHA512

    631887b4a57c30e7c25bf587f335b01cd3b12a9ba63cacc4f96fe313e93ee7039ece1d390a12d6ce62ee7f598b7c98a7debe72d686bcdbb53628d21f6d8d1dcc

  • memory/3092-15-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/3092-16-0x0000000000A20000-0x0000000000A6B000-memory.dmp

    Filesize

    300KB

  • memory/3092-17-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/3092-18-0x0000000000400000-0x00000000007A6000-memory.dmp

    Filesize

    3.6MB

  • memory/3092-19-0x0000000004D10000-0x0000000004D56000-memory.dmp

    Filesize

    280KB

  • memory/3092-20-0x0000000004D50000-0x00000000052F4000-memory.dmp

    Filesize

    5.6MB

  • memory/3092-21-0x0000000005340000-0x0000000005384000-memory.dmp

    Filesize

    272KB

  • memory/3092-27-0x0000000005340000-0x000000000537E000-memory.dmp

    Filesize

    248KB

  • memory/3092-61-0x0000000005340000-0x000000000537E000-memory.dmp

    Filesize

    248KB

  • memory/3092-85-0x0000000005340000-0x000000000537E000-memory.dmp

    Filesize

    248KB

  • memory/3092-83-0x0000000005340000-0x000000000537E000-memory.dmp

    Filesize

    248KB

  • memory/3092-82-0x0000000005340000-0x000000000537E000-memory.dmp

    Filesize

    248KB

  • memory/3092-80-0x0000000005340000-0x000000000537E000-memory.dmp

    Filesize

    248KB

  • memory/3092-77-0x0000000005340000-0x000000000537E000-memory.dmp

    Filesize

    248KB

  • memory/3092-75-0x0000000005340000-0x000000000537E000-memory.dmp

    Filesize

    248KB

  • memory/3092-74-0x0000000005340000-0x000000000537E000-memory.dmp

    Filesize

    248KB

  • memory/3092-71-0x0000000005340000-0x000000000537E000-memory.dmp

    Filesize

    248KB

  • memory/3092-69-0x0000000005340000-0x000000000537E000-memory.dmp

    Filesize

    248KB

  • memory/3092-67-0x0000000005340000-0x000000000537E000-memory.dmp

    Filesize

    248KB

  • memory/3092-65-0x0000000005340000-0x000000000537E000-memory.dmp

    Filesize

    248KB

  • memory/3092-63-0x0000000005340000-0x000000000537E000-memory.dmp

    Filesize

    248KB

  • memory/3092-59-0x0000000005340000-0x000000000537E000-memory.dmp

    Filesize

    248KB

  • memory/3092-57-0x0000000005340000-0x000000000537E000-memory.dmp

    Filesize

    248KB

  • memory/3092-55-0x0000000005340000-0x000000000537E000-memory.dmp

    Filesize

    248KB

  • memory/3092-53-0x0000000005340000-0x000000000537E000-memory.dmp

    Filesize

    248KB

  • memory/3092-51-0x0000000005340000-0x000000000537E000-memory.dmp

    Filesize

    248KB

  • memory/3092-47-0x0000000005340000-0x000000000537E000-memory.dmp

    Filesize

    248KB

  • memory/3092-45-0x0000000005340000-0x000000000537E000-memory.dmp

    Filesize

    248KB

  • memory/3092-43-0x0000000005340000-0x000000000537E000-memory.dmp

    Filesize

    248KB

  • memory/3092-41-0x0000000005340000-0x000000000537E000-memory.dmp

    Filesize

    248KB

  • memory/3092-39-0x0000000005340000-0x000000000537E000-memory.dmp

    Filesize

    248KB

  • memory/3092-37-0x0000000005340000-0x000000000537E000-memory.dmp

    Filesize

    248KB

  • memory/3092-31-0x0000000005340000-0x000000000537E000-memory.dmp

    Filesize

    248KB

  • memory/3092-29-0x0000000005340000-0x000000000537E000-memory.dmp

    Filesize

    248KB

  • memory/3092-25-0x0000000005340000-0x000000000537E000-memory.dmp

    Filesize

    248KB

  • memory/3092-49-0x0000000005340000-0x000000000537E000-memory.dmp

    Filesize

    248KB

  • memory/3092-23-0x0000000005340000-0x000000000537E000-memory.dmp

    Filesize

    248KB

  • memory/3092-22-0x0000000005340000-0x000000000537E000-memory.dmp

    Filesize

    248KB

  • memory/3092-35-0x0000000005340000-0x000000000537E000-memory.dmp

    Filesize

    248KB

  • memory/3092-33-0x0000000005340000-0x000000000537E000-memory.dmp

    Filesize

    248KB

  • memory/3092-928-0x00000000053E0000-0x00000000059F8000-memory.dmp

    Filesize

    6.1MB

  • memory/3092-929-0x0000000005A80000-0x0000000005B8A000-memory.dmp

    Filesize

    1.0MB

  • memory/3092-930-0x0000000005BC0000-0x0000000005BD2000-memory.dmp

    Filesize

    72KB

  • memory/3092-931-0x0000000005BE0000-0x0000000005C1C000-memory.dmp

    Filesize

    240KB

  • memory/3092-932-0x0000000005D30000-0x0000000005D7C000-memory.dmp

    Filesize

    304KB

  • memory/3092-933-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/3092-934-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB