Analysis Overview
SHA256
8d401cd9e1cfdec82daf8016e56e125b4d9103d37af45ef3042172bfb0d9e68e
Threat Level: Known bad
The file 8d401cd9e1cfdec82daf8016e56e125b4d9103d37af45ef3042172bfb0d9e68e was found to be: Known bad.
Malicious Activity Summary
Redline family
RedLine
RedLine payload
Executes dropped EXE
Adds Run key to start application
Unsigned PE
System Location Discovery: System Language Discovery
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-11-11 05:55
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-11-11 05:55
Reported
2024-11-11 05:57
Platform
win10v2004-20241007-en
Max time kernel
149s
Max time network
150s
Command Line
Signatures
RedLine
RedLine payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Redline family
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nyV38kC65.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eMn78sf.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" | C:\Users\Admin\AppData\Local\Temp\8d401cd9e1cfdec82daf8016e56e125b4d9103d37af45ef3042172bfb0d9e68e.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" | C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nyV38kC65.exe | N/A |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nyV38kC65.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eMn78sf.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\8d401cd9e1cfdec82daf8016e56e125b4d9103d37af45ef3042172bfb0d9e68e.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eMn78sf.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\8d401cd9e1cfdec82daf8016e56e125b4d9103d37af45ef3042172bfb0d9e68e.exe
"C:\Users\Admin\AppData\Local\Temp\8d401cd9e1cfdec82daf8016e56e125b4d9103d37af45ef3042172bfb0d9e68e.exe"
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nyV38kC65.exe
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nyV38kC65.exe
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eMn78sf.exe
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eMn78sf.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 58.55.71.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.210.23.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 17.160.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| RU | 193.233.20.20:4134 | tcp | |
| RU | 193.233.20.20:4134 | tcp | |
| RU | 193.233.20.20:4134 | tcp | |
| RU | 193.233.20.20:4134 | tcp | |
| US | 8.8.8.8:53 | 197.87.175.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| RU | 193.233.20.20:4134 | tcp | |
| RU | 193.233.20.20:4134 | tcp | |
| RU | 193.233.20.20:4134 | tcp | |
| RU | 193.233.20.20:4134 | tcp | |
| US | 8.8.8.8:53 | 83.210.23.2.in-addr.arpa | udp |
| RU | 193.233.20.20:4134 | tcp | |
| RU | 193.233.20.20:4134 | tcp | |
| RU | 193.233.20.20:4134 | tcp | |
| RU | 193.233.20.20:4134 | tcp | |
| US | 8.8.8.8:53 | 30.243.111.52.in-addr.arpa | udp |
| RU | 193.233.20.20:4134 | tcp | |
| RU | 193.233.20.20:4134 | tcp | |
| RU | 193.233.20.20:4134 | tcp | |
| RU | 193.233.20.20:4134 | tcp | |
| RU | 193.233.20.20:4134 | tcp | |
| RU | 193.233.20.20:4134 | tcp | |
| RU | 193.233.20.20:4134 | tcp | |
| RU | 193.233.20.20:4134 | tcp | |
| US | 8.8.8.8:53 | 2.17.178.52.in-addr.arpa | udp |
Files
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nyV38kC65.exe
| MD5 | 221ed3e1992bdc16eec381c7ed0bb169 |
| SHA1 | 72622cfc9db625e261e9e03d017a6c2da82f7fe2 |
| SHA256 | 9324d1222da0163fb30cf09cc226c4731249e91ac8c125797bd885c4d0ebf5bb |
| SHA512 | 474c2d662bd62ac6f49e4279f4839bf1220404c9123f12a2dabfbd7214d99830808dc5545fef8c5990bec681f3d3b0e2bef5c61ddf5ef1f12bd2506a9c163871 |
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eMn78sf.exe
| MD5 | 22fa9dc8d6bb6629c530256635becb49 |
| SHA1 | 5041d1a1d4b8c6e442ca2d5a089c1ba146f9ed21 |
| SHA256 | bb9b0f0b2564e1817399025d209a51878f070a9c0370d341398cf1c4caea59c8 |
| SHA512 | b99fd8e8aff01cb53668189cf751ae020d8e004278d56f4ee8db06a2f1776a4ad5015fc848cdc3de90d3bbeb8ba45b237ee426662f6a296a2cf3d976be41b549 |
memory/644-15-0x0000000000650000-0x0000000000750000-memory.dmp
memory/644-16-0x0000000000400000-0x000000000044E000-memory.dmp
memory/644-17-0x0000000000400000-0x0000000000589000-memory.dmp
memory/644-18-0x0000000000400000-0x0000000000589000-memory.dmp
memory/644-19-0x0000000002550000-0x0000000002596000-memory.dmp
memory/644-20-0x0000000004E00000-0x00000000053A4000-memory.dmp
memory/644-21-0x0000000002710000-0x0000000002754000-memory.dmp
memory/644-23-0x0000000002710000-0x000000000274E000-memory.dmp
memory/644-31-0x0000000002710000-0x000000000274E000-memory.dmp
memory/644-85-0x0000000002710000-0x000000000274E000-memory.dmp
memory/644-83-0x0000000002710000-0x000000000274E000-memory.dmp
memory/644-79-0x0000000002710000-0x000000000274E000-memory.dmp
memory/644-77-0x0000000002710000-0x000000000274E000-memory.dmp
memory/644-73-0x0000000002710000-0x000000000274E000-memory.dmp
memory/644-71-0x0000000002710000-0x000000000274E000-memory.dmp
memory/644-70-0x0000000002710000-0x000000000274E000-memory.dmp
memory/644-65-0x0000000002710000-0x000000000274E000-memory.dmp
memory/644-63-0x0000000002710000-0x000000000274E000-memory.dmp
memory/644-62-0x0000000002710000-0x000000000274E000-memory.dmp
memory/644-59-0x0000000002710000-0x000000000274E000-memory.dmp
memory/644-57-0x0000000002710000-0x000000000274E000-memory.dmp
memory/644-55-0x0000000002710000-0x000000000274E000-memory.dmp
memory/644-53-0x0000000002710000-0x000000000274E000-memory.dmp
memory/644-51-0x0000000002710000-0x000000000274E000-memory.dmp
memory/644-49-0x0000000002710000-0x000000000274E000-memory.dmp
memory/644-47-0x0000000002710000-0x000000000274E000-memory.dmp
memory/644-45-0x0000000002710000-0x000000000274E000-memory.dmp
memory/644-43-0x0000000002710000-0x000000000274E000-memory.dmp
memory/644-41-0x0000000002710000-0x000000000274E000-memory.dmp
memory/644-39-0x0000000002710000-0x000000000274E000-memory.dmp
memory/644-37-0x0000000002710000-0x000000000274E000-memory.dmp
memory/644-35-0x0000000002710000-0x000000000274E000-memory.dmp
memory/644-29-0x0000000002710000-0x000000000274E000-memory.dmp
memory/644-27-0x0000000002710000-0x000000000274E000-memory.dmp
memory/644-25-0x0000000002710000-0x000000000274E000-memory.dmp
memory/644-81-0x0000000002710000-0x000000000274E000-memory.dmp
memory/644-75-0x0000000002710000-0x000000000274E000-memory.dmp
memory/644-67-0x0000000002710000-0x000000000274E000-memory.dmp
memory/644-33-0x0000000002710000-0x000000000274E000-memory.dmp
memory/644-22-0x0000000002710000-0x000000000274E000-memory.dmp
memory/644-928-0x00000000053B0000-0x00000000059C8000-memory.dmp
memory/644-929-0x0000000004C80000-0x0000000004D8A000-memory.dmp
memory/644-930-0x0000000004DC0000-0x0000000004DD2000-memory.dmp
memory/644-931-0x00000000059D0000-0x0000000005A0C000-memory.dmp
memory/644-932-0x0000000005B10000-0x0000000005B5C000-memory.dmp
memory/644-933-0x0000000000650000-0x0000000000750000-memory.dmp
memory/644-934-0x0000000000400000-0x000000000044E000-memory.dmp