Analysis Overview
SHA256
399ee73ca5fd42f4aeda9593c0d2ce8624c81c22117a37e3c7d13673e8bf0725
Threat Level: Known bad
The file 399ee73ca5fd42f4aeda9593c0d2ce8624c81c22117a37e3c7d13673e8bf0725 was found to be: Known bad.
Malicious Activity Summary
RedLine payload
Redline family
RedLine
Executes dropped EXE
Adds Run key to start application
System Location Discovery: System Language Discovery
Unsigned PE
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-11-11 06:52
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-11-11 06:52
Reported
2024-11-11 06:54
Platform
win10v2004-20241007-en
Max time kernel
148s
Max time network
150s
Command Line
Signatures
RedLine
RedLine payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Redline family
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8194485.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8398904.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" | C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8194485.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" | C:\Users\Admin\AppData\Local\Temp\399ee73ca5fd42f4aeda9593c0d2ce8624c81c22117a37e3c7d13673e8bf0725.exe | N/A |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8398904.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\399ee73ca5fd42f4aeda9593c0d2ce8624c81c22117a37e3c7d13673e8bf0725.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8194485.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\399ee73ca5fd42f4aeda9593c0d2ce8624c81c22117a37e3c7d13673e8bf0725.exe
"C:\Users\Admin\AppData\Local\Temp\399ee73ca5fd42f4aeda9593c0d2ce8624c81c22117a37e3c7d13673e8bf0725.exe"
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8194485.exe
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8194485.exe
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8398904.exe
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8398904.exe
Network
| Country | Destination | Domain | Proto |
| FI | 77.91.124.251:19069 | tcp | |
| US | 8.8.8.8:53 | 13.86.106.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 67.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| FI | 77.91.124.251:19069 | tcp | |
| US | 8.8.8.8:53 | 212.20.149.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| FI | 77.91.124.251:19069 | tcp | |
| US | 8.8.8.8:53 | 83.210.23.2.in-addr.arpa | udp |
| FI | 77.91.124.251:19069 | tcp | |
| FI | 77.91.124.251:19069 | tcp | |
| US | 8.8.8.8:53 | 11.227.111.52.in-addr.arpa | udp |
| FI | 77.91.124.251:19069 | tcp | |
| FI | 77.91.124.251:19069 | tcp | |
| FI | 77.91.124.251:19069 | tcp |
Files
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8194485.exe
| MD5 | 47f978dafeda927083137d749241a5cb |
| SHA1 | 6c97b19fcd82b00ab2fb376edf899936c1a50767 |
| SHA256 | 4d72136d289f0f955553a0610fa8beeccd4e453ed9b9829c94b5de023cf70d46 |
| SHA512 | 759db6d77e9b52f0c783d0d75adc993cdb6011dd5658f0465bea68125bd2d5bc4ed5ef916c55d7280c7287ff1bf5cccf396cbde5dbefc74701cf729728467c0b |
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8398904.exe
| MD5 | 8f30f7f88229560306c5959c605316de |
| SHA1 | 36f26a905a9743f6dd1608e39b37d1116cafcc0a |
| SHA256 | 3a616b322cc7ca87e349b8ceabb92062ed0388308d1f9221e9cdb6f65c86b6f7 |
| SHA512 | 267d0f3954c416dc994e3c3e6790f6997598b71fdb7172e87265b31b7593fb29e9eb4cc295a38b969d1f2aa131b5a67525e0f4bb51a61a3dd82b7c63b867f9a0 |
memory/4568-14-0x0000000074A8E000-0x0000000074A8F000-memory.dmp
memory/4568-15-0x0000000000CD0000-0x0000000000CF8000-memory.dmp
memory/4568-16-0x0000000007F90000-0x00000000085A8000-memory.dmp
memory/4568-17-0x0000000007A30000-0x0000000007A42000-memory.dmp
memory/4568-18-0x0000000007B60000-0x0000000007C6A000-memory.dmp
memory/4568-19-0x0000000007A90000-0x0000000007ACC000-memory.dmp
memory/4568-20-0x0000000074A80000-0x0000000075230000-memory.dmp
memory/4568-21-0x0000000005020000-0x000000000506C000-memory.dmp
memory/4568-22-0x0000000074A8E000-0x0000000074A8F000-memory.dmp
memory/4568-23-0x0000000074A80000-0x0000000075230000-memory.dmp