Analysis

  • max time kernel
    110s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 07:47

General

  • Target

    0082aa01ee931a031e10ffac5fcfd31339de67e4cc9cb553757adfc1b853e19fN.exe

  • Size

    570KB

  • MD5

    a390e7134a4cb952f3353931944e6828

  • SHA1

    0d6cf1d7f0aa0ac7212d819faa06aa82b69a2b30

  • SHA256

    a2e14e5ff7d4d627d0380df7330c429a5df4cba2e9ffb4bd11ec1a6ec040bea5

  • SHA512

    906a87a7baf158ccbb68634d1268f7378ce7ec340e9480bd25da5f10ee1689fbabc03c0444b3630386b26ae0573de9552148791785700a8f33977cb8d7a8e40f

  • SSDEEP

    12288:xy90SQ0dRTmPHSvAbI/9/a74L7KvF0tYBwX4Ng/dV8:xylQuRTeSobOCFoz4eV8

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dante

C2

185.161.248.73:4164

Attributes
  • auth_value

    f4066af6b8a6f23125c8ee48288a3f90

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0082aa01ee931a031e10ffac5fcfd31339de67e4cc9cb553757adfc1b853e19fN.exe
    "C:\Users\Admin\AppData\Local\Temp\0082aa01ee931a031e10ffac5fcfd31339de67e4cc9cb553757adfc1b853e19fN.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4848
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m42974613.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m42974613.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4444
      • C:\Windows\Temp\1.exe
        "C:\Windows\Temp\1.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:6040
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n23671177.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n23671177.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:6116

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m42974613.exe

    Filesize

    476KB

    MD5

    9a64e73103c441d16845194295351085

    SHA1

    4801e160c2067651af6efa28bc715c1d0731ece7

    SHA256

    2d17bd94c2cbcd922c47e24b7209cbee50c9a9563164c798c65fe157a169ef94

    SHA512

    3682903c1cadfb05ec2f5f6b9e3a739d8ab17c5e65948c09f3ac65f3e8e0d691db01f8343f3b7e1b5fb0041297e5db7e88d5a9e0218729bbc337a43c39f0cac6

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n23671177.exe

    Filesize

    169KB

    MD5

    e95bd1405954b689a753ec6b5cfb3f2c

    SHA1

    af529a71b4e83a08f0ea0ec7a989b222183fc339

    SHA256

    2e323f3d434ccf95d1a236113f973ec1bf547d07a0e02f5b42b4d3ea03682f85

    SHA512

    43d4a5e9fa8de04dd0ad4abd77dfc8024d643495f384301cb17b2a6bd244f38c7d10d60c41a5f0fe29f11fe70a61ecd7ba8db2303c621b310e02921e9ea429db

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • memory/4444-32-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/4444-14-0x0000000005400000-0x0000000005466000-memory.dmp

    Filesize

    408KB

  • memory/4444-30-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/4444-13-0x0000000004E10000-0x00000000053B4000-memory.dmp

    Filesize

    5.6MB

  • memory/4444-28-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/4444-38-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/4444-52-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/4444-78-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/4444-76-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/4444-74-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/4444-72-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/4444-70-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/4444-66-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/4444-64-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/4444-62-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/4444-60-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/4444-58-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/4444-56-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/4444-54-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/4444-50-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/4444-48-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/4444-46-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/4444-44-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/4444-42-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/4444-26-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/4444-36-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/4444-34-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/4444-10-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/4444-12-0x0000000004DA0000-0x0000000004E08000-memory.dmp

    Filesize

    416KB

  • memory/4444-11-0x0000000000400000-0x00000000006F8000-memory.dmp

    Filesize

    3.0MB

  • memory/4444-40-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/4444-24-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/4444-22-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/4444-20-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/4444-18-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/4444-68-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/4444-16-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/4444-15-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/4444-2161-0x0000000000870000-0x0000000000970000-memory.dmp

    Filesize

    1024KB

  • memory/4444-2162-0x0000000005620000-0x0000000005652000-memory.dmp

    Filesize

    200KB

  • memory/4444-8-0x0000000000870000-0x0000000000970000-memory.dmp

    Filesize

    1024KB

  • memory/4444-9-0x0000000000700000-0x000000000075B000-memory.dmp

    Filesize

    364KB

  • memory/4444-2178-0x0000000000700000-0x000000000075B000-memory.dmp

    Filesize

    364KB

  • memory/4444-2180-0x0000000000400000-0x00000000006F8000-memory.dmp

    Filesize

    3.0MB

  • memory/4444-2179-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/6040-2192-0x00000000050A0000-0x00000000050EC000-memory.dmp

    Filesize

    304KB

  • memory/6040-2181-0x0000000000F20000-0x0000000000F26000-memory.dmp

    Filesize

    24KB

  • memory/6040-2174-0x0000000073D3E000-0x0000000073D3F000-memory.dmp

    Filesize

    4KB

  • memory/6040-2194-0x0000000073D30000-0x00000000744E0000-memory.dmp

    Filesize

    7.7MB

  • memory/6040-2193-0x0000000073D3E000-0x0000000073D3F000-memory.dmp

    Filesize

    4KB

  • memory/6040-2176-0x0000000000670000-0x000000000069E000-memory.dmp

    Filesize

    184KB

  • memory/6040-2187-0x0000000005610000-0x0000000005C28000-memory.dmp

    Filesize

    6.1MB

  • memory/6040-2191-0x0000000073D30000-0x00000000744E0000-memory.dmp

    Filesize

    7.7MB

  • memory/6116-2185-0x0000000000350000-0x0000000000380000-memory.dmp

    Filesize

    192KB

  • memory/6116-2189-0x0000000004CD0000-0x0000000004CE2000-memory.dmp

    Filesize

    72KB

  • memory/6116-2190-0x0000000004D50000-0x0000000004D8C000-memory.dmp

    Filesize

    240KB

  • memory/6116-2186-0x0000000000BC0000-0x0000000000BC6000-memory.dmp

    Filesize

    24KB

  • memory/6116-2188-0x0000000004E60000-0x0000000004F6A000-memory.dmp

    Filesize

    1.0MB