Analysis

  • max time kernel
    139s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/11/2024, 08:58

General

  • Target

    ad3930e087caf238fec1c5dfac2659a58254929bd3f21ae3be0cf647375d2a4d.exe

  • Size

    890KB

  • MD5

    f5e6d3506624bb3ef4d21e2dc5489cd5

  • SHA1

    fb164e7168b0e1416765ac400ee48f8c8957e24e

  • SHA256

    ad3930e087caf238fec1c5dfac2659a58254929bd3f21ae3be0cf647375d2a4d

  • SHA512

    603e8998b8afea4b5ac632d03598e9b605e9d1bed87282d93237fcf4c1e908f9beced964641b2eb61dd948e72e69fbe6b6b9d89e4ec53bc6175ff883f6489e48

  • SSDEEP

    24576:xyzVxStZHExnmRbNaZzxVvAIdzos7lpdIsqVCq1:kTuZHExmPOAcJyVC

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dante

C2

185.161.248.73:4164

Attributes
  • auth_value

    f4066af6b8a6f23125c8ee48288a3f90

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad3930e087caf238fec1c5dfac2659a58254929bd3f21ae3be0cf647375d2a4d.exe
    "C:\Users\Admin\AppData\Local\Temp\ad3930e087caf238fec1c5dfac2659a58254929bd3f21ae3be0cf647375d2a4d.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y71856847.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y71856847.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1304
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p56352692.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p56352692.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3932
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1588
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3932 -s 1208
          4⤵
          • Program crash
          PID:2116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r08000757.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r08000757.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4768
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3932 -ip 3932
    1⤵
      PID:1396

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y71856847.exe

            Filesize

            590KB

            MD5

            3ba6162793f42fe6af5141b4d31cb16c

            SHA1

            4f7ae26e82a93fe39e4570fdb12225520e3ba222

            SHA256

            5c7ada056ad9dba3c0e7dd05616e2af049283e44111077be873eeb4f30626676

            SHA512

            e8e2cb49ac8d4b92e2c3f42ca0dc2fdf21a4ffe75f74ccb05fec1be8e3af222295ba773c9216d82b7ea04b239241d67271d83f6b46e901c35a77bace9bbfa11d

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p56352692.exe

            Filesize

            530KB

            MD5

            5e6ebd1005bf1d404fe392f1844e98c6

            SHA1

            f842cf54d2834339b2790a6d40e6e4ea7bb69927

            SHA256

            7d085bceff108f69f3933386c5252bff083f962bb7c1765deeb4adc2086624e4

            SHA512

            0bee8caf36ffa096913bf46b9f5726c4fe7c0f939433e966ad991119000d7395046553e411d403de3c4cc71744f8faad28dc9cd5bb30e72bb7c1553986c277a6

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r08000757.exe

            Filesize

            168KB

            MD5

            b3bb18c4cf4e83381c15022642d4ede3

            SHA1

            7d92ee794895771cedd4cee35299b597ad0f5192

            SHA256

            338385d3f4ee72a6799fbf2e4909d5533d273e1c08751d33597ac7dc37887b57

            SHA512

            67c85b53811fa0dd961ba613b22aa1fac2cf1d1586c9e2b57579e82ae6cfcdebab07001b969cae9dbc3864a7e12f839fff781d03fa1769c9494d0105ae35650f

          • C:\Windows\Temp\1.exe

            Filesize

            168KB

            MD5

            f16fb63d4e551d3808e8f01f2671b57e

            SHA1

            781153ad6235a1152da112de1fb39a6f2d063575

            SHA256

            8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

            SHA512

            fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

          • memory/1588-2182-0x0000000000B40000-0x0000000000B6E000-memory.dmp

            Filesize

            184KB

          • memory/1588-2183-0x0000000002E90000-0x0000000002E96000-memory.dmp

            Filesize

            24KB

          • memory/1588-2184-0x0000000005AB0000-0x00000000060C8000-memory.dmp

            Filesize

            6.1MB

          • memory/1588-2185-0x00000000055A0000-0x00000000056AA000-memory.dmp

            Filesize

            1.0MB

          • memory/1588-2189-0x00000000056B0000-0x00000000056FC000-memory.dmp

            Filesize

            304KB

          • memory/1588-2187-0x0000000005520000-0x000000000555C000-memory.dmp

            Filesize

            240KB

          • memory/1588-2186-0x00000000054C0000-0x00000000054D2000-memory.dmp

            Filesize

            72KB

          • memory/3932-55-0x00000000058B0000-0x0000000005910000-memory.dmp

            Filesize

            384KB

          • memory/3932-43-0x00000000058B0000-0x0000000005910000-memory.dmp

            Filesize

            384KB

          • memory/3932-21-0x00000000058B0000-0x0000000005916000-memory.dmp

            Filesize

            408KB

          • memory/3932-57-0x00000000058B0000-0x0000000005910000-memory.dmp

            Filesize

            384KB

          • memory/3932-67-0x00000000058B0000-0x0000000005910000-memory.dmp

            Filesize

            384KB

          • memory/3932-86-0x00000000058B0000-0x0000000005910000-memory.dmp

            Filesize

            384KB

          • memory/3932-83-0x00000000058B0000-0x0000000005910000-memory.dmp

            Filesize

            384KB

          • memory/3932-81-0x00000000058B0000-0x0000000005910000-memory.dmp

            Filesize

            384KB

          • memory/3932-80-0x00000000058B0000-0x0000000005910000-memory.dmp

            Filesize

            384KB

          • memory/3932-75-0x00000000058B0000-0x0000000005910000-memory.dmp

            Filesize

            384KB

          • memory/3932-73-0x00000000058B0000-0x0000000005910000-memory.dmp

            Filesize

            384KB

          • memory/3932-71-0x00000000058B0000-0x0000000005910000-memory.dmp

            Filesize

            384KB

          • memory/3932-69-0x00000000058B0000-0x0000000005910000-memory.dmp

            Filesize

            384KB

          • memory/3932-65-0x00000000058B0000-0x0000000005910000-memory.dmp

            Filesize

            384KB

          • memory/3932-63-0x00000000058B0000-0x0000000005910000-memory.dmp

            Filesize

            384KB

          • memory/3932-61-0x00000000058B0000-0x0000000005910000-memory.dmp

            Filesize

            384KB

          • memory/3932-59-0x00000000058B0000-0x0000000005910000-memory.dmp

            Filesize

            384KB

          • memory/3932-19-0x0000000002CC0000-0x0000000002D28000-memory.dmp

            Filesize

            416KB

          • memory/3932-53-0x00000000058B0000-0x0000000005910000-memory.dmp

            Filesize

            384KB

          • memory/3932-51-0x00000000058B0000-0x0000000005910000-memory.dmp

            Filesize

            384KB

          • memory/3932-49-0x00000000058B0000-0x0000000005910000-memory.dmp

            Filesize

            384KB

          • memory/3932-47-0x00000000058B0000-0x0000000005910000-memory.dmp

            Filesize

            384KB

          • memory/3932-45-0x00000000058B0000-0x0000000005910000-memory.dmp

            Filesize

            384KB

          • memory/3932-20-0x00000000052B0000-0x0000000005854000-memory.dmp

            Filesize

            5.6MB

          • memory/3932-39-0x00000000058B0000-0x0000000005910000-memory.dmp

            Filesize

            384KB

          • memory/3932-37-0x00000000058B0000-0x0000000005910000-memory.dmp

            Filesize

            384KB

          • memory/3932-35-0x00000000058B0000-0x0000000005910000-memory.dmp

            Filesize

            384KB

          • memory/3932-33-0x00000000058B0000-0x0000000005910000-memory.dmp

            Filesize

            384KB

          • memory/3932-31-0x00000000058B0000-0x0000000005910000-memory.dmp

            Filesize

            384KB

          • memory/3932-29-0x00000000058B0000-0x0000000005910000-memory.dmp

            Filesize

            384KB

          • memory/3932-27-0x00000000058B0000-0x0000000005910000-memory.dmp

            Filesize

            384KB

          • memory/3932-25-0x00000000058B0000-0x0000000005910000-memory.dmp

            Filesize

            384KB

          • memory/3932-77-0x00000000058B0000-0x0000000005910000-memory.dmp

            Filesize

            384KB

          • memory/3932-18-0x0000000000400000-0x0000000000A95000-memory.dmp

            Filesize

            6.6MB

          • memory/3932-17-0x0000000000400000-0x000000000045E000-memory.dmp

            Filesize

            376KB

          • memory/3932-23-0x00000000058B0000-0x0000000005910000-memory.dmp

            Filesize

            384KB

          • memory/3932-22-0x00000000058B0000-0x0000000005910000-memory.dmp

            Filesize

            384KB

          • memory/3932-41-0x00000000058B0000-0x0000000005910000-memory.dmp

            Filesize

            384KB

          • memory/3932-2168-0x0000000000DB0000-0x0000000000EB0000-memory.dmp

            Filesize

            1024KB

          • memory/3932-2169-0x0000000005B00000-0x0000000005B32000-memory.dmp

            Filesize

            200KB

          • memory/3932-2188-0x0000000002750000-0x00000000027AB000-memory.dmp

            Filesize

            364KB

          • memory/3932-16-0x0000000002750000-0x00000000027AB000-memory.dmp

            Filesize

            364KB

          • memory/3932-2191-0x0000000000400000-0x000000000045E000-memory.dmp

            Filesize

            376KB

          • memory/3932-2192-0x0000000000400000-0x0000000000A95000-memory.dmp

            Filesize

            6.6MB

          • memory/3932-15-0x0000000000DB0000-0x0000000000EB0000-memory.dmp

            Filesize

            1024KB

          • memory/4768-2196-0x0000000000D40000-0x0000000000D70000-memory.dmp

            Filesize

            192KB

          • memory/4768-2197-0x00000000013C0000-0x00000000013C6000-memory.dmp

            Filesize

            24KB