Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 11:04

General

  • Target

    7737d039a714c7cea8ae63a69766b9155b902d0e1660d2fb45ab86e94b525380.exe

  • Size

    759KB

  • MD5

    95dbdcc55dbc500642b7ca63975883f0

  • SHA1

    29bd749792863370bf07cac1d98766f3c4839711

  • SHA256

    7737d039a714c7cea8ae63a69766b9155b902d0e1660d2fb45ab86e94b525380

  • SHA512

    7eea95e65f7596cde0de4ee5b837d8ffff21a0416d5a198fff54cf0d386f9437306692954ea68100a637630ca7fefb6df960698c93047b02cf76bdf55533816f

  • SSDEEP

    12288:vMr0y90FmgGN0mV6n9Ii2Ial69xMghb6TPISPwHae6uaLA0RP53:HyAmgqVV6n9X2I66cggTVw6jR1

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7737d039a714c7cea8ae63a69766b9155b902d0e1660d2fb45ab86e94b525380.exe
    "C:\Users\Admin\AppData\Local\Temp\7737d039a714c7cea8ae63a69766b9155b902d0e1660d2fb45ab86e94b525380.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4928
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vND20.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vND20.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3068
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vYX44.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vYX44.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1424
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dRg36.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dRg36.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:3044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vND20.exe

    Filesize

    655KB

    MD5

    810de4b46fc72cea9ca7cdf5fb467c1e

    SHA1

    79b8fe88a283cec988b71d83d3be52ff21be2416

    SHA256

    4d542ff42d0b9086149088dbae686e5e7c6bf89ec54b61ee11a3438c6ce579e7

    SHA512

    c202aaf1c900d7b8b4f779a90f7da42a3e4a3ed247ed25cb871424a2904bc31995e96c1658329e9e008bfa79c2aa911bc2e0877829cffd52e7aea3f6a6b2f5bb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vYX44.exe

    Filesize

    509KB

    MD5

    3ceabd97c62d1b118f0c53bb9ed8d644

    SHA1

    7b084aba1250e71b060c5e7e8697a1f14cc9a256

    SHA256

    133a6299d74175632455580553ff7df2667a1b1d637513289a5e5b892c896de2

    SHA512

    e8b07bb4cf3fb27a0df8b93f337a4dab22f5586b26dc2af67796da844679d5cd695677de8b083ec01a4962a208984938a7537809d6796678ed41d74cbe693106

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dRg36.exe

    Filesize

    280KB

    MD5

    7d909ade41361092545c6e8718ef0458

    SHA1

    36b2753a4c3275635178e80d71a86bcd04ad4c98

    SHA256

    06e3026c306e867e5c77594df9c6bc687d1567416f014fba65ec1121eaf78591

    SHA512

    063b2020da84aad453254dd62fc3b6d2d6fa29966dfd88ad2af175514fad0a45a808123bd1619fae162190449cbdb8521873b4839e101ea0bb3622b4c1a03dce

  • memory/3044-22-0x0000000004CC0000-0x0000000004D06000-memory.dmp

    Filesize

    280KB

  • memory/3044-23-0x0000000004E30000-0x00000000053D4000-memory.dmp

    Filesize

    5.6MB

  • memory/3044-24-0x0000000004D80000-0x0000000004DC4000-memory.dmp

    Filesize

    272KB

  • memory/3044-82-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/3044-62-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/3044-40-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/3044-25-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/3044-88-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/3044-86-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/3044-84-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/3044-80-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/3044-78-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/3044-76-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/3044-74-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/3044-72-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/3044-70-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/3044-68-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/3044-66-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/3044-64-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/3044-60-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/3044-58-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/3044-56-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/3044-54-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/3044-52-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/3044-50-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/3044-48-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/3044-46-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/3044-44-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/3044-42-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/3044-38-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/3044-36-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/3044-34-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/3044-32-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/3044-30-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/3044-28-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/3044-26-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/3044-931-0x00000000053E0000-0x00000000059F8000-memory.dmp

    Filesize

    6.1MB

  • memory/3044-932-0x0000000005A80000-0x0000000005B8A000-memory.dmp

    Filesize

    1.0MB

  • memory/3044-933-0x0000000005BC0000-0x0000000005BD2000-memory.dmp

    Filesize

    72KB

  • memory/3044-934-0x0000000005BE0000-0x0000000005C1C000-memory.dmp

    Filesize

    240KB

  • memory/3044-935-0x0000000005D30000-0x0000000005D7C000-memory.dmp

    Filesize

    304KB