Analysis

  • max time kernel
    140s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 11:10

General

  • Target

    9c87ae8aa139f78d048e64fef780cef440b87e3ac7f583cbda8f530995cd1de2.exe

  • Size

    764KB

  • MD5

    e2a61c0aa82ebee86dc6a8171cce0f1d

  • SHA1

    5dbb3199637a8b207329ed97205923eaaa2e45ac

  • SHA256

    9c87ae8aa139f78d048e64fef780cef440b87e3ac7f583cbda8f530995cd1de2

  • SHA512

    ef9289acfb4203a575f305d7d303a54d968803442b3193c1553d23554e62d4e63e0d9f3a42c66e0712f04b9bf878ee6e86e803008f1d894ad0b07299983d814b

  • SSDEEP

    12288:WMrMy90fd9SaQVNc4MinjPF5efIEpv2emOSbEiH3KkvI+yw45u/GTB4Od:CySd9SzVN5XF5j+2emOSbEiH3lvPN45B

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9c87ae8aa139f78d048e64fef780cef440b87e3ac7f583cbda8f530995cd1de2.exe
    "C:\Users\Admin\AppData\Local\Temp\9c87ae8aa139f78d048e64fef780cef440b87e3ac7f583cbda8f530995cd1de2.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4380
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vGu18.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vGu18.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3708
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vJl17.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vJl17.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1420
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dkS63.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dkS63.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:1548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vGu18.exe

    Filesize

    660KB

    MD5

    1c03cf581d0b202e326d177106dce492

    SHA1

    e53f111b16694713dc233e2a53f9f3de317cb802

    SHA256

    621a683bbf03c7b907a5a84d18a971d3c033eb0cee9ffb51b6ebe1e795b21f1a

    SHA512

    2b189d85934f9c9e5ffba05f0ae8b13b9351b5c9c6f0926197c8c53ce07359ea3a3fa256ba802b7ebf3e73b7e574af21c9aaa30ec5d64e24a90a0dd41fe9175a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vJl17.exe

    Filesize

    516KB

    MD5

    b9e5e108c15efadef1247987402118e5

    SHA1

    7f6bb289ba9b7de7efd48f7294f1d18e8c149669

    SHA256

    14a7e1de2c732d95b5f661b897cd4aa7dd97287679bc7cb2962544ff2309e3e6

    SHA512

    23c6bc3ac0438096a54bef8c61c300410a32ec1d06d9115ba1b214703406ae10cb7269c5736a12ca8a5a76d66b9ed22b7f1cb9913f965bec28a67d0105701370

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dkS63.exe

    Filesize

    293KB

    MD5

    05cec4f107653cd20a093e2ab3255796

    SHA1

    3ea89b1cf7fc3a40d3a8c06d7e3082b39ad67f85

    SHA256

    f8f4ea19cff74a70ef2cc653515d2512d6caf81f7cff71774ae8978718039326

    SHA512

    7553f277177d5025c4346ce5d727073c83c224b12540908bf6d8b75e229ec25b5ad0ef1ce6569ecb59661ef7e16926c3a5bfad477979f9b9d0ab55cc80091b65

  • memory/1548-22-0x0000000000860000-0x0000000000960000-memory.dmp

    Filesize

    1024KB

  • memory/1548-23-0x0000000000650000-0x000000000069B000-memory.dmp

    Filesize

    300KB

  • memory/1548-24-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1548-25-0x0000000004A90000-0x0000000004AD6000-memory.dmp

    Filesize

    280KB

  • memory/1548-26-0x0000000004BF0000-0x0000000005194000-memory.dmp

    Filesize

    5.6MB

  • memory/1548-27-0x0000000004B50000-0x0000000004B94000-memory.dmp

    Filesize

    272KB

  • memory/1548-29-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1548-35-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1548-33-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1548-31-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1548-89-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1548-77-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1548-65-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1548-37-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1548-28-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1548-91-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1548-87-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1548-86-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1548-83-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1548-81-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1548-79-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1548-75-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1548-73-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1548-71-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1548-69-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1548-67-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1548-63-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1548-61-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1548-59-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1548-57-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1548-55-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1548-53-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1548-51-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1548-49-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1548-47-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1548-45-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1548-43-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1548-41-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1548-39-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1548-934-0x00000000051B0000-0x00000000057C8000-memory.dmp

    Filesize

    6.1MB

  • memory/1548-935-0x0000000005850000-0x000000000595A000-memory.dmp

    Filesize

    1.0MB

  • memory/1548-936-0x0000000005990000-0x00000000059A2000-memory.dmp

    Filesize

    72KB

  • memory/1548-937-0x00000000059B0000-0x00000000059EC000-memory.dmp

    Filesize

    240KB

  • memory/1548-938-0x0000000005B00000-0x0000000005B4C000-memory.dmp

    Filesize

    304KB

  • memory/1548-940-0x0000000000860000-0x0000000000960000-memory.dmp

    Filesize

    1024KB

  • memory/1548-941-0x0000000000650000-0x000000000069B000-memory.dmp

    Filesize

    300KB

  • memory/1548-942-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB