Analysis

  • max time kernel
    141s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-11-2024 22:14

General

  • Target

    5517b348f32070ddaec8916521afca51c1bbb88231a8f34b230b4d64335369b3.exe

  • Size

    583KB

  • MD5

    31df9ad5a69e5a28aa320285d07ceaea

  • SHA1

    5ad9814ecf19ba1bf51fb2a5b6e41e7ce2c0843c

  • SHA256

    5517b348f32070ddaec8916521afca51c1bbb88231a8f34b230b4d64335369b3

  • SHA512

    0ea84a84869d477fceb0bd74ab55c3eed9d7e0cdf7c91dc687b2957a971e952e27bb61b1fe0acafada65a4f5a8a523eb4cc9ea6f34f07c766e176cadeb8446a6

  • SSDEEP

    12288:LMroy9072br0EnE25LKbmcgLkLwgY3YzMGPasb9:XyxQX25LKbplY3PGSs5

Malware Config

Extracted

Family

redline

Botnet

ronam

C2

193.233.20.17:4139

Attributes
  • auth_value

    125421d19d14dd7fd211bc7f6d4aea6c

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5517b348f32070ddaec8916521afca51c1bbb88231a8f34b230b4d64335369b3.exe
    "C:\Users\Admin\AppData\Local\Temp\5517b348f32070ddaec8916521afca51c1bbb88231a8f34b230b4d64335369b3.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3640
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dJX0189.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dJX0189.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4192
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nkK72wb.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nkK72wb.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dJX0189.exe

    Filesize

    439KB

    MD5

    f296a21114109e7400f4637d5f66439a

    SHA1

    2f8372636b79f6c405d91655ea4180fdedaeb65b

    SHA256

    b8b4ec1c7d024442e698f8f9495d05079427b5de6c66befb43c1cc2b80419cdd

    SHA512

    f1357c4710b3b062109fa4c1c7d3741a2ea175e0e2820cd9ed6ac2a261f28b4d8573518a460eed2e50630cf80b3f517009ad4c2cbcd6ea15f907523ceda421b4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nkK72wb.exe

    Filesize

    302KB

    MD5

    3ae325b7e23ade83ec4a82f60599bbd2

    SHA1

    5dc22cc013fc250e419ac826ef7cb1fcb3728ef5

    SHA256

    271a51784a7210356ba70dfd7e82d0c7c46316b6911925e1e6c955d5b3ecaa74

    SHA512

    a10c5bc435513e0583d9e5227347e1e62a5b1a6a25116f3a609b8d93d797c402ecc88041156f337b66ead158d9fe1a0000b71c1f114efd14c95d28cc26e026d3

  • memory/2820-16-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2820-15-0x0000000000920000-0x0000000000A20000-memory.dmp

    Filesize

    1024KB

  • memory/2820-17-0x0000000000400000-0x000000000062C000-memory.dmp

    Filesize

    2.2MB

  • memory/2820-18-0x0000000000400000-0x000000000062C000-memory.dmp

    Filesize

    2.2MB

  • memory/2820-19-0x00000000023B0000-0x00000000023F6000-memory.dmp

    Filesize

    280KB

  • memory/2820-20-0x0000000004CE0000-0x0000000005284000-memory.dmp

    Filesize

    5.6MB

  • memory/2820-21-0x00000000027F0000-0x0000000002834000-memory.dmp

    Filesize

    272KB

  • memory/2820-79-0x00000000027F0000-0x000000000282E000-memory.dmp

    Filesize

    248KB

  • memory/2820-85-0x00000000027F0000-0x000000000282E000-memory.dmp

    Filesize

    248KB

  • memory/2820-83-0x00000000027F0000-0x000000000282E000-memory.dmp

    Filesize

    248KB

  • memory/2820-81-0x00000000027F0000-0x000000000282E000-memory.dmp

    Filesize

    248KB

  • memory/2820-77-0x00000000027F0000-0x000000000282E000-memory.dmp

    Filesize

    248KB

  • memory/2820-75-0x00000000027F0000-0x000000000282E000-memory.dmp

    Filesize

    248KB

  • memory/2820-73-0x00000000027F0000-0x000000000282E000-memory.dmp

    Filesize

    248KB

  • memory/2820-71-0x00000000027F0000-0x000000000282E000-memory.dmp

    Filesize

    248KB

  • memory/2820-69-0x00000000027F0000-0x000000000282E000-memory.dmp

    Filesize

    248KB

  • memory/2820-67-0x00000000027F0000-0x000000000282E000-memory.dmp

    Filesize

    248KB

  • memory/2820-65-0x00000000027F0000-0x000000000282E000-memory.dmp

    Filesize

    248KB

  • memory/2820-63-0x00000000027F0000-0x000000000282E000-memory.dmp

    Filesize

    248KB

  • memory/2820-61-0x00000000027F0000-0x000000000282E000-memory.dmp

    Filesize

    248KB

  • memory/2820-57-0x00000000027F0000-0x000000000282E000-memory.dmp

    Filesize

    248KB

  • memory/2820-55-0x00000000027F0000-0x000000000282E000-memory.dmp

    Filesize

    248KB

  • memory/2820-53-0x00000000027F0000-0x000000000282E000-memory.dmp

    Filesize

    248KB

  • memory/2820-51-0x00000000027F0000-0x000000000282E000-memory.dmp

    Filesize

    248KB

  • memory/2820-47-0x00000000027F0000-0x000000000282E000-memory.dmp

    Filesize

    248KB

  • memory/2820-45-0x00000000027F0000-0x000000000282E000-memory.dmp

    Filesize

    248KB

  • memory/2820-43-0x00000000027F0000-0x000000000282E000-memory.dmp

    Filesize

    248KB

  • memory/2820-41-0x00000000027F0000-0x000000000282E000-memory.dmp

    Filesize

    248KB

  • memory/2820-39-0x00000000027F0000-0x000000000282E000-memory.dmp

    Filesize

    248KB

  • memory/2820-37-0x00000000027F0000-0x000000000282E000-memory.dmp

    Filesize

    248KB

  • memory/2820-35-0x00000000027F0000-0x000000000282E000-memory.dmp

    Filesize

    248KB

  • memory/2820-33-0x00000000027F0000-0x000000000282E000-memory.dmp

    Filesize

    248KB

  • memory/2820-31-0x00000000027F0000-0x000000000282E000-memory.dmp

    Filesize

    248KB

  • memory/2820-29-0x00000000027F0000-0x000000000282E000-memory.dmp

    Filesize

    248KB

  • memory/2820-27-0x00000000027F0000-0x000000000282E000-memory.dmp

    Filesize

    248KB

  • memory/2820-23-0x00000000027F0000-0x000000000282E000-memory.dmp

    Filesize

    248KB

  • memory/2820-59-0x00000000027F0000-0x000000000282E000-memory.dmp

    Filesize

    248KB

  • memory/2820-49-0x00000000027F0000-0x000000000282E000-memory.dmp

    Filesize

    248KB

  • memory/2820-25-0x00000000027F0000-0x000000000282E000-memory.dmp

    Filesize

    248KB

  • memory/2820-22-0x00000000027F0000-0x000000000282E000-memory.dmp

    Filesize

    248KB

  • memory/2820-928-0x0000000005290000-0x00000000058A8000-memory.dmp

    Filesize

    6.1MB

  • memory/2820-929-0x0000000005900000-0x0000000005A0A000-memory.dmp

    Filesize

    1.0MB

  • memory/2820-930-0x0000000005A40000-0x0000000005A52000-memory.dmp

    Filesize

    72KB

  • memory/2820-931-0x0000000005A60000-0x0000000005A9C000-memory.dmp

    Filesize

    240KB

  • memory/2820-932-0x0000000005BB0000-0x0000000005BFC000-memory.dmp

    Filesize

    304KB

  • memory/2820-933-0x0000000000920000-0x0000000000A20000-memory.dmp

    Filesize

    1024KB

  • memory/2820-934-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB