Analysis

  • max time kernel
    111s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-11-2024 06:49

General

  • Target

    63c71776b7cf0ed1c5a4a62af775c5e012c9dcdfb06304952486c671a0b3ad07N.exe

  • Size

    582KB

  • MD5

    ba6cbff5944c4491c9e1014b88f83c0b

  • SHA1

    f5d41af486c65d12c5ec1d1adfce921a34c471cf

  • SHA256

    29453d1637476037fa13266e6a13b18149b80919ff892a15336bcb728568e79e

  • SHA512

    45de05f8209d528bbbcdd8be0d056fb0cbbb0b07f7fd0611f2d7eb27191d7f6c708845b32327996319305a5a43e1f632cde03c8272350efb9c2e49459927f3a5

  • SSDEEP

    12288:7Mr7y90WfaaVSGEgQkpRL/8/uqPXgJqrtE:oyFVigtRLk/u0XPJE

Malware Config

Extracted

Family

redline

Botnet

ronam

C2

193.233.20.17:4139

Attributes
  • auth_value

    125421d19d14dd7fd211bc7f6d4aea6c

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\63c71776b7cf0ed1c5a4a62af775c5e012c9dcdfb06304952486c671a0b3ad07N.exe
    "C:\Users\Admin\AppData\Local\Temp\63c71776b7cf0ed1c5a4a62af775c5e012c9dcdfb06304952486c671a0b3ad07N.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4408
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nyg83lN66.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nyg83lN66.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5024
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eAD13Dl.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eAD13Dl.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nyg83lN66.exe

    Filesize

    437KB

    MD5

    733f23218e42eb3e9debb84677a5a8b5

    SHA1

    d656f1477ac2a2207d5b7abb2b803791b7612b13

    SHA256

    bd6923ed5005c1edbe918e037db0bca5aa313c8c6eb6d09f75fe8ad8730246f8

    SHA512

    f1758be4cc39c305a6c449bd440ea8eb866829a7572953de9a1adbca9135a1d9840b019aac35c41634c644b3d22abc54852872fea7bc719133226f7741042f7b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eAD13Dl.exe

    Filesize

    311KB

    MD5

    4bfdf9d989b41e197aff889080aa38f3

    SHA1

    d0e435c2baf1d9098b15efb642e9534583bbc063

    SHA256

    c0bfbc038e56436fa43f3d42253f0668a8cb23dea8856aae3afd99154737afe1

    SHA512

    50ea99f870b96b694798431753eb9695ac5a4f4011e7cd560d98e94a2941de887101bb0b59aba018a85b28bb259b9cc8fde1d7e4595ab07c1dfdff0c6a2c811b

  • memory/964-15-0x00000000007B0000-0x00000000008B0000-memory.dmp

    Filesize

    1024KB

  • memory/964-16-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/964-17-0x0000000000400000-0x0000000000583000-memory.dmp

    Filesize

    1.5MB

  • memory/964-18-0x0000000000400000-0x0000000000583000-memory.dmp

    Filesize

    1.5MB

  • memory/964-19-0x0000000002790000-0x00000000027D6000-memory.dmp

    Filesize

    280KB

  • memory/964-20-0x0000000004D80000-0x0000000005324000-memory.dmp

    Filesize

    5.6MB

  • memory/964-21-0x0000000002840000-0x0000000002884000-memory.dmp

    Filesize

    272KB

  • memory/964-85-0x0000000002840000-0x000000000287E000-memory.dmp

    Filesize

    248KB

  • memory/964-83-0x0000000002840000-0x000000000287E000-memory.dmp

    Filesize

    248KB

  • memory/964-81-0x0000000002840000-0x000000000287E000-memory.dmp

    Filesize

    248KB

  • memory/964-80-0x0000000002840000-0x000000000287E000-memory.dmp

    Filesize

    248KB

  • memory/964-77-0x0000000002840000-0x000000000287E000-memory.dmp

    Filesize

    248KB

  • memory/964-75-0x0000000002840000-0x000000000287E000-memory.dmp

    Filesize

    248KB

  • memory/964-74-0x0000000002840000-0x000000000287E000-memory.dmp

    Filesize

    248KB

  • memory/964-69-0x0000000002840000-0x000000000287E000-memory.dmp

    Filesize

    248KB

  • memory/964-67-0x0000000002840000-0x000000000287E000-memory.dmp

    Filesize

    248KB

  • memory/964-65-0x0000000002840000-0x000000000287E000-memory.dmp

    Filesize

    248KB

  • memory/964-63-0x0000000002840000-0x000000000287E000-memory.dmp

    Filesize

    248KB

  • memory/964-61-0x0000000002840000-0x000000000287E000-memory.dmp

    Filesize

    248KB

  • memory/964-59-0x0000000002840000-0x000000000287E000-memory.dmp

    Filesize

    248KB

  • memory/964-57-0x0000000002840000-0x000000000287E000-memory.dmp

    Filesize

    248KB

  • memory/964-55-0x0000000002840000-0x000000000287E000-memory.dmp

    Filesize

    248KB

  • memory/964-51-0x0000000002840000-0x000000000287E000-memory.dmp

    Filesize

    248KB

  • memory/964-49-0x0000000002840000-0x000000000287E000-memory.dmp

    Filesize

    248KB

  • memory/964-47-0x0000000002840000-0x000000000287E000-memory.dmp

    Filesize

    248KB

  • memory/964-45-0x0000000002840000-0x000000000287E000-memory.dmp

    Filesize

    248KB

  • memory/964-43-0x0000000002840000-0x000000000287E000-memory.dmp

    Filesize

    248KB

  • memory/964-41-0x0000000002840000-0x000000000287E000-memory.dmp

    Filesize

    248KB

  • memory/964-39-0x0000000002840000-0x000000000287E000-memory.dmp

    Filesize

    248KB

  • memory/964-37-0x0000000002840000-0x000000000287E000-memory.dmp

    Filesize

    248KB

  • memory/964-33-0x0000000002840000-0x000000000287E000-memory.dmp

    Filesize

    248KB

  • memory/964-31-0x0000000002840000-0x000000000287E000-memory.dmp

    Filesize

    248KB

  • memory/964-29-0x0000000002840000-0x000000000287E000-memory.dmp

    Filesize

    248KB

  • memory/964-27-0x0000000002840000-0x000000000287E000-memory.dmp

    Filesize

    248KB

  • memory/964-25-0x0000000002840000-0x000000000287E000-memory.dmp

    Filesize

    248KB

  • memory/964-71-0x0000000002840000-0x000000000287E000-memory.dmp

    Filesize

    248KB

  • memory/964-53-0x0000000002840000-0x000000000287E000-memory.dmp

    Filesize

    248KB

  • memory/964-35-0x0000000002840000-0x000000000287E000-memory.dmp

    Filesize

    248KB

  • memory/964-23-0x0000000002840000-0x000000000287E000-memory.dmp

    Filesize

    248KB

  • memory/964-22-0x0000000002840000-0x000000000287E000-memory.dmp

    Filesize

    248KB

  • memory/964-928-0x0000000005330000-0x0000000005948000-memory.dmp

    Filesize

    6.1MB

  • memory/964-929-0x0000000005950000-0x0000000005A5A000-memory.dmp

    Filesize

    1.0MB

  • memory/964-930-0x0000000002970000-0x0000000002982000-memory.dmp

    Filesize

    72KB

  • memory/964-931-0x0000000002990000-0x00000000029CC000-memory.dmp

    Filesize

    240KB

  • memory/964-932-0x00000000029E0000-0x0000000002A2C000-memory.dmp

    Filesize

    304KB

  • memory/964-933-0x00000000007B0000-0x00000000008B0000-memory.dmp

    Filesize

    1024KB

  • memory/964-934-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB