Analysis

  • max time kernel
    111s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-11-2024 08:53

General

  • Target

    acaa219c50d214e0d5a4de3c82dfc3d2aa64c6971f2fd31002c145539003a4c9.exe

  • Size

    446KB

  • MD5

    46612847c9f7b336dae350c651753771

  • SHA1

    b74f5a90f35673b68d943cfc42c74b359cf0b371

  • SHA256

    acaa219c50d214e0d5a4de3c82dfc3d2aa64c6971f2fd31002c145539003a4c9

  • SHA512

    9b706c903d1c3c5ec0998ce27f29b6ec224a4f12ebc9fda63a77ffcf52657be8c32b550c1139e0acc81331ac752f39d1d6aeef0a192d20b63550e8b8d1dbfbd3

  • SSDEEP

    12288:+Mr3y90lhTwaqZb+5i3NtInynUmpeMGQAv:xyKpgt+5i3/IynUmpecAv

Malware Config

Extracted

Family

redline

Botnet

ronam

C2

193.233.20.17:4139

Attributes
  • auth_value

    125421d19d14dd7fd211bc7f6d4aea6c

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\acaa219c50d214e0d5a4de3c82dfc3d2aa64c6971f2fd31002c145539003a4c9.exe
    "C:\Users\Admin\AppData\Local\Temp\acaa219c50d214e0d5a4de3c82dfc3d2aa64c6971f2fd31002c145539003a4c9.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4432
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\eBQ36jb.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\eBQ36jb.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:1196

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\eBQ36jb.exe

    Filesize

    329KB

    MD5

    f8a8a9163c847a2144670680479a771f

    SHA1

    e0f0cde7f67b18eb48bb253171508b1b3e39c172

    SHA256

    def50e848f25c94a89584f91d99c89791531b1371baf1e6c5f74e9c4e81df673

    SHA512

    1ebe59ce59652bc34e25ea90f1fce93a5fda9924c716712873840c5996cc535f6db212606cba74b2dc59c42a8ccfcb47d9d001bbfad4b9213552d8e502dfff35

  • memory/1196-8-0x00000000007A0000-0x00000000008A0000-memory.dmp

    Filesize

    1024KB

  • memory/1196-10-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1196-9-0x0000000002140000-0x000000000218B000-memory.dmp

    Filesize

    300KB

  • memory/1196-11-0x0000000000400000-0x0000000000633000-memory.dmp

    Filesize

    2.2MB

  • memory/1196-12-0x0000000004BA0000-0x0000000004BE6000-memory.dmp

    Filesize

    280KB

  • memory/1196-13-0x0000000004C30000-0x00000000051D4000-memory.dmp

    Filesize

    5.6MB

  • memory/1196-14-0x00000000051E0000-0x0000000005224000-memory.dmp

    Filesize

    272KB

  • memory/1196-66-0x00000000051E0000-0x000000000521E000-memory.dmp

    Filesize

    248KB

  • memory/1196-78-0x00000000051E0000-0x000000000521E000-memory.dmp

    Filesize

    248KB

  • memory/1196-76-0x00000000051E0000-0x000000000521E000-memory.dmp

    Filesize

    248KB

  • memory/1196-74-0x00000000051E0000-0x000000000521E000-memory.dmp

    Filesize

    248KB

  • memory/1196-72-0x00000000051E0000-0x000000000521E000-memory.dmp

    Filesize

    248KB

  • memory/1196-70-0x00000000051E0000-0x000000000521E000-memory.dmp

    Filesize

    248KB

  • memory/1196-68-0x00000000051E0000-0x000000000521E000-memory.dmp

    Filesize

    248KB

  • memory/1196-64-0x00000000051E0000-0x000000000521E000-memory.dmp

    Filesize

    248KB

  • memory/1196-62-0x00000000051E0000-0x000000000521E000-memory.dmp

    Filesize

    248KB

  • memory/1196-61-0x00000000051E0000-0x000000000521E000-memory.dmp

    Filesize

    248KB

  • memory/1196-58-0x00000000051E0000-0x000000000521E000-memory.dmp

    Filesize

    248KB

  • memory/1196-56-0x00000000051E0000-0x000000000521E000-memory.dmp

    Filesize

    248KB

  • memory/1196-54-0x00000000051E0000-0x000000000521E000-memory.dmp

    Filesize

    248KB

  • memory/1196-52-0x00000000051E0000-0x000000000521E000-memory.dmp

    Filesize

    248KB

  • memory/1196-50-0x00000000051E0000-0x000000000521E000-memory.dmp

    Filesize

    248KB

  • memory/1196-48-0x00000000051E0000-0x000000000521E000-memory.dmp

    Filesize

    248KB

  • memory/1196-46-0x00000000051E0000-0x000000000521E000-memory.dmp

    Filesize

    248KB

  • memory/1196-42-0x00000000051E0000-0x000000000521E000-memory.dmp

    Filesize

    248KB

  • memory/1196-40-0x00000000051E0000-0x000000000521E000-memory.dmp

    Filesize

    248KB

  • memory/1196-38-0x00000000051E0000-0x000000000521E000-memory.dmp

    Filesize

    248KB

  • memory/1196-36-0x00000000051E0000-0x000000000521E000-memory.dmp

    Filesize

    248KB

  • memory/1196-34-0x00000000051E0000-0x000000000521E000-memory.dmp

    Filesize

    248KB

  • memory/1196-32-0x00000000051E0000-0x000000000521E000-memory.dmp

    Filesize

    248KB

  • memory/1196-30-0x00000000051E0000-0x000000000521E000-memory.dmp

    Filesize

    248KB

  • memory/1196-26-0x00000000051E0000-0x000000000521E000-memory.dmp

    Filesize

    248KB

  • memory/1196-24-0x00000000051E0000-0x000000000521E000-memory.dmp

    Filesize

    248KB

  • memory/1196-22-0x00000000051E0000-0x000000000521E000-memory.dmp

    Filesize

    248KB

  • memory/1196-20-0x00000000051E0000-0x000000000521E000-memory.dmp

    Filesize

    248KB

  • memory/1196-44-0x00000000051E0000-0x000000000521E000-memory.dmp

    Filesize

    248KB

  • memory/1196-28-0x00000000051E0000-0x000000000521E000-memory.dmp

    Filesize

    248KB

  • memory/1196-18-0x00000000051E0000-0x000000000521E000-memory.dmp

    Filesize

    248KB

  • memory/1196-16-0x00000000051E0000-0x000000000521E000-memory.dmp

    Filesize

    248KB

  • memory/1196-15-0x00000000051E0000-0x000000000521E000-memory.dmp

    Filesize

    248KB

  • memory/1196-921-0x00000000053A0000-0x00000000059B8000-memory.dmp

    Filesize

    6.1MB

  • memory/1196-922-0x0000000005A40000-0x0000000005B4A000-memory.dmp

    Filesize

    1.0MB

  • memory/1196-923-0x0000000005B80000-0x0000000005B92000-memory.dmp

    Filesize

    72KB

  • memory/1196-924-0x0000000005BA0000-0x0000000005BDC000-memory.dmp

    Filesize

    240KB

  • memory/1196-925-0x0000000005CF0000-0x0000000005D3C000-memory.dmp

    Filesize

    304KB

  • memory/1196-926-0x00000000007A0000-0x00000000008A0000-memory.dmp

    Filesize

    1024KB

  • memory/1196-927-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB