Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-11-2024 22:31

General

  • Target

    339450e18291913d51e65f272fbb5beecd062d633fbbcf7b53325f710d28f9f4.exe

  • Size

    666KB

  • MD5

    fc3118b147113fb44bc89f0060ca28c8

  • SHA1

    5ff4662eb7f089b319feed58ae56b0b0b6b22127

  • SHA256

    339450e18291913d51e65f272fbb5beecd062d633fbbcf7b53325f710d28f9f4

  • SHA512

    67f66df691b340617d5583a3562d3635ddfe06391a05b8d5f3fa0c0e5603d45de70778319be020065f6c24bb6a2e1d4b5c372c2d95a1d86c03253f112d8773f7

  • SSDEEP

    12288:YMrgy90OJc1I9Xu+F/s4S+H88CEnXrPrLyrOdaJIhj06YP7:YysalnnH88JXfo6hj1Yj

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\339450e18291913d51e65f272fbb5beecd062d633fbbcf7b53325f710d28f9f4.exe
    "C:\Users\Admin\AppData\Local\Temp\339450e18291913d51e65f272fbb5beecd062d633fbbcf7b53325f710d28f9f4.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3288
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vZW44.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vZW44.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3616
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dSr38.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dSr38.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1260

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vZW44.exe

    Filesize

    521KB

    MD5

    d9fe06668279ff46e7128184b68c6395

    SHA1

    62178d57765230c4474ffa73c001074bbe345ef9

    SHA256

    b12efe55cc8c424a4a44ebd81bebb4e741c62b1103ac14993aafc9567accde1b

    SHA512

    648213ad1d784a8e297051b7c5adefdcf72010bef583bd53d5c14eb70dfee4aef6b52e5bb17c4ab71d81fa9c51c063d0fa9c924678acff92566559c0002f5502

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dSr38.exe

    Filesize

    306KB

    MD5

    45f8bfc8d5eb5084fd616df3f7e055af

    SHA1

    bed0d63374a425e922b18f243c699239ba0f6bfb

    SHA256

    e36e5a2972ffa26a5453108e0385fbe371045fafb60ca0fafd0a7fe1e557a0c9

    SHA512

    0e4ae78d96fe6e89929806a7716770563cab588ce1f724abffd046b6671f8f46e78007a8d6b74c0c034f6ddaebc646359810075e2e6fdf3fa66c8e343cbba1e4

  • memory/1260-15-0x0000000000810000-0x0000000000910000-memory.dmp

    Filesize

    1024KB

  • memory/1260-16-0x0000000000690000-0x00000000006DB000-memory.dmp

    Filesize

    300KB

  • memory/1260-17-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1260-18-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/1260-19-0x0000000002640000-0x0000000002686000-memory.dmp

    Filesize

    280KB

  • memory/1260-20-0x0000000004CC0000-0x0000000005264000-memory.dmp

    Filesize

    5.6MB

  • memory/1260-21-0x0000000004B80000-0x0000000004BC4000-memory.dmp

    Filesize

    272KB

  • memory/1260-25-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/1260-31-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/1260-85-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/1260-81-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/1260-79-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/1260-77-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/1260-75-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/1260-73-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/1260-71-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/1260-69-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/1260-67-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/1260-65-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/1260-61-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/1260-59-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/1260-57-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/1260-56-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/1260-53-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/1260-51-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/1260-49-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/1260-47-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/1260-43-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/1260-41-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/1260-39-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/1260-37-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/1260-35-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/1260-33-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/1260-30-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/1260-28-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/1260-83-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/1260-63-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/1260-23-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/1260-45-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/1260-22-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/1260-928-0x0000000005370000-0x0000000005988000-memory.dmp

    Filesize

    6.1MB

  • memory/1260-929-0x0000000005990000-0x0000000005A9A000-memory.dmp

    Filesize

    1.0MB

  • memory/1260-930-0x0000000000810000-0x0000000000910000-memory.dmp

    Filesize

    1024KB

  • memory/1260-931-0x0000000005AD0000-0x0000000005AE2000-memory.dmp

    Filesize

    72KB

  • memory/1260-932-0x0000000005AF0000-0x0000000005B2C000-memory.dmp

    Filesize

    240KB

  • memory/1260-933-0x0000000005C40000-0x0000000005C8C000-memory.dmp

    Filesize

    304KB

  • memory/1260-934-0x0000000000690000-0x00000000006DB000-memory.dmp

    Filesize

    300KB

  • memory/1260-936-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB