Analysis

  • max time kernel
    113s
  • max time network
    117s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2024 22:28

General

  • Target

    71ce813ed7e44b990c9f69fe1157c0899f4912dcc99fdf4b87ea074d0b9e78ab.exe

  • Size

    6KB

  • MD5

    deb4b9e51f7c5de99e93a8043644847b

  • SHA1

    0a7b50a1adaf90db971d7d44539e9618467c0feb

  • SHA256

    71ce813ed7e44b990c9f69fe1157c0899f4912dcc99fdf4b87ea074d0b9e78ab

  • SHA512

    d3ff51a204cd97a364d08ef20f6ca64e3209c5749d6eb0b6d55bdeefdd0ab31176427de67a3ff91463b459c5ee53e4340a48301bc0751be8c9652ca1e44eab1c

  • SSDEEP

    96:cDD5/TKf21gKbv5z+jLkG5wFDnLj7K9K8OHPl5TzNtv:E5/TgSzKLkGWRnH7KTOHt51p

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

41.216.183.218:1912

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Redline family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Drops startup file 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3540
      • C:\Users\Admin\AppData\Local\Temp\71ce813ed7e44b990c9f69fe1157c0899f4912dcc99fdf4b87ea074d0b9e78ab.exe
        "C:\Users\Admin\AppData\Local\Temp\71ce813ed7e44b990c9f69fe1157c0899f4912dcc99fdf4b87ea074d0b9e78ab.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Drops startup file
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:432
      • C:\Users\Admin\AppData\Local\Temp\71ce813ed7e44b990c9f69fe1157c0899f4912dcc99fdf4b87ea074d0b9e78ab.exe
        "C:\Users\Admin\AppData\Local\Temp\71ce813ed7e44b990c9f69fe1157c0899f4912dcc99fdf4b87ea074d0b9e78ab.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:4328

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/432-0-0x0000000074FFE000-0x0000000074FFF000-memory.dmp

      Filesize

      4KB

    • memory/432-1-0x0000000000470000-0x0000000000478000-memory.dmp

      Filesize

      32KB

    • memory/432-2-0x0000000005530000-0x0000000005AD4000-memory.dmp

      Filesize

      5.6MB

    • memory/432-3-0x0000000004E70000-0x0000000004F02000-memory.dmp

      Filesize

      584KB

    • memory/432-4-0x0000000002A10000-0x0000000002A1A000-memory.dmp

      Filesize

      40KB

    • memory/432-5-0x0000000074FF0000-0x00000000757A0000-memory.dmp

      Filesize

      7.7MB

    • memory/432-6-0x0000000006A30000-0x0000000006B32000-memory.dmp

      Filesize

      1.0MB

    • memory/432-20-0x0000000006A30000-0x0000000006B2C000-memory.dmp

      Filesize

      1008KB

    • memory/432-26-0x0000000006A30000-0x0000000006B2C000-memory.dmp

      Filesize

      1008KB

    • memory/432-66-0x0000000006A30000-0x0000000006B2C000-memory.dmp

      Filesize

      1008KB

    • memory/432-70-0x0000000006A30000-0x0000000006B2C000-memory.dmp

      Filesize

      1008KB

    • memory/432-68-0x0000000006A30000-0x0000000006B2C000-memory.dmp

      Filesize

      1008KB

    • memory/432-62-0x0000000006A30000-0x0000000006B2C000-memory.dmp

      Filesize

      1008KB

    • memory/432-60-0x0000000006A30000-0x0000000006B2C000-memory.dmp

      Filesize

      1008KB

    • memory/432-58-0x0000000006A30000-0x0000000006B2C000-memory.dmp

      Filesize

      1008KB

    • memory/432-56-0x0000000006A30000-0x0000000006B2C000-memory.dmp

      Filesize

      1008KB

    • memory/432-54-0x0000000006A30000-0x0000000006B2C000-memory.dmp

      Filesize

      1008KB

    • memory/432-64-0x0000000006A30000-0x0000000006B2C000-memory.dmp

      Filesize

      1008KB

    • memory/432-52-0x0000000006A30000-0x0000000006B2C000-memory.dmp

      Filesize

      1008KB

    • memory/432-50-0x0000000006A30000-0x0000000006B2C000-memory.dmp

      Filesize

      1008KB

    • memory/432-48-0x0000000006A30000-0x0000000006B2C000-memory.dmp

      Filesize

      1008KB

    • memory/432-46-0x0000000006A30000-0x0000000006B2C000-memory.dmp

      Filesize

      1008KB

    • memory/432-42-0x0000000006A30000-0x0000000006B2C000-memory.dmp

      Filesize

      1008KB

    • memory/432-40-0x0000000006A30000-0x0000000006B2C000-memory.dmp

      Filesize

      1008KB

    • memory/432-38-0x0000000006A30000-0x0000000006B2C000-memory.dmp

      Filesize

      1008KB

    • memory/432-36-0x0000000006A30000-0x0000000006B2C000-memory.dmp

      Filesize

      1008KB

    • memory/432-34-0x0000000006A30000-0x0000000006B2C000-memory.dmp

      Filesize

      1008KB

    • memory/432-30-0x0000000006A30000-0x0000000006B2C000-memory.dmp

      Filesize

      1008KB

    • memory/432-28-0x0000000006A30000-0x0000000006B2C000-memory.dmp

      Filesize

      1008KB

    • memory/432-24-0x0000000006A30000-0x0000000006B2C000-memory.dmp

      Filesize

      1008KB

    • memory/432-22-0x0000000006A30000-0x0000000006B2C000-memory.dmp

      Filesize

      1008KB

    • memory/432-18-0x0000000006A30000-0x0000000006B2C000-memory.dmp

      Filesize

      1008KB

    • memory/432-16-0x0000000006A30000-0x0000000006B2C000-memory.dmp

      Filesize

      1008KB

    • memory/432-14-0x0000000006A30000-0x0000000006B2C000-memory.dmp

      Filesize

      1008KB

    • memory/432-12-0x0000000006A30000-0x0000000006B2C000-memory.dmp

      Filesize

      1008KB

    • memory/432-10-0x0000000006A30000-0x0000000006B2C000-memory.dmp

      Filesize

      1008KB

    • memory/432-8-0x0000000006A30000-0x0000000006B2C000-memory.dmp

      Filesize

      1008KB

    • memory/432-44-0x0000000006A30000-0x0000000006B2C000-memory.dmp

      Filesize

      1008KB

    • memory/432-32-0x0000000006A30000-0x0000000006B2C000-memory.dmp

      Filesize

      1008KB

    • memory/432-7-0x0000000006A30000-0x0000000006B2C000-memory.dmp

      Filesize

      1008KB

    • memory/432-1183-0x0000000074FF0000-0x00000000757A0000-memory.dmp

      Filesize

      7.7MB

    • memory/432-1184-0x0000000006C50000-0x0000000006CC2000-memory.dmp

      Filesize

      456KB

    • memory/432-1185-0x0000000006CC0000-0x0000000006D0C000-memory.dmp

      Filesize

      304KB

    • memory/432-1186-0x0000000006E80000-0x0000000006ED4000-memory.dmp

      Filesize

      336KB

    • memory/432-1192-0x0000000074FF0000-0x00000000757A0000-memory.dmp

      Filesize

      7.7MB

    • memory/432-1196-0x0000000074FF0000-0x00000000757A0000-memory.dmp

      Filesize

      7.7MB

    • memory/432-1197-0x0000000074FF0000-0x00000000757A0000-memory.dmp

      Filesize

      7.7MB

    • memory/432-1194-0x0000000074FF0000-0x00000000757A0000-memory.dmp

      Filesize

      7.7MB

    • memory/4328-1198-0x0000000074FF0000-0x00000000757A0000-memory.dmp

      Filesize

      7.7MB

    • memory/4328-1199-0x0000000000360000-0x00000000003B2000-memory.dmp

      Filesize

      328KB

    • memory/4328-1200-0x0000000074FF0000-0x00000000757A0000-memory.dmp

      Filesize

      7.7MB

    • memory/4328-1201-0x0000000005C80000-0x0000000006298000-memory.dmp

      Filesize

      6.1MB

    • memory/4328-1202-0x0000000004F20000-0x000000000502A000-memory.dmp

      Filesize

      1.0MB

    • memory/4328-1203-0x0000000004E50000-0x0000000004E62000-memory.dmp

      Filesize

      72KB

    • memory/4328-1204-0x0000000004EB0000-0x0000000004EEC000-memory.dmp

      Filesize

      240KB

    • memory/4328-1205-0x0000000005030000-0x000000000507C000-memory.dmp

      Filesize

      304KB

    • memory/4328-1206-0x0000000074FF0000-0x00000000757A0000-memory.dmp

      Filesize

      7.7MB