Analysis

  • max time kernel
    300s
  • max time network
    304s
  • platform
    windows10-1703_x64
  • resource
    win10-20220722-en
  • resource tags

    arch:x64arch:x86image:win10-20220722-enlocale:en-usos:windows10-1703-x64system
  • submitted
    30/07/2022, 22:15

General

  • Target

    8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5.exe

  • Size

    1.7MB

  • MD5

    44df72212127215eff6b18cc9f250971

  • SHA1

    497cfce96217cfbbd6fcd14d9af6b6114eaecd9f

  • SHA256

    8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5

  • SHA512

    9213bcbf112e1a4ceb584292d8d86005f636b071b154ab7cee90745965e148d7e145d22d21cd15b8431a48c8c9d2b310b5ab04c06fc2a75289d020a3d1a4a03e

Malware Config

Extracted

Family

redline

C2

185.186.142.127:6737

193.106.191.160:8673

194.93.2.28:21390

Attributes
  • auth_value

    1fce8029e8fab4e62b767b33e52bdb9e

Extracted

Family

redline

Botnet

@moriwWs

C2

neredenkyor.xyz:81

Attributes
  • auth_value

    c2f987b4e6cd55ad1315311e92563eca

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 6 IoCs
  • YTStealer

    YTStealer is a malware designed to steal YouTube authentication cookies.

  • YTStealer payload 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5.exe
    "C:\Users\Admin\AppData\Local\Temp\8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2764
    • C:\Users\Admin\AppData\Local\Temp\v.exe
      "C:\Users\Admin\AppData\Local\Temp\v.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2200
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:570164
    • C:\Users\Admin\AppData\Local\Temp\r.exe
      "C:\Users\Admin\AppData\Local\Temp\r.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4308
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:415668
    • C:\Users\Admin\AppData\Local\Temp\g.exe
      "C:\Users\Admin\AppData\Local\Temp\g.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:17088
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:602124
        • C:\Users\Admin\AppData\Roaming\yu.exe
          "C:\Users\Admin\AppData\Roaming\yu.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:433388
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Roaming\yu.exe
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:433584
            • C:\Windows\system32\choice.exe
              choice /C Y /N /D Y /T 0
              6⤵
                PID:433624
      • C:\Users\Admin\AppData\Local\Temp\x.exe
        "C:\Users\Admin\AppData\Local\Temp\x.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:95284
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          3⤵
            PID:94044

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

        Filesize

        2KB

        MD5

        f1f571b5cae6f0da7dab6b846f962fc1

        SHA1

        b4d9048f0f1f5127cbb2f1f28af35d4e513bc27a

        SHA256

        4f155f840c9de45e68f78f6008c209020d731b339d3636440163b9917af3f897

        SHA512

        fb3e5dbf9db5784d49cec03dca6bcb179e149967bc24ca6520096218a6c9950d4ac71e1a4a6d8e67f1c08a0f20a2d22e3dd5346f4ecc9bcc2df0337cb0ca00b9

      • C:\Users\Admin\AppData\Local\Temp\g.exe

        Filesize

        1.4MB

        MD5

        c2fb7cd0cd6ed34e9ecebec33e4b2977

        SHA1

        ba46fecd84c4b138f3cbe6074539f2ca95ab9e36

        SHA256

        83ac1f2ae2aed80455750c99992559f009ba2bcf450d21d7fd74b52c4149de71

        SHA512

        d7bf5d2b68304a7c2076e4d60d1fd772a617a25eadbc255920f6f64001edf053dca8fd948326ce1b99b3facef000493867c4c8743d350ad48dec2b8cf6adb551

      • C:\Users\Admin\AppData\Local\Temp\g.exe

        Filesize

        1.4MB

        MD5

        c2fb7cd0cd6ed34e9ecebec33e4b2977

        SHA1

        ba46fecd84c4b138f3cbe6074539f2ca95ab9e36

        SHA256

        83ac1f2ae2aed80455750c99992559f009ba2bcf450d21d7fd74b52c4149de71

        SHA512

        d7bf5d2b68304a7c2076e4d60d1fd772a617a25eadbc255920f6f64001edf053dca8fd948326ce1b99b3facef000493867c4c8743d350ad48dec2b8cf6adb551

      • C:\Users\Admin\AppData\Local\Temp\r.exe

        Filesize

        2.4MB

        MD5

        f9553db053dc46b78d5df4250b7eb856

        SHA1

        5746f285f9ded98b81c653afd13167d117f503a0

        SHA256

        797087014be1f103e61780d6061c0fc34ce5e899158d924221523d6d372ee5fb

        SHA512

        da388a8aab24924b9b4d7a86cf4496e9159c1f5ca6e15d0fed61d73ca381ea19b2b8a3830f9812ce54b634cd0b15b24eaf13e23018ba8cb6be72b9e7205f011f

      • C:\Users\Admin\AppData\Local\Temp\r.exe

        Filesize

        2.4MB

        MD5

        f9553db053dc46b78d5df4250b7eb856

        SHA1

        5746f285f9ded98b81c653afd13167d117f503a0

        SHA256

        797087014be1f103e61780d6061c0fc34ce5e899158d924221523d6d372ee5fb

        SHA512

        da388a8aab24924b9b4d7a86cf4496e9159c1f5ca6e15d0fed61d73ca381ea19b2b8a3830f9812ce54b634cd0b15b24eaf13e23018ba8cb6be72b9e7205f011f

      • C:\Users\Admin\AppData\Local\Temp\v.exe

        Filesize

        1.3MB

        MD5

        82b89beccee5a94ed7b5e658378a2ab9

        SHA1

        0bfb7aa1c4186278b202e0d2fae5a5374a563454

        SHA256

        27647e78a83d0ec40696f05d8d8cfbafbcfb778c9301c368991320a0e9c12428

        SHA512

        a5b990dd74f4ab39a5465f515dde824da0f2fc43121c51b7469c29d49d5a439c74353a3e18c1015092615e5eb2c0cf21ead43930ce71a2359ed40442ca7e38ee

      • C:\Users\Admin\AppData\Local\Temp\v.exe

        Filesize

        1.3MB

        MD5

        82b89beccee5a94ed7b5e658378a2ab9

        SHA1

        0bfb7aa1c4186278b202e0d2fae5a5374a563454

        SHA256

        27647e78a83d0ec40696f05d8d8cfbafbcfb778c9301c368991320a0e9c12428

        SHA512

        a5b990dd74f4ab39a5465f515dde824da0f2fc43121c51b7469c29d49d5a439c74353a3e18c1015092615e5eb2c0cf21ead43930ce71a2359ed40442ca7e38ee

      • C:\Users\Admin\AppData\Local\Temp\x.exe

        Filesize

        2.5MB

        MD5

        40badae91f0c7250d2c230f4d3ca2266

        SHA1

        eeec6634aa7ea776d76cf5f0b904e31a64caf05c

        SHA256

        5a5db1b91bfbd2b4ce79745651bfaa120bcf4d0c6cc1aeccfbae852df176c3f7

        SHA512

        3ba66cb90347ffe28b35fe775203af9b9e1c66c612a0cf12bb9d029d79f863e153d9fbb9020a7299f54567b6003b0cd680759a9cb64409509ddf1b49804c99e9

      • C:\Users\Admin\AppData\Local\Temp\x.exe

        Filesize

        2.5MB

        MD5

        40badae91f0c7250d2c230f4d3ca2266

        SHA1

        eeec6634aa7ea776d76cf5f0b904e31a64caf05c

        SHA256

        5a5db1b91bfbd2b4ce79745651bfaa120bcf4d0c6cc1aeccfbae852df176c3f7

        SHA512

        3ba66cb90347ffe28b35fe775203af9b9e1c66c612a0cf12bb9d029d79f863e153d9fbb9020a7299f54567b6003b0cd680759a9cb64409509ddf1b49804c99e9

      • C:\Users\Admin\AppData\Roaming\yu.exe

        Filesize

        4.0MB

        MD5

        da70d0aab8cad0887e5e9b5174c9d87d

        SHA1

        af5096c0b9fd4f4926850c4479c8e0e0eac8c91b

        SHA256

        6617c1ab08b88711538b600fc4c5cf76098088b436185f5590cdb0e1fc1f6b13

        SHA512

        c100a08bccfa00dcf93160b6174940db1b6839aafbbaec8caa25c4c0e004c96aebf243552df85b7dff56915401bfcb0ecb9caa9bce2edf0d29a9b52c849ebcc5

      • C:\Users\Admin\AppData\Roaming\yu.exe

        Filesize

        4.0MB

        MD5

        da70d0aab8cad0887e5e9b5174c9d87d

        SHA1

        af5096c0b9fd4f4926850c4479c8e0e0eac8c91b

        SHA256

        6617c1ab08b88711538b600fc4c5cf76098088b436185f5590cdb0e1fc1f6b13

        SHA512

        c100a08bccfa00dcf93160b6174940db1b6839aafbbaec8caa25c4c0e004c96aebf243552df85b7dff56915401bfcb0ecb9caa9bce2edf0d29a9b52c849ebcc5

      • memory/2200-192-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2200-191-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2200-188-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2200-190-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2200-185-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2200-187-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-179-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-189-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-147-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-148-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-149-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-150-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-151-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-152-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-153-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-154-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-155-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-156-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-157-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-158-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-159-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-160-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-162-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-161-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-163-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-164-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-165-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-166-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-167-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-168-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-169-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-170-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-171-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-172-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-173-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-174-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-175-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-176-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-177-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-178-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-127-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-180-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-181-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-182-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-145-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-144-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-186-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-143-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-142-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-146-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-141-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-140-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-139-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-138-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-137-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-128-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-136-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-135-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-129-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-134-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-133-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-130-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-132-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/2764-131-0x0000000077630000-0x00000000777BE000-memory.dmp

        Filesize

        1.6MB

      • memory/94044-393-0x0000000000590000-0x00000000005AE000-memory.dmp

        Filesize

        120KB

      • memory/415668-1300-0x000000000C190000-0x000000000C1E0000-memory.dmp

        Filesize

        320KB

      • memory/415668-484-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/433388-1749-0x00000000011C0000-0x0000000001F98000-memory.dmp

        Filesize

        13.8MB

      • memory/433388-1741-0x00000000011C0000-0x0000000001F98000-memory.dmp

        Filesize

        13.8MB

      • memory/570164-429-0x0000000009720000-0x000000000975E000-memory.dmp

        Filesize

        248KB

      • memory/570164-337-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/570164-550-0x000000000A7D0000-0x000000000ACCE000-memory.dmp

        Filesize

        5.0MB

      • memory/570164-415-0x00000000096C0000-0x00000000096D2000-memory.dmp

        Filesize

        72KB

      • memory/570164-1115-0x000000000B2A0000-0x000000000B462000-memory.dmp

        Filesize

        1.8MB

      • memory/570164-1116-0x000000000B9A0000-0x000000000BECC000-memory.dmp

        Filesize

        5.2MB

      • memory/602124-413-0x0000000009A60000-0x000000000A066000-memory.dmp

        Filesize

        6.0MB

      • memory/602124-572-0x000000000A1E0000-0x000000000A246000-memory.dmp

        Filesize

        408KB

      • memory/602124-565-0x00000000097D0000-0x00000000097EE000-memory.dmp

        Filesize

        120KB

      • memory/602124-549-0x00000000096F0000-0x0000000009782000-memory.dmp

        Filesize

        584KB

      • memory/602124-543-0x0000000009670000-0x00000000096E6000-memory.dmp

        Filesize

        472KB

      • memory/602124-449-0x0000000005510000-0x000000000555B000-memory.dmp

        Filesize

        300KB

      • memory/602124-418-0x0000000009560000-0x000000000966A000-memory.dmp

        Filesize

        1.0MB

      • memory/602124-354-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB