Analysis

  • max time kernel
    282s
  • max time network
    298s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    30/07/2022, 22:15

General

  • Target

    fbcd45b47c28ba4275e76079c58ce6d36386d0600d102ca29628973116a340d9.exe

  • Size

    2.9MB

  • MD5

    aaa3dbcc297ef4ff7329d42440509fdc

  • SHA1

    30a8c945583ad1e7b1f8ce0b79ca42e11ea13cd2

  • SHA256

    fbcd45b47c28ba4275e76079c58ce6d36386d0600d102ca29628973116a340d9

  • SHA512

    2bb68efba4372294633a59d6720b87983d12bf1092dd21feb6eb8667b223cf114fa31346ec131746b92d9591202cf4934b5a0e3f8230119678d7309a0936c208

Malware Config

Extracted

Family

redline

C2

193.106.191.160:8673

194.93.2.28:21390

185.186.142.127:6737

Attributes
  • auth_value

    a92e5e3459b5f1ea8a76ec4f05c50c1e

Extracted

Family

redline

Botnet

@moriwWs

C2

neredenkyor.xyz:81

Attributes
  • auth_value

    c2f987b4e6cd55ad1315311e92563eca

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 12 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 9 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fbcd45b47c28ba4275e76079c58ce6d36386d0600d102ca29628973116a340d9.exe
    "C:\Users\Admin\AppData\Local\Temp\fbcd45b47c28ba4275e76079c58ce6d36386d0600d102ca29628973116a340d9.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1392
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Process -FilePath C:\Users\Admin\AppData\Local\Temp\54741.exe
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1744
      • C:\Users\Admin\AppData\Local\Temp\54741.exe
        "C:\Users\Admin\AppData\Local\Temp\54741.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2016
        • C:\Users\Admin\AppData\Local\Temp\v.exe
          "C:\Users\Admin\AppData\Local\Temp\v.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:972
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:610776
        • C:\Users\Admin\AppData\Local\Temp\r.exe
          "C:\Users\Admin\AppData\Local\Temp\r.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:14812
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:717024
        • C:\Users\Admin\AppData\Local\Temp\g.exe
          "C:\Users\Admin\AppData\Local\Temp\g.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:37820
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:743764
        • C:\Users\Admin\AppData\Local\Temp\x.exe
          "C:\Users\Admin\AppData\Local\Temp\x.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:95864
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
              PID:723892

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\54741.exe

      Filesize

      1.7MB

      MD5

      fc50da6d7611c0388542345af32164ea

      SHA1

      38a940871565a966749508eb2dd746ce2b5adb09

      SHA256

      32eda0605fb448ee351e12fcb06cc14a45a8d3a1d5c0cbd68c16bdd993873b24

      SHA512

      dbef20f58feeba7e4503fd0594908b723df7790342414cf076c77a4d84281a8af4a88e65feafd76d7a4836f3092d76708a87f8ab021df7e0dce1d3249aaea764

    • C:\Users\Admin\AppData\Local\Temp\54741.exe

      Filesize

      1.7MB

      MD5

      fc50da6d7611c0388542345af32164ea

      SHA1

      38a940871565a966749508eb2dd746ce2b5adb09

      SHA256

      32eda0605fb448ee351e12fcb06cc14a45a8d3a1d5c0cbd68c16bdd993873b24

      SHA512

      dbef20f58feeba7e4503fd0594908b723df7790342414cf076c77a4d84281a8af4a88e65feafd76d7a4836f3092d76708a87f8ab021df7e0dce1d3249aaea764

    • C:\Users\Admin\AppData\Local\Temp\g.exe

      Filesize

      1.4MB

      MD5

      c2fb7cd0cd6ed34e9ecebec33e4b2977

      SHA1

      ba46fecd84c4b138f3cbe6074539f2ca95ab9e36

      SHA256

      83ac1f2ae2aed80455750c99992559f009ba2bcf450d21d7fd74b52c4149de71

      SHA512

      d7bf5d2b68304a7c2076e4d60d1fd772a617a25eadbc255920f6f64001edf053dca8fd948326ce1b99b3facef000493867c4c8743d350ad48dec2b8cf6adb551

    • C:\Users\Admin\AppData\Local\Temp\r.exe

      Filesize

      2.4MB

      MD5

      f9553db053dc46b78d5df4250b7eb856

      SHA1

      5746f285f9ded98b81c653afd13167d117f503a0

      SHA256

      797087014be1f103e61780d6061c0fc34ce5e899158d924221523d6d372ee5fb

      SHA512

      da388a8aab24924b9b4d7a86cf4496e9159c1f5ca6e15d0fed61d73ca381ea19b2b8a3830f9812ce54b634cd0b15b24eaf13e23018ba8cb6be72b9e7205f011f

    • C:\Users\Admin\AppData\Local\Temp\v.exe

      Filesize

      1.3MB

      MD5

      82b89beccee5a94ed7b5e658378a2ab9

      SHA1

      0bfb7aa1c4186278b202e0d2fae5a5374a563454

      SHA256

      27647e78a83d0ec40696f05d8d8cfbafbcfb778c9301c368991320a0e9c12428

      SHA512

      a5b990dd74f4ab39a5465f515dde824da0f2fc43121c51b7469c29d49d5a439c74353a3e18c1015092615e5eb2c0cf21ead43930ce71a2359ed40442ca7e38ee

    • C:\Users\Admin\AppData\Local\Temp\x.exe

      Filesize

      2.5MB

      MD5

      40badae91f0c7250d2c230f4d3ca2266

      SHA1

      eeec6634aa7ea776d76cf5f0b904e31a64caf05c

      SHA256

      5a5db1b91bfbd2b4ce79745651bfaa120bcf4d0c6cc1aeccfbae852df176c3f7

      SHA512

      3ba66cb90347ffe28b35fe775203af9b9e1c66c612a0cf12bb9d029d79f863e153d9fbb9020a7299f54567b6003b0cd680759a9cb64409509ddf1b49804c99e9

    • \Users\Admin\AppData\Local\Temp\54741.exe

      Filesize

      1.7MB

      MD5

      fc50da6d7611c0388542345af32164ea

      SHA1

      38a940871565a966749508eb2dd746ce2b5adb09

      SHA256

      32eda0605fb448ee351e12fcb06cc14a45a8d3a1d5c0cbd68c16bdd993873b24

      SHA512

      dbef20f58feeba7e4503fd0594908b723df7790342414cf076c77a4d84281a8af4a88e65feafd76d7a4836f3092d76708a87f8ab021df7e0dce1d3249aaea764

    • \Users\Admin\AppData\Local\Temp\g.exe

      Filesize

      1.4MB

      MD5

      c2fb7cd0cd6ed34e9ecebec33e4b2977

      SHA1

      ba46fecd84c4b138f3cbe6074539f2ca95ab9e36

      SHA256

      83ac1f2ae2aed80455750c99992559f009ba2bcf450d21d7fd74b52c4149de71

      SHA512

      d7bf5d2b68304a7c2076e4d60d1fd772a617a25eadbc255920f6f64001edf053dca8fd948326ce1b99b3facef000493867c4c8743d350ad48dec2b8cf6adb551

    • \Users\Admin\AppData\Local\Temp\g.exe

      Filesize

      1.4MB

      MD5

      c2fb7cd0cd6ed34e9ecebec33e4b2977

      SHA1

      ba46fecd84c4b138f3cbe6074539f2ca95ab9e36

      SHA256

      83ac1f2ae2aed80455750c99992559f009ba2bcf450d21d7fd74b52c4149de71

      SHA512

      d7bf5d2b68304a7c2076e4d60d1fd772a617a25eadbc255920f6f64001edf053dca8fd948326ce1b99b3facef000493867c4c8743d350ad48dec2b8cf6adb551

    • \Users\Admin\AppData\Local\Temp\r.exe

      Filesize

      2.4MB

      MD5

      f9553db053dc46b78d5df4250b7eb856

      SHA1

      5746f285f9ded98b81c653afd13167d117f503a0

      SHA256

      797087014be1f103e61780d6061c0fc34ce5e899158d924221523d6d372ee5fb

      SHA512

      da388a8aab24924b9b4d7a86cf4496e9159c1f5ca6e15d0fed61d73ca381ea19b2b8a3830f9812ce54b634cd0b15b24eaf13e23018ba8cb6be72b9e7205f011f

    • \Users\Admin\AppData\Local\Temp\r.exe

      Filesize

      2.4MB

      MD5

      f9553db053dc46b78d5df4250b7eb856

      SHA1

      5746f285f9ded98b81c653afd13167d117f503a0

      SHA256

      797087014be1f103e61780d6061c0fc34ce5e899158d924221523d6d372ee5fb

      SHA512

      da388a8aab24924b9b4d7a86cf4496e9159c1f5ca6e15d0fed61d73ca381ea19b2b8a3830f9812ce54b634cd0b15b24eaf13e23018ba8cb6be72b9e7205f011f

    • \Users\Admin\AppData\Local\Temp\v.exe

      Filesize

      1.3MB

      MD5

      82b89beccee5a94ed7b5e658378a2ab9

      SHA1

      0bfb7aa1c4186278b202e0d2fae5a5374a563454

      SHA256

      27647e78a83d0ec40696f05d8d8cfbafbcfb778c9301c368991320a0e9c12428

      SHA512

      a5b990dd74f4ab39a5465f515dde824da0f2fc43121c51b7469c29d49d5a439c74353a3e18c1015092615e5eb2c0cf21ead43930ce71a2359ed40442ca7e38ee

    • \Users\Admin\AppData\Local\Temp\v.exe

      Filesize

      1.3MB

      MD5

      82b89beccee5a94ed7b5e658378a2ab9

      SHA1

      0bfb7aa1c4186278b202e0d2fae5a5374a563454

      SHA256

      27647e78a83d0ec40696f05d8d8cfbafbcfb778c9301c368991320a0e9c12428

      SHA512

      a5b990dd74f4ab39a5465f515dde824da0f2fc43121c51b7469c29d49d5a439c74353a3e18c1015092615e5eb2c0cf21ead43930ce71a2359ed40442ca7e38ee

    • \Users\Admin\AppData\Local\Temp\x.exe

      Filesize

      2.5MB

      MD5

      40badae91f0c7250d2c230f4d3ca2266

      SHA1

      eeec6634aa7ea776d76cf5f0b904e31a64caf05c

      SHA256

      5a5db1b91bfbd2b4ce79745651bfaa120bcf4d0c6cc1aeccfbae852df176c3f7

      SHA512

      3ba66cb90347ffe28b35fe775203af9b9e1c66c612a0cf12bb9d029d79f863e153d9fbb9020a7299f54567b6003b0cd680759a9cb64409509ddf1b49804c99e9

    • \Users\Admin\AppData\Local\Temp\x.exe

      Filesize

      2.5MB

      MD5

      40badae91f0c7250d2c230f4d3ca2266

      SHA1

      eeec6634aa7ea776d76cf5f0b904e31a64caf05c

      SHA256

      5a5db1b91bfbd2b4ce79745651bfaa120bcf4d0c6cc1aeccfbae852df176c3f7

      SHA512

      3ba66cb90347ffe28b35fe775203af9b9e1c66c612a0cf12bb9d029d79f863e153d9fbb9020a7299f54567b6003b0cd680759a9cb64409509ddf1b49804c99e9

    • memory/1392-54-0x0000000076031000-0x0000000076033000-memory.dmp

      Filesize

      8KB

    • memory/1744-62-0x0000000074300000-0x00000000748AB000-memory.dmp

      Filesize

      5.7MB

    • memory/1744-61-0x0000000074300000-0x00000000748AB000-memory.dmp

      Filesize

      5.7MB

    • memory/610776-91-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/610776-108-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/610776-109-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/717024-112-0x0000000000090000-0x00000000000B0000-memory.dmp

      Filesize

      128KB

    • memory/717024-122-0x0000000000090000-0x00000000000B0000-memory.dmp

      Filesize

      128KB

    • memory/717024-121-0x0000000000090000-0x00000000000B0000-memory.dmp

      Filesize

      128KB

    • memory/723892-83-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/723892-87-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/723892-104-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/723892-105-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/743764-107-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/743764-106-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/743764-82-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/743764-80-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB