Resubmissions

31/07/2022, 00:49

220731-a6j5cscgg9 10

30/07/2022, 22:18

220730-17yl9abebj 10

Analysis

  • max time kernel
    298s
  • max time network
    318s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    30/07/2022, 22:18

General

  • Target

    8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5.exe

  • Size

    1.7MB

  • MD5

    44df72212127215eff6b18cc9f250971

  • SHA1

    497cfce96217cfbbd6fcd14d9af6b6114eaecd9f

  • SHA256

    8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5

  • SHA512

    9213bcbf112e1a4ceb584292d8d86005f636b071b154ab7cee90745965e148d7e145d22d21cd15b8431a48c8c9d2b310b5ab04c06fc2a75289d020a3d1a4a03e

Malware Config

Extracted

Family

redline

C2

185.186.142.127:6737

193.106.191.160:8673

194.93.2.28:21390

Attributes
  • auth_value

    1fce8029e8fab4e62b767b33e52bdb9e

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 8 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5.exe
    "C:\Users\Admin\AppData\Local\Temp\8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:964
    • C:\Users\Admin\AppData\Local\Temp\v.exe
      "C:\Users\Admin\AppData\Local\Temp\v.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1412
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:195676
    • C:\Users\Admin\AppData\Local\Temp\g.exe
      "C:\Users\Admin\AppData\Local\Temp\g.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:195760
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:318732
    • C:\Users\Admin\AppData\Local\Temp\x.exe
      "C:\Users\Admin\AppData\Local\Temp\x.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:51356
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
          PID:15588

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\g.exe

      Filesize

      1.4MB

      MD5

      c2fb7cd0cd6ed34e9ecebec33e4b2977

      SHA1

      ba46fecd84c4b138f3cbe6074539f2ca95ab9e36

      SHA256

      83ac1f2ae2aed80455750c99992559f009ba2bcf450d21d7fd74b52c4149de71

      SHA512

      d7bf5d2b68304a7c2076e4d60d1fd772a617a25eadbc255920f6f64001edf053dca8fd948326ce1b99b3facef000493867c4c8743d350ad48dec2b8cf6adb551

    • C:\Users\Admin\AppData\Local\Temp\v.exe

      Filesize

      1.3MB

      MD5

      82b89beccee5a94ed7b5e658378a2ab9

      SHA1

      0bfb7aa1c4186278b202e0d2fae5a5374a563454

      SHA256

      27647e78a83d0ec40696f05d8d8cfbafbcfb778c9301c368991320a0e9c12428

      SHA512

      a5b990dd74f4ab39a5465f515dde824da0f2fc43121c51b7469c29d49d5a439c74353a3e18c1015092615e5eb2c0cf21ead43930ce71a2359ed40442ca7e38ee

    • C:\Users\Admin\AppData\Local\Temp\x.exe

      Filesize

      2.5MB

      MD5

      40badae91f0c7250d2c230f4d3ca2266

      SHA1

      eeec6634aa7ea776d76cf5f0b904e31a64caf05c

      SHA256

      5a5db1b91bfbd2b4ce79745651bfaa120bcf4d0c6cc1aeccfbae852df176c3f7

      SHA512

      3ba66cb90347ffe28b35fe775203af9b9e1c66c612a0cf12bb9d029d79f863e153d9fbb9020a7299f54567b6003b0cd680759a9cb64409509ddf1b49804c99e9

    • \Users\Admin\AppData\Local\Temp\g.exe

      Filesize

      1.4MB

      MD5

      c2fb7cd0cd6ed34e9ecebec33e4b2977

      SHA1

      ba46fecd84c4b138f3cbe6074539f2ca95ab9e36

      SHA256

      83ac1f2ae2aed80455750c99992559f009ba2bcf450d21d7fd74b52c4149de71

      SHA512

      d7bf5d2b68304a7c2076e4d60d1fd772a617a25eadbc255920f6f64001edf053dca8fd948326ce1b99b3facef000493867c4c8743d350ad48dec2b8cf6adb551

    • \Users\Admin\AppData\Local\Temp\g.exe

      Filesize

      1.4MB

      MD5

      c2fb7cd0cd6ed34e9ecebec33e4b2977

      SHA1

      ba46fecd84c4b138f3cbe6074539f2ca95ab9e36

      SHA256

      83ac1f2ae2aed80455750c99992559f009ba2bcf450d21d7fd74b52c4149de71

      SHA512

      d7bf5d2b68304a7c2076e4d60d1fd772a617a25eadbc255920f6f64001edf053dca8fd948326ce1b99b3facef000493867c4c8743d350ad48dec2b8cf6adb551

    • \Users\Admin\AppData\Local\Temp\v.exe

      Filesize

      1.3MB

      MD5

      82b89beccee5a94ed7b5e658378a2ab9

      SHA1

      0bfb7aa1c4186278b202e0d2fae5a5374a563454

      SHA256

      27647e78a83d0ec40696f05d8d8cfbafbcfb778c9301c368991320a0e9c12428

      SHA512

      a5b990dd74f4ab39a5465f515dde824da0f2fc43121c51b7469c29d49d5a439c74353a3e18c1015092615e5eb2c0cf21ead43930ce71a2359ed40442ca7e38ee

    • \Users\Admin\AppData\Local\Temp\v.exe

      Filesize

      1.3MB

      MD5

      82b89beccee5a94ed7b5e658378a2ab9

      SHA1

      0bfb7aa1c4186278b202e0d2fae5a5374a563454

      SHA256

      27647e78a83d0ec40696f05d8d8cfbafbcfb778c9301c368991320a0e9c12428

      SHA512

      a5b990dd74f4ab39a5465f515dde824da0f2fc43121c51b7469c29d49d5a439c74353a3e18c1015092615e5eb2c0cf21ead43930ce71a2359ed40442ca7e38ee

    • \Users\Admin\AppData\Local\Temp\x.exe

      Filesize

      2.5MB

      MD5

      40badae91f0c7250d2c230f4d3ca2266

      SHA1

      eeec6634aa7ea776d76cf5f0b904e31a64caf05c

      SHA256

      5a5db1b91bfbd2b4ce79745651bfaa120bcf4d0c6cc1aeccfbae852df176c3f7

      SHA512

      3ba66cb90347ffe28b35fe775203af9b9e1c66c612a0cf12bb9d029d79f863e153d9fbb9020a7299f54567b6003b0cd680759a9cb64409509ddf1b49804c99e9

    • \Users\Admin\AppData\Local\Temp\x.exe

      Filesize

      2.5MB

      MD5

      40badae91f0c7250d2c230f4d3ca2266

      SHA1

      eeec6634aa7ea776d76cf5f0b904e31a64caf05c

      SHA256

      5a5db1b91bfbd2b4ce79745651bfaa120bcf4d0c6cc1aeccfbae852df176c3f7

      SHA512

      3ba66cb90347ffe28b35fe775203af9b9e1c66c612a0cf12bb9d029d79f863e153d9fbb9020a7299f54567b6003b0cd680759a9cb64409509ddf1b49804c99e9

    • memory/964-54-0x00000000757E1000-0x00000000757E3000-memory.dmp

      Filesize

      8KB

    • memory/15588-89-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/15588-91-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/15588-98-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/15588-97-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/195676-61-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/195676-68-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/195676-67-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/195676-59-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/318732-80-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/318732-86-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/318732-87-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB