Analysis

  • max time kernel
    207s
  • max time network
    207s
  • platform
    windows10-1703_x64
  • resource
    win10-20220718-en
  • resource tags

    arch:x64arch:x86image:win10-20220718-enlocale:en-usos:windows10-1703-x64system
  • submitted
    31/07/2022, 03:49

General

  • Target

    8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5.exe

  • Size

    1.7MB

  • MD5

    44df72212127215eff6b18cc9f250971

  • SHA1

    497cfce96217cfbbd6fcd14d9af6b6114eaecd9f

  • SHA256

    8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5

  • SHA512

    9213bcbf112e1a4ceb584292d8d86005f636b071b154ab7cee90745965e148d7e145d22d21cd15b8431a48c8c9d2b310b5ab04c06fc2a75289d020a3d1a4a03e

Malware Config

Extracted

Family

redline

C2

185.186.142.127:6737

193.106.191.160:8673

194.93.2.28:21390

Attributes
  • auth_value

    1fce8029e8fab4e62b767b33e52bdb9e

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 4 IoCs
  • YTStealer

    YTStealer is a malware designed to steal YouTube authentication cookies.

  • YTStealer payload 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5.exe
    "C:\Users\Admin\AppData\Local\Temp\8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Users\Admin\AppData\Local\Temp\v.exe
      "C:\Users\Admin\AppData\Local\Temp\v.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4012
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:199420
    • C:\Users\Admin\AppData\Local\Temp\g.exe
      "C:\Users\Admin\AppData\Local\Temp\g.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:199464
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:197112
        • C:\Users\Admin\AppData\Roaming\yu.exe
          "C:\Users\Admin\AppData\Roaming\yu.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:99384
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Roaming\yu.exe
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:99552
            • C:\Windows\system32\choice.exe
              choice /C Y /N /D Y /T 0
              6⤵
                PID:99588
      • C:\Users\Admin\AppData\Local\Temp\x.exe
        "C:\Users\Admin\AppData\Local\Temp\x.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:139736
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          3⤵
            PID:93796

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

        Filesize

        2KB

        MD5

        0baa73d0812998344b1942ab5dc933fa

        SHA1

        48f88a5a2fba6e4d89f268ff6220c93b5a2dee0b

        SHA256

        b57345f0efb83ae674fbe6af5cd3afdd8238bd0c68d0d6a000b6e02f5d7c8e4a

        SHA512

        fe68d7fef3624e397478bddf2e0b65bed9548473ea853c560ec8d713f8ff0e436648a241e5de58346058a302eb5e40e08cbf839421f0cc4364bd3c56a257df64

      • C:\Users\Admin\AppData\Local\Temp\g.exe

        Filesize

        1.4MB

        MD5

        c2fb7cd0cd6ed34e9ecebec33e4b2977

        SHA1

        ba46fecd84c4b138f3cbe6074539f2ca95ab9e36

        SHA256

        83ac1f2ae2aed80455750c99992559f009ba2bcf450d21d7fd74b52c4149de71

        SHA512

        d7bf5d2b68304a7c2076e4d60d1fd772a617a25eadbc255920f6f64001edf053dca8fd948326ce1b99b3facef000493867c4c8743d350ad48dec2b8cf6adb551

      • C:\Users\Admin\AppData\Local\Temp\g.exe

        Filesize

        1.4MB

        MD5

        c2fb7cd0cd6ed34e9ecebec33e4b2977

        SHA1

        ba46fecd84c4b138f3cbe6074539f2ca95ab9e36

        SHA256

        83ac1f2ae2aed80455750c99992559f009ba2bcf450d21d7fd74b52c4149de71

        SHA512

        d7bf5d2b68304a7c2076e4d60d1fd772a617a25eadbc255920f6f64001edf053dca8fd948326ce1b99b3facef000493867c4c8743d350ad48dec2b8cf6adb551

      • C:\Users\Admin\AppData\Local\Temp\v.exe

        Filesize

        1.3MB

        MD5

        82b89beccee5a94ed7b5e658378a2ab9

        SHA1

        0bfb7aa1c4186278b202e0d2fae5a5374a563454

        SHA256

        27647e78a83d0ec40696f05d8d8cfbafbcfb778c9301c368991320a0e9c12428

        SHA512

        a5b990dd74f4ab39a5465f515dde824da0f2fc43121c51b7469c29d49d5a439c74353a3e18c1015092615e5eb2c0cf21ead43930ce71a2359ed40442ca7e38ee

      • C:\Users\Admin\AppData\Local\Temp\v.exe

        Filesize

        1.3MB

        MD5

        82b89beccee5a94ed7b5e658378a2ab9

        SHA1

        0bfb7aa1c4186278b202e0d2fae5a5374a563454

        SHA256

        27647e78a83d0ec40696f05d8d8cfbafbcfb778c9301c368991320a0e9c12428

        SHA512

        a5b990dd74f4ab39a5465f515dde824da0f2fc43121c51b7469c29d49d5a439c74353a3e18c1015092615e5eb2c0cf21ead43930ce71a2359ed40442ca7e38ee

      • C:\Users\Admin\AppData\Local\Temp\x.exe

        Filesize

        2.5MB

        MD5

        40badae91f0c7250d2c230f4d3ca2266

        SHA1

        eeec6634aa7ea776d76cf5f0b904e31a64caf05c

        SHA256

        5a5db1b91bfbd2b4ce79745651bfaa120bcf4d0c6cc1aeccfbae852df176c3f7

        SHA512

        3ba66cb90347ffe28b35fe775203af9b9e1c66c612a0cf12bb9d029d79f863e153d9fbb9020a7299f54567b6003b0cd680759a9cb64409509ddf1b49804c99e9

      • C:\Users\Admin\AppData\Local\Temp\x.exe

        Filesize

        2.5MB

        MD5

        40badae91f0c7250d2c230f4d3ca2266

        SHA1

        eeec6634aa7ea776d76cf5f0b904e31a64caf05c

        SHA256

        5a5db1b91bfbd2b4ce79745651bfaa120bcf4d0c6cc1aeccfbae852df176c3f7

        SHA512

        3ba66cb90347ffe28b35fe775203af9b9e1c66c612a0cf12bb9d029d79f863e153d9fbb9020a7299f54567b6003b0cd680759a9cb64409509ddf1b49804c99e9

      • C:\Users\Admin\AppData\Roaming\yu.exe

        Filesize

        4.0MB

        MD5

        da70d0aab8cad0887e5e9b5174c9d87d

        SHA1

        af5096c0b9fd4f4926850c4479c8e0e0eac8c91b

        SHA256

        6617c1ab08b88711538b600fc4c5cf76098088b436185f5590cdb0e1fc1f6b13

        SHA512

        c100a08bccfa00dcf93160b6174940db1b6839aafbbaec8caa25c4c0e004c96aebf243552df85b7dff56915401bfcb0ecb9caa9bce2edf0d29a9b52c849ebcc5

      • C:\Users\Admin\AppData\Roaming\yu.exe

        Filesize

        4.0MB

        MD5

        da70d0aab8cad0887e5e9b5174c9d87d

        SHA1

        af5096c0b9fd4f4926850c4479c8e0e0eac8c91b

        SHA256

        6617c1ab08b88711538b600fc4c5cf76098088b436185f5590cdb0e1fc1f6b13

        SHA512

        c100a08bccfa00dcf93160b6174940db1b6839aafbbaec8caa25c4c0e004c96aebf243552df85b7dff56915401bfcb0ecb9caa9bce2edf0d29a9b52c849ebcc5

      • memory/2220-167-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-156-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-127-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-129-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-130-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-131-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-133-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-132-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-134-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-136-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-135-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-172-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-138-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-139-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-140-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-141-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-142-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-143-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-144-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-145-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-146-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-147-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-148-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-149-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-150-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-151-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-152-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-153-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-154-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-155-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-171-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-157-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-158-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-159-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-160-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-161-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-162-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-163-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-164-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-165-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-166-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-117-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-168-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-169-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-128-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-170-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-137-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-118-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-126-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-119-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-175-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-120-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-121-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-122-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-178-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-123-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-124-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/2220-125-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/4012-180-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/4012-176-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/4012-182-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/4012-181-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/4012-177-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/4012-179-0x0000000076F40000-0x00000000770CE000-memory.dmp

        Filesize

        1.6MB

      • memory/93796-411-0x0000000000400000-0x000000000041E000-memory.dmp

        Filesize

        120KB

      • memory/99384-1247-0x00000000009C0000-0x0000000001798000-memory.dmp

        Filesize

        13.8MB

      • memory/99384-1243-0x00000000009C0000-0x0000000001798000-memory.dmp

        Filesize

        13.8MB

      • memory/197112-469-0x000000000A160000-0x000000000A1F2000-memory.dmp

        Filesize

        584KB

      • memory/197112-496-0x000000000B5E0000-0x000000000BB0C000-memory.dmp

        Filesize

        5.2MB

      • memory/197112-446-0x0000000009BC0000-0x000000000A0BE000-memory.dmp

        Filesize

        5.0MB

      • memory/197112-453-0x0000000008EF0000-0x0000000008F56000-memory.dmp

        Filesize

        408KB

      • memory/197112-333-0x00000000003C0000-0x00000000003E0000-memory.dmp

        Filesize

        128KB

      • memory/197112-476-0x0000000009B80000-0x0000000009B9E000-memory.dmp

        Filesize

        120KB

      • memory/197112-486-0x000000000A250000-0x000000000A2A0000-memory.dmp

        Filesize

        320KB

      • memory/197112-495-0x000000000AEE0000-0x000000000B0A2000-memory.dmp

        Filesize

        1.8MB

      • memory/199420-319-0x00000000095D0000-0x000000000961B000-memory.dmp

        Filesize

        300KB

      • memory/199420-269-0x0000000009A90000-0x000000000A096000-memory.dmp

        Filesize

        6.0MB

      • memory/199420-227-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/199420-295-0x0000000009590000-0x00000000095CE000-memory.dmp

        Filesize

        248KB

      • memory/199420-468-0x000000000A490000-0x000000000A506000-memory.dmp

        Filesize

        472KB

      • memory/199420-270-0x0000000009510000-0x0000000009522000-memory.dmp

        Filesize

        72KB

      • memory/199420-280-0x0000000009640000-0x000000000974A000-memory.dmp

        Filesize

        1.0MB