Analysis
-
max time kernel
111s -
max time network
114s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
10/08/2022, 19:08
Static task
static1
Behavioral task
behavioral1
Sample
50cf1d78e64a81527acb3344a55b3dde.exe
Resource
win7-20220715-en
General
-
Target
50cf1d78e64a81527acb3344a55b3dde.exe
-
Size
3.9MB
-
MD5
50cf1d78e64a81527acb3344a55b3dde
-
SHA1
8477f910b3d33e64b156b0bcf091b92758c28d50
-
SHA256
8029372ee0d847274003b41f70af056c577b82ad655ccaeb3163775e4bf1dcab
-
SHA512
848a6f220aa287f71494ee7a77eae2e403ca87eadf8978857f6889ec1f84d91b5343e1ac103b43e438b669e2a66cc9da77c0478535fb89d2d12ac260c2ef3409
Malware Config
Extracted
redline
185.215.113.83:60722
-
auth_value
1c4e183970feef5b300526ddd407dc7a
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/1136-54-0x0000000000400000-0x0000000000AA9000-memory.dmp family_redline behavioral1/memory/90648-61-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/90648-66-0x000000000041B51E-mapping.dmp family_redline behavioral1/memory/90648-68-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/90648-67-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/90304-82-0x0000000001010000-0x0000000001DE9000-memory.dmp family_ytstealer behavioral1/memory/90304-86-0x0000000001010000-0x0000000001DE9000-memory.dmp family_ytstealer -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 90188 Starter.exe 90304 start.exe -
resource yara_rule behavioral1/files/0x000d000000014209-76.dat upx behavioral1/files/0x000d000000014209-77.dat upx behavioral1/files/0x000d000000014209-79.dat upx behavioral1/memory/90304-82-0x0000000001010000-0x0000000001DE9000-memory.dmp upx behavioral1/files/0x000d000000014209-85.dat upx behavioral1/memory/90304-86-0x0000000001010000-0x0000000001DE9000-memory.dmp upx -
Loads dropped DLL 3 IoCs
pid Process 90648 AppLaunch.exe 90648 AppLaunch.exe 90648 AppLaunch.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1136 set thread context of 90648 1136 50cf1d78e64a81527acb3344a55b3dde.exe 28 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 90648 AppLaunch.exe 90304 start.exe 90304 start.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 90648 AppLaunch.exe Token: SeDebugPrivilege 90188 Starter.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1136 wrote to memory of 90648 1136 50cf1d78e64a81527acb3344a55b3dde.exe 28 PID 1136 wrote to memory of 90648 1136 50cf1d78e64a81527acb3344a55b3dde.exe 28 PID 1136 wrote to memory of 90648 1136 50cf1d78e64a81527acb3344a55b3dde.exe 28 PID 1136 wrote to memory of 90648 1136 50cf1d78e64a81527acb3344a55b3dde.exe 28 PID 1136 wrote to memory of 90648 1136 50cf1d78e64a81527acb3344a55b3dde.exe 28 PID 1136 wrote to memory of 90648 1136 50cf1d78e64a81527acb3344a55b3dde.exe 28 PID 1136 wrote to memory of 90648 1136 50cf1d78e64a81527acb3344a55b3dde.exe 28 PID 1136 wrote to memory of 90648 1136 50cf1d78e64a81527acb3344a55b3dde.exe 28 PID 1136 wrote to memory of 90648 1136 50cf1d78e64a81527acb3344a55b3dde.exe 28 PID 90648 wrote to memory of 90188 90648 AppLaunch.exe 30 PID 90648 wrote to memory of 90188 90648 AppLaunch.exe 30 PID 90648 wrote to memory of 90188 90648 AppLaunch.exe 30 PID 90648 wrote to memory of 90188 90648 AppLaunch.exe 30 PID 90648 wrote to memory of 90188 90648 AppLaunch.exe 30 PID 90648 wrote to memory of 90188 90648 AppLaunch.exe 30 PID 90648 wrote to memory of 90188 90648 AppLaunch.exe 30 PID 90648 wrote to memory of 90304 90648 AppLaunch.exe 31 PID 90648 wrote to memory of 90304 90648 AppLaunch.exe 31 PID 90648 wrote to memory of 90304 90648 AppLaunch.exe 31 PID 90648 wrote to memory of 90304 90648 AppLaunch.exe 31 PID 90304 wrote to memory of 1708 90304 start.exe 32 PID 90304 wrote to memory of 1708 90304 start.exe 32 PID 90304 wrote to memory of 1708 90304 start.exe 32 PID 1708 wrote to memory of 1560 1708 cmd.exe 34 PID 1708 wrote to memory of 1560 1708 cmd.exe 34 PID 1708 wrote to memory of 1560 1708 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\50cf1d78e64a81527acb3344a55b3dde.exe"C:\Users\Admin\AppData\Local\Temp\50cf1d78e64a81527acb3344a55b3dde.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:90648 -
C:\Users\Admin\AppData\Local\Temp\Starter.exe"C:\Users\Admin\AppData\Local\Temp\Starter.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:90188
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:90304 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\start.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 05⤵PID:1560
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD53d41fe66e7592eb35c5ef99a83fce2a4
SHA15dc2984ceb1a169b5571267159c43f1b0e5d757d
SHA2567c58039db066e640a338ac6180adcf0b45cbfb9adaa7ae3b279d4628159c4198
SHA5129ac687f2278f19265ae361eee6bbbe0234fed0d9b16c9f4524af8c9e1e131a51fddfa0a19cbbda9feb0b5ccf22ffaad97d5c425f179cb7d920dba66ad7f4e285
-
Filesize
18KB
MD53d41fe66e7592eb35c5ef99a83fce2a4
SHA15dc2984ceb1a169b5571267159c43f1b0e5d757d
SHA2567c58039db066e640a338ac6180adcf0b45cbfb9adaa7ae3b279d4628159c4198
SHA5129ac687f2278f19265ae361eee6bbbe0234fed0d9b16c9f4524af8c9e1e131a51fddfa0a19cbbda9feb0b5ccf22ffaad97d5c425f179cb7d920dba66ad7f4e285
-
Filesize
4.0MB
MD5b09ec6718a34a70a182f3412b89f6777
SHA1e730645db18339897aeddb4f21ce662911e03444
SHA25621c2f78a2ba5891c4dbdc1b50283844c7720ecd3f1187fb9269015524cad2da2
SHA5125d0f9eb9fcfe8a5d6c42db552d35411116ec0b405e747537a75fd50fb6e9f1d1fc1bf95c169c5ef7c2d217b7cc5d647a6ed36f130e0382a71f919c5e09ec7881
-
Filesize
4.0MB
MD5b09ec6718a34a70a182f3412b89f6777
SHA1e730645db18339897aeddb4f21ce662911e03444
SHA25621c2f78a2ba5891c4dbdc1b50283844c7720ecd3f1187fb9269015524cad2da2
SHA5125d0f9eb9fcfe8a5d6c42db552d35411116ec0b405e747537a75fd50fb6e9f1d1fc1bf95c169c5ef7c2d217b7cc5d647a6ed36f130e0382a71f919c5e09ec7881
-
Filesize
18KB
MD53d41fe66e7592eb35c5ef99a83fce2a4
SHA15dc2984ceb1a169b5571267159c43f1b0e5d757d
SHA2567c58039db066e640a338ac6180adcf0b45cbfb9adaa7ae3b279d4628159c4198
SHA5129ac687f2278f19265ae361eee6bbbe0234fed0d9b16c9f4524af8c9e1e131a51fddfa0a19cbbda9feb0b5ccf22ffaad97d5c425f179cb7d920dba66ad7f4e285
-
Filesize
4.0MB
MD5b09ec6718a34a70a182f3412b89f6777
SHA1e730645db18339897aeddb4f21ce662911e03444
SHA25621c2f78a2ba5891c4dbdc1b50283844c7720ecd3f1187fb9269015524cad2da2
SHA5125d0f9eb9fcfe8a5d6c42db552d35411116ec0b405e747537a75fd50fb6e9f1d1fc1bf95c169c5ef7c2d217b7cc5d647a6ed36f130e0382a71f919c5e09ec7881
-
Filesize
4.0MB
MD5b09ec6718a34a70a182f3412b89f6777
SHA1e730645db18339897aeddb4f21ce662911e03444
SHA25621c2f78a2ba5891c4dbdc1b50283844c7720ecd3f1187fb9269015524cad2da2
SHA5125d0f9eb9fcfe8a5d6c42db552d35411116ec0b405e747537a75fd50fb6e9f1d1fc1bf95c169c5ef7c2d217b7cc5d647a6ed36f130e0382a71f919c5e09ec7881