Analysis
-
max time kernel
127s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
10-08-2022 19:08
Static task
static1
Behavioral task
behavioral1
Sample
e25ce9c2b5d24744369835f590f91d1a.exe
Resource
win7-20220718-en
General
-
Target
e25ce9c2b5d24744369835f590f91d1a.exe
-
Size
3.9MB
-
MD5
e25ce9c2b5d24744369835f590f91d1a
-
SHA1
73b7c7c2cd35864ed4fe3969f8f8dc4242900ac1
-
SHA256
6ace84c8a5b97075e435df18a59c7dcaa90091c8b3140deedf5139329d1890df
-
SHA512
7c949da1f0cbdd49198f8ccb07b67a4222f1f3c9c9451bd7e871bb7561f5cd77a6f45006a3324a511cde7c216622c1811244ae03795e2106536e613325adee73
Malware Config
Extracted
redline
185.215.113.23:15912
-
auth_value
2e05da16ff667c8d53d0673cd5b4e948
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3580-130-0x0000000000400000-0x0000000000AAD000-memory.dmp family_redline behavioral2/memory/223012-135-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
YTStealer payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1180-154-0x0000000000A80000-0x0000000001892000-memory.dmp family_ytstealer behavioral2/memory/1180-155-0x0000000000A80000-0x0000000001892000-memory.dmp family_ytstealer behavioral2/memory/1180-159-0x0000000000A80000-0x0000000001892000-memory.dmp family_ytstealer -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
filename.exepid process 1180 filename.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\filename.exe upx C:\Users\Admin\AppData\Local\Temp\filename.exe upx behavioral2/memory/1180-154-0x0000000000A80000-0x0000000001892000-memory.dmp upx behavioral2/memory/1180-155-0x0000000000A80000-0x0000000001892000-memory.dmp upx behavioral2/memory/1180-159-0x0000000000A80000-0x0000000001892000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
e25ce9c2b5d24744369835f590f91d1a.exedescription pid process target process PID 3580 set thread context of 223012 3580 e25ce9c2b5d24744369835f590f91d1a.exe AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
AppLaunch.exepowershell.exepid process 223012 AppLaunch.exe 4420 powershell.exe 4420 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
AppLaunch.exepowershell.exedescription pid process Token: SeDebugPrivilege 223012 AppLaunch.exe Token: SeDebugPrivilege 4420 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
e25ce9c2b5d24744369835f590f91d1a.exeAppLaunch.exefilename.exedescription pid process target process PID 3580 wrote to memory of 223012 3580 e25ce9c2b5d24744369835f590f91d1a.exe AppLaunch.exe PID 3580 wrote to memory of 223012 3580 e25ce9c2b5d24744369835f590f91d1a.exe AppLaunch.exe PID 3580 wrote to memory of 223012 3580 e25ce9c2b5d24744369835f590f91d1a.exe AppLaunch.exe PID 3580 wrote to memory of 223012 3580 e25ce9c2b5d24744369835f590f91d1a.exe AppLaunch.exe PID 3580 wrote to memory of 223012 3580 e25ce9c2b5d24744369835f590f91d1a.exe AppLaunch.exe PID 223012 wrote to memory of 1180 223012 AppLaunch.exe filename.exe PID 223012 wrote to memory of 1180 223012 AppLaunch.exe filename.exe PID 1180 wrote to memory of 4420 1180 filename.exe powershell.exe PID 1180 wrote to memory of 4420 1180 filename.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e25ce9c2b5d24744369835f590f91d1a.exe"C:\Users\Admin\AppData\Local\Temp\e25ce9c2b5d24744369835f590f91d1a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:223012 -
C:\Users\Admin\AppData\Local\Temp\filename.exe"C:\Users\Admin\AppData\Local\Temp\filename.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "Get-WmiObject Win32_PortConnector"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4420
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.0MB
MD56452e14763ae943f8e556f65c09473eb
SHA1290981d61d73c696b475c8fefed323b569418bde
SHA256bc35c66b1be35a701e70388789b6446093fa71716801c8828c3f363eee1a183e
SHA51244ac3be1c66b734a908a88c79df310788dd5edd1e8bbaa577682459163fa347282a937d4d4d48710e1a1f08e89ca8d4674cbdbc51e015539dce4509645727796
-
Filesize
4.0MB
MD56452e14763ae943f8e556f65c09473eb
SHA1290981d61d73c696b475c8fefed323b569418bde
SHA256bc35c66b1be35a701e70388789b6446093fa71716801c8828c3f363eee1a183e
SHA51244ac3be1c66b734a908a88c79df310788dd5edd1e8bbaa577682459163fa347282a937d4d4d48710e1a1f08e89ca8d4674cbdbc51e015539dce4509645727796