Analysis
-
max time kernel
49s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
12-08-2022 00:53
Static task
static1
Behavioral task
behavioral1
Sample
43AF78F2753EDE1F0EDB63228D878BCB0E08EF56FE2CE81BF6B244804B925C61.exe
Resource
win7-20220718-en
General
-
Target
43AF78F2753EDE1F0EDB63228D878BCB0E08EF56FE2CE81BF6B244804B925C61.exe
-
Size
2.4MB
-
MD5
70b2a3171cbd8898b4bb72865b154383
-
SHA1
e0ef3c4a392202c0cb6b8ddaf74d7b7da3d96e93
-
SHA256
43af78f2753ede1f0edb63228d878bcb0e08ef56fe2ce81bf6b244804b925c61
-
SHA512
a0e9df18e7d0b48640f821f1242fb6ad66013f9a486a1cb0ebf0c5131ed46ac9bdcaf32dd664b92cc72a9c6c718960f465a69c4677e07adbe3f045e594a9c2d5
Malware Config
Extracted
redline
185.215.113.83:60722
-
auth_value
6a762d509b2b364f6321ec8e3f099271
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/201184-56-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/201184-61-0x000000000041B4EE-mapping.dmp family_redline behavioral1/memory/201184-63-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/201184-62-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
YTStealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/201532-76-0x0000000000B30000-0x0000000001909000-memory.dmp family_ytstealer behavioral1/memory/201532-80-0x0000000000B30000-0x0000000001909000-memory.dmp family_ytstealer -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
Starter.exestart.exepid process 201480 Starter.exe 201532 start.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\start.exe upx \Users\Admin\AppData\Local\Temp\start.exe upx C:\Users\Admin\AppData\Local\Temp\start.exe upx behavioral1/memory/201532-76-0x0000000000B30000-0x0000000001909000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\start.exe upx behavioral1/memory/201532-80-0x0000000000B30000-0x0000000001909000-memory.dmp upx -
Loads dropped DLL 3 IoCs
Processes:
AppLaunch.exepid process 201184 AppLaunch.exe 201184 AppLaunch.exe 201184 AppLaunch.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
43AF78F2753EDE1F0EDB63228D878BCB0E08EF56FE2CE81BF6B244804B925C61.exedescription pid process target process PID 540 set thread context of 201184 540 43AF78F2753EDE1F0EDB63228D878BCB0E08EF56FE2CE81BF6B244804B925C61.exe AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
AppLaunch.exestart.exepid process 201184 AppLaunch.exe 201532 start.exe 201532 start.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
AppLaunch.exeStarter.exedescription pid process Token: SeDebugPrivilege 201184 AppLaunch.exe Token: SeDebugPrivilege 201480 Starter.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
43AF78F2753EDE1F0EDB63228D878BCB0E08EF56FE2CE81BF6B244804B925C61.exeAppLaunch.exestart.execmd.exedescription pid process target process PID 540 wrote to memory of 201184 540 43AF78F2753EDE1F0EDB63228D878BCB0E08EF56FE2CE81BF6B244804B925C61.exe AppLaunch.exe PID 540 wrote to memory of 201184 540 43AF78F2753EDE1F0EDB63228D878BCB0E08EF56FE2CE81BF6B244804B925C61.exe AppLaunch.exe PID 540 wrote to memory of 201184 540 43AF78F2753EDE1F0EDB63228D878BCB0E08EF56FE2CE81BF6B244804B925C61.exe AppLaunch.exe PID 540 wrote to memory of 201184 540 43AF78F2753EDE1F0EDB63228D878BCB0E08EF56FE2CE81BF6B244804B925C61.exe AppLaunch.exe PID 540 wrote to memory of 201184 540 43AF78F2753EDE1F0EDB63228D878BCB0E08EF56FE2CE81BF6B244804B925C61.exe AppLaunch.exe PID 540 wrote to memory of 201184 540 43AF78F2753EDE1F0EDB63228D878BCB0E08EF56FE2CE81BF6B244804B925C61.exe AppLaunch.exe PID 540 wrote to memory of 201184 540 43AF78F2753EDE1F0EDB63228D878BCB0E08EF56FE2CE81BF6B244804B925C61.exe AppLaunch.exe PID 540 wrote to memory of 201184 540 43AF78F2753EDE1F0EDB63228D878BCB0E08EF56FE2CE81BF6B244804B925C61.exe AppLaunch.exe PID 540 wrote to memory of 201184 540 43AF78F2753EDE1F0EDB63228D878BCB0E08EF56FE2CE81BF6B244804B925C61.exe AppLaunch.exe PID 201184 wrote to memory of 201480 201184 AppLaunch.exe Starter.exe PID 201184 wrote to memory of 201480 201184 AppLaunch.exe Starter.exe PID 201184 wrote to memory of 201480 201184 AppLaunch.exe Starter.exe PID 201184 wrote to memory of 201480 201184 AppLaunch.exe Starter.exe PID 201184 wrote to memory of 201480 201184 AppLaunch.exe Starter.exe PID 201184 wrote to memory of 201480 201184 AppLaunch.exe Starter.exe PID 201184 wrote to memory of 201480 201184 AppLaunch.exe Starter.exe PID 201184 wrote to memory of 201532 201184 AppLaunch.exe start.exe PID 201184 wrote to memory of 201532 201184 AppLaunch.exe start.exe PID 201184 wrote to memory of 201532 201184 AppLaunch.exe start.exe PID 201184 wrote to memory of 201532 201184 AppLaunch.exe start.exe PID 201532 wrote to memory of 916 201532 start.exe cmd.exe PID 201532 wrote to memory of 916 201532 start.exe cmd.exe PID 201532 wrote to memory of 916 201532 start.exe cmd.exe PID 916 wrote to memory of 2016 916 cmd.exe choice.exe PID 916 wrote to memory of 2016 916 cmd.exe choice.exe PID 916 wrote to memory of 2016 916 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\43AF78F2753EDE1F0EDB63228D878BCB0E08EF56FE2CE81BF6B244804B925C61.exe"C:\Users\Admin\AppData\Local\Temp\43AF78F2753EDE1F0EDB63228D878BCB0E08EF56FE2CE81BF6B244804B925C61.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:201184 -
C:\Users\Admin\AppData\Local\Temp\Starter.exe"C:\Users\Admin\AppData\Local\Temp\Starter.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:201480 -
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:201532 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\start.exe4⤵
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 05⤵PID:2016
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD53d41fe66e7592eb35c5ef99a83fce2a4
SHA15dc2984ceb1a169b5571267159c43f1b0e5d757d
SHA2567c58039db066e640a338ac6180adcf0b45cbfb9adaa7ae3b279d4628159c4198
SHA5129ac687f2278f19265ae361eee6bbbe0234fed0d9b16c9f4524af8c9e1e131a51fddfa0a19cbbda9feb0b5ccf22ffaad97d5c425f179cb7d920dba66ad7f4e285
-
Filesize
18KB
MD53d41fe66e7592eb35c5ef99a83fce2a4
SHA15dc2984ceb1a169b5571267159c43f1b0e5d757d
SHA2567c58039db066e640a338ac6180adcf0b45cbfb9adaa7ae3b279d4628159c4198
SHA5129ac687f2278f19265ae361eee6bbbe0234fed0d9b16c9f4524af8c9e1e131a51fddfa0a19cbbda9feb0b5ccf22ffaad97d5c425f179cb7d920dba66ad7f4e285
-
Filesize
4.0MB
MD5b09ec6718a34a70a182f3412b89f6777
SHA1e730645db18339897aeddb4f21ce662911e03444
SHA25621c2f78a2ba5891c4dbdc1b50283844c7720ecd3f1187fb9269015524cad2da2
SHA5125d0f9eb9fcfe8a5d6c42db552d35411116ec0b405e747537a75fd50fb6e9f1d1fc1bf95c169c5ef7c2d217b7cc5d647a6ed36f130e0382a71f919c5e09ec7881
-
Filesize
4.0MB
MD5b09ec6718a34a70a182f3412b89f6777
SHA1e730645db18339897aeddb4f21ce662911e03444
SHA25621c2f78a2ba5891c4dbdc1b50283844c7720ecd3f1187fb9269015524cad2da2
SHA5125d0f9eb9fcfe8a5d6c42db552d35411116ec0b405e747537a75fd50fb6e9f1d1fc1bf95c169c5ef7c2d217b7cc5d647a6ed36f130e0382a71f919c5e09ec7881
-
Filesize
18KB
MD53d41fe66e7592eb35c5ef99a83fce2a4
SHA15dc2984ceb1a169b5571267159c43f1b0e5d757d
SHA2567c58039db066e640a338ac6180adcf0b45cbfb9adaa7ae3b279d4628159c4198
SHA5129ac687f2278f19265ae361eee6bbbe0234fed0d9b16c9f4524af8c9e1e131a51fddfa0a19cbbda9feb0b5ccf22ffaad97d5c425f179cb7d920dba66ad7f4e285
-
Filesize
4.0MB
MD5b09ec6718a34a70a182f3412b89f6777
SHA1e730645db18339897aeddb4f21ce662911e03444
SHA25621c2f78a2ba5891c4dbdc1b50283844c7720ecd3f1187fb9269015524cad2da2
SHA5125d0f9eb9fcfe8a5d6c42db552d35411116ec0b405e747537a75fd50fb6e9f1d1fc1bf95c169c5ef7c2d217b7cc5d647a6ed36f130e0382a71f919c5e09ec7881
-
Filesize
4.0MB
MD5b09ec6718a34a70a182f3412b89f6777
SHA1e730645db18339897aeddb4f21ce662911e03444
SHA25621c2f78a2ba5891c4dbdc1b50283844c7720ecd3f1187fb9269015524cad2da2
SHA5125d0f9eb9fcfe8a5d6c42db552d35411116ec0b405e747537a75fd50fb6e9f1d1fc1bf95c169c5ef7c2d217b7cc5d647a6ed36f130e0382a71f919c5e09ec7881