Analysis
-
max time kernel
71s -
max time network
180s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
15-08-2022 04:47
Static task
static1
Behavioral task
behavioral1
Sample
f187b170f2d586038f73311d31f879c574b2a6aef8e41e776a5ba3710484338b.exe
Resource
win7-20220812-en
General
-
Target
f187b170f2d586038f73311d31f879c574b2a6aef8e41e776a5ba3710484338b.exe
-
Size
4.7MB
-
MD5
f4ee53801ab804bfdc50d03daaf50595
-
SHA1
c9748bca6c56c59280052b89a2d2a69ef348fdfa
-
SHA256
f187b170f2d586038f73311d31f879c574b2a6aef8e41e776a5ba3710484338b
-
SHA512
72ee2ccb2e520f2cd9a54217ba85c1228529cb2ae7e103e0f3892a5910b9b29d54d7b427029bfc624b091b391e88eac906eb9305873972ba89ea1d507ca3ef98
Malware Config
Extracted
redline
s32
185.106.92.56:48079
-
auth_value
9ad5135eac94b69fb550f1f6a2c7e142
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1520-3859-0x000000000041ADBA-mapping.dmp family_redline behavioral2/memory/1520-3893-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
YTStealer payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2268-3983-0x0000000000F20000-0x0000000001D31000-memory.dmp family_ytstealer behavioral2/memory/2268-4002-0x0000000000F20000-0x0000000001D31000-memory.dmp family_ytstealer -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
333.exepid process 2268 333.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\333.exe upx C:\Users\Admin\AppData\Local\Temp\333.exe upx behavioral2/memory/2268-3981-0x0000000000F20000-0x0000000001D31000-memory.dmp upx behavioral2/memory/2268-3983-0x0000000000F20000-0x0000000001D31000-memory.dmp upx behavioral2/memory/2268-4002-0x0000000000F20000-0x0000000001D31000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
f187b170f2d586038f73311d31f879c574b2a6aef8e41e776a5ba3710484338b.exedescription pid process target process PID 2672 set thread context of 1520 2672 f187b170f2d586038f73311d31f879c574b2a6aef8e41e776a5ba3710484338b.exe aspnet_compiler.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
powershell.exef187b170f2d586038f73311d31f879c574b2a6aef8e41e776a5ba3710484338b.exeaspnet_compiler.exepowershell.exepid process 4596 powershell.exe 4596 powershell.exe 4596 powershell.exe 2672 f187b170f2d586038f73311d31f879c574b2a6aef8e41e776a5ba3710484338b.exe 2672 f187b170f2d586038f73311d31f879c574b2a6aef8e41e776a5ba3710484338b.exe 1520 aspnet_compiler.exe 1004 powershell.exe 1004 powershell.exe 1004 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
f187b170f2d586038f73311d31f879c574b2a6aef8e41e776a5ba3710484338b.exepowershell.exeaspnet_compiler.exepowershell.exedescription pid process Token: SeDebugPrivilege 2672 f187b170f2d586038f73311d31f879c574b2a6aef8e41e776a5ba3710484338b.exe Token: SeDebugPrivilege 4596 powershell.exe Token: SeDebugPrivilege 1520 aspnet_compiler.exe Token: SeDebugPrivilege 1004 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
f187b170f2d586038f73311d31f879c574b2a6aef8e41e776a5ba3710484338b.exeaspnet_compiler.exe333.exedescription pid process target process PID 2672 wrote to memory of 4596 2672 f187b170f2d586038f73311d31f879c574b2a6aef8e41e776a5ba3710484338b.exe powershell.exe PID 2672 wrote to memory of 4596 2672 f187b170f2d586038f73311d31f879c574b2a6aef8e41e776a5ba3710484338b.exe powershell.exe PID 2672 wrote to memory of 4596 2672 f187b170f2d586038f73311d31f879c574b2a6aef8e41e776a5ba3710484338b.exe powershell.exe PID 2672 wrote to memory of 1520 2672 f187b170f2d586038f73311d31f879c574b2a6aef8e41e776a5ba3710484338b.exe aspnet_compiler.exe PID 2672 wrote to memory of 1520 2672 f187b170f2d586038f73311d31f879c574b2a6aef8e41e776a5ba3710484338b.exe aspnet_compiler.exe PID 2672 wrote to memory of 1520 2672 f187b170f2d586038f73311d31f879c574b2a6aef8e41e776a5ba3710484338b.exe aspnet_compiler.exe PID 2672 wrote to memory of 1520 2672 f187b170f2d586038f73311d31f879c574b2a6aef8e41e776a5ba3710484338b.exe aspnet_compiler.exe PID 2672 wrote to memory of 1520 2672 f187b170f2d586038f73311d31f879c574b2a6aef8e41e776a5ba3710484338b.exe aspnet_compiler.exe PID 2672 wrote to memory of 1520 2672 f187b170f2d586038f73311d31f879c574b2a6aef8e41e776a5ba3710484338b.exe aspnet_compiler.exe PID 2672 wrote to memory of 1520 2672 f187b170f2d586038f73311d31f879c574b2a6aef8e41e776a5ba3710484338b.exe aspnet_compiler.exe PID 2672 wrote to memory of 1520 2672 f187b170f2d586038f73311d31f879c574b2a6aef8e41e776a5ba3710484338b.exe aspnet_compiler.exe PID 1520 wrote to memory of 2268 1520 aspnet_compiler.exe 333.exe PID 1520 wrote to memory of 2268 1520 aspnet_compiler.exe 333.exe PID 2268 wrote to memory of 1004 2268 333.exe powershell.exe PID 2268 wrote to memory of 1004 2268 333.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f187b170f2d586038f73311d31f879c574b2a6aef8e41e776a5ba3710484338b.exe"C:\Users\Admin\AppData\Local\Temp\f187b170f2d586038f73311d31f879c574b2a6aef8e41e776a5ba3710484338b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4596 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\333.exe"C:\Users\Admin\AppData\Local\Temp\333.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "Get-WmiObject Win32_PortConnector"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1004
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD55f640bd48e2547b4c1a7421f080f815f
SHA1a8f4a743f5b7da5cba7b8e6fb1d7ad4d67fefc6a
SHA256916c83c7c8d059aea295523b8b3f24e1e2436df894f7fae26c47c9bad04baa9c
SHA512a6ac100a351946b1bbb40c98aeda6e16e12f90f81063aff08c16d4d9afec8ed65c2cbcf25b42946627d67653f75740b1137dab625c99e9492ba35aba68b79a8e
-
Filesize
16KB
MD5697f689b67b84f169270c2d745de3e37
SHA1d0ac5974855d84bf2b03d5703770e74b5d8d9242
SHA256b69d89b68bd99684b5812483c9f34b517896876820d8c3fc50d493b35b16c8a8
SHA512bd6a078f172bf3bd25c7774d38b8644dc7011609da344e7342b7735ac148db685e1d31f3803983411134f99741147d09d32c3de77ed43abfc72992efc2839792
-
Filesize
4.0MB
MD554759c68e5daf4d0195ccc4bd929b6ce
SHA14dd9a7932308baec2b2d9d5e87aca88a488ac74e
SHA2567819f51ad0cc844210b83cc218fe2c750c87cfc6f0c21921a3ceebc62b76b060
SHA5121ca17ba07d44b26e25e7594a33510d772079e754fa8c06cde97cc5ede4d5a40e2e5ba0605ea1b075ac3e4e3c167075dacbd86094d5e5861195d1376352572d12
-
Filesize
4.0MB
MD554759c68e5daf4d0195ccc4bd929b6ce
SHA14dd9a7932308baec2b2d9d5e87aca88a488ac74e
SHA2567819f51ad0cc844210b83cc218fe2c750c87cfc6f0c21921a3ceebc62b76b060
SHA5121ca17ba07d44b26e25e7594a33510d772079e754fa8c06cde97cc5ede4d5a40e2e5ba0605ea1b075ac3e4e3c167075dacbd86094d5e5861195d1376352572d12