Analysis
-
max time kernel
70s -
max time network
76s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
17-08-2022 10:35
Static task
static1
Behavioral task
behavioral1
Sample
Launcher.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Launcher.exe
Resource
win10v2004-20220812-en
General
-
Target
Launcher.exe
-
Size
4.6MB
-
MD5
4612516fca7a6fc9c393a76859d89539
-
SHA1
4d854c616dca1833ee3bb64befb39676a4cd26c3
-
SHA256
097c24ae162bd92ddfacc1276aada59fa7d058837c359a3f3a37f2ddc763e841
-
SHA512
700125943a1e7fca1f161c869cf7553e4462bd770763ad49e3ef1591d77ee521ff635b721af241718413442a5ecf3972981579396fd52472e4a5ddcc89b3e290
Malware Config
Extracted
redline
62.204.41.141:24758
-
auth_value
2c7c599df95f4eb1a36237ba938268a0
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/161356-61-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/161356-66-0x000000000041B53E-mapping.dmp family_redline behavioral1/memory/161356-67-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/161356-68-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/900-70-0x0000000000400000-0x00000000009F9000-memory.dmp family_redline -
YTStealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/161756-85-0x0000000000950000-0x0000000001762000-memory.dmp family_ytstealer behavioral1/memory/161756-86-0x0000000000950000-0x0000000001762000-memory.dmp family_ytstealer -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
baklan.exestart.exepid process 161652 baklan.exe 161756 start.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\start.exe upx \Users\Admin\AppData\Local\Temp\start.exe upx C:\Users\Admin\AppData\Local\Temp\start.exe upx behavioral1/memory/161756-85-0x0000000000950000-0x0000000001762000-memory.dmp upx behavioral1/memory/161756-86-0x0000000000950000-0x0000000001762000-memory.dmp upx -
Loads dropped DLL 3 IoCs
Processes:
AppLaunch.exepid process 161356 AppLaunch.exe 161356 AppLaunch.exe 161356 AppLaunch.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Launcher.exedescription pid process target process PID 900 set thread context of 161356 900 Launcher.exe AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exebaklan.exepid process 161356 AppLaunch.exe 161652 baklan.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
Launcher.exeAppLaunch.exebaklan.exedescription pid process Token: 33 900 Launcher.exe Token: SeIncBasePriorityPrivilege 900 Launcher.exe Token: SeDebugPrivilege 161356 AppLaunch.exe Token: SeDebugPrivilege 161652 baklan.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
Launcher.exeAppLaunch.exedescription pid process target process PID 900 wrote to memory of 161356 900 Launcher.exe AppLaunch.exe PID 900 wrote to memory of 161356 900 Launcher.exe AppLaunch.exe PID 900 wrote to memory of 161356 900 Launcher.exe AppLaunch.exe PID 900 wrote to memory of 161356 900 Launcher.exe AppLaunch.exe PID 900 wrote to memory of 161356 900 Launcher.exe AppLaunch.exe PID 900 wrote to memory of 161356 900 Launcher.exe AppLaunch.exe PID 900 wrote to memory of 161356 900 Launcher.exe AppLaunch.exe PID 900 wrote to memory of 161356 900 Launcher.exe AppLaunch.exe PID 900 wrote to memory of 161356 900 Launcher.exe AppLaunch.exe PID 161356 wrote to memory of 161652 161356 AppLaunch.exe baklan.exe PID 161356 wrote to memory of 161652 161356 AppLaunch.exe baklan.exe PID 161356 wrote to memory of 161652 161356 AppLaunch.exe baklan.exe PID 161356 wrote to memory of 161652 161356 AppLaunch.exe baklan.exe PID 161356 wrote to memory of 161652 161356 AppLaunch.exe baklan.exe PID 161356 wrote to memory of 161652 161356 AppLaunch.exe baklan.exe PID 161356 wrote to memory of 161652 161356 AppLaunch.exe baklan.exe PID 161356 wrote to memory of 161756 161356 AppLaunch.exe start.exe PID 161356 wrote to memory of 161756 161356 AppLaunch.exe start.exe PID 161356 wrote to memory of 161756 161356 AppLaunch.exe start.exe PID 161356 wrote to memory of 161756 161356 AppLaunch.exe start.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Launcher.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:161356 -
C:\Users\Admin\AppData\Local\Temp\baklan.exe"C:\Users\Admin\AppData\Local\Temp\baklan.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:161652 -
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"3⤵
- Executes dropped EXE
PID:161756
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD58cc3ff31023bde179e029bb3095bbf7f
SHA1dff06fb929328dd6813c9b6d3714c08983fe4371
SHA2568680278426baf3dbefe5340efdb6d2fc7291b9c3ceca27b62ead172df436c7b5
SHA512310f269e376fbced37a92948afbc888b65623cb1120e94f5c0389e237f24a4a02931475606ff2add68ae3cf921dafde20bf002bcddd5e70d8ea687bb40be2118
-
Filesize
72KB
MD58cc3ff31023bde179e029bb3095bbf7f
SHA1dff06fb929328dd6813c9b6d3714c08983fe4371
SHA2568680278426baf3dbefe5340efdb6d2fc7291b9c3ceca27b62ead172df436c7b5
SHA512310f269e376fbced37a92948afbc888b65623cb1120e94f5c0389e237f24a4a02931475606ff2add68ae3cf921dafde20bf002bcddd5e70d8ea687bb40be2118
-
Filesize
4.0MB
MD547b29465bb5fcbbd899f1d98af193f06
SHA1ddd7c01b07939751f734c1e9b7aa17853447e02c
SHA256a54ac89930406913a3b0b3b8e3ef738135a9b7fa54b01578f870e26ee9f99efb
SHA512838a170802283f318712195402dc26dc601d2f81d3dae1f32309e532af732808c1a8b03c80f7dcf99b2ae94276678bb4211a44ebe889335da34a6083c4bd31f8
-
Filesize
72KB
MD58cc3ff31023bde179e029bb3095bbf7f
SHA1dff06fb929328dd6813c9b6d3714c08983fe4371
SHA2568680278426baf3dbefe5340efdb6d2fc7291b9c3ceca27b62ead172df436c7b5
SHA512310f269e376fbced37a92948afbc888b65623cb1120e94f5c0389e237f24a4a02931475606ff2add68ae3cf921dafde20bf002bcddd5e70d8ea687bb40be2118
-
Filesize
4.0MB
MD547b29465bb5fcbbd899f1d98af193f06
SHA1ddd7c01b07939751f734c1e9b7aa17853447e02c
SHA256a54ac89930406913a3b0b3b8e3ef738135a9b7fa54b01578f870e26ee9f99efb
SHA512838a170802283f318712195402dc26dc601d2f81d3dae1f32309e532af732808c1a8b03c80f7dcf99b2ae94276678bb4211a44ebe889335da34a6083c4bd31f8
-
Filesize
4.0MB
MD547b29465bb5fcbbd899f1d98af193f06
SHA1ddd7c01b07939751f734c1e9b7aa17853447e02c
SHA256a54ac89930406913a3b0b3b8e3ef738135a9b7fa54b01578f870e26ee9f99efb
SHA512838a170802283f318712195402dc26dc601d2f81d3dae1f32309e532af732808c1a8b03c80f7dcf99b2ae94276678bb4211a44ebe889335da34a6083c4bd31f8