Analysis
-
max time kernel
146s -
max time network
60s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/08/2022, 04:51
Static task
static1
Behavioral task
behavioral1
Sample
bdd05b9f4943e47fbd5c563d5d7470d5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bdd05b9f4943e47fbd5c563d5d7470d5.exe
Resource
win10v2004-20220812-en
General
-
Target
bdd05b9f4943e47fbd5c563d5d7470d5.exe
-
Size
3.9MB
-
MD5
bdd05b9f4943e47fbd5c563d5d7470d5
-
SHA1
8c607681070f16579219eccc0add734b5e4adfcb
-
SHA256
25fe81874728f7b962f31c47988989f587fac28ba3b8b3dc126c1eb79f772541
-
SHA512
5816b168dc0953dbacb958459ba089d76b69ff7181f0f52f19efb9ab5d3423067e1e83e9be2e021883d72461af878ef05a8d18961b2f8c0be55d34b4613761f6
Malware Config
Extracted
redline
185.215.113.69:15544
-
auth_value
fb4317bf0c3365222a03787673dee218
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/1148-54-0x0000000000400000-0x0000000000AA8000-memory.dmp family_redline behavioral1/memory/83384-61-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/83384-66-0x000000000041B4FE-mapping.dmp family_redline behavioral1/memory/83384-68-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/83384-67-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/83680-76-0x0000000000A10000-0x0000000001822000-memory.dmp family_ytstealer behavioral1/memory/83680-89-0x0000000000A10000-0x0000000001822000-memory.dmp family_ytstealer -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 83680 start.exe 83804 System.exe -
resource yara_rule behavioral1/files/0x0009000000012752-70.dat upx behavioral1/files/0x0009000000012752-71.dat upx behavioral1/files/0x0009000000012752-73.dat upx behavioral1/memory/83680-76-0x0000000000A10000-0x0000000001822000-memory.dmp upx behavioral1/memory/83680-89-0x0000000000A10000-0x0000000001822000-memory.dmp upx -
Loads dropped DLL 3 IoCs
pid Process 83384 AppLaunch.exe 83384 AppLaunch.exe 83384 AppLaunch.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1148 set thread context of 83384 1148 bdd05b9f4943e47fbd5c563d5d7470d5.exe 27 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\bin_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\bin_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\bin_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\.bin\ = "bin_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\bin_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\bin_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\bin_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\.bin rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 83384 AppLaunch.exe 83804 System.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 83384 AppLaunch.exe Token: SeDebugPrivilege 83804 System.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 83868 AcroRd32.exe 83868 AcroRd32.exe 83868 AcroRd32.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 1148 wrote to memory of 83384 1148 bdd05b9f4943e47fbd5c563d5d7470d5.exe 27 PID 1148 wrote to memory of 83384 1148 bdd05b9f4943e47fbd5c563d5d7470d5.exe 27 PID 1148 wrote to memory of 83384 1148 bdd05b9f4943e47fbd5c563d5d7470d5.exe 27 PID 1148 wrote to memory of 83384 1148 bdd05b9f4943e47fbd5c563d5d7470d5.exe 27 PID 1148 wrote to memory of 83384 1148 bdd05b9f4943e47fbd5c563d5d7470d5.exe 27 PID 1148 wrote to memory of 83384 1148 bdd05b9f4943e47fbd5c563d5d7470d5.exe 27 PID 1148 wrote to memory of 83384 1148 bdd05b9f4943e47fbd5c563d5d7470d5.exe 27 PID 1148 wrote to memory of 83384 1148 bdd05b9f4943e47fbd5c563d5d7470d5.exe 27 PID 1148 wrote to memory of 83384 1148 bdd05b9f4943e47fbd5c563d5d7470d5.exe 27 PID 83384 wrote to memory of 83680 83384 AppLaunch.exe 29 PID 83384 wrote to memory of 83680 83384 AppLaunch.exe 29 PID 83384 wrote to memory of 83680 83384 AppLaunch.exe 29 PID 83384 wrote to memory of 83680 83384 AppLaunch.exe 29 PID 83384 wrote to memory of 83744 83384 AppLaunch.exe 30 PID 83384 wrote to memory of 83744 83384 AppLaunch.exe 30 PID 83384 wrote to memory of 83744 83384 AppLaunch.exe 30 PID 83384 wrote to memory of 83744 83384 AppLaunch.exe 30 PID 83384 wrote to memory of 83744 83384 AppLaunch.exe 30 PID 83384 wrote to memory of 83744 83384 AppLaunch.exe 30 PID 83384 wrote to memory of 83744 83384 AppLaunch.exe 30 PID 83384 wrote to memory of 83804 83384 AppLaunch.exe 31 PID 83384 wrote to memory of 83804 83384 AppLaunch.exe 31 PID 83384 wrote to memory of 83804 83384 AppLaunch.exe 31 PID 83384 wrote to memory of 83804 83384 AppLaunch.exe 31 PID 83384 wrote to memory of 83804 83384 AppLaunch.exe 31 PID 83384 wrote to memory of 83804 83384 AppLaunch.exe 31 PID 83384 wrote to memory of 83804 83384 AppLaunch.exe 31 PID 83744 wrote to memory of 83868 83744 rundll32.exe 32 PID 83744 wrote to memory of 83868 83744 rundll32.exe 32 PID 83744 wrote to memory of 83868 83744 rundll32.exe 32 PID 83744 wrote to memory of 83868 83744 rundll32.exe 32 PID 83744 wrote to memory of 83868 83744 rundll32.exe 32 PID 83744 wrote to memory of 83868 83744 rundll32.exe 32 PID 83744 wrote to memory of 83868 83744 rundll32.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\bdd05b9f4943e47fbd5c563d5d7470d5.exe"C:\Users\Admin\AppData\Local\Temp\bdd05b9f4943e47fbd5c563d5d7470d5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:83384 -
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"3⤵
- Executes dropped EXE
PID:83680
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\92993840754678044003.bin3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:83744 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\92993840754678044003.bin"4⤵
- Suspicious use of SetWindowsHookEx
PID:83868
-
-
-
C:\Users\Admin\AppData\Local\Temp\System.exe"C:\Users\Admin\AppData\Local\Temp\System.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:83804
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.9MB
MD585a3792d007879e9eea553ee73d20b2f
SHA171996cb623a6c2a1b7b9d83a890507e1f245c190
SHA2568a054d101e170c71e37f65ddf4f8c52b07285eeae468b61924cbac2b4582ca26
SHA512bf181e20bda67299c355f2510240cf59459d313f3334b4c0d8d8c5e9fa26bb67d6b7b1989ee56d5a875c3f2b416e00bc57f2c20d8e385a91f7800fbe06e0049b
-
Filesize
72KB
MD57e03b2609dd2e9506626e5991bcd6f12
SHA1e2fb7fe2b756bfb88e738d2b292df7ab635fe3d3
SHA256b1ff384c048f9ac05a326050cfbcb29ebc5d4dc958f056a07c87d6b8282636aa
SHA5129d199aafeece12fe6800a90282111b4da0fd3359404f42175a9914bb2d6113c2c675f219bae533702a84cfac58ddcb17201072ab72e5389c6ab48b342c4b644e
-
Filesize
72KB
MD57e03b2609dd2e9506626e5991bcd6f12
SHA1e2fb7fe2b756bfb88e738d2b292df7ab635fe3d3
SHA256b1ff384c048f9ac05a326050cfbcb29ebc5d4dc958f056a07c87d6b8282636aa
SHA5129d199aafeece12fe6800a90282111b4da0fd3359404f42175a9914bb2d6113c2c675f219bae533702a84cfac58ddcb17201072ab72e5389c6ab48b342c4b644e
-
Filesize
4.0MB
MD547b29465bb5fcbbd899f1d98af193f06
SHA1ddd7c01b07939751f734c1e9b7aa17853447e02c
SHA256a54ac89930406913a3b0b3b8e3ef738135a9b7fa54b01578f870e26ee9f99efb
SHA512838a170802283f318712195402dc26dc601d2f81d3dae1f32309e532af732808c1a8b03c80f7dcf99b2ae94276678bb4211a44ebe889335da34a6083c4bd31f8
-
Filesize
72KB
MD57e03b2609dd2e9506626e5991bcd6f12
SHA1e2fb7fe2b756bfb88e738d2b292df7ab635fe3d3
SHA256b1ff384c048f9ac05a326050cfbcb29ebc5d4dc958f056a07c87d6b8282636aa
SHA5129d199aafeece12fe6800a90282111b4da0fd3359404f42175a9914bb2d6113c2c675f219bae533702a84cfac58ddcb17201072ab72e5389c6ab48b342c4b644e
-
Filesize
4.0MB
MD547b29465bb5fcbbd899f1d98af193f06
SHA1ddd7c01b07939751f734c1e9b7aa17853447e02c
SHA256a54ac89930406913a3b0b3b8e3ef738135a9b7fa54b01578f870e26ee9f99efb
SHA512838a170802283f318712195402dc26dc601d2f81d3dae1f32309e532af732808c1a8b03c80f7dcf99b2ae94276678bb4211a44ebe889335da34a6083c4bd31f8
-
Filesize
4.0MB
MD547b29465bb5fcbbd899f1d98af193f06
SHA1ddd7c01b07939751f734c1e9b7aa17853447e02c
SHA256a54ac89930406913a3b0b3b8e3ef738135a9b7fa54b01578f870e26ee9f99efb
SHA512838a170802283f318712195402dc26dc601d2f81d3dae1f32309e532af732808c1a8b03c80f7dcf99b2ae94276678bb4211a44ebe889335da34a6083c4bd31f8