Analysis

  • max time kernel
    99s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/08/2022, 13:46

General

  • Target

    537967a4ff0594af46c09bf023eb4964af5a9bf2ef902acc2000e53addeba193.exe

  • Size

    175KB

  • MD5

    f8afeeab30c1ef52199dfabc7be6d4c6

  • SHA1

    b306886efbdc6b38af5292f232c83cac3af8fb49

  • SHA256

    537967a4ff0594af46c09bf023eb4964af5a9bf2ef902acc2000e53addeba193

  • SHA512

    3a3a1b469f6925090fef244551cd7b6bdbca72c58010bb3660386d78a80416b096a6e788bb715667a6bfe42516b1fdf711f575cfa3a9e240b2bb350778c24ca7

  • SSDEEP

    3072:tTHr/+PDJ8K+7V1T4rlIZPFpTJYyvqtWroLwyrxfiWpiOwIm12i/tWo1Vz8xo:NrGPuKW10rCYCq8xyrtWOwIm1v/V1VE

Malware Config

Extracted

Family

redline

C2

78.24.216.5:42717

Attributes
  • auth_value

    6687e352a0604d495c3851d248ebf06f

Extracted

Family

raccoon

Botnet

ea6e085210142782ca765e8e63fe811d

C2

http://206.188.196.200/

rc4.plain

Signatures

  • Eternity

    Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\537967a4ff0594af46c09bf023eb4964af5a9bf2ef902acc2000e53addeba193.exe
    "C:\Users\Admin\AppData\Local\Temp\537967a4ff0594af46c09bf023eb4964af5a9bf2ef902acc2000e53addeba193.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1196
    • C:\Users\Admin\AppData\Local\Temp\8999.exe
      "C:\Users\Admin\AppData\Local\Temp\8999.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4920
    • C:\Users\Admin\AppData\Local\Temp\2.0.1-beta.exe
      "C:\Users\Admin\AppData\Local\Temp\2.0.1-beta.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1424

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\mozglue.dll

          Filesize

          612KB

          MD5

          f07d9977430e762b563eaadc2b94bbfa

          SHA1

          da0a05b2b8d269fb73558dfcf0ed5c167f6d3877

          SHA256

          4191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862

          SHA512

          6afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf

        • C:\Users\Admin\AppData\LocalLow\nss3.dll

          Filesize

          1.9MB

          MD5

          f67d08e8c02574cbc2f1122c53bfb976

          SHA1

          6522992957e7e4d074947cad63189f308a80fcf2

          SHA256

          c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e

          SHA512

          2e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5

        • C:\Users\Admin\AppData\LocalLow\sqlite3.dll

          Filesize

          1.0MB

          MD5

          dbf4f8dcefb8056dc6bae4b67ff810ce

          SHA1

          bbac1dd8a07c6069415c04b62747d794736d0689

          SHA256

          47b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68

          SHA512

          b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1

        • C:\Users\Admin\AppData\Local\Temp\2.0.1-beta.exe

          Filesize

          57KB

          MD5

          b167ba266d25d54ae5d7a85b6d30309e

          SHA1

          1e2e2c9934a6276529b39c784597026ffb2336b8

          SHA256

          595a15ed654f8c7ffcd47dd71fa637f6be7cbf2524b7867aa7c941df3f681cf2

          SHA512

          3b52e2fff5e17bb034c49acc90dd73972ea24237789e99cf89e1eb30831d4de94e2d3c3a445a06449cd30c4abd517f13b7584ee45c3a875e82c1310dfaa31370

        • C:\Users\Admin\AppData\Local\Temp\2.0.1-beta.exe

          Filesize

          57KB

          MD5

          b167ba266d25d54ae5d7a85b6d30309e

          SHA1

          1e2e2c9934a6276529b39c784597026ffb2336b8

          SHA256

          595a15ed654f8c7ffcd47dd71fa637f6be7cbf2524b7867aa7c941df3f681cf2

          SHA512

          3b52e2fff5e17bb034c49acc90dd73972ea24237789e99cf89e1eb30831d4de94e2d3c3a445a06449cd30c4abd517f13b7584ee45c3a875e82c1310dfaa31370

        • C:\Users\Admin\AppData\Local\Temp\8999.exe

          Filesize

          107KB

          MD5

          46c9e711e372e5400396c316aee84ef2

          SHA1

          87d69acf7d1aa5c14d589f2675b762d31df4f045

          SHA256

          649c7ce4e1f7fa6cbc84427bc59f02c3aee0d5147e020d78ad5098b0edfd9278

          SHA512

          b75d0c2523967595894d11e82e549117597cc52c3cc3521fbdb0e8f64c14842a0648a5ac2afc6d5a24f7d35985639513a093ac9ca86f19a2a5d9824a8a7fae88

        • C:\Users\Admin\AppData\Local\Temp\8999.exe

          Filesize

          107KB

          MD5

          46c9e711e372e5400396c316aee84ef2

          SHA1

          87d69acf7d1aa5c14d589f2675b762d31df4f045

          SHA256

          649c7ce4e1f7fa6cbc84427bc59f02c3aee0d5147e020d78ad5098b0edfd9278

          SHA512

          b75d0c2523967595894d11e82e549117597cc52c3cc3521fbdb0e8f64c14842a0648a5ac2afc6d5a24f7d35985639513a093ac9ca86f19a2a5d9824a8a7fae88

        • memory/1196-132-0x00000000006E0000-0x0000000000712000-memory.dmp

          Filesize

          200KB

        • memory/1196-133-0x00000000055B0000-0x0000000005B54000-memory.dmp

          Filesize

          5.6MB

        • memory/4920-144-0x00000000053F0000-0x000000000542C000-memory.dmp

          Filesize

          240KB

        • memory/4920-141-0x00000000054C0000-0x00000000055CA000-memory.dmp

          Filesize

          1.0MB

        • memory/4920-139-0x0000000005390000-0x00000000053A2000-memory.dmp

          Filesize

          72KB

        • memory/4920-138-0x0000000005940000-0x0000000005F58000-memory.dmp

          Filesize

          6.1MB

        • memory/4920-137-0x0000000000B40000-0x0000000000B60000-memory.dmp

          Filesize

          128KB

        • memory/4920-148-0x0000000005730000-0x00000000057A6000-memory.dmp

          Filesize

          472KB

        • memory/4920-149-0x0000000005850000-0x00000000058E2000-memory.dmp

          Filesize

          584KB

        • memory/4920-150-0x0000000006160000-0x000000000617E000-memory.dmp

          Filesize

          120KB

        • memory/4920-151-0x0000000006320000-0x0000000006386000-memory.dmp

          Filesize

          408KB

        • memory/4920-152-0x0000000007AB0000-0x0000000007C72000-memory.dmp

          Filesize

          1.8MB

        • memory/4920-153-0x00000000081B0000-0x00000000086DC000-memory.dmp

          Filesize

          5.2MB

        • memory/4920-154-0x0000000006D50000-0x0000000006DA0000-memory.dmp

          Filesize

          320KB