Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2022 13:34
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20220812-en
General
-
Target
setup.exe
-
Size
4.9MB
-
MD5
f282768e11d3b0f9543a4dce4e51d563
-
SHA1
c71b735210380cd0a53db2b4d781cddc5c418fa5
-
SHA256
0af383db909c314a9e69f1266dd8f50b11816a26d3ff26b5b32f0bf8574f410b
-
SHA512
6001628abccb1fc01a5a92fb3e91278b1aefe9b2a05b40d98ed577a4bf9a05ec385d12504874a3be1786b5c7e3a5e42bf89530bb935c83a5d4d2b090d4d57995
-
SSDEEP
98304:iCnkht4Wom20+2hlWDLh88t+IRnBgObfsyzy7seBmhgdOkEWDQPfrSy38km:ibhtgP2hliLXFsyzy7fmMWrSy33m
Malware Config
Extracted
redline
185.200.191.18:80
-
auth_value
8e735c61c3e52e58f4665d971fce8806
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/147036-140-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
YTStealer payload 3 IoCs
resource yara_rule behavioral2/memory/6940-138-0x0000000000F10000-0x0000000001D24000-memory.dmp family_ytstealer behavioral2/memory/6940-149-0x0000000000F10000-0x0000000001D24000-memory.dmp family_ytstealer behavioral2/memory/6940-161-0x0000000000F10000-0x0000000001D24000-memory.dmp family_ytstealer -
Executes dropped EXE 2 IoCs
pid Process 800 @sp1keeeeee_crypted.exe 6940 1859736053.exe -
resource yara_rule behavioral2/files/0x0006000000022e44-137.dat upx behavioral2/files/0x0006000000022e44-136.dat upx behavioral2/memory/6940-138-0x0000000000F10000-0x0000000001D24000-memory.dmp upx behavioral2/memory/6940-149-0x0000000000F10000-0x0000000001D24000-memory.dmp upx behavioral2/memory/6940-161-0x0000000000F10000-0x0000000001D24000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 800 set thread context of 147036 800 @sp1keeeeee_crypted.exe 85 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 147248 powershell.exe 147248 powershell.exe 147036 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 147036 AppLaunch.exe Token: SeDebugPrivilege 147248 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2324 wrote to memory of 800 2324 setup.exe 82 PID 2324 wrote to memory of 800 2324 setup.exe 82 PID 2324 wrote to memory of 800 2324 setup.exe 82 PID 2324 wrote to memory of 6940 2324 setup.exe 84 PID 2324 wrote to memory of 6940 2324 setup.exe 84 PID 800 wrote to memory of 147036 800 @sp1keeeeee_crypted.exe 85 PID 800 wrote to memory of 147036 800 @sp1keeeeee_crypted.exe 85 PID 800 wrote to memory of 147036 800 @sp1keeeeee_crypted.exe 85 PID 800 wrote to memory of 147036 800 @sp1keeeeee_crypted.exe 85 PID 800 wrote to memory of 147036 800 @sp1keeeeee_crypted.exe 85 PID 6940 wrote to memory of 147248 6940 1859736053.exe 86 PID 6940 wrote to memory of 147248 6940 1859736053.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Roaming\@sp1keeeeee_crypted.exeC:\Users\Admin\AppData\Roaming\@sp1keeeeee_crypted.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:147036
-
-
-
C:\Users\Admin\AppData\Roaming\1859736053.exeC:\Users\Admin\AppData\Roaming\1859736053.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:6940 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "Get-WmiObject Win32_PortConnector"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:147248
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.0MB
MD510b2a9cc7dec335b598856c1974da4fa
SHA1b95755e2693c58359910bec6e8d0d57051f1ef6f
SHA256dc678f956695d21ae414b3df2541183fa3641457492e8337e9b74b563f2bc124
SHA5126f4728899e90f36a27cf106184520b642f72ff54c0ff04a8c069ee33b7a00cee77c3ec2e957a6ff306b17bc6e16e987e284d9015e322325ea5042ee9edd33140
-
Filesize
4.0MB
MD510b2a9cc7dec335b598856c1974da4fa
SHA1b95755e2693c58359910bec6e8d0d57051f1ef6f
SHA256dc678f956695d21ae414b3df2541183fa3641457492e8337e9b74b563f2bc124
SHA5126f4728899e90f36a27cf106184520b642f72ff54c0ff04a8c069ee33b7a00cee77c3ec2e957a6ff306b17bc6e16e987e284d9015e322325ea5042ee9edd33140
-
Filesize
2.4MB
MD58f2ef7ab3520eccf48d2d32bab887447
SHA169237aae807f04e2160475aee36c10a66582bad6
SHA2566bdd0a39b62d6c0e351fcd504c5430fae0b3e4d8457e0b9f78f69a490b590693
SHA5128a2276eb3f44227fe6737d83206f09cf33a294ee86834cb7fcf074d0337705cbe68236d19e5dfba55b5c32e281bfcf7d046309e86fb72f2a6829262dae45e5b5
-
Filesize
2.4MB
MD58f2ef7ab3520eccf48d2d32bab887447
SHA169237aae807f04e2160475aee36c10a66582bad6
SHA2566bdd0a39b62d6c0e351fcd504c5430fae0b3e4d8457e0b9f78f69a490b590693
SHA5128a2276eb3f44227fe6737d83206f09cf33a294ee86834cb7fcf074d0337705cbe68236d19e5dfba55b5c32e281bfcf7d046309e86fb72f2a6829262dae45e5b5