Analysis

  • max time kernel
    98s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-09-2022 18:15

General

  • Target

    Setup 2.exe

  • Size

    9KB

  • MD5

    c2c84226444eb2597f9b000bb59d2db7

  • SHA1

    e9eb9b080059e7ee92c28debbbfcd3560d93f2a2

  • SHA256

    86e79986dc2a94049d06e9501a21d541fdaada04e47e7bf49aaa04bc0479f710

  • SHA512

    fb054e6c659c487fcb86f49798cf59063a86a102fc2af24ecf589c09e9eaae2f253d5e7b533e2133321bb4dfe88ecf71e0cafd1678bcf44a3c3eb4605fc66cc7

  • SSDEEP

    192:JAPr/j+peQbAINi7RrKBAPTXrWfYVjlM4mIgV:yD/j+8QbAT7Rr8sTXCQvcIg

Malware Config

Extracted

Family

redline

C2

45.138.74.121:80

Attributes
  • auth_value

    789c24c515d0ca3018de8d8c611caf08

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • YTStealer

    YTStealer is a malware designed to steal YouTube authentication cookies.

  • YTStealer payload 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup 2.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup 2.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4880
    • C:\Users\Admin\AppData\Local\Temp\NH9Y8.exe
      "C:\Users\Admin\AppData\Local\Temp\NH9Y8.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1356
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell "" "Get-WmiObject Win32_PortConnector"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4060
    • C:\Users\Admin\AppData\Local\Temp\S2Y9F.exe
      "C:\Users\Admin\AppData\Local\Temp\S2Y9F.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1320
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:100988
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 5 & Del "Setup 2.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:20416
      • C:\Windows\system32\choice.exe
        choice /C Y /N /D Y /T 5
        3⤵
          PID:20584

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\NH9Y8.exe

      Filesize

      4.3MB

      MD5

      3396ca21ec2620532b08c9823e7a246c

      SHA1

      8c380dec5387c300b4ccce56a7086d0211f2347d

      SHA256

      5f76670ab4cddd48de1abf8340799665d88f9d13856bffc79e175170605ce777

      SHA512

      05b07f13feb6a99ce0457ceedce9795bdebcab81be25d6b351f5222a5afff534939952bae02f5707b549fd8d1fd96027bf00c6d643a67b51b4e3b8ddc32dcef7

    • C:\Users\Admin\AppData\Local\Temp\NH9Y8.exe

      Filesize

      4.3MB

      MD5

      3396ca21ec2620532b08c9823e7a246c

      SHA1

      8c380dec5387c300b4ccce56a7086d0211f2347d

      SHA256

      5f76670ab4cddd48de1abf8340799665d88f9d13856bffc79e175170605ce777

      SHA512

      05b07f13feb6a99ce0457ceedce9795bdebcab81be25d6b351f5222a5afff534939952bae02f5707b549fd8d1fd96027bf00c6d643a67b51b4e3b8ddc32dcef7

    • C:\Users\Admin\AppData\Local\Temp\S2Y9F.exe

      Filesize

      475KB

      MD5

      cbb9bfbaaf3b05cfaeca3f36f23e3e89

      SHA1

      efe3e26798474754f465c85524088e3d3814f24a

      SHA256

      f6d09cfdff46132187828ea15db4bd103ed62aec6fe4a1b416f93f49cb14db7c

      SHA512

      73fa4537c1a9e84d735e73a04da25725430db7235b5e09b59c63e7229b00e25d788d0aab0e5232bedde0105043b70ac092d52325868d239956a9e9605d8d3636

    • C:\Users\Admin\AppData\Local\Temp\S2Y9F.exe

      Filesize

      475KB

      MD5

      cbb9bfbaaf3b05cfaeca3f36f23e3e89

      SHA1

      efe3e26798474754f465c85524088e3d3814f24a

      SHA256

      f6d09cfdff46132187828ea15db4bd103ed62aec6fe4a1b416f93f49cb14db7c

      SHA512

      73fa4537c1a9e84d735e73a04da25725430db7235b5e09b59c63e7229b00e25d788d0aab0e5232bedde0105043b70ac092d52325868d239956a9e9605d8d3636

    • memory/1356-137-0x0000000000840000-0x000000000165A000-memory.dmp

      Filesize

      14.1MB

    • memory/1356-154-0x0000000000840000-0x000000000165A000-memory.dmp

      Filesize

      14.1MB

    • memory/1356-166-0x0000000000840000-0x000000000165A000-memory.dmp

      Filesize

      14.1MB

    • memory/4060-165-0x00007FFC65080000-0x00007FFC65B41000-memory.dmp

      Filesize

      10.8MB

    • memory/4060-164-0x00007FFC65080000-0x00007FFC65B41000-memory.dmp

      Filesize

      10.8MB

    • memory/4060-162-0x0000020ABA850000-0x0000020ABA872000-memory.dmp

      Filesize

      136KB

    • memory/4880-133-0x00007FFC65C20000-0x00007FFC666E1000-memory.dmp

      Filesize

      10.8MB

    • memory/4880-143-0x00007FFC65C20000-0x00007FFC666E1000-memory.dmp

      Filesize

      10.8MB

    • memory/4880-132-0x0000000000240000-0x0000000000248000-memory.dmp

      Filesize

      32KB

    • memory/100988-150-0x0000000005D00000-0x0000000006318000-memory.dmp

      Filesize

      6.1MB

    • memory/100988-155-0x0000000006900000-0x0000000006992000-memory.dmp

      Filesize

      584KB

    • memory/100988-156-0x0000000006F50000-0x00000000074F4000-memory.dmp

      Filesize

      5.6MB

    • memory/100988-157-0x0000000006A10000-0x0000000006A76000-memory.dmp

      Filesize

      408KB

    • memory/100988-158-0x0000000006C50000-0x0000000006CC6000-memory.dmp

      Filesize

      472KB

    • memory/100988-159-0x0000000006CD0000-0x0000000006D20000-memory.dmp

      Filesize

      320KB

    • memory/100988-153-0x0000000005740000-0x000000000577C000-memory.dmp

      Filesize

      240KB

    • memory/100988-161-0x0000000007500000-0x00000000076C2000-memory.dmp

      Filesize

      1.8MB

    • memory/100988-152-0x00000000056E0000-0x00000000056F2000-memory.dmp

      Filesize

      72KB

    • memory/100988-163-0x0000000007C00000-0x000000000812C000-memory.dmp

      Filesize

      5.2MB

    • memory/100988-151-0x00000000057F0000-0x00000000058FA000-memory.dmp

      Filesize

      1.0MB

    • memory/100988-145-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB