Analysis
-
max time kernel
47s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02-10-2022 22:17
Static task
static1
Behavioral task
behavioral1
Sample
5229f4d7ccb40a8c71606a72bc43b8a4fb1855a27c57314871e9c164b4a50484.exe
Resource
win7-20220901-en
General
-
Target
5229f4d7ccb40a8c71606a72bc43b8a4fb1855a27c57314871e9c164b4a50484.exe
-
Size
5.4MB
-
MD5
ba60e23ac2a9c0b2cd5e7bae7ad5049a
-
SHA1
359aee0cb29012f0ed373b30383d7e26df710fdc
-
SHA256
5229f4d7ccb40a8c71606a72bc43b8a4fb1855a27c57314871e9c164b4a50484
-
SHA512
a9f14fadd3b7d84dc9e4a90eab2704a6776b3563976d9de767184c9d323776781edbe2ac1f9077cd77860f86744772a79fc7b0106000b4ba94e03d9d9ffa45ca
-
SSDEEP
49152:2PFJCvLqOaSTK5ISawpVpVliC8TkxZyh5u4P0zg7vrctB/irpXoXPpS:2PFsjqOaSFUzyPvcj/PA
Malware Config
Extracted
redline
JOKER
185.215.113.217:19618
-
auth_value
fbdd1ed5d25f3ea0234594f3484c633d
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1936-67-0x00000000005C0000-0x00000000005FE000-memory.dmp family_redline behavioral1/memory/1936-69-0x00000000021F0000-0x000000000222C000-memory.dmp family_redline -
Executes dropped EXE 2 IoCs
Processes:
website.exewebsite.exepid process 1788 website.exe 1936 website.exe -
Loads dropped DLL 2 IoCs
Processes:
5229f4d7ccb40a8c71606a72bc43b8a4fb1855a27c57314871e9c164b4a50484.exepid process 1416 5229f4d7ccb40a8c71606a72bc43b8a4fb1855a27c57314871e9c164b4a50484.exe 1416 5229f4d7ccb40a8c71606a72bc43b8a4fb1855a27c57314871e9c164b4a50484.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
website.exedescription pid process target process PID 1788 set thread context of 1936 1788 website.exe website.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
website.exepid process 1936 website.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
website.exedescription pid process Token: SeDebugPrivilege 1936 website.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
5229f4d7ccb40a8c71606a72bc43b8a4fb1855a27c57314871e9c164b4a50484.exewebsite.exedescription pid process target process PID 1416 wrote to memory of 1788 1416 5229f4d7ccb40a8c71606a72bc43b8a4fb1855a27c57314871e9c164b4a50484.exe website.exe PID 1416 wrote to memory of 1788 1416 5229f4d7ccb40a8c71606a72bc43b8a4fb1855a27c57314871e9c164b4a50484.exe website.exe PID 1416 wrote to memory of 1788 1416 5229f4d7ccb40a8c71606a72bc43b8a4fb1855a27c57314871e9c164b4a50484.exe website.exe PID 1416 wrote to memory of 1788 1416 5229f4d7ccb40a8c71606a72bc43b8a4fb1855a27c57314871e9c164b4a50484.exe website.exe PID 1788 wrote to memory of 1936 1788 website.exe website.exe PID 1788 wrote to memory of 1936 1788 website.exe website.exe PID 1788 wrote to memory of 1936 1788 website.exe website.exe PID 1788 wrote to memory of 1936 1788 website.exe website.exe PID 1788 wrote to memory of 1936 1788 website.exe website.exe PID 1788 wrote to memory of 1936 1788 website.exe website.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5229f4d7ccb40a8c71606a72bc43b8a4fb1855a27c57314871e9c164b4a50484.exe"C:\Users\Admin\AppData\Local\Temp\5229f4d7ccb40a8c71606a72bc43b8a4fb1855a27c57314871e9c164b4a50484.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\website.exe"C:\Users\Admin\AppData\Roaming\website.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\website.exe"C:\Users\Admin\AppData\Roaming\website.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\website.exeFilesize
1.2MB
MD5d7c97883b9f3e1895c092c5303ce8e27
SHA18fe505906b5c184a78b6e87d9aefe993c29c4afa
SHA25627bebd062276307e7e83e6e1450a5d64fec0c5af9b785f87e36de74e10b22fb0
SHA512a0223d2933d69a30dd6bc58cfaac388a829b93f844c9067afec611751b0c662ace7a0ca1c0d5c268b71961a52e82bb96e4f1e1fd47926087bef37cacb3cd38e3
-
C:\Users\Admin\AppData\Roaming\website.exeFilesize
1.2MB
MD5d7c97883b9f3e1895c092c5303ce8e27
SHA18fe505906b5c184a78b6e87d9aefe993c29c4afa
SHA25627bebd062276307e7e83e6e1450a5d64fec0c5af9b785f87e36de74e10b22fb0
SHA512a0223d2933d69a30dd6bc58cfaac388a829b93f844c9067afec611751b0c662ace7a0ca1c0d5c268b71961a52e82bb96e4f1e1fd47926087bef37cacb3cd38e3
-
C:\Users\Admin\AppData\Roaming\website.exeFilesize
1.2MB
MD5d7c97883b9f3e1895c092c5303ce8e27
SHA18fe505906b5c184a78b6e87d9aefe993c29c4afa
SHA25627bebd062276307e7e83e6e1450a5d64fec0c5af9b785f87e36de74e10b22fb0
SHA512a0223d2933d69a30dd6bc58cfaac388a829b93f844c9067afec611751b0c662ace7a0ca1c0d5c268b71961a52e82bb96e4f1e1fd47926087bef37cacb3cd38e3
-
\Users\Admin\AppData\Roaming\website.exeFilesize
1.2MB
MD5d7c97883b9f3e1895c092c5303ce8e27
SHA18fe505906b5c184a78b6e87d9aefe993c29c4afa
SHA25627bebd062276307e7e83e6e1450a5d64fec0c5af9b785f87e36de74e10b22fb0
SHA512a0223d2933d69a30dd6bc58cfaac388a829b93f844c9067afec611751b0c662ace7a0ca1c0d5c268b71961a52e82bb96e4f1e1fd47926087bef37cacb3cd38e3
-
\Users\Admin\AppData\Roaming\website.exeFilesize
1.2MB
MD5d7c97883b9f3e1895c092c5303ce8e27
SHA18fe505906b5c184a78b6e87d9aefe993c29c4afa
SHA25627bebd062276307e7e83e6e1450a5d64fec0c5af9b785f87e36de74e10b22fb0
SHA512a0223d2933d69a30dd6bc58cfaac388a829b93f844c9067afec611751b0c662ace7a0ca1c0d5c268b71961a52e82bb96e4f1e1fd47926087bef37cacb3cd38e3
-
memory/1416-54-0x0000000074DC1000-0x0000000074DC3000-memory.dmpFilesize
8KB
-
memory/1788-57-0x0000000000000000-mapping.dmp
-
memory/1936-62-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/1936-63-0x000000000040CD2F-mapping.dmp
-
memory/1936-60-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/1936-66-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/1936-67-0x00000000005C0000-0x00000000005FE000-memory.dmpFilesize
248KB
-
memory/1936-68-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/1936-69-0x00000000021F0000-0x000000000222C000-memory.dmpFilesize
240KB
-
memory/1936-71-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB