Analysis

  • max time kernel
    127s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    13-10-2022 16:30

General

  • Target

    BOT_SETUP2022/SETUP.exe

  • Size

    5.5MB

  • MD5

    ed40898f7e28068cf4b1ced8b502395c

  • SHA1

    b148b0033ee8a6d0158ebec162a263b668fa9510

  • SHA256

    5d8f2f6b4203e5785450eb6968570e5fd07de1f4627f75416e175ac53b0b9bd7

  • SHA512

    566379fab2bb6f71b264ff5381375313b9eb0d0b3a46e89001648c3d38a867124ec970feb3bc4f9963253b885e47021291e1d64457fb89de0d176c2a61c261e2

  • SSDEEP

    98304:ESAjmq5KGe4EaQmMKYBoyXdjOHn/R0lrUg1Cd1PYQIRGrPqVg3bEGM07rAWmI+T:ESumoKGNLoKYqyXVOfarUgTQ4GrPUibE

Malware Config

Extracted

Family

redline

C2

185.200.191.18:80

Attributes
  • auth_value

    f902a77d89afd7a0dcc0127007a4bb3c

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • YTStealer

    YTStealer is a malware designed to steal YouTube authentication cookies.

  • YTStealer payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BOT_SETUP2022\SETUP.exe
    "C:\Users\Admin\AppData\Local\Temp\BOT_SETUP2022\SETUP.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1608
    • C:\Users\Admin\AppData\Roaming\@heis999_crypted.exe
      C:\Users\Admin\AppData\Roaming\@heis999_crypted.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1984
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
          PID:161352
      • C:\Users\Admin\AppData\Roaming\1467997772.exe
        C:\Users\Admin\AppData\Roaming\1467997772.exe
        2⤵
        • Executes dropped EXE
        PID:1316

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\1467997772.exe
      Filesize

      4.0MB

      MD5

      3c1a35fa54ee724987c28716eb1f5631

      SHA1

      1dcee84fc37306c656b72d2143a59d8e64281819

      SHA256

      93ad379a0fb0e682e9afa1f2e728f8fb5a39c15a7d13cd8b6c432d24d6064e57

      SHA512

      e4c516d10dc3e05d334d38988724a2c5dafb73ecfcd1b4ee7351eccab889d2ac0f9a3799da2f4af626bb15e3a32aaf284c6b4d966a11539083916e7677fd29f2

    • C:\Users\Admin\AppData\Roaming\@heis999_crypted.exe
      Filesize

      4.5MB

      MD5

      37200dd4e6070cfbd52962142a37042c

      SHA1

      db222cda218b9e4be1a7e9abd9c8dedb85740366

      SHA256

      c6fe992dbabdd7e073740ba21ab8f96a1c34832d467c1312217a8e1b56d3818c

      SHA512

      b63841cb308caffa82aa26506dc730e263874c5c0518b13f14658ff9a7e9116af2c40c0f5daf564916e78d3809268a0bb9c1334c4850d2e05623025c958726ee

    • \Users\Admin\AppData\Roaming\1467997772.exe
      Filesize

      4.0MB

      MD5

      3c1a35fa54ee724987c28716eb1f5631

      SHA1

      1dcee84fc37306c656b72d2143a59d8e64281819

      SHA256

      93ad379a0fb0e682e9afa1f2e728f8fb5a39c15a7d13cd8b6c432d24d6064e57

      SHA512

      e4c516d10dc3e05d334d38988724a2c5dafb73ecfcd1b4ee7351eccab889d2ac0f9a3799da2f4af626bb15e3a32aaf284c6b4d966a11539083916e7677fd29f2

    • \Users\Admin\AppData\Roaming\1467997772.exe
      Filesize

      4.0MB

      MD5

      3c1a35fa54ee724987c28716eb1f5631

      SHA1

      1dcee84fc37306c656b72d2143a59d8e64281819

      SHA256

      93ad379a0fb0e682e9afa1f2e728f8fb5a39c15a7d13cd8b6c432d24d6064e57

      SHA512

      e4c516d10dc3e05d334d38988724a2c5dafb73ecfcd1b4ee7351eccab889d2ac0f9a3799da2f4af626bb15e3a32aaf284c6b4d966a11539083916e7677fd29f2

    • \Users\Admin\AppData\Roaming\@heis999_crypted.exe
      Filesize

      4.5MB

      MD5

      37200dd4e6070cfbd52962142a37042c

      SHA1

      db222cda218b9e4be1a7e9abd9c8dedb85740366

      SHA256

      c6fe992dbabdd7e073740ba21ab8f96a1c34832d467c1312217a8e1b56d3818c

      SHA512

      b63841cb308caffa82aa26506dc730e263874c5c0518b13f14658ff9a7e9116af2c40c0f5daf564916e78d3809268a0bb9c1334c4850d2e05623025c958726ee

    • memory/1316-80-0x0000000000BC0000-0x00000000019D2000-memory.dmp
      Filesize

      14.1MB

    • memory/1316-66-0x0000000000BC0000-0x00000000019D2000-memory.dmp
      Filesize

      14.1MB

    • memory/1316-62-0x0000000000000000-mapping.dmp
    • memory/1608-54-0x0000000075A91000-0x0000000075A93000-memory.dmp
      Filesize

      8KB

    • memory/1984-64-0x00000000003D0000-0x00000000003D4000-memory.dmp
      Filesize

      16KB

    • memory/1984-59-0x0000000000400000-0x00000000009E6000-memory.dmp
      Filesize

      5.9MB

    • memory/1984-63-0x0000000000CE0000-0x0000000001142000-memory.dmp
      Filesize

      4.4MB

    • memory/1984-58-0x0000000000400000-0x00000000009E6000-memory.dmp
      Filesize

      5.9MB

    • memory/1984-77-0x0000000000400000-0x00000000009E6000-memory.dmp
      Filesize

      5.9MB

    • memory/1984-78-0x0000000000CE0000-0x0000000001142000-memory.dmp
      Filesize

      4.4MB

    • memory/1984-56-0x0000000000000000-mapping.dmp
    • memory/161352-67-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/161352-69-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/161352-74-0x000000000041A7CE-mapping.dmp
    • memory/161352-76-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/161352-75-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB