Analysis
-
max time kernel
127s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
13-10-2022 16:30
Static task
static1
Behavioral task
behavioral1
Sample
BOT_SETUP2022/SETUP.exe
Resource
win7-20220812-en
General
-
Target
BOT_SETUP2022/SETUP.exe
-
Size
5.5MB
-
MD5
ed40898f7e28068cf4b1ced8b502395c
-
SHA1
b148b0033ee8a6d0158ebec162a263b668fa9510
-
SHA256
5d8f2f6b4203e5785450eb6968570e5fd07de1f4627f75416e175ac53b0b9bd7
-
SHA512
566379fab2bb6f71b264ff5381375313b9eb0d0b3a46e89001648c3d38a867124ec970feb3bc4f9963253b885e47021291e1d64457fb89de0d176c2a61c261e2
-
SSDEEP
98304:ESAjmq5KGe4EaQmMKYBoyXdjOHn/R0lrUg1Cd1PYQIRGrPqVg3bEGM07rAWmI+T:ESumoKGNLoKYqyXVOfarUgTQ4GrPUibE
Malware Config
Extracted
redline
185.200.191.18:80
-
auth_value
f902a77d89afd7a0dcc0127007a4bb3c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/161352-69-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/161352-74-0x000000000041A7CE-mapping.dmp family_redline behavioral1/memory/1984-77-0x0000000000400000-0x00000000009E6000-memory.dmp family_redline behavioral1/memory/161352-76-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/161352-75-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
YTStealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1316-66-0x0000000000BC0000-0x00000000019D2000-memory.dmp family_ytstealer behavioral1/memory/1316-80-0x0000000000BC0000-0x00000000019D2000-memory.dmp family_ytstealer -
Executes dropped EXE 2 IoCs
Processes:
@heis999_crypted.exe1467997772.exepid process 1984 @heis999_crypted.exe 1316 1467997772.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\1467997772.exe upx \Users\Admin\AppData\Roaming\1467997772.exe upx C:\Users\Admin\AppData\Roaming\1467997772.exe upx behavioral1/memory/1316-66-0x0000000000BC0000-0x00000000019D2000-memory.dmp upx behavioral1/memory/1316-80-0x0000000000BC0000-0x00000000019D2000-memory.dmp upx -
Loads dropped DLL 3 IoCs
Processes:
SETUP.exepid process 1608 SETUP.exe 1608 SETUP.exe 1608 SETUP.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
@heis999_crypted.exedescription pid process target process PID 1984 set thread context of 161352 1984 @heis999_crypted.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
@heis999_crypted.exedescription pid process Token: 33 1984 @heis999_crypted.exe Token: SeIncBasePriorityPrivilege 1984 @heis999_crypted.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
SETUP.exe@heis999_crypted.exedescription pid process target process PID 1608 wrote to memory of 1984 1608 SETUP.exe @heis999_crypted.exe PID 1608 wrote to memory of 1984 1608 SETUP.exe @heis999_crypted.exe PID 1608 wrote to memory of 1984 1608 SETUP.exe @heis999_crypted.exe PID 1608 wrote to memory of 1984 1608 SETUP.exe @heis999_crypted.exe PID 1608 wrote to memory of 1316 1608 SETUP.exe 1467997772.exe PID 1608 wrote to memory of 1316 1608 SETUP.exe 1467997772.exe PID 1608 wrote to memory of 1316 1608 SETUP.exe 1467997772.exe PID 1608 wrote to memory of 1316 1608 SETUP.exe 1467997772.exe PID 1984 wrote to memory of 161352 1984 @heis999_crypted.exe AppLaunch.exe PID 1984 wrote to memory of 161352 1984 @heis999_crypted.exe AppLaunch.exe PID 1984 wrote to memory of 161352 1984 @heis999_crypted.exe AppLaunch.exe PID 1984 wrote to memory of 161352 1984 @heis999_crypted.exe AppLaunch.exe PID 1984 wrote to memory of 161352 1984 @heis999_crypted.exe AppLaunch.exe PID 1984 wrote to memory of 161352 1984 @heis999_crypted.exe AppLaunch.exe PID 1984 wrote to memory of 161352 1984 @heis999_crypted.exe AppLaunch.exe PID 1984 wrote to memory of 161352 1984 @heis999_crypted.exe AppLaunch.exe PID 1984 wrote to memory of 161352 1984 @heis999_crypted.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\BOT_SETUP2022\SETUP.exe"C:\Users\Admin\AppData\Local\Temp\BOT_SETUP2022\SETUP.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Roaming\@heis999_crypted.exeC:\Users\Admin\AppData\Roaming\@heis999_crypted.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:161352
-
-
-
C:\Users\Admin\AppData\Roaming\1467997772.exeC:\Users\Admin\AppData\Roaming\1467997772.exe2⤵
- Executes dropped EXE
PID:1316
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.0MB
MD53c1a35fa54ee724987c28716eb1f5631
SHA11dcee84fc37306c656b72d2143a59d8e64281819
SHA25693ad379a0fb0e682e9afa1f2e728f8fb5a39c15a7d13cd8b6c432d24d6064e57
SHA512e4c516d10dc3e05d334d38988724a2c5dafb73ecfcd1b4ee7351eccab889d2ac0f9a3799da2f4af626bb15e3a32aaf284c6b4d966a11539083916e7677fd29f2
-
Filesize
4.5MB
MD537200dd4e6070cfbd52962142a37042c
SHA1db222cda218b9e4be1a7e9abd9c8dedb85740366
SHA256c6fe992dbabdd7e073740ba21ab8f96a1c34832d467c1312217a8e1b56d3818c
SHA512b63841cb308caffa82aa26506dc730e263874c5c0518b13f14658ff9a7e9116af2c40c0f5daf564916e78d3809268a0bb9c1334c4850d2e05623025c958726ee
-
Filesize
4.0MB
MD53c1a35fa54ee724987c28716eb1f5631
SHA11dcee84fc37306c656b72d2143a59d8e64281819
SHA25693ad379a0fb0e682e9afa1f2e728f8fb5a39c15a7d13cd8b6c432d24d6064e57
SHA512e4c516d10dc3e05d334d38988724a2c5dafb73ecfcd1b4ee7351eccab889d2ac0f9a3799da2f4af626bb15e3a32aaf284c6b4d966a11539083916e7677fd29f2
-
Filesize
4.0MB
MD53c1a35fa54ee724987c28716eb1f5631
SHA11dcee84fc37306c656b72d2143a59d8e64281819
SHA25693ad379a0fb0e682e9afa1f2e728f8fb5a39c15a7d13cd8b6c432d24d6064e57
SHA512e4c516d10dc3e05d334d38988724a2c5dafb73ecfcd1b4ee7351eccab889d2ac0f9a3799da2f4af626bb15e3a32aaf284c6b4d966a11539083916e7677fd29f2
-
Filesize
4.5MB
MD537200dd4e6070cfbd52962142a37042c
SHA1db222cda218b9e4be1a7e9abd9c8dedb85740366
SHA256c6fe992dbabdd7e073740ba21ab8f96a1c34832d467c1312217a8e1b56d3818c
SHA512b63841cb308caffa82aa26506dc730e263874c5c0518b13f14658ff9a7e9116af2c40c0f5daf564916e78d3809268a0bb9c1334c4850d2e05623025c958726ee