Analysis

  • max time kernel
    45s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2022, 22:18

General

  • Target

    da4f7ab4335741da73cdc9d9e8ec197aeb015aad2e149c8e903e9854fc8b2381.exe

  • Size

    5.5MB

  • MD5

    24592dbf8073fce528cd270cd8fba5e1

  • SHA1

    f50fb2cd1772cc4bb336e8f1aeade9e12a65a817

  • SHA256

    da4f7ab4335741da73cdc9d9e8ec197aeb015aad2e149c8e903e9854fc8b2381

  • SHA512

    21e4147ce76080488f532683f273978112cb1aa1262e7c5bfb9c16c7bf84f8289b9c5d8894f5bb8cf90e9262873f21563d636492bb90a020537c27335ad481a5

  • SSDEEP

    49152:0PFJCvLqOaSTK5ISawpVpVliC8Tkx4HS2TQ:0PFsjqOaSFUN2T

Malware Config

Extracted

Family

redline

Botnet

ANUBIS13

C2

185.215.113.217:25060

Attributes
  • auth_value

    4df54404f211b2ab9f27688b8eb20b17

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da4f7ab4335741da73cdc9d9e8ec197aeb015aad2e149c8e903e9854fc8b2381.exe
    "C:\Users\Admin\AppData\Local\Temp\da4f7ab4335741da73cdc9d9e8ec197aeb015aad2e149c8e903e9854fc8b2381.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Users\Admin\AppData\Roaming\Adapter Cins\Name.exe
      "C:\Users\Admin\AppData\Roaming\Adapter Cins\Name.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:936
      • C:\Users\Admin\AppData\Roaming\Adapter Cins\Name.exe
        "C:\Users\Admin\AppData\Roaming\Adapter Cins\Name.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1472

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adapter Cins\Name.exe

    Filesize

    427KB

    MD5

    44da63ff962447eb7496cd168ae44712

    SHA1

    d84d050fbed33c8fe5ad69fee3abdecccabf0c1a

    SHA256

    8997bbcc5abb11e0be1683957f85ee94b5de4e5119bd2a7994a78e06c532d07b

    SHA512

    d66712e34ebae2087d4b96a474d693313844dd10b68ce1cb9a1387c5b435ab6fd4f96f6ff1cd9a8682c013bca5d26f7370e55c2937eee779939766af59348475

  • C:\Users\Admin\AppData\Roaming\Adapter Cins\Name.exe

    Filesize

    427KB

    MD5

    44da63ff962447eb7496cd168ae44712

    SHA1

    d84d050fbed33c8fe5ad69fee3abdecccabf0c1a

    SHA256

    8997bbcc5abb11e0be1683957f85ee94b5de4e5119bd2a7994a78e06c532d07b

    SHA512

    d66712e34ebae2087d4b96a474d693313844dd10b68ce1cb9a1387c5b435ab6fd4f96f6ff1cd9a8682c013bca5d26f7370e55c2937eee779939766af59348475

  • C:\Users\Admin\AppData\Roaming\Adapter Cins\Name.exe

    Filesize

    427KB

    MD5

    44da63ff962447eb7496cd168ae44712

    SHA1

    d84d050fbed33c8fe5ad69fee3abdecccabf0c1a

    SHA256

    8997bbcc5abb11e0be1683957f85ee94b5de4e5119bd2a7994a78e06c532d07b

    SHA512

    d66712e34ebae2087d4b96a474d693313844dd10b68ce1cb9a1387c5b435ab6fd4f96f6ff1cd9a8682c013bca5d26f7370e55c2937eee779939766af59348475

  • \Users\Admin\AppData\Roaming\Adapter Cins\Name.exe

    Filesize

    427KB

    MD5

    44da63ff962447eb7496cd168ae44712

    SHA1

    d84d050fbed33c8fe5ad69fee3abdecccabf0c1a

    SHA256

    8997bbcc5abb11e0be1683957f85ee94b5de4e5119bd2a7994a78e06c532d07b

    SHA512

    d66712e34ebae2087d4b96a474d693313844dd10b68ce1cb9a1387c5b435ab6fd4f96f6ff1cd9a8682c013bca5d26f7370e55c2937eee779939766af59348475

  • \Users\Admin\AppData\Roaming\Adapter Cins\Name.exe

    Filesize

    427KB

    MD5

    44da63ff962447eb7496cd168ae44712

    SHA1

    d84d050fbed33c8fe5ad69fee3abdecccabf0c1a

    SHA256

    8997bbcc5abb11e0be1683957f85ee94b5de4e5119bd2a7994a78e06c532d07b

    SHA512

    d66712e34ebae2087d4b96a474d693313844dd10b68ce1cb9a1387c5b435ab6fd4f96f6ff1cd9a8682c013bca5d26f7370e55c2937eee779939766af59348475

  • memory/936-61-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/936-69-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/1472-63-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1472-65-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1472-70-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1472-71-0x0000000001F10000-0x0000000001F4E000-memory.dmp

    Filesize

    248KB

  • memory/1472-72-0x0000000002040000-0x000000000207C000-memory.dmp

    Filesize

    240KB

  • memory/1472-74-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1472-75-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2020-60-0x0000000003640000-0x0000000003674000-memory.dmp

    Filesize

    208KB

  • memory/2020-54-0x00000000756B1000-0x00000000756B3000-memory.dmp

    Filesize

    8KB

  • memory/2020-59-0x0000000003640000-0x0000000003674000-memory.dmp

    Filesize

    208KB