Analysis
-
max time kernel
95s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2022 19:02
Static task
static1
Behavioral task
behavioral1
Sample
d6e9e86e003086022805cd59d1a406bd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d6e9e86e003086022805cd59d1a406bd.exe
Resource
win10v2004-20220901-en
General
-
Target
d6e9e86e003086022805cd59d1a406bd.exe
-
Size
785KB
-
MD5
d6e9e86e003086022805cd59d1a406bd
-
SHA1
514a4aaa1d1a0577fb1f84ff5d36cba8ea9619ea
-
SHA256
29a808de2d82612a27d0ffb5a6505a90e0884d8ea332a282847d7da04f52b5f1
-
SHA512
bff9b88db4187f31f1aa4f405d676df909eacf5ad48a9f413278e2fdc656e735c0ab265f0f4cdc87b8885d15109ffc7cfca071faca9352988ec2a6f0afb36ac9
-
SSDEEP
1536:Wrae78zjORCDGwfdCSog01313os5gP2DKPJY8rPf128M+ZtgTr2u92PUmqIf0O0Q:uahKyd2n31x5BuIZ7T9vGPr
Malware Config
Extracted
redline
bethoven
185.215.113.46:8223
-
auth_value
42d21fccbcd8cb0441971e6ed0b0897a
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/3504-146-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
Executes dropped EXE 2 IoCs
pid Process 3264 SETUP_~1.EXE 3504 SETUP_~1.EXE -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation SETUP_~1.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce d6e9e86e003086022805cd59d1a406bd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d6e9e86e003086022805cd59d1a406bd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3264 set thread context of 3504 3264 SETUP_~1.EXE 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 100 powershell.exe 100 powershell.exe 3504 SETUP_~1.EXE 3504 SETUP_~1.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3264 SETUP_~1.EXE Token: SeDebugPrivilege 100 powershell.exe Token: SeDebugPrivilege 3504 SETUP_~1.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 384 wrote to memory of 3264 384 d6e9e86e003086022805cd59d1a406bd.exe 82 PID 384 wrote to memory of 3264 384 d6e9e86e003086022805cd59d1a406bd.exe 82 PID 384 wrote to memory of 3264 384 d6e9e86e003086022805cd59d1a406bd.exe 82 PID 3264 wrote to memory of 100 3264 SETUP_~1.EXE 87 PID 3264 wrote to memory of 100 3264 SETUP_~1.EXE 87 PID 3264 wrote to memory of 100 3264 SETUP_~1.EXE 87 PID 3264 wrote to memory of 3504 3264 SETUP_~1.EXE 92 PID 3264 wrote to memory of 3504 3264 SETUP_~1.EXE 92 PID 3264 wrote to memory of 3504 3264 SETUP_~1.EXE 92 PID 3264 wrote to memory of 3504 3264 SETUP_~1.EXE 92 PID 3264 wrote to memory of 3504 3264 SETUP_~1.EXE 92 PID 3264 wrote to memory of 3504 3264 SETUP_~1.EXE 92 PID 3264 wrote to memory of 3504 3264 SETUP_~1.EXE 92 PID 3264 wrote to memory of 3504 3264 SETUP_~1.EXE 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6e9e86e003086022805cd59d1a406bd.exe"C:\Users\Admin\AppData\Local\Temp\d6e9e86e003086022805cd59d1a406bd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA0AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:100
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3504
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e87e48b105757e1c7563d1c719059733
SHA128a3f2b2e0672da2b531f4757d2b20b53032dafc
SHA2560aaf22dc84cc3fcfe53de7ccfed8e662247dfb7f1a9967032c88790d0c663461
SHA512bf19c5743143aee914a453c41189c722c9b90a5b8bf299cecf3e1f97656d32cd209ecb74da8aebc89bb41c27d189f73aaaabbc64fe383410c95dc76ad4218968
-
Filesize
333.8MB
MD56adc030eeebd67c41f767f7ff4d7fea0
SHA1e5d80aff951e4b6df714cb4eb650bafb54e87370
SHA256b12ba6202ed39313ebef9404fd7513effd5c00d8e3f403fe971a8550843ef5ec
SHA5129a3c48019d245e2a6e041bd8aa0a477c9f24d5678036a6252d112fe493283e5996ffbdcc7d0c8fdafbe0d636a4d26ae28a1c476222dbabb5ad9893b64e977475
-
Filesize
333.8MB
MD56adc030eeebd67c41f767f7ff4d7fea0
SHA1e5d80aff951e4b6df714cb4eb650bafb54e87370
SHA256b12ba6202ed39313ebef9404fd7513effd5c00d8e3f403fe971a8550843ef5ec
SHA5129a3c48019d245e2a6e041bd8aa0a477c9f24d5678036a6252d112fe493283e5996ffbdcc7d0c8fdafbe0d636a4d26ae28a1c476222dbabb5ad9893b64e977475
-
Filesize
333.8MB
MD56adc030eeebd67c41f767f7ff4d7fea0
SHA1e5d80aff951e4b6df714cb4eb650bafb54e87370
SHA256b12ba6202ed39313ebef9404fd7513effd5c00d8e3f403fe971a8550843ef5ec
SHA5129a3c48019d245e2a6e041bd8aa0a477c9f24d5678036a6252d112fe493283e5996ffbdcc7d0c8fdafbe0d636a4d26ae28a1c476222dbabb5ad9893b64e977475