Analysis

  • max time kernel
    96s
  • max time network
    178s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01/11/2022, 11:36

General

  • Target

    e323e77e4de084cbd021f145ea6c06272cc02b3cc205661b1f1a0b394c1479a7.exe

  • Size

    2.4MB

  • MD5

    6d08b9c640d37b92015c4089b67b60fc

  • SHA1

    0ef593211a9490ad9133e270ed25167bdfabc442

  • SHA256

    e323e77e4de084cbd021f145ea6c06272cc02b3cc205661b1f1a0b394c1479a7

  • SHA512

    81f363b875025a53ff9ad3f97c0f991e73c43ad9d6ae6f8bd12e901a4b24527b1d33fb58d4c85b08aa2d39aed1ef18efac5d4e8eb18a3c2be2e54fea272750fa

  • SSDEEP

    24576:KQZc1Jo4kY0Yzo95v9dUMzLsc0dqWU1va3945IW6YM1ACS9hLxrHl3RuQ55313e:Nq1JoTUDyt6YMKCS9hxl34

Malware Config

Extracted

Family

redline

Botnet

ubivica

C2

185.106.92.228:24221

Attributes
  • auth_value

    ce5fd9c1dbac271cad6d4c8ac467dd30

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e323e77e4de084cbd021f145ea6c06272cc02b3cc205661b1f1a0b394c1479a7.exe
    "C:\Users\Admin\AppData\Local\Temp\e323e77e4de084cbd021f145ea6c06272cc02b3cc205661b1f1a0b394c1479a7.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2708
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4008
      • C:\Users\Admin\AppData\Local\Temp\build.exe
        "C:\Users\Admin\AppData\Local\Temp\build.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4852
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell "" "Get-WmiObject Win32_PortConnector"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4944

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\build.exe

    Filesize

    4.3MB

    MD5

    98a18c083befbe5c1dbde47292fc2b12

    SHA1

    6782b8a22a9596c57e4ac3adad9a39bf40ce811b

    SHA256

    11c8d7044705de2a4f724e27223e3a10b753e8b213525fe8aca71fcb7aea95ef

    SHA512

    5bcda777d4d3c47c7c9e21bd688f617b26703ffec73aa7af9a14489480451d33bf3eb52296bcc7c4bf5f28756661e626d9732f30e2266ec08813fc0bb1bd5e09

  • C:\Users\Admin\AppData\Local\Temp\build.exe

    Filesize

    4.3MB

    MD5

    98a18c083befbe5c1dbde47292fc2b12

    SHA1

    6782b8a22a9596c57e4ac3adad9a39bf40ce811b

    SHA256

    11c8d7044705de2a4f724e27223e3a10b753e8b213525fe8aca71fcb7aea95ef

    SHA512

    5bcda777d4d3c47c7c9e21bd688f617b26703ffec73aa7af9a14489480451d33bf3eb52296bcc7c4bf5f28756661e626d9732f30e2266ec08813fc0bb1bd5e09

  • memory/2708-116-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/2708-118-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/2708-117-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/2708-119-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/2708-120-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/2708-115-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/2708-121-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/2708-125-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/2708-124-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/2708-123-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/2708-122-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/2708-128-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/2708-127-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/2708-126-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/2708-130-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/2708-129-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-131-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4008-137-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-140-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-143-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-144-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-141-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-139-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-147-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-148-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-151-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-152-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-150-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-149-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-146-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-138-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-153-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-157-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-160-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-159-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-161-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-162-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-158-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-156-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-155-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-154-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-163-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-164-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-165-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-167-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-166-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-168-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-170-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-171-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-172-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-173-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-176-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-177-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-179-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-178-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-175-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-180-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-174-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-181-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-182-0x0000000077AD0000-0x0000000077C5E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-192-0x0000000009A70000-0x000000000A076000-memory.dmp

    Filesize

    6.0MB

  • memory/4008-193-0x00000000095D0000-0x00000000096DA000-memory.dmp

    Filesize

    1.0MB

  • memory/4008-195-0x0000000009500000-0x0000000009512000-memory.dmp

    Filesize

    72KB

  • memory/4008-197-0x0000000009560000-0x000000000959E000-memory.dmp

    Filesize

    248KB

  • memory/4008-199-0x00000000096E0000-0x000000000972B000-memory.dmp

    Filesize

    300KB

  • memory/4008-207-0x00000000098B0000-0x0000000009942000-memory.dmp

    Filesize

    584KB

  • memory/4008-208-0x000000000A580000-0x000000000AA7E000-memory.dmp

    Filesize

    5.0MB

  • memory/4008-211-0x0000000009950000-0x00000000099B6000-memory.dmp

    Filesize

    408KB

  • memory/4008-225-0x000000000AC50000-0x000000000AE12000-memory.dmp

    Filesize

    1.8MB

  • memory/4008-226-0x000000000B350000-0x000000000B87C000-memory.dmp

    Filesize

    5.2MB

  • memory/4008-571-0x000000000B220000-0x000000000B296000-memory.dmp

    Filesize

    472KB

  • memory/4008-572-0x000000000B2A0000-0x000000000B2F0000-memory.dmp

    Filesize

    320KB

  • memory/4852-620-0x00000000003C0000-0x00000000011F9000-memory.dmp

    Filesize

    14.2MB

  • memory/4852-621-0x00000000003C0000-0x00000000011F9000-memory.dmp

    Filesize

    14.2MB

  • memory/4852-640-0x00000000003C0000-0x00000000011F9000-memory.dmp

    Filesize

    14.2MB

  • memory/4944-627-0x0000028B60780000-0x0000028B607A2000-memory.dmp

    Filesize

    136KB

  • memory/4944-631-0x0000028B796F0000-0x0000028B79766000-memory.dmp

    Filesize

    472KB