Analysis

  • max time kernel
    43s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 13:35

General

  • Target

    9b0e09d7ff6b42667e744dd7ee8623a6.exe

  • Size

    660KB

  • MD5

    9b0e09d7ff6b42667e744dd7ee8623a6

  • SHA1

    b7d6cc0c3d04c6ac6e757dadadd59fcffd69fd89

  • SHA256

    05aed5bb6d590c1b0781804889957f73a85aa49c248f0e1c453ffc2777f4d5fb

  • SHA512

    6742fd1c3e1c91ed0361be377f5df52658abde63d9c70f47716c82337673c3993445c94e2cd5325f07257ca975e694bb96cf7e3c2e5b8c438e35b803a74104a2

  • SSDEEP

    6144:e7BzKQRNBVp8iZ0WEpAorPDWpeawdAhrlZlboHdw+eGPNcrW9EE:iBzbXp/0WExrrWpcihrzlboamisEE

Malware Config

Extracted

Family

redline

Botnet

top2

C2

chardhesha.xyz:81

jalocliche.xyz:81

Attributes
  • auth_value

    706cbcaf3ac7dba064257646e57776cd

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9b0e09d7ff6b42667e744dd7ee8623a6.exe
    "C:\Users\Admin\AppData\Local\Temp\9b0e09d7ff6b42667e744dd7ee8623a6.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1468
    • C:\Windows\Temp\top2.exe
      "C:\Windows\Temp\top2.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:284

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Temp\top2.exe

    Filesize

    137KB

    MD5

    acf056d8de0cda2acdd12e036f3eec99

    SHA1

    7333b641c92b5c6ff5f5af32c1954e3c7566877d

    SHA256

    2027dedfec9e09c58388ab769027118602b6f7b28cda697a18280483babc2705

    SHA512

    24fec5b1d995a7b5d7209daab96e5b112d76e6d9e176060f87f21581923966743c239e89bbb6c690f3b076f4a4a689fca380d0d3313628679139ef0f6ffac1af

  • C:\Windows\Temp\top2.exe

    Filesize

    137KB

    MD5

    acf056d8de0cda2acdd12e036f3eec99

    SHA1

    7333b641c92b5c6ff5f5af32c1954e3c7566877d

    SHA256

    2027dedfec9e09c58388ab769027118602b6f7b28cda697a18280483babc2705

    SHA512

    24fec5b1d995a7b5d7209daab96e5b112d76e6d9e176060f87f21581923966743c239e89bbb6c690f3b076f4a4a689fca380d0d3313628679139ef0f6ffac1af

  • \Windows\Temp\top2.exe

    Filesize

    137KB

    MD5

    acf056d8de0cda2acdd12e036f3eec99

    SHA1

    7333b641c92b5c6ff5f5af32c1954e3c7566877d

    SHA256

    2027dedfec9e09c58388ab769027118602b6f7b28cda697a18280483babc2705

    SHA512

    24fec5b1d995a7b5d7209daab96e5b112d76e6d9e176060f87f21581923966743c239e89bbb6c690f3b076f4a4a689fca380d0d3313628679139ef0f6ffac1af

  • memory/284-58-0x0000000000000000-mapping.dmp

  • memory/284-61-0x00000000000C0000-0x00000000000E8000-memory.dmp

    Filesize

    160KB

  • memory/1468-54-0x0000000000120000-0x00000000001CC000-memory.dmp

    Filesize

    688KB

  • memory/1468-55-0x0000000076BA1000-0x0000000076BA3000-memory.dmp

    Filesize

    8KB

  • memory/1468-56-0x00000000005B0000-0x00000000005DA000-memory.dmp

    Filesize

    168KB