Analysis

  • max time kernel
    124s
  • max time network
    206s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    09-02-2023 13:11

General

  • Target

    7d87c4bc2f2d293c42d30b5c85b7a061.exe

  • Size

    518KB

  • MD5

    7d87c4bc2f2d293c42d30b5c85b7a061

  • SHA1

    4cab1a968d1e93eb0b6ec52f0df4f9d7e56029d1

  • SHA256

    72fa014db49738f6ab72b7e127c30d4d15a7e6c03aaa5c3a7e06be766858a124

  • SHA512

    d33fb6f6dca80349b1f23f206c85d915d683ebb8d3ce9dffa1ada6e48d25d45fafb19b6692e88a1431f1926faf48bec3f64516e42fe84e9b67c30bf47764c884

  • SSDEEP

    12288:JMrny90xCiQb5c+bKuZdZ3+Nxpsvka6OIOIpCNAJ:CyKCdba+nr37vP6s8CuJ

Malware Config

Extracted

Family

redline

Botnet

romka

C2

193.233.20.11:4131

Attributes
  • auth_value

    fcbb3247051f5290e8ac5b1a841af67b

Extracted

Family

redline

Botnet

crypt

C2

176.113.115.17:4132

Attributes
  • auth_value

    407e05c9b3a74d99a20f90b091547bd6

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d87c4bc2f2d293c42d30b5c85b7a061.exe
    "C:\Users\Admin\AppData\Local\Temp\7d87c4bc2f2d293c42d30b5c85b7a061.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1404
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bzPf.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bzPf.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1204
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\czPzPa.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\czPzPa.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1136
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2040

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bzPf.exe

    Filesize

    306KB

    MD5

    bfd3c9cc73189c612ad98425537629c0

    SHA1

    e6c5a48b6a75b9bd237212b0383e21cd6c267554

    SHA256

    b7348280cc2e1e0f18dde17f01245b80b54e5440a47231881f25ef8c03723680

    SHA512

    f30fc3389d407c9a003ad7b9b98f6e345a09d5ef9d44eb0c77de245b5b49b79a150afbe01029efceba610eaa2188d169528e04223e4fd83b44384526f633365e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bzPf.exe

    Filesize

    306KB

    MD5

    bfd3c9cc73189c612ad98425537629c0

    SHA1

    e6c5a48b6a75b9bd237212b0383e21cd6c267554

    SHA256

    b7348280cc2e1e0f18dde17f01245b80b54e5440a47231881f25ef8c03723680

    SHA512

    f30fc3389d407c9a003ad7b9b98f6e345a09d5ef9d44eb0c77de245b5b49b79a150afbe01029efceba610eaa2188d169528e04223e4fd83b44384526f633365e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\czPzPa.exe

    Filesize

    283KB

    MD5

    457dcca2cfa8e1592521e4bc580d2097

    SHA1

    de855fa7934126fd1cde834b752999ebe79e367f

    SHA256

    54ce28a037eea87448e65bc25f8d3a38ddd4b4679516cc59899b77150aa46fcc

    SHA512

    d15709dd44e184612a86e7201c78887771e7cc062e8b4daf83c5bbf1d6dd74320e8c5058cde295d412d8e5b135f8686f8ed56aa9aa2a439b022319e6723bb752

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\czPzPa.exe

    Filesize

    283KB

    MD5

    457dcca2cfa8e1592521e4bc580d2097

    SHA1

    de855fa7934126fd1cde834b752999ebe79e367f

    SHA256

    54ce28a037eea87448e65bc25f8d3a38ddd4b4679516cc59899b77150aa46fcc

    SHA512

    d15709dd44e184612a86e7201c78887771e7cc062e8b4daf83c5bbf1d6dd74320e8c5058cde295d412d8e5b135f8686f8ed56aa9aa2a439b022319e6723bb752

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\bzPf.exe

    Filesize

    306KB

    MD5

    bfd3c9cc73189c612ad98425537629c0

    SHA1

    e6c5a48b6a75b9bd237212b0383e21cd6c267554

    SHA256

    b7348280cc2e1e0f18dde17f01245b80b54e5440a47231881f25ef8c03723680

    SHA512

    f30fc3389d407c9a003ad7b9b98f6e345a09d5ef9d44eb0c77de245b5b49b79a150afbe01029efceba610eaa2188d169528e04223e4fd83b44384526f633365e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\bzPf.exe

    Filesize

    306KB

    MD5

    bfd3c9cc73189c612ad98425537629c0

    SHA1

    e6c5a48b6a75b9bd237212b0383e21cd6c267554

    SHA256

    b7348280cc2e1e0f18dde17f01245b80b54e5440a47231881f25ef8c03723680

    SHA512

    f30fc3389d407c9a003ad7b9b98f6e345a09d5ef9d44eb0c77de245b5b49b79a150afbe01029efceba610eaa2188d169528e04223e4fd83b44384526f633365e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\bzPf.exe

    Filesize

    306KB

    MD5

    bfd3c9cc73189c612ad98425537629c0

    SHA1

    e6c5a48b6a75b9bd237212b0383e21cd6c267554

    SHA256

    b7348280cc2e1e0f18dde17f01245b80b54e5440a47231881f25ef8c03723680

    SHA512

    f30fc3389d407c9a003ad7b9b98f6e345a09d5ef9d44eb0c77de245b5b49b79a150afbe01029efceba610eaa2188d169528e04223e4fd83b44384526f633365e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\czPzPa.exe

    Filesize

    283KB

    MD5

    457dcca2cfa8e1592521e4bc580d2097

    SHA1

    de855fa7934126fd1cde834b752999ebe79e367f

    SHA256

    54ce28a037eea87448e65bc25f8d3a38ddd4b4679516cc59899b77150aa46fcc

    SHA512

    d15709dd44e184612a86e7201c78887771e7cc062e8b4daf83c5bbf1d6dd74320e8c5058cde295d412d8e5b135f8686f8ed56aa9aa2a439b022319e6723bb752

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\czPzPa.exe

    Filesize

    283KB

    MD5

    457dcca2cfa8e1592521e4bc580d2097

    SHA1

    de855fa7934126fd1cde834b752999ebe79e367f

    SHA256

    54ce28a037eea87448e65bc25f8d3a38ddd4b4679516cc59899b77150aa46fcc

    SHA512

    d15709dd44e184612a86e7201c78887771e7cc062e8b4daf83c5bbf1d6dd74320e8c5058cde295d412d8e5b135f8686f8ed56aa9aa2a439b022319e6723bb752

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\czPzPa.exe

    Filesize

    283KB

    MD5

    457dcca2cfa8e1592521e4bc580d2097

    SHA1

    de855fa7934126fd1cde834b752999ebe79e367f

    SHA256

    54ce28a037eea87448e65bc25f8d3a38ddd4b4679516cc59899b77150aa46fcc

    SHA512

    d15709dd44e184612a86e7201c78887771e7cc062e8b4daf83c5bbf1d6dd74320e8c5058cde295d412d8e5b135f8686f8ed56aa9aa2a439b022319e6723bb752

  • memory/1136-77-0x0000000000163000-0x0000000000165000-memory.dmp

    Filesize

    8KB

  • memory/1204-62-0x0000000002330000-0x0000000002376000-memory.dmp

    Filesize

    280KB

  • memory/1204-69-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/1204-65-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/1204-64-0x00000000002F0000-0x000000000033B000-memory.dmp

    Filesize

    300KB

  • memory/1204-63-0x000000000066F000-0x000000000069E000-memory.dmp

    Filesize

    188KB

  • memory/1204-68-0x000000000066F000-0x000000000069E000-memory.dmp

    Filesize

    188KB

  • memory/1204-66-0x0000000002370000-0x00000000023B4000-memory.dmp

    Filesize

    272KB

  • memory/1204-67-0x000000000066F000-0x000000000069E000-memory.dmp

    Filesize

    188KB

  • memory/1404-54-0x0000000075831000-0x0000000075833000-memory.dmp

    Filesize

    8KB

  • memory/2040-78-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2040-80-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2040-86-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2040-87-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB