Analysis

  • max time kernel
    85s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-03-2023 10:51

General

  • Target

    446215913dd436aae1317ad90bf75677.exe

  • Size

    4.2MB

  • MD5

    446215913dd436aae1317ad90bf75677

  • SHA1

    6f9c887f3fe17b16045fd2fa2d754c744447a4d2

  • SHA256

    4bbf8447f25f44cabc87e9e20bf6594475f999a58e86c76bbad265d1db9bd513

  • SHA512

    dd1b3f89efb92245640289b43ceedbf3bb562578286966d3a72bd03ff145f36054788353d39804489174c6f9018624820f54cad560394be7cf09f5127188acb3

  • SSDEEP

    98304:scyyd+oHduCY3f3rFQtAjgyzZdGxHeqWF0KfgOjCH:sAswQFQtLUGFeqlm

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

185.246.220.122:1488

Attributes
  • communication_password

    81dc9bdb52d04dc20036dbd8313ed055

  • tor_process

    tor

Extracted

Family

redline

C2

185.246.220.122:7164

Attributes
  • auth_value

    bc36aaf1c6447fa611401422deaa29dd

Signatures

  • BitRAT

    BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\446215913dd436aae1317ad90bf75677.exe
    "C:\Users\Admin\AppData\Local\Temp\446215913dd436aae1317ad90bf75677.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2644
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
      2⤵
        PID:1732
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1732 -s 184
          3⤵
          • Program crash
          PID:2560
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1732 -s 188
          3⤵
          • Program crash
          PID:3128
      • C:\Users\Admin\AppData\Local\Temp\rr.exe
        "C:\Users\Admin\AppData\Local\Temp\rr.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2236
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:972
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1732 -ip 1732
      1⤵
        PID:1876
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1732 -ip 1732
        1⤵
          PID:3360

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Execution

        Scripting

        1
        T1064

        Defense Evasion

        Scripting

        1
        T1064

        Credential Access

        Credentials in Files

        1
        T1081

        Discovery

        Query Registry

        1
        T1012

        System Information Discovery

        2
        T1082

        Collection

        Data from Local System

        1
        T1005

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rr.exe
          Filesize

          328KB

          MD5

          3f2f9975e1964be99f7e51ddc30f8c07

          SHA1

          1e6d873c70d4ac66daf350087a50409050eeeaff

          SHA256

          843dc782676a45c6e1ab1197fe4d16ba3bc57943423eca12ec2b69ece68ac32f

          SHA512

          89848eb83bced651355f5d8f5fe767fe7830ebe4287be4345223438318246089710e5393a4a75b7cf5c5eb2df22429ebd56f248b46e628c44ea8f5df88c5fb0d

        • C:\Users\Admin\AppData\Local\Temp\rr.exe
          Filesize

          328KB

          MD5

          3f2f9975e1964be99f7e51ddc30f8c07

          SHA1

          1e6d873c70d4ac66daf350087a50409050eeeaff

          SHA256

          843dc782676a45c6e1ab1197fe4d16ba3bc57943423eca12ec2b69ece68ac32f

          SHA512

          89848eb83bced651355f5d8f5fe767fe7830ebe4287be4345223438318246089710e5393a4a75b7cf5c5eb2df22429ebd56f248b46e628c44ea8f5df88c5fb0d

        • C:\Users\Admin\AppData\Local\Temp\rr.exe
          Filesize

          328KB

          MD5

          3f2f9975e1964be99f7e51ddc30f8c07

          SHA1

          1e6d873c70d4ac66daf350087a50409050eeeaff

          SHA256

          843dc782676a45c6e1ab1197fe4d16ba3bc57943423eca12ec2b69ece68ac32f

          SHA512

          89848eb83bced651355f5d8f5fe767fe7830ebe4287be4345223438318246089710e5393a4a75b7cf5c5eb2df22429ebd56f248b46e628c44ea8f5df88c5fb0d

        • memory/972-166-0x0000000005D00000-0x0000000005D66000-memory.dmp
          Filesize

          408KB

        • memory/972-160-0x00000000050C0000-0x00000000050D2000-memory.dmp
          Filesize

          72KB

        • memory/972-173-0x0000000006DA0000-0x0000000006DF0000-memory.dmp
          Filesize

          320KB

        • memory/972-172-0x0000000006D20000-0x0000000006D96000-memory.dmp
          Filesize

          472KB

        • memory/972-171-0x0000000007E40000-0x000000000836C000-memory.dmp
          Filesize

          5.2MB

        • memory/972-170-0x0000000007740000-0x0000000007902000-memory.dmp
          Filesize

          1.8MB

        • memory/972-157-0x0000000000400000-0x0000000000432000-memory.dmp
          Filesize

          200KB

        • memory/972-158-0x0000000005670000-0x0000000005C88000-memory.dmp
          Filesize

          6.1MB

        • memory/972-159-0x0000000005190000-0x000000000529A000-memory.dmp
          Filesize

          1.0MB

        • memory/972-169-0x00000000053C0000-0x00000000053D0000-memory.dmp
          Filesize

          64KB

        • memory/972-162-0x00000000053C0000-0x00000000053D0000-memory.dmp
          Filesize

          64KB

        • memory/972-165-0x0000000006240000-0x00000000067E4000-memory.dmp
          Filesize

          5.6MB

        • memory/972-163-0x0000000005120000-0x000000000515C000-memory.dmp
          Filesize

          240KB

        • memory/972-164-0x0000000005470000-0x0000000005502000-memory.dmp
          Filesize

          584KB

        • memory/1732-145-0x0000000000510000-0x00000000008DE000-memory.dmp
          Filesize

          3.8MB

        • memory/1732-134-0x0000000000510000-0x00000000008DE000-memory.dmp
          Filesize

          3.8MB

        • memory/1732-140-0x0000000000510000-0x00000000008DE000-memory.dmp
          Filesize

          3.8MB

        • memory/2236-168-0x0000000005740000-0x0000000005750000-memory.dmp
          Filesize

          64KB

        • memory/2236-161-0x0000000005740000-0x0000000005750000-memory.dmp
          Filesize

          64KB

        • memory/2236-156-0x0000000000D60000-0x0000000000DB6000-memory.dmp
          Filesize

          344KB

        • memory/2644-133-0x00000000002B0000-0x00000000006E6000-memory.dmp
          Filesize

          4.2MB

        • memory/2644-167-0x0000000005190000-0x00000000051A0000-memory.dmp
          Filesize

          64KB

        • memory/2644-143-0x0000000005190000-0x00000000051A0000-memory.dmp
          Filesize

          64KB