Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
29-03-2023 14:49
Static task
static1
Behavioral task
behavioral1
Sample
3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2.exe
Resource
win10v2004-20230220-en
General
-
Target
3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2.exe
-
Size
7.2MB
-
MD5
7212e623e04d3427364e7f00a95bf932
-
SHA1
5f8e0384cf7c209d804d9b10e3d2281a9c391fe7
-
SHA256
3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2
-
SHA512
3a2ac1111eaaf17475235ee233819286848c45bb2d69a42803fde15f4ae609f63120ca3a9f945b80af1a7c565941e81513ecb90ef9ea1320240c81f77091f7df
-
SSDEEP
196608:r+QDCeRpnhgR/BQ+/Svwj47kuTkGfxDlDlAs:s6MQ+/SvwOvY4
Malware Config
Extracted
redline
cheat
45.141.215.79:1639
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/files/0x0009000000012313-60.dat family_redline behavioral1/files/0x0009000000012313-61.dat family_redline behavioral1/memory/852-68-0x0000000000910000-0x000000000092E000-memory.dmp family_redline -
SectopRAT payload 3 IoCs
resource yara_rule behavioral1/files/0x0009000000012313-60.dat family_sectoprat behavioral1/files/0x0009000000012313-61.dat family_sectoprat behavioral1/memory/852-68-0x0000000000910000-0x000000000092E000-memory.dmp family_sectoprat -
Executes dropped EXE 3 IoCs
pid Process 852 Yxnjkmkmromsbf.exe 1160 Nasuozapjtqwrg.exe 1204 Nasuozapjtqwrg.exe -
Loads dropped DLL 4 IoCs
pid Process 316 3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2.exe 268 Process not Found 1160 Nasuozapjtqwrg.exe 1204 Nasuozapjtqwrg.exe -
Detects Pyinstaller 6 IoCs
resource yara_rule behavioral1/files/0x000800000001232c-64.dat pyinstaller behavioral1/files/0x000800000001232c-66.dat pyinstaller behavioral1/files/0x000800000001232c-67.dat pyinstaller behavioral1/files/0x000800000001232c-69.dat pyinstaller behavioral1/files/0x000800000001232c-88.dat pyinstaller behavioral1/files/0x000800000001232c-87.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 852 Yxnjkmkmromsbf.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 316 wrote to memory of 852 316 3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2.exe 28 PID 316 wrote to memory of 852 316 3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2.exe 28 PID 316 wrote to memory of 852 316 3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2.exe 28 PID 316 wrote to memory of 852 316 3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2.exe 28 PID 316 wrote to memory of 1160 316 3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2.exe 30 PID 316 wrote to memory of 1160 316 3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2.exe 30 PID 316 wrote to memory of 1160 316 3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2.exe 30 PID 1160 wrote to memory of 1204 1160 Nasuozapjtqwrg.exe 32 PID 1160 wrote to memory of 1204 1160 Nasuozapjtqwrg.exe 32 PID 1160 wrote to memory of 1204 1160 Nasuozapjtqwrg.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2.exe"C:\Users\Admin\AppData\Local\Temp\3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Local\Temp\Yxnjkmkmromsbf.exe"C:\Users\Admin\AppData\Local\Temp\Yxnjkmkmromsbf.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:852
-
-
C:\Users\Admin\AppData\Local\Temp\Nasuozapjtqwrg.exe"C:\Users\Admin\AppData\Local\Temp\Nasuozapjtqwrg.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\Nasuozapjtqwrg.exe"C:\Users\Admin\AppData\Local\Temp\Nasuozapjtqwrg.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1204
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.3MB
MD52073e77e93fc051dc7a179cea9015520
SHA15b0d44c2559431e40af1fd7247b83d27d4d4a2fc
SHA2560e9621fb6359ea8acd039414c88ebc137c4864703dcfa8605718e6e3b54a597f
SHA5127f41778776d29c5a4e586da237f4730a7bf570b328ced039c23f50c45868cacf22e7c8003a21c38fe02e3827057cfba8e34a4dc2da057e7356cb8a40928ee819
-
Filesize
7.3MB
MD52073e77e93fc051dc7a179cea9015520
SHA15b0d44c2559431e40af1fd7247b83d27d4d4a2fc
SHA2560e9621fb6359ea8acd039414c88ebc137c4864703dcfa8605718e6e3b54a597f
SHA5127f41778776d29c5a4e586da237f4730a7bf570b328ced039c23f50c45868cacf22e7c8003a21c38fe02e3827057cfba8e34a4dc2da057e7356cb8a40928ee819
-
Filesize
7.3MB
MD52073e77e93fc051dc7a179cea9015520
SHA15b0d44c2559431e40af1fd7247b83d27d4d4a2fc
SHA2560e9621fb6359ea8acd039414c88ebc137c4864703dcfa8605718e6e3b54a597f
SHA5127f41778776d29c5a4e586da237f4730a7bf570b328ced039c23f50c45868cacf22e7c8003a21c38fe02e3827057cfba8e34a4dc2da057e7356cb8a40928ee819
-
Filesize
95KB
MD55d2d319a57180973471a07b00b9c9d08
SHA1481c355baf245d307b15ea653ddbe1c3282a0914
SHA25608f089589dda0d849bf735d27c71152bc47f7c71e676a0ee8bc502b422f454c1
SHA5123e686b023537e0f7ca0bb37694c0a3be470a7c05f5a179bf6b2a93200428457b4f0ab771ef1b8fb2d8047d10565c54512b408bc49eb1f805badb32ff54667ae1
-
Filesize
95KB
MD55d2d319a57180973471a07b00b9c9d08
SHA1481c355baf245d307b15ea653ddbe1c3282a0914
SHA25608f089589dda0d849bf735d27c71152bc47f7c71e676a0ee8bc502b422f454c1
SHA5123e686b023537e0f7ca0bb37694c0a3be470a7c05f5a179bf6b2a93200428457b4f0ab771ef1b8fb2d8047d10565c54512b408bc49eb1f805badb32ff54667ae1
-
Filesize
5.5MB
MD51fe47c83669491bf38a949253d7d960f
SHA1de5cc181c0e26cbcb31309fe00d9f2f5264d2b25
SHA2560a9f2c98f36ba8974a944127b5b7e90e638010e472f2eb6598fc55b1bda9e7ae
SHA51205cc6f00db128fbca02a14f60f86c049855f429013f65d91e14ea292d468bf9bfdeebc00ec2d54a9fb5715743a57ae3ab48a95037016240c02aabe4bfa1a2ff4
-
Filesize
7.3MB
MD52073e77e93fc051dc7a179cea9015520
SHA15b0d44c2559431e40af1fd7247b83d27d4d4a2fc
SHA2560e9621fb6359ea8acd039414c88ebc137c4864703dcfa8605718e6e3b54a597f
SHA5127f41778776d29c5a4e586da237f4730a7bf570b328ced039c23f50c45868cacf22e7c8003a21c38fe02e3827057cfba8e34a4dc2da057e7356cb8a40928ee819
-
Filesize
7.3MB
MD52073e77e93fc051dc7a179cea9015520
SHA15b0d44c2559431e40af1fd7247b83d27d4d4a2fc
SHA2560e9621fb6359ea8acd039414c88ebc137c4864703dcfa8605718e6e3b54a597f
SHA5127f41778776d29c5a4e586da237f4730a7bf570b328ced039c23f50c45868cacf22e7c8003a21c38fe02e3827057cfba8e34a4dc2da057e7356cb8a40928ee819
-
Filesize
7.3MB
MD52073e77e93fc051dc7a179cea9015520
SHA15b0d44c2559431e40af1fd7247b83d27d4d4a2fc
SHA2560e9621fb6359ea8acd039414c88ebc137c4864703dcfa8605718e6e3b54a597f
SHA5127f41778776d29c5a4e586da237f4730a7bf570b328ced039c23f50c45868cacf22e7c8003a21c38fe02e3827057cfba8e34a4dc2da057e7356cb8a40928ee819
-
Filesize
5.5MB
MD51fe47c83669491bf38a949253d7d960f
SHA1de5cc181c0e26cbcb31309fe00d9f2f5264d2b25
SHA2560a9f2c98f36ba8974a944127b5b7e90e638010e472f2eb6598fc55b1bda9e7ae
SHA51205cc6f00db128fbca02a14f60f86c049855f429013f65d91e14ea292d468bf9bfdeebc00ec2d54a9fb5715743a57ae3ab48a95037016240c02aabe4bfa1a2ff4