Analysis

  • max time kernel
    32s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    17-04-2023 20:20

General

  • Target

    879A1CC064DBB64D3EC72FD1C246376E.exe

  • Size

    168KB

  • MD5

    879a1cc064dbb64d3ec72fd1c246376e

  • SHA1

    29b7a5d7c3d890e4cd57c977ff0e0c6cf03010f8

  • SHA256

    b5bb65f44c5f4e5021f914a090fc8167d7ab5f93b69bb589b283d8a1b80d18c8

  • SHA512

    402d10f1ec986de7f6de6820378f92fb43853a64a808bb0a9dcea5178859b89048f262242d1502c65dd8d499a107178be6a57af9cea45ed43ad8f68b62fc4bd0

  • SSDEEP

    3072:V0ODgnL3kfWp5Z466hJOVukx+qVEA9YbbCLmwB8e8hH:uOD+FkE+ogbCLmwB

Malware Config

Extracted

Family

redline

Botnet

xyi

C2

193.233.20.13:11552

Attributes
  • auth_value

    047b878d2df34cc0bb8e92d3fa4f34d8

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\879A1CC064DBB64D3EC72FD1C246376E.exe
    "C:\Users\Admin\AppData\Local\Temp\879A1CC064DBB64D3EC72FD1C246376E.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1636
    • C:\Users\Admin\AppData\Local\Temp\update.exe
      "C:\Users\Admin\AppData\Local\Temp\update.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1864

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    e71c8443ae0bc2e282c73faead0a6dd3

    SHA1

    0c110c1b01e68edfacaeae64781a37b1995fa94b

    SHA256

    95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

    SHA512

    b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    42ee03a9394f49929d1c7308a85a5fd2

    SHA1

    315ee1206afe87a01eca5504b692ee29738d8c7a

    SHA256

    bd5c51d39457a584c3f7f20e71b80f9b87d214cae90132ec70aeb5f7a99cf7c0

    SHA512

    9f0270337553b885ecf304d9e2bed1ad02ccf1746f9f20797c60341d4cd82ce4026514ae851345c94b9931684f8c20c26ee58603e13a2f46b6d4075508de3cbd

  • C:\Users\Admin\AppData\Local\Temp\TarC7BA.tmp

    Filesize

    161KB

    MD5

    be2bec6e8c5653136d3e72fe53c98aa3

    SHA1

    a8182d6db17c14671c3d5766c72e58d87c0810de

    SHA256

    1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

    SHA512

    0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

  • C:\Users\Admin\AppData\Local\Temp\update.exe

    Filesize

    63KB

    MD5

    b7bc649a51698f067fe352cc825acf03

    SHA1

    6d66412367f01490a50b05168ce3f6e26fdb4a19

    SHA256

    758a1e1543f527cd1991894f49a4e9f66f550035875158ec34d3b3478040197e

    SHA512

    4df89530eb1c8b5b9e9a733f0c4baec710d562b55dae2a4bc31277f2f199b118224f1a87a803cf56260f8e4a6e22609ad9dea8c914723b008862d02e480430f5

  • C:\Users\Admin\AppData\Local\Temp\update.exe

    Filesize

    63KB

    MD5

    b7bc649a51698f067fe352cc825acf03

    SHA1

    6d66412367f01490a50b05168ce3f6e26fdb4a19

    SHA256

    758a1e1543f527cd1991894f49a4e9f66f550035875158ec34d3b3478040197e

    SHA512

    4df89530eb1c8b5b9e9a733f0c4baec710d562b55dae2a4bc31277f2f199b118224f1a87a803cf56260f8e4a6e22609ad9dea8c914723b008862d02e480430f5

  • \Users\Admin\AppData\Local\Temp\update.exe

    Filesize

    63KB

    MD5

    b7bc649a51698f067fe352cc825acf03

    SHA1

    6d66412367f01490a50b05168ce3f6e26fdb4a19

    SHA256

    758a1e1543f527cd1991894f49a4e9f66f550035875158ec34d3b3478040197e

    SHA512

    4df89530eb1c8b5b9e9a733f0c4baec710d562b55dae2a4bc31277f2f199b118224f1a87a803cf56260f8e4a6e22609ad9dea8c914723b008862d02e480430f5

  • memory/1636-54-0x0000000000B30000-0x0000000000B60000-memory.dmp

    Filesize

    192KB

  • memory/1636-55-0x00000000003F0000-0x00000000003F6000-memory.dmp

    Filesize

    24KB

  • memory/1636-56-0x0000000004A10000-0x0000000004A50000-memory.dmp

    Filesize

    256KB

  • memory/1864-185-0x0000000001280000-0x0000000001296000-memory.dmp

    Filesize

    88KB

  • memory/1864-186-0x0000000000340000-0x0000000000346000-memory.dmp

    Filesize

    24KB

  • memory/1864-187-0x0000000004750000-0x0000000004790000-memory.dmp

    Filesize

    256KB