Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2023 15:50
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
General
-
Target
file.exe
-
Size
2.5MB
-
MD5
913d760e2231966514afd45953222d8d
-
SHA1
427e0ea23ff895e648dcbdce89d404f671d815ad
-
SHA256
a361b930ea3e7336d0101bab97323603e1b06c23a42352237ad5272c464d728e
-
SHA512
bb284b728de9d38d5e8096e6072cab4e6bf9f559aff2a302baf33371cc891adb5a441e45aee3888f2c5b643641fb1fd48489ed8e533b7593d7626653be6ee5b0
-
SSDEEP
49152:IBJnvmysJFzbwJX/2WjX+/hlnRSf2Eri/ZFydl8wZQkn/M918gW9DTG/utBf5QS8:yJvmys0X/2WIRbEr6ZFyD8w24M91m9DI
Malware Config
Extracted
redline
RED
79.137.202.0:81
-
auth_value
49e32ec54afd3f75dadad05dbf2e524f
Extracted
laplas
http://79.137.199.252
-
api_key
ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation Coek3uKK.exe -
Executes dropped EXE 4 IoCs
pid Process 3988 KR934ie2.exe 4936 Mi430uW3.exe 752 Coek3uKK.exe 4652 svcservice.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" Coek3uKK.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3988 set thread context of 3932 3988 KR934ie2.exe 88 PID 4936 set thread context of 4360 4936 Mi430uW3.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3932 AppLaunch.exe 3932 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3932 AppLaunch.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1368 wrote to memory of 3988 1368 file.exe 85 PID 1368 wrote to memory of 3988 1368 file.exe 85 PID 1368 wrote to memory of 3988 1368 file.exe 85 PID 3988 wrote to memory of 3932 3988 KR934ie2.exe 88 PID 3988 wrote to memory of 3932 3988 KR934ie2.exe 88 PID 3988 wrote to memory of 3932 3988 KR934ie2.exe 88 PID 3988 wrote to memory of 3932 3988 KR934ie2.exe 88 PID 3988 wrote to memory of 3932 3988 KR934ie2.exe 88 PID 1368 wrote to memory of 4936 1368 file.exe 89 PID 1368 wrote to memory of 4936 1368 file.exe 89 PID 1368 wrote to memory of 4936 1368 file.exe 89 PID 4936 wrote to memory of 4552 4936 Mi430uW3.exe 91 PID 4936 wrote to memory of 4552 4936 Mi430uW3.exe 91 PID 4936 wrote to memory of 4552 4936 Mi430uW3.exe 91 PID 4936 wrote to memory of 872 4936 Mi430uW3.exe 92 PID 4936 wrote to memory of 872 4936 Mi430uW3.exe 92 PID 4936 wrote to memory of 872 4936 Mi430uW3.exe 92 PID 4936 wrote to memory of 4360 4936 Mi430uW3.exe 93 PID 4936 wrote to memory of 4360 4936 Mi430uW3.exe 93 PID 4936 wrote to memory of 4360 4936 Mi430uW3.exe 93 PID 4936 wrote to memory of 4360 4936 Mi430uW3.exe 93 PID 4936 wrote to memory of 4360 4936 Mi430uW3.exe 93 PID 1368 wrote to memory of 752 1368 file.exe 95 PID 1368 wrote to memory of 752 1368 file.exe 95 PID 1368 wrote to memory of 752 1368 file.exe 95 PID 752 wrote to memory of 4652 752 Coek3uKK.exe 96 PID 752 wrote to memory of 4652 752 Coek3uKK.exe 96 PID 752 wrote to memory of 4652 752 Coek3uKK.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\KR934ie2.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\KR934ie2.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3932
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Mi430uW3.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Mi430uW3.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"3⤵PID:4552
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"3⤵PID:872
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"3⤵PID:4360
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Coek3uKK.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Coek3uKK.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"3⤵
- Executes dropped EXE
PID:4652
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5a316af84a4a0b9eaa9d13b2e9a10a79c
SHA133f663b2ce7f5d2d50c303db135cd3edd98cd95d
SHA2569986545e363a843599fde75d31fa4f611daaaa3c64ac6d8e27d24c9b5874240f
SHA512c763cc79a7c2eded3e7e83498d553d6c15eccb77dbb6baea69591ddfc8d985152fde20909df5b71a30802d7680ac6865264444acd5833f52cbdf896b3a1dd59f
-
Filesize
1.1MB
MD5a316af84a4a0b9eaa9d13b2e9a10a79c
SHA133f663b2ce7f5d2d50c303db135cd3edd98cd95d
SHA2569986545e363a843599fde75d31fa4f611daaaa3c64ac6d8e27d24c9b5874240f
SHA512c763cc79a7c2eded3e7e83498d553d6c15eccb77dbb6baea69591ddfc8d985152fde20909df5b71a30802d7680ac6865264444acd5833f52cbdf896b3a1dd59f
-
Filesize
1.1MB
MD5a316af84a4a0b9eaa9d13b2e9a10a79c
SHA133f663b2ce7f5d2d50c303db135cd3edd98cd95d
SHA2569986545e363a843599fde75d31fa4f611daaaa3c64ac6d8e27d24c9b5874240f
SHA512c763cc79a7c2eded3e7e83498d553d6c15eccb77dbb6baea69591ddfc8d985152fde20909df5b71a30802d7680ac6865264444acd5833f52cbdf896b3a1dd59f
-
Filesize
342KB
MD5913f8b43a0a737d366bbd9aa04ea2cf3
SHA180766d487a578b3175734a253997c6f062bc2bb0
SHA256e571056f83ea8ec1d2973f40847fec85f17d26fa685187ad152ee5fb6cb2a26f
SHA512af3232674b3fa4efb01b793d6f160a8bb7840e9df79639f6b0cf6833107966ac4a81139ff88364556463fb480675b78ffe0a1a8d9ee87f9788b5da2786c0fa5e
-
Filesize
342KB
MD5913f8b43a0a737d366bbd9aa04ea2cf3
SHA180766d487a578b3175734a253997c6f062bc2bb0
SHA256e571056f83ea8ec1d2973f40847fec85f17d26fa685187ad152ee5fb6cb2a26f
SHA512af3232674b3fa4efb01b793d6f160a8bb7840e9df79639f6b0cf6833107966ac4a81139ff88364556463fb480675b78ffe0a1a8d9ee87f9788b5da2786c0fa5e
-
Filesize
342KB
MD5913f8b43a0a737d366bbd9aa04ea2cf3
SHA180766d487a578b3175734a253997c6f062bc2bb0
SHA256e571056f83ea8ec1d2973f40847fec85f17d26fa685187ad152ee5fb6cb2a26f
SHA512af3232674b3fa4efb01b793d6f160a8bb7840e9df79639f6b0cf6833107966ac4a81139ff88364556463fb480675b78ffe0a1a8d9ee87f9788b5da2786c0fa5e
-
Filesize
2.6MB
MD56cf1a766a001c14ab610cf8b0d49a519
SHA1f6972ce0388ad64fc9ecc793dacf19fcb0f98887
SHA256d4dcde6d1d1bb0b9592816c04a3f2bb1f0958dc0e9ef4fd5a016fad1a9527024
SHA512b7707976392d3f80ab8d54bf9609eb673b352dd3a29e65c502ee11f902bd099239ac4a1c6476f71b0e5ef820e8b1934cb0e4b37d20c85b657bfe997371d670b6
-
Filesize
2.6MB
MD56cf1a766a001c14ab610cf8b0d49a519
SHA1f6972ce0388ad64fc9ecc793dacf19fcb0f98887
SHA256d4dcde6d1d1bb0b9592816c04a3f2bb1f0958dc0e9ef4fd5a016fad1a9527024
SHA512b7707976392d3f80ab8d54bf9609eb673b352dd3a29e65c502ee11f902bd099239ac4a1c6476f71b0e5ef820e8b1934cb0e4b37d20c85b657bfe997371d670b6
-
Filesize
2.6MB
MD56cf1a766a001c14ab610cf8b0d49a519
SHA1f6972ce0388ad64fc9ecc793dacf19fcb0f98887
SHA256d4dcde6d1d1bb0b9592816c04a3f2bb1f0958dc0e9ef4fd5a016fad1a9527024
SHA512b7707976392d3f80ab8d54bf9609eb673b352dd3a29e65c502ee11f902bd099239ac4a1c6476f71b0e5ef820e8b1934cb0e4b37d20c85b657bfe997371d670b6
-
Filesize
320.4MB
MD55f7e1657190439a43f60aac253ea01c2
SHA1dd0fff78cdf4b3caf09bb532f617578de33b377f
SHA2565be9e3ed02ed1a0bed7374aabd82cea78ae0ace2f6ca5553f8f61e55aa307ace
SHA5125a2dd901dc5e9bdb8de3e4845fec7793395ed6152c8693f15ea408093a0cde0cf551cb91e12d63f2278a8f6e329208d6dc9e908cb45014c4d63125777107b3dc
-
Filesize
326.0MB
MD5e1d879199dc5df044de6a2699c7ee1ff
SHA15d4b3f5a6c84f05c7980df4ac99d2faa3b02f85a
SHA25672aa42912b228e483d12624dfea1cb8e64ebb3dafe906d84bcbb1abd58435255
SHA5125c91b7818daf85d90df05ce518efd577138a226d6546c05575cebfd1c453944658044f8a33beb390ee36ee43292e4b1e0c53092ff1a366d2168646380115319e