Analysis

  • max time kernel
    115s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/04/2023, 00:09

General

  • Target

    11.exe

  • Size

    1.2MB

  • MD5

    14f74bf3111e2f4f5e0627ae73aca0be

  • SHA1

    af5a5c13cc3900136b408cd3f5caec957f3ecf27

  • SHA256

    f401cd90e781b747d207796dd7327db534fbb3e362a9df0fb21e78d8104871f1

  • SHA512

    1b6524033ade35159d2c6de2f8da5542c31c164ebebd1180b7189458034c45d0474c6d8eb393a64a294345addb73931cdbdfa635435242da124bbd2cc755f874

  • SSDEEP

    6144:DG1dDszSc/wXmkAODwyWfKp6LWVMZb1YFv9Edm:q1dDsqN6fKp6LW2ZaUm

Malware Config

Extracted

Family

redline

Botnet

kyotranbot

C2

45.77.166.103:37904

Attributes
  • auth_value

    039a36b7ff8c4be7a5e5f93361625ea2

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\11.exe
    "C:\Users\Admin\AppData\Local\Temp\11.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:396
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3172
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 396 -s 280
      2⤵
      • Program crash
      PID:540
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 396 -ip 396
    1⤵
      PID:4948

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/3172-133-0x0000000000400000-0x000000000042E000-memory.dmp

            Filesize

            184KB

          • memory/3172-138-0x000000000B3B0000-0x000000000B9C8000-memory.dmp

            Filesize

            6.1MB

          • memory/3172-139-0x000000000AEA0000-0x000000000AFAA000-memory.dmp

            Filesize

            1.0MB

          • memory/3172-140-0x000000000AD90000-0x000000000ADA2000-memory.dmp

            Filesize

            72KB

          • memory/3172-141-0x000000000ADF0000-0x000000000AE2C000-memory.dmp

            Filesize

            240KB

          • memory/3172-142-0x0000000005900000-0x0000000005910000-memory.dmp

            Filesize

            64KB

          • memory/3172-143-0x000000000B100000-0x000000000B176000-memory.dmp

            Filesize

            472KB

          • memory/3172-144-0x000000000B220000-0x000000000B2B2000-memory.dmp

            Filesize

            584KB

          • memory/3172-145-0x000000000B180000-0x000000000B1E6000-memory.dmp

            Filesize

            408KB

          • memory/3172-146-0x000000000C380000-0x000000000C924000-memory.dmp

            Filesize

            5.6MB

          • memory/3172-147-0x000000000D5B0000-0x000000000D772000-memory.dmp

            Filesize

            1.8MB

          • memory/3172-148-0x0000000005900000-0x0000000005910000-memory.dmp

            Filesize

            64KB

          • memory/3172-149-0x000000000DCB0000-0x000000000E1DC000-memory.dmp

            Filesize

            5.2MB

          • memory/3172-150-0x000000000C2C0000-0x000000000C310000-memory.dmp

            Filesize

            320KB