Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07-06-2023 09:01
Static task
static1
Behavioral task
behavioral1
Sample
3f0e8a9d61be8b596b4be752965295ad.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3f0e8a9d61be8b596b4be752965295ad.exe
Resource
win10v2004-20230220-en
General
-
Target
3f0e8a9d61be8b596b4be752965295ad.exe
-
Size
1.1MB
-
MD5
3f0e8a9d61be8b596b4be752965295ad
-
SHA1
23399af014c60bcd53af9591a6bb80bc09772139
-
SHA256
69f24003a768ac6451b4bac285475486d27c39723f474e3b8a19c61ceb732838
-
SHA512
340137d0b76a523dc680847f656048f02545a306d5fac927fd53bfe41e07ab0fea893a821e45344e2ade31d078ec6cd1cff4a6398e09321037973df703fcd8e7
-
SSDEEP
6144:Tuo1XQlPoSlw4524UcL/LHh5Z8Z0AOkGZKWklMdGwuss4tjS0G+zLT1YS:TXX4flh524UOyKKWklMdGOtjasBY
Malware Config
Extracted
redline
1
95.216.249.153:81
-
auth_value
a290efd4796d37556cc5af7e83c91346
Extracted
laplas
http://45.159.189.105
-
api_key
ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4
Extracted
systembc
5.42.95.122:4308
194.87.111.29:4308
Extracted
laplas
http://45.159.189.105
-
api_key
ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
LengthLong64.exeLengthLong32.exeLengthLong32x.exentlhost.exepid process 4396 LengthLong64.exe 4112 LengthLong32.exe 5012 LengthLong32x.exe 6972 ntlhost.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
RegSvcs.exeLengthLong32x.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Windows\CurrentVersion\Run RegSvcs.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\socks5 = "powershell.exe -windowstyle hidden -Command \"& 'C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegSvcs.exe'\"" RegSvcs.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" LengthLong32x.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
3f0e8a9d61be8b596b4be752965295ad.exeLengthLong32.exeLengthLong64.exedescription pid process target process PID 5068 set thread context of 4276 5068 3f0e8a9d61be8b596b4be752965295ad.exe RegSvcs.exe PID 4112 set thread context of 4868 4112 LengthLong32.exe RegSvcs.exe PID 4396 set thread context of 936 4396 LengthLong64.exe RegSvcs.exe -
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 116 5068 WerFault.exe 3f0e8a9d61be8b596b4be752965295ad.exe 4448 4112 WerFault.exe LengthLong32.exe 3036 4396 WerFault.exe LengthLong64.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
Processes:
description flow ioc HTTP User-Agent header 60 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
RegSvcs.exepid process 4276 RegSvcs.exe 4276 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegSvcs.exedescription pid process Token: SeDebugPrivilege 4276 RegSvcs.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
3f0e8a9d61be8b596b4be752965295ad.exeRegSvcs.exeLengthLong32.exeLengthLong64.exeLengthLong32x.exedescription pid process target process PID 5068 wrote to memory of 4276 5068 3f0e8a9d61be8b596b4be752965295ad.exe RegSvcs.exe PID 5068 wrote to memory of 4276 5068 3f0e8a9d61be8b596b4be752965295ad.exe RegSvcs.exe PID 5068 wrote to memory of 4276 5068 3f0e8a9d61be8b596b4be752965295ad.exe RegSvcs.exe PID 5068 wrote to memory of 4276 5068 3f0e8a9d61be8b596b4be752965295ad.exe RegSvcs.exe PID 5068 wrote to memory of 4276 5068 3f0e8a9d61be8b596b4be752965295ad.exe RegSvcs.exe PID 4276 wrote to memory of 4396 4276 RegSvcs.exe LengthLong64.exe PID 4276 wrote to memory of 4396 4276 RegSvcs.exe LengthLong64.exe PID 4276 wrote to memory of 4396 4276 RegSvcs.exe LengthLong64.exe PID 4276 wrote to memory of 4112 4276 RegSvcs.exe LengthLong32.exe PID 4276 wrote to memory of 4112 4276 RegSvcs.exe LengthLong32.exe PID 4276 wrote to memory of 4112 4276 RegSvcs.exe LengthLong32.exe PID 4276 wrote to memory of 5012 4276 RegSvcs.exe LengthLong32x.exe PID 4276 wrote to memory of 5012 4276 RegSvcs.exe LengthLong32x.exe PID 4276 wrote to memory of 5012 4276 RegSvcs.exe LengthLong32x.exe PID 4112 wrote to memory of 4868 4112 LengthLong32.exe RegSvcs.exe PID 4112 wrote to memory of 4868 4112 LengthLong32.exe RegSvcs.exe PID 4112 wrote to memory of 4868 4112 LengthLong32.exe RegSvcs.exe PID 4112 wrote to memory of 4868 4112 LengthLong32.exe RegSvcs.exe PID 4112 wrote to memory of 4868 4112 LengthLong32.exe RegSvcs.exe PID 4396 wrote to memory of 936 4396 LengthLong64.exe RegSvcs.exe PID 4396 wrote to memory of 936 4396 LengthLong64.exe RegSvcs.exe PID 4396 wrote to memory of 936 4396 LengthLong64.exe RegSvcs.exe PID 4396 wrote to memory of 936 4396 LengthLong64.exe RegSvcs.exe PID 4396 wrote to memory of 936 4396 LengthLong64.exe RegSvcs.exe PID 5012 wrote to memory of 6972 5012 LengthLong32x.exe ntlhost.exe PID 5012 wrote to memory of 6972 5012 LengthLong32x.exe ntlhost.exe PID 5012 wrote to memory of 6972 5012 LengthLong32x.exe ntlhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f0e8a9d61be8b596b4be752965295ad.exe"C:\Users\Admin\AppData\Local\Temp\3f0e8a9d61be8b596b4be752965295ad.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\LengthLong64.exe"C:\Users\Admin\AppData\Local\Temp\LengthLong64.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵PID:936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4396 -s 2404⤵
- Program crash
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\LengthLong32.exe"C:\Users\Admin\AppData\Local\Temp\LengthLong32.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵
- Adds Run key to start application
PID:4868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4112 -s 2404⤵
- Program crash
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\LengthLong32x.exe"C:\Users\Admin\AppData\Local\Temp\LengthLong32x.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe4⤵
- Executes dropped EXE
PID:6972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 2522⤵
- Program crash
PID:116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 5068 -ip 50681⤵PID:3640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4112 -ip 41121⤵PID:2708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4396 -ip 43961⤵PID:2268
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
923KB
MD50c0827b80b8450ed442d0a5afbc1324c
SHA1f212fc466d539f1b327e0f23269c4d2818e9bbfb
SHA25696bb40eaf29d3619c016a62e397e02761e898f342ab4dfdb52232ceddc13846a
SHA51275df0198b67109a5443c06e63c9ef145ae343c7519c9e2a4b7a06ddaf880c95a725ba223e2f183d52ee13f70c9a599e2b2ac2bcbc3d0510a4ef11941d7af118c
-
Filesize
923KB
MD50c0827b80b8450ed442d0a5afbc1324c
SHA1f212fc466d539f1b327e0f23269c4d2818e9bbfb
SHA25696bb40eaf29d3619c016a62e397e02761e898f342ab4dfdb52232ceddc13846a
SHA51275df0198b67109a5443c06e63c9ef145ae343c7519c9e2a4b7a06ddaf880c95a725ba223e2f183d52ee13f70c9a599e2b2ac2bcbc3d0510a4ef11941d7af118c
-
Filesize
923KB
MD50c0827b80b8450ed442d0a5afbc1324c
SHA1f212fc466d539f1b327e0f23269c4d2818e9bbfb
SHA25696bb40eaf29d3619c016a62e397e02761e898f342ab4dfdb52232ceddc13846a
SHA51275df0198b67109a5443c06e63c9ef145ae343c7519c9e2a4b7a06ddaf880c95a725ba223e2f183d52ee13f70c9a599e2b2ac2bcbc3d0510a4ef11941d7af118c
-
Filesize
3.8MB
MD568be007bd3fa09d26fcee584a9157770
SHA16f191c0587c8055f26367f25ce0f7787ca272714
SHA25671acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e
SHA512f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245
-
Filesize
3.8MB
MD568be007bd3fa09d26fcee584a9157770
SHA16f191c0587c8055f26367f25ce0f7787ca272714
SHA25671acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e
SHA512f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245
-
Filesize
3.8MB
MD568be007bd3fa09d26fcee584a9157770
SHA16f191c0587c8055f26367f25ce0f7787ca272714
SHA25671acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e
SHA512f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245
-
Filesize
3.4MB
MD5ac27f58d41c18197d3eb0242610c6dbf
SHA1505ed23652ea471cf1315f6eda6bd5729b87025e
SHA2568af2872503e066bcf59ef6cfe86d77a54382420e9e731f8674103b7f414c9b84
SHA5121386bf095925f7d37f125bc4ec1bd89f11b75ff87d49e42a7729aabf6f75bdbb380c687530330e92545434493ac34d1cb38da78b117765a35d1f1f0a10d50380
-
Filesize
3.4MB
MD5ac27f58d41c18197d3eb0242610c6dbf
SHA1505ed23652ea471cf1315f6eda6bd5729b87025e
SHA2568af2872503e066bcf59ef6cfe86d77a54382420e9e731f8674103b7f414c9b84
SHA5121386bf095925f7d37f125bc4ec1bd89f11b75ff87d49e42a7729aabf6f75bdbb380c687530330e92545434493ac34d1cb38da78b117765a35d1f1f0a10d50380
-
Filesize
3.4MB
MD5ac27f58d41c18197d3eb0242610c6dbf
SHA1505ed23652ea471cf1315f6eda6bd5729b87025e
SHA2568af2872503e066bcf59ef6cfe86d77a54382420e9e731f8674103b7f414c9b84
SHA5121386bf095925f7d37f125bc4ec1bd89f11b75ff87d49e42a7729aabf6f75bdbb380c687530330e92545434493ac34d1cb38da78b117765a35d1f1f0a10d50380
-
Filesize
273.5MB
MD516ae3a0042157a35327770ee2bb49d19
SHA1c132bd1382cb338d8df650fba3a7530e906d5451
SHA256f88e332dec9e199bffa2634cd1620b90840005ff23a8a848e5936ac13d280426
SHA5128d82dc668b2f86e1c9abac9cd4be9c51ab691b88961012cb0edb517e358ff377ecd3215730e3087d5915782de57a31eb0d8f297da8e8296828c1c980262da0c2
-
Filesize
272.1MB
MD5b920c1fd201eb0939ff4956d41c9c334
SHA11afa405194f69b876588dae586d8c3070c4dfb5f
SHA256403f205dfe65a05ab8347c15479163ffac39f47b0fcdfe657860209d62f75689
SHA5127c999c40e0c8c0ce32c26fb693a962693f4ab8cad6a0ece529883924f2c9cac7fe195f0ab5c1448add15805eb05f6516b1c7b0a52bb8d3924fc321b280b9261b