Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2023 20:56
Static task
static1
Behavioral task
behavioral1
Sample
6fb6cfdca040bd1e7ab1256d37306416.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
6fb6cfdca040bd1e7ab1256d37306416.exe
Resource
win10v2004-20230220-en
General
-
Target
6fb6cfdca040bd1e7ab1256d37306416.exe
-
Size
741KB
-
MD5
6fb6cfdca040bd1e7ab1256d37306416
-
SHA1
f9f8270d2186a27a3f7301e4e3d3cccc73bab0ad
-
SHA256
0e59fafb2de30f5fa5b6cce425f40115180b373592e1a201702742a6e8f21cc9
-
SHA512
0e4c654863528e97d67741734217d37d0cec03d9bf9cbe9e66543e614566d9e163c5b8455548352b56a706225937bbc5dc17c5c9a8e52e99637b6885ef2d0ad3
-
SSDEEP
6144:25G0py2KhkpK60W2VuTLx7AV35pDNvB/PQs6AvLTJ:25M2KhkpWWYuHxU3pDNvB/PHXLTJ
Malware Config
Extracted
redline
1
95.216.249.153:81
-
auth_value
a290efd4796d37556cc5af7e83c91346
Extracted
laplas
http://45.159.189.105
-
api_key
ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4
Extracted
laplas
http://45.159.189.105
-
api_key
ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
pid Process 448 p5zl9bq82kjf7.exe 2012 ClipperDoej4oa.exe 5112 Upshotox64.exe 4512 ntlhost.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Windows\CurrentVersion\Run Upshotox64.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\socks5 = "powershell.exe -windowstyle hidden -Command \"& 'C:\\Users\\Admin\\AppData\\Local\\Temp\\Upshotox64.exe'\"" Upshotox64.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" ClipperDoej4oa.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1028 set thread context of 4668 1028 6fb6cfdca040bd1e7ab1256d37306416.exe 83 PID 448 set thread context of 1856 448 p5zl9bq82kjf7.exe 88 -
Program crash 2 IoCs
pid pid_target Process procid_target 3660 1028 WerFault.exe 81 2428 448 WerFault.exe 86 -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 23 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4668 AppLaunch.exe 4668 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4668 AppLaunch.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1028 wrote to memory of 4668 1028 6fb6cfdca040bd1e7ab1256d37306416.exe 83 PID 1028 wrote to memory of 4668 1028 6fb6cfdca040bd1e7ab1256d37306416.exe 83 PID 1028 wrote to memory of 4668 1028 6fb6cfdca040bd1e7ab1256d37306416.exe 83 PID 1028 wrote to memory of 4668 1028 6fb6cfdca040bd1e7ab1256d37306416.exe 83 PID 1028 wrote to memory of 4668 1028 6fb6cfdca040bd1e7ab1256d37306416.exe 83 PID 4668 wrote to memory of 448 4668 AppLaunch.exe 86 PID 4668 wrote to memory of 448 4668 AppLaunch.exe 86 PID 4668 wrote to memory of 448 4668 AppLaunch.exe 86 PID 448 wrote to memory of 1856 448 p5zl9bq82kjf7.exe 88 PID 448 wrote to memory of 1856 448 p5zl9bq82kjf7.exe 88 PID 448 wrote to memory of 1856 448 p5zl9bq82kjf7.exe 88 PID 448 wrote to memory of 1856 448 p5zl9bq82kjf7.exe 88 PID 448 wrote to memory of 1856 448 p5zl9bq82kjf7.exe 88 PID 4668 wrote to memory of 2012 4668 AppLaunch.exe 91 PID 4668 wrote to memory of 2012 4668 AppLaunch.exe 91 PID 4668 wrote to memory of 2012 4668 AppLaunch.exe 91 PID 4668 wrote to memory of 5112 4668 AppLaunch.exe 92 PID 4668 wrote to memory of 5112 4668 AppLaunch.exe 92 PID 4668 wrote to memory of 5112 4668 AppLaunch.exe 92 PID 2012 wrote to memory of 4512 2012 ClipperDoej4oa.exe 93 PID 2012 wrote to memory of 4512 2012 ClipperDoej4oa.exe 93 PID 2012 wrote to memory of 4512 2012 ClipperDoej4oa.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fb6cfdca040bd1e7ab1256d37306416.exe"C:\Users\Admin\AppData\Local\Temp\6fb6cfdca040bd1e7ab1256d37306416.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\p5zl9bq82kjf7.exe"C:\Users\Admin\AppData\Local\Temp\p5zl9bq82kjf7.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:1856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 3084⤵
- Program crash
PID:2428
-
-
-
C:\Users\Admin\AppData\Local\Temp\ClipperDoej4oa.exe"C:\Users\Admin\AppData\Local\Temp\ClipperDoej4oa.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe4⤵
- Executes dropped EXE
PID:4512
-
-
-
C:\Users\Admin\AppData\Local\Temp\Upshotox64.exe"C:\Users\Admin\AppData\Local\Temp\Upshotox64.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5112
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1028 -s 2762⤵
- Program crash
PID:3660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1028 -ip 10281⤵PID:2644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 448 -ip 4481⤵PID:228
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.8MB
MD568be007bd3fa09d26fcee584a9157770
SHA16f191c0587c8055f26367f25ce0f7787ca272714
SHA25671acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e
SHA512f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245
-
Filesize
3.8MB
MD568be007bd3fa09d26fcee584a9157770
SHA16f191c0587c8055f26367f25ce0f7787ca272714
SHA25671acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e
SHA512f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245
-
Filesize
3.8MB
MD568be007bd3fa09d26fcee584a9157770
SHA16f191c0587c8055f26367f25ce0f7787ca272714
SHA25671acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e
SHA512f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245
-
Filesize
229KB
MD58c76e949a6b3bfb992ceb54c3be68f69
SHA132892363bea5d921144baac2017e4ca06ecf8269
SHA256682dc9f1350f3cfab2740e249fc00639927e0a53e8598e07611425dad2821719
SHA5122f949be9e7275067306338cd91331f21bc60bf4f0a1479b2953a199619d5a21f54d31031bf66c89662871eedd72d751f733c89cfefbb22a4fe6bbe06c1823ac8
-
Filesize
229KB
MD58c76e949a6b3bfb992ceb54c3be68f69
SHA132892363bea5d921144baac2017e4ca06ecf8269
SHA256682dc9f1350f3cfab2740e249fc00639927e0a53e8598e07611425dad2821719
SHA5122f949be9e7275067306338cd91331f21bc60bf4f0a1479b2953a199619d5a21f54d31031bf66c89662871eedd72d751f733c89cfefbb22a4fe6bbe06c1823ac8
-
Filesize
229KB
MD58c76e949a6b3bfb992ceb54c3be68f69
SHA132892363bea5d921144baac2017e4ca06ecf8269
SHA256682dc9f1350f3cfab2740e249fc00639927e0a53e8598e07611425dad2821719
SHA5122f949be9e7275067306338cd91331f21bc60bf4f0a1479b2953a199619d5a21f54d31031bf66c89662871eedd72d751f733c89cfefbb22a4fe6bbe06c1823ac8
-
Filesize
3.0MB
MD58adb6bf170d9e58bd51021619c8d74a0
SHA1fe37f27bb1c348e21ff0f656ed3efd100627f199
SHA2568e12d8cb25a85392d8e14d429b725c635776731d1546ad5d8c88afb09e8e2856
SHA51263e50768c6c057f6fca5855827adcfcaef198b67dd6fa3f874278cf0a6937ad4dec0d26e366ac3873aa92aee1510acb632b188af8031502d9382fb0e0140d3da
-
Filesize
3.0MB
MD58adb6bf170d9e58bd51021619c8d74a0
SHA1fe37f27bb1c348e21ff0f656ed3efd100627f199
SHA2568e12d8cb25a85392d8e14d429b725c635776731d1546ad5d8c88afb09e8e2856
SHA51263e50768c6c057f6fca5855827adcfcaef198b67dd6fa3f874278cf0a6937ad4dec0d26e366ac3873aa92aee1510acb632b188af8031502d9382fb0e0140d3da
-
Filesize
3.0MB
MD58adb6bf170d9e58bd51021619c8d74a0
SHA1fe37f27bb1c348e21ff0f656ed3efd100627f199
SHA2568e12d8cb25a85392d8e14d429b725c635776731d1546ad5d8c88afb09e8e2856
SHA51263e50768c6c057f6fca5855827adcfcaef198b67dd6fa3f874278cf0a6937ad4dec0d26e366ac3873aa92aee1510acb632b188af8031502d9382fb0e0140d3da
-
Filesize
811.8MB
MD524a5a6608aefba7f366fd009d46b5aa1
SHA1cb28ca25d6360ab43af8a9e2f4cb12fa14613f9f
SHA256ab33a487621400a754669cd0a637ef98b482eb8576a1f3654757af580fa22f34
SHA512419783500933278281a9745456dd8b9ba669ea9fdf874262a4a987df4f62911bbc8cf417bc6b5342ff91be200c55ee5613bdf47ab94b73ab23c0b7540374e168
-
Filesize
811.8MB
MD524a5a6608aefba7f366fd009d46b5aa1
SHA1cb28ca25d6360ab43af8a9e2f4cb12fa14613f9f
SHA256ab33a487621400a754669cd0a637ef98b482eb8576a1f3654757af580fa22f34
SHA512419783500933278281a9745456dd8b9ba669ea9fdf874262a4a987df4f62911bbc8cf417bc6b5342ff91be200c55ee5613bdf47ab94b73ab23c0b7540374e168