Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    16-06-2023 12:01

General

  • Target

    71feef2d7c3a5b64d022f29b9e76799d.exe

  • Size

    1.8MB

  • MD5

    71feef2d7c3a5b64d022f29b9e76799d

  • SHA1

    4e166f8b0f35d3e654ab6a16793f17fc8f648b7c

  • SHA256

    b20a55927f7fa65653a758c3962622ffdb428ef6fe03f80493b4798fa12ba1db

  • SHA512

    61562206896ce0824f8f70af2e2e9a4ef98d3053a11d2e74f21cf5b780e99bd025a9dd3cc87fb1e779dd09402892a264fefa69496e1c6447da938d9fcaf0395e

  • SSDEEP

    49152:4HWOaUxJgoj1THQbUf3rVrCOFA70asTrm:8CYJgClHWUf3rFC30at

Malware Config

Extracted

Family

redline

Botnet

top

C2

83.97.73.124:53

Attributes
  • auth_value

    053e5ccc53982413753b68419138b23a

Extracted

Family

redline

Botnet

Lyla1606

C2

94.130.176.65:13400

Attributes
  • auth_value

    f39fff6907be2a845f1dd21f03a9f743

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Downloads MZ/PE file
  • .NET Reactor proctector 11 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Unexpected DNS network traffic destination 10 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\71feef2d7c3a5b64d022f29b9e76799d.exe
    "C:\Users\Admin\AppData\Local\Temp\71feef2d7c3a5b64d022f29b9e76799d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
        PID:1504
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1164
        • C:\Users\Admin\AppData\Local\Temp\3J8GBAEBMOLM62B.exe
          "C:\Users\Admin\AppData\Local\Temp\3J8GBAEBMOLM62B.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:948
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:292
        • C:\Users\Admin\AppData\Local\Temp\ILOPB2M670PKO71.exe
          "C:\Users\Admin\AppData\Local\Temp\ILOPB2M670PKO71.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:800
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1984
        • C:\Users\Admin\AppData\Local\Temp\ILOPB2M670PKO71.exe
          "C:\Users\Admin\AppData\Local\Temp\ILOPB2M670PKO71.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1092
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:288
        • C:\Users\Admin\AppData\Local\Temp\58002DBN4EEF50P.exe
          https://iplogger.com/12qaJ4
          3⤵
          • Executes dropped EXE
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1944

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Credential Access

    Credentials in Files

    1
    T1081

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\3J8GBAEBMOLM62B.exe
      Filesize

      1.4MB

      MD5

      217ba190f5ed42238e9b1c05f2eaf386

      SHA1

      6959f1f880603094edee516e977255aeb2873989

      SHA256

      9a86c98d91a1795bdd8abba614f47a7f5ccad05370231a74be952b12f3cca170

      SHA512

      36a8ac5e5c5851d83145e914af25c9dfba779004817bcb3971b675a0d758301f78757fb2791b03c6b933ade83574c0c0c4d0309dafc69b6b136a0bf397281ca4

    • C:\Users\Admin\AppData\Local\Temp\3J8GBAEBMOLM62B.exe
      Filesize

      1.4MB

      MD5

      217ba190f5ed42238e9b1c05f2eaf386

      SHA1

      6959f1f880603094edee516e977255aeb2873989

      SHA256

      9a86c98d91a1795bdd8abba614f47a7f5ccad05370231a74be952b12f3cca170

      SHA512

      36a8ac5e5c5851d83145e914af25c9dfba779004817bcb3971b675a0d758301f78757fb2791b03c6b933ade83574c0c0c4d0309dafc69b6b136a0bf397281ca4

    • C:\Users\Admin\AppData\Local\Temp\58002DBN4EEF50P.exe
      Filesize

      8KB

      MD5

      8719ce641e7c777ac1b0eaec7b5fa7c7

      SHA1

      c04de52cb511480cc7d00d67f1d9e17b02d6406b

      SHA256

      6283ac6ecbf4c4038cf44896dd221c7c11152bac77273709330409032c3e72ea

      SHA512

      7be5bd6d2342dd02818f1979e7e74a6376658711ac82a59b2af1a67207cfd3c7416b657af01216473b15132e4aa5c6675f0eb8ee6343192c7dfc4a5249ccaa97

    • C:\Users\Admin\AppData\Local\Temp\58002DBN4EEF50P.exe
      Filesize

      8KB

      MD5

      8719ce641e7c777ac1b0eaec7b5fa7c7

      SHA1

      c04de52cb511480cc7d00d67f1d9e17b02d6406b

      SHA256

      6283ac6ecbf4c4038cf44896dd221c7c11152bac77273709330409032c3e72ea

      SHA512

      7be5bd6d2342dd02818f1979e7e74a6376658711ac82a59b2af1a67207cfd3c7416b657af01216473b15132e4aa5c6675f0eb8ee6343192c7dfc4a5249ccaa97

    • C:\Users\Admin\AppData\Local\Temp\BCOEK9CCK8485J8.exe
      Filesize

      100KB

      MD5

      df59a02a093a2a7d4f56da1013045d8f

      SHA1

      0be0150a1d7310afaed1725e29c2cb0b3d9936a3

      SHA256

      ac7e36fb8b701fd1fb560d743c63168850c243035257a24210899bf7c36ed0ad

      SHA512

      202e9793db87cfc9fe66e58a5ef7976c91ff3aad975e971678bc42700fa64e49f515f0b2d47054dee062032a6261b436a5f37de5d3208414bffb5d9f4ac1a98d

    • C:\Users\Admin\AppData\Local\Temp\ILOPB2M670PKO71.exe
      Filesize

      1.3MB

      MD5

      7feb03325f5b263e1142e03b93fe01c2

      SHA1

      868221436752fdbb61ba78b9983793986912694f

      SHA256

      3849c73450d6ca36851a5e0b8e2b5d34d2ca4972b7508378b5c809574e5fc6eb

      SHA512

      3e803250fc07321229743be33a329bb389e08ac285f172c55d63854fac87068c70861337b890da9f0f99de134d9e8ff574c56cfd78f071134eda622c8aa585fe

    • C:\Users\Admin\AppData\Local\Temp\ILOPB2M670PKO71.exe
      Filesize

      1.3MB

      MD5

      7feb03325f5b263e1142e03b93fe01c2

      SHA1

      868221436752fdbb61ba78b9983793986912694f

      SHA256

      3849c73450d6ca36851a5e0b8e2b5d34d2ca4972b7508378b5c809574e5fc6eb

      SHA512

      3e803250fc07321229743be33a329bb389e08ac285f172c55d63854fac87068c70861337b890da9f0f99de134d9e8ff574c56cfd78f071134eda622c8aa585fe

    • C:\Users\Admin\AppData\Local\Temp\ILOPB2M670PKO71.exe
      Filesize

      1.3MB

      MD5

      7feb03325f5b263e1142e03b93fe01c2

      SHA1

      868221436752fdbb61ba78b9983793986912694f

      SHA256

      3849c73450d6ca36851a5e0b8e2b5d34d2ca4972b7508378b5c809574e5fc6eb

      SHA512

      3e803250fc07321229743be33a329bb389e08ac285f172c55d63854fac87068c70861337b890da9f0f99de134d9e8ff574c56cfd78f071134eda622c8aa585fe

    • \Users\Admin\AppData\Local\Temp\3J8GBAEBMOLM62B.exe
      Filesize

      1.4MB

      MD5

      217ba190f5ed42238e9b1c05f2eaf386

      SHA1

      6959f1f880603094edee516e977255aeb2873989

      SHA256

      9a86c98d91a1795bdd8abba614f47a7f5ccad05370231a74be952b12f3cca170

      SHA512

      36a8ac5e5c5851d83145e914af25c9dfba779004817bcb3971b675a0d758301f78757fb2791b03c6b933ade83574c0c0c4d0309dafc69b6b136a0bf397281ca4

    • \Users\Admin\AppData\Local\Temp\58002DBN4EEF50P.exe
      Filesize

      8KB

      MD5

      8719ce641e7c777ac1b0eaec7b5fa7c7

      SHA1

      c04de52cb511480cc7d00d67f1d9e17b02d6406b

      SHA256

      6283ac6ecbf4c4038cf44896dd221c7c11152bac77273709330409032c3e72ea

      SHA512

      7be5bd6d2342dd02818f1979e7e74a6376658711ac82a59b2af1a67207cfd3c7416b657af01216473b15132e4aa5c6675f0eb8ee6343192c7dfc4a5249ccaa97

    • \Users\Admin\AppData\Local\Temp\ILOPB2M670PKO71.exe
      Filesize

      1.3MB

      MD5

      7feb03325f5b263e1142e03b93fe01c2

      SHA1

      868221436752fdbb61ba78b9983793986912694f

      SHA256

      3849c73450d6ca36851a5e0b8e2b5d34d2ca4972b7508378b5c809574e5fc6eb

      SHA512

      3e803250fc07321229743be33a329bb389e08ac285f172c55d63854fac87068c70861337b890da9f0f99de134d9e8ff574c56cfd78f071134eda622c8aa585fe

    • \Users\Admin\AppData\Local\Temp\ILOPB2M670PKO71.exe
      Filesize

      1.3MB

      MD5

      7feb03325f5b263e1142e03b93fe01c2

      SHA1

      868221436752fdbb61ba78b9983793986912694f

      SHA256

      3849c73450d6ca36851a5e0b8e2b5d34d2ca4972b7508378b5c809574e5fc6eb

      SHA512

      3e803250fc07321229743be33a329bb389e08ac285f172c55d63854fac87068c70861337b890da9f0f99de134d9e8ff574c56cfd78f071134eda622c8aa585fe

    • memory/288-237-0x0000000001FA0000-0x0000000001FE0000-memory.dmp
      Filesize

      256KB

    • memory/292-151-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/292-152-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
      Filesize

      4KB

    • memory/292-248-0x0000000002090000-0x00000000020D0000-memory.dmp
      Filesize

      256KB

    • memory/292-163-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/292-148-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/292-149-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/292-150-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/292-164-0x00000000002A0000-0x00000000002A6000-memory.dmp
      Filesize

      24KB

    • memory/292-201-0x0000000002090000-0x00000000020D0000-memory.dmp
      Filesize

      256KB

    • memory/292-154-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/800-106-0x0000000000240000-0x0000000000392000-memory.dmp
      Filesize

      1.3MB

    • memory/800-165-0x00000000004D0000-0x000000000050A000-memory.dmp
      Filesize

      232KB

    • memory/948-159-0x0000000004B90000-0x0000000004BD0000-memory.dmp
      Filesize

      256KB

    • memory/948-99-0x0000000001260000-0x00000000013BE000-memory.dmp
      Filesize

      1.4MB

    • memory/948-161-0x0000000000360000-0x0000000000361000-memory.dmp
      Filesize

      4KB

    • memory/948-123-0x0000000000C30000-0x0000000000C76000-memory.dmp
      Filesize

      280KB

    • memory/1164-85-0x0000000000400000-0x0000000000492000-memory.dmp
      Filesize

      584KB

    • memory/1164-92-0x0000000000400000-0x0000000000492000-memory.dmp
      Filesize

      584KB

    • memory/1164-91-0x0000000000400000-0x0000000000492000-memory.dmp
      Filesize

      584KB

    • memory/1164-89-0x0000000000400000-0x0000000000492000-memory.dmp
      Filesize

      584KB

    • memory/1164-87-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
      Filesize

      4KB

    • memory/1164-119-0x0000000000400000-0x0000000000492000-memory.dmp
      Filesize

      584KB

    • memory/1164-84-0x0000000000400000-0x0000000000492000-memory.dmp
      Filesize

      584KB

    • memory/1164-83-0x0000000000400000-0x0000000000492000-memory.dmp
      Filesize

      584KB

    • memory/1164-82-0x0000000000400000-0x0000000000492000-memory.dmp
      Filesize

      584KB

    • memory/1164-81-0x0000000000400000-0x0000000000492000-memory.dmp
      Filesize

      584KB

    • memory/1944-155-0x000000001BE20000-0x000000001BEA0000-memory.dmp
      Filesize

      512KB

    • memory/1944-157-0x000000001BE20000-0x000000001BEA0000-memory.dmp
      Filesize

      512KB

    • memory/1944-247-0x00000000250B0000-0x0000000025856000-memory.dmp
      Filesize

      7.6MB

    • memory/1944-121-0x000000013F890000-0x000000013F896000-memory.dmp
      Filesize

      24KB

    • memory/1944-122-0x000000001BE20000-0x000000001BEA0000-memory.dmp
      Filesize

      512KB

    • memory/1944-202-0x000000001BE20000-0x000000001BEA0000-memory.dmp
      Filesize

      512KB

    • memory/1944-153-0x000000001BE20000-0x000000001BEA0000-memory.dmp
      Filesize

      512KB

    • memory/1984-200-0x0000000000400000-0x0000000000426000-memory.dmp
      Filesize

      152KB

    • memory/2028-68-0x00000000004B0000-0x00000000004C5000-memory.dmp
      Filesize

      84KB

    • memory/2028-74-0x00000000004B0000-0x00000000004C5000-memory.dmp
      Filesize

      84KB

    • memory/2028-78-0x00000000004B0000-0x00000000004C5000-memory.dmp
      Filesize

      84KB

    • memory/2028-66-0x00000000004B0000-0x00000000004C5000-memory.dmp
      Filesize

      84KB

    • memory/2028-64-0x00000000004B0000-0x00000000004C5000-memory.dmp
      Filesize

      84KB

    • memory/2028-56-0x00000000004B0000-0x00000000004CC000-memory.dmp
      Filesize

      112KB

    • memory/2028-62-0x00000000004B0000-0x00000000004C5000-memory.dmp
      Filesize

      84KB

    • memory/2028-70-0x00000000004B0000-0x00000000004C5000-memory.dmp
      Filesize

      84KB

    • memory/2028-72-0x00000000004B0000-0x00000000004C5000-memory.dmp
      Filesize

      84KB

    • memory/2028-54-0x0000000000C10000-0x0000000000DE0000-memory.dmp
      Filesize

      1.8MB

    • memory/2028-76-0x00000000004B0000-0x00000000004C5000-memory.dmp
      Filesize

      84KB

    • memory/2028-88-0x00000000004D0000-0x00000000004D1000-memory.dmp
      Filesize

      4KB

    • memory/2028-60-0x00000000004B0000-0x00000000004C5000-memory.dmp
      Filesize

      84KB

    • memory/2028-86-0x0000000004A80000-0x0000000004AC0000-memory.dmp
      Filesize

      256KB

    • memory/2028-58-0x00000000004B0000-0x00000000004C5000-memory.dmp
      Filesize

      84KB

    • memory/2028-55-0x0000000004970000-0x0000000004A1A000-memory.dmp
      Filesize

      680KB

    • memory/2028-57-0x00000000004B0000-0x00000000004C5000-memory.dmp
      Filesize

      84KB

    • memory/2028-80-0x00000000004B0000-0x00000000004C5000-memory.dmp
      Filesize

      84KB