Analysis
-
max time kernel
144s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2023 01:24
Static task
static1
Behavioral task
behavioral1
Sample
0e59fafb2de30f5fa5b6cce425f40115180b373592e1a201702742a6e8f21cc9.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0e59fafb2de30f5fa5b6cce425f40115180b373592e1a201702742a6e8f21cc9.exe
Resource
win10v2004-20230220-en
General
-
Target
0e59fafb2de30f5fa5b6cce425f40115180b373592e1a201702742a6e8f21cc9.exe
-
Size
741KB
-
MD5
6fb6cfdca040bd1e7ab1256d37306416
-
SHA1
f9f8270d2186a27a3f7301e4e3d3cccc73bab0ad
-
SHA256
0e59fafb2de30f5fa5b6cce425f40115180b373592e1a201702742a6e8f21cc9
-
SHA512
0e4c654863528e97d67741734217d37d0cec03d9bf9cbe9e66543e614566d9e163c5b8455548352b56a706225937bbc5dc17c5c9a8e52e99637b6885ef2d0ad3
-
SSDEEP
6144:25G0py2KhkpK60W2VuTLx7AV35pDNvB/PQs6AvLTJ:25M2KhkpWWYuHxU3pDNvB/PHXLTJ
Malware Config
Extracted
redline
1
95.216.249.153:81
-
auth_value
a290efd4796d37556cc5af7e83c91346
Extracted
laplas
http://45.159.189.105
-
api_key
ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4
Extracted
laplas
http://45.159.189.105
-
api_key
ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
pid Process 2476 p5zl9bq82kjf7.exe 4436 ClipperDoej4oa.exe 3560 Upshotox64.exe 3476 ntlhost.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" ClipperDoej4oa.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows\CurrentVersion\Run AppLaunch.exe Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\socks5 = "powershell.exe -windowstyle hidden -Command \"& 'C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe'\"" AppLaunch.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1372 set thread context of 1136 1372 0e59fafb2de30f5fa5b6cce425f40115180b373592e1a201702742a6e8f21cc9.exe 85 PID 2476 set thread context of 412 2476 p5zl9bq82kjf7.exe 96 PID 3560 set thread context of 816 3560 Upshotox64.exe 102 -
Program crash 3 IoCs
pid pid_target Process procid_target 4148 1372 WerFault.exe 83 4728 2476 WerFault.exe 94 748 3560 WerFault.exe 100 -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 35 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1136 AppLaunch.exe 1136 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1136 AppLaunch.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1372 wrote to memory of 1136 1372 0e59fafb2de30f5fa5b6cce425f40115180b373592e1a201702742a6e8f21cc9.exe 85 PID 1372 wrote to memory of 1136 1372 0e59fafb2de30f5fa5b6cce425f40115180b373592e1a201702742a6e8f21cc9.exe 85 PID 1372 wrote to memory of 1136 1372 0e59fafb2de30f5fa5b6cce425f40115180b373592e1a201702742a6e8f21cc9.exe 85 PID 1372 wrote to memory of 1136 1372 0e59fafb2de30f5fa5b6cce425f40115180b373592e1a201702742a6e8f21cc9.exe 85 PID 1372 wrote to memory of 1136 1372 0e59fafb2de30f5fa5b6cce425f40115180b373592e1a201702742a6e8f21cc9.exe 85 PID 1136 wrote to memory of 2476 1136 AppLaunch.exe 94 PID 1136 wrote to memory of 2476 1136 AppLaunch.exe 94 PID 1136 wrote to memory of 2476 1136 AppLaunch.exe 94 PID 2476 wrote to memory of 412 2476 p5zl9bq82kjf7.exe 96 PID 2476 wrote to memory of 412 2476 p5zl9bq82kjf7.exe 96 PID 2476 wrote to memory of 412 2476 p5zl9bq82kjf7.exe 96 PID 2476 wrote to memory of 412 2476 p5zl9bq82kjf7.exe 96 PID 2476 wrote to memory of 412 2476 p5zl9bq82kjf7.exe 96 PID 1136 wrote to memory of 4436 1136 AppLaunch.exe 99 PID 1136 wrote to memory of 4436 1136 AppLaunch.exe 99 PID 1136 wrote to memory of 4436 1136 AppLaunch.exe 99 PID 1136 wrote to memory of 3560 1136 AppLaunch.exe 100 PID 1136 wrote to memory of 3560 1136 AppLaunch.exe 100 PID 1136 wrote to memory of 3560 1136 AppLaunch.exe 100 PID 3560 wrote to memory of 816 3560 Upshotox64.exe 102 PID 3560 wrote to memory of 816 3560 Upshotox64.exe 102 PID 3560 wrote to memory of 816 3560 Upshotox64.exe 102 PID 3560 wrote to memory of 816 3560 Upshotox64.exe 102 PID 3560 wrote to memory of 816 3560 Upshotox64.exe 102 PID 4436 wrote to memory of 3476 4436 ClipperDoej4oa.exe 106 PID 4436 wrote to memory of 3476 4436 ClipperDoej4oa.exe 106 PID 4436 wrote to memory of 3476 4436 ClipperDoej4oa.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e59fafb2de30f5fa5b6cce425f40115180b373592e1a201702742a6e8f21cc9.exe"C:\Users\Admin\AppData\Local\Temp\0e59fafb2de30f5fa5b6cce425f40115180b373592e1a201702742a6e8f21cc9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\p5zl9bq82kjf7.exe"C:\Users\Admin\AppData\Local\Temp\p5zl9bq82kjf7.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 2964⤵
- Program crash
PID:4728
-
-
-
C:\Users\Admin\AppData\Local\Temp\ClipperDoej4oa.exe"C:\Users\Admin\AppData\Local\Temp\ClipperDoej4oa.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe4⤵
- Executes dropped EXE
PID:3476
-
-
-
C:\Users\Admin\AppData\Local\Temp\Upshotox64.exe"C:\Users\Admin\AppData\Local\Temp\Upshotox64.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Adds Run key to start application
PID:816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3560 -s 2964⤵
- Program crash
PID:748
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 3122⤵
- Program crash
PID:4148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1372 -ip 13721⤵PID:3952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2476 -ip 24761⤵PID:4568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3560 -ip 35601⤵PID:4368
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.8MB
MD568be007bd3fa09d26fcee584a9157770
SHA16f191c0587c8055f26367f25ce0f7787ca272714
SHA25671acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e
SHA512f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245
-
Filesize
3.8MB
MD568be007bd3fa09d26fcee584a9157770
SHA16f191c0587c8055f26367f25ce0f7787ca272714
SHA25671acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e
SHA512f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245
-
Filesize
3.8MB
MD568be007bd3fa09d26fcee584a9157770
SHA16f191c0587c8055f26367f25ce0f7787ca272714
SHA25671acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e
SHA512f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245
-
Filesize
412KB
MD542851869d2ed62806999dd416ff9f45b
SHA146333b2f7ddf326a774b43ea2d66ed681486fd34
SHA256a6734f7888870bb71002eb528eb1b175b6bcaaf77d216dddd54b13ca967bdfb6
SHA51243e563a64ef0e85c21bb491666f0ef97392563d40bb3f570c08a3d79affc202ff2b2dd58e5288a80a3e558e711e875d8232d9c0732bdfeb216c49cfc16be0a7f
-
Filesize
412KB
MD542851869d2ed62806999dd416ff9f45b
SHA146333b2f7ddf326a774b43ea2d66ed681486fd34
SHA256a6734f7888870bb71002eb528eb1b175b6bcaaf77d216dddd54b13ca967bdfb6
SHA51243e563a64ef0e85c21bb491666f0ef97392563d40bb3f570c08a3d79affc202ff2b2dd58e5288a80a3e558e711e875d8232d9c0732bdfeb216c49cfc16be0a7f
-
Filesize
412KB
MD542851869d2ed62806999dd416ff9f45b
SHA146333b2f7ddf326a774b43ea2d66ed681486fd34
SHA256a6734f7888870bb71002eb528eb1b175b6bcaaf77d216dddd54b13ca967bdfb6
SHA51243e563a64ef0e85c21bb491666f0ef97392563d40bb3f570c08a3d79affc202ff2b2dd58e5288a80a3e558e711e875d8232d9c0732bdfeb216c49cfc16be0a7f
-
Filesize
2.9MB
MD573e4eccfbd36690b22434b8edaeab4bf
SHA1dd7f7c0577149ddc9302998c00ac9846498c973b
SHA256ef543bf69789486fc724e0c42f2a09a0318af27f6a3bb1889bf7db6d89fd1b9a
SHA512a5fef4cfdf400e953eab0604e41de44d0b8f9cd4f1b89401cbab77f5e0c8bcb5c41538d0772492065d59b6f24d54fee21e669aa34931c26fa4ae0aeed27df127
-
Filesize
2.9MB
MD573e4eccfbd36690b22434b8edaeab4bf
SHA1dd7f7c0577149ddc9302998c00ac9846498c973b
SHA256ef543bf69789486fc724e0c42f2a09a0318af27f6a3bb1889bf7db6d89fd1b9a
SHA512a5fef4cfdf400e953eab0604e41de44d0b8f9cd4f1b89401cbab77f5e0c8bcb5c41538d0772492065d59b6f24d54fee21e669aa34931c26fa4ae0aeed27df127
-
Filesize
2.9MB
MD573e4eccfbd36690b22434b8edaeab4bf
SHA1dd7f7c0577149ddc9302998c00ac9846498c973b
SHA256ef543bf69789486fc724e0c42f2a09a0318af27f6a3bb1889bf7db6d89fd1b9a
SHA512a5fef4cfdf400e953eab0604e41de44d0b8f9cd4f1b89401cbab77f5e0c8bcb5c41538d0772492065d59b6f24d54fee21e669aa34931c26fa4ae0aeed27df127
-
Filesize
755.8MB
MD5ab86076e60a5ce6f1c564751fde18eab
SHA1b97463cf30d897f7edf107eb921a1fa45f14ec3e
SHA256e82232f28744450a9b47e081758c4806992d76ab31a36430627197d2d8007c19
SHA51286616180d134f707d3dd03d80cafb3268c20d98a338540431b21be3bd08440dd7b2e5b3e0f2206660d706f0f7dda8b4eb3c64b913fb8af1891403186d872fc67
-
Filesize
755.8MB
MD5ab86076e60a5ce6f1c564751fde18eab
SHA1b97463cf30d897f7edf107eb921a1fa45f14ec3e
SHA256e82232f28744450a9b47e081758c4806992d76ab31a36430627197d2d8007c19
SHA51286616180d134f707d3dd03d80cafb3268c20d98a338540431b21be3bd08440dd7b2e5b3e0f2206660d706f0f7dda8b4eb3c64b913fb8af1891403186d872fc67