Analysis
-
max time kernel
65s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2023 06:48
Static task
static1
Behavioral task
behavioral1
Sample
0e59fafb2de30f5fa5b6cce425f40115180b373592e1a201702742a6e8f21cc9.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0e59fafb2de30f5fa5b6cce425f40115180b373592e1a201702742a6e8f21cc9.exe
Resource
win10v2004-20230220-en
General
-
Target
0e59fafb2de30f5fa5b6cce425f40115180b373592e1a201702742a6e8f21cc9.exe
-
Size
741KB
-
MD5
6fb6cfdca040bd1e7ab1256d37306416
-
SHA1
f9f8270d2186a27a3f7301e4e3d3cccc73bab0ad
-
SHA256
0e59fafb2de30f5fa5b6cce425f40115180b373592e1a201702742a6e8f21cc9
-
SHA512
0e4c654863528e97d67741734217d37d0cec03d9bf9cbe9e66543e614566d9e163c5b8455548352b56a706225937bbc5dc17c5c9a8e52e99637b6885ef2d0ad3
-
SSDEEP
6144:25G0py2KhkpK60W2VuTLx7AV35pDNvB/PQs6AvLTJ:25M2KhkpWWYuHxU3pDNvB/PHXLTJ
Malware Config
Extracted
redline
1
95.216.249.153:81
-
auth_value
a290efd4796d37556cc5af7e83c91346
Extracted
laplas
http://45.159.189.105
-
api_key
ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4
Extracted
laplas
http://45.159.189.105
-
api_key
ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 1240 ClipperDoej4oa.exe 3636 Upshotox64.exe 2228 ntlhost.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" ClipperDoej4oa.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1736 set thread context of 3680 1736 0e59fafb2de30f5fa5b6cce425f40115180b373592e1a201702742a6e8f21cc9.exe 85 PID 3636 set thread context of 2356 3636 Upshotox64.exe 98 -
Program crash 2 IoCs
pid pid_target Process procid_target 2052 1736 WerFault.exe 83 4348 3636 WerFault.exe 96 -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 101 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3680 AppLaunch.exe 3680 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3680 AppLaunch.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1736 wrote to memory of 3680 1736 0e59fafb2de30f5fa5b6cce425f40115180b373592e1a201702742a6e8f21cc9.exe 85 PID 1736 wrote to memory of 3680 1736 0e59fafb2de30f5fa5b6cce425f40115180b373592e1a201702742a6e8f21cc9.exe 85 PID 1736 wrote to memory of 3680 1736 0e59fafb2de30f5fa5b6cce425f40115180b373592e1a201702742a6e8f21cc9.exe 85 PID 1736 wrote to memory of 3680 1736 0e59fafb2de30f5fa5b6cce425f40115180b373592e1a201702742a6e8f21cc9.exe 85 PID 1736 wrote to memory of 3680 1736 0e59fafb2de30f5fa5b6cce425f40115180b373592e1a201702742a6e8f21cc9.exe 85 PID 3680 wrote to memory of 1240 3680 AppLaunch.exe 95 PID 3680 wrote to memory of 1240 3680 AppLaunch.exe 95 PID 3680 wrote to memory of 1240 3680 AppLaunch.exe 95 PID 3680 wrote to memory of 3636 3680 AppLaunch.exe 96 PID 3680 wrote to memory of 3636 3680 AppLaunch.exe 96 PID 3680 wrote to memory of 3636 3680 AppLaunch.exe 96 PID 3636 wrote to memory of 2356 3636 Upshotox64.exe 98 PID 3636 wrote to memory of 2356 3636 Upshotox64.exe 98 PID 3636 wrote to memory of 2356 3636 Upshotox64.exe 98 PID 3636 wrote to memory of 2356 3636 Upshotox64.exe 98 PID 3636 wrote to memory of 2356 3636 Upshotox64.exe 98 PID 1240 wrote to memory of 2228 1240 ClipperDoej4oa.exe 101 PID 1240 wrote to memory of 2228 1240 ClipperDoej4oa.exe 101 PID 1240 wrote to memory of 2228 1240 ClipperDoej4oa.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e59fafb2de30f5fa5b6cce425f40115180b373592e1a201702742a6e8f21cc9.exe"C:\Users\Admin\AppData\Local\Temp\0e59fafb2de30f5fa5b6cce425f40115180b373592e1a201702742a6e8f21cc9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\ClipperDoej4oa.exe"C:\Users\Admin\AppData\Local\Temp\ClipperDoej4oa.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe4⤵
- Executes dropped EXE
PID:2228
-
-
-
C:\Users\Admin\AppData\Local\Temp\Upshotox64.exe"C:\Users\Admin\AppData\Local\Temp\Upshotox64.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:2356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3636 -s 2964⤵
- Program crash
PID:4348
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1736 -s 3122⤵
- Program crash
PID:2052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1736 -ip 17361⤵PID:3288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3636 -ip 36361⤵PID:1452
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.8MB
MD568be007bd3fa09d26fcee584a9157770
SHA16f191c0587c8055f26367f25ce0f7787ca272714
SHA25671acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e
SHA512f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245
-
Filesize
3.8MB
MD568be007bd3fa09d26fcee584a9157770
SHA16f191c0587c8055f26367f25ce0f7787ca272714
SHA25671acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e
SHA512f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245
-
Filesize
3.8MB
MD568be007bd3fa09d26fcee584a9157770
SHA16f191c0587c8055f26367f25ce0f7787ca272714
SHA25671acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e
SHA512f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245
-
Filesize
412KB
MD542851869d2ed62806999dd416ff9f45b
SHA146333b2f7ddf326a774b43ea2d66ed681486fd34
SHA256a6734f7888870bb71002eb528eb1b175b6bcaaf77d216dddd54b13ca967bdfb6
SHA51243e563a64ef0e85c21bb491666f0ef97392563d40bb3f570c08a3d79affc202ff2b2dd58e5288a80a3e558e711e875d8232d9c0732bdfeb216c49cfc16be0a7f
-
Filesize
412KB
MD542851869d2ed62806999dd416ff9f45b
SHA146333b2f7ddf326a774b43ea2d66ed681486fd34
SHA256a6734f7888870bb71002eb528eb1b175b6bcaaf77d216dddd54b13ca967bdfb6
SHA51243e563a64ef0e85c21bb491666f0ef97392563d40bb3f570c08a3d79affc202ff2b2dd58e5288a80a3e558e711e875d8232d9c0732bdfeb216c49cfc16be0a7f
-
Filesize
412KB
MD542851869d2ed62806999dd416ff9f45b
SHA146333b2f7ddf326a774b43ea2d66ed681486fd34
SHA256a6734f7888870bb71002eb528eb1b175b6bcaaf77d216dddd54b13ca967bdfb6
SHA51243e563a64ef0e85c21bb491666f0ef97392563d40bb3f570c08a3d79affc202ff2b2dd58e5288a80a3e558e711e875d8232d9c0732bdfeb216c49cfc16be0a7f
-
Filesize
677.9MB
MD56f616f450976646375414f7af15a98ee
SHA126a2b73c2bf7836926d8ad8cbfbe1f8a09d12e75
SHA25676640076efa0dacf1bbc6adb12b9483f2489158484a67aa659f71b639eeb0288
SHA512f3b5dfb958e3b83e5632c0122eab44e1f4a1e9deeb628ab7003021205d2a1300c250a77d6eb22bee39da3c265f68fd0dcda6b1704a26aa46e78e3dbc67b4cc18
-
Filesize
681.9MB
MD575925f1dfbcf118245f97a299beb354f
SHA1d425ddabd5a46b6891cc11932f97d12c38c9ae54
SHA256a936632f59b34d8dae7ba21f54b1ee426d406b6efa235146fd1508b351cb543f
SHA5129d2dc995c8e4be2ae1f685ce8eb3e765771389e474b701333fcd181586254709a91e54c431d3834db5d1c5a6ba37527bf143308126f06371e0b81b5d4fe24426