Analysis
-
max time kernel
140s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2023 08:08
Behavioral task
behavioral1
Sample
1fd972fa7b5d9b8b1457dd025aa1ffe7.exe
Resource
win7-20230712-en
General
-
Target
1fd972fa7b5d9b8b1457dd025aa1ffe7.exe
-
Size
25.6MB
-
MD5
1fd972fa7b5d9b8b1457dd025aa1ffe7
-
SHA1
2879d38e0b6fe1b930fafbe6415b641b5efc68e4
-
SHA256
520044b6e34ca534c0a4d97abd318a8db37169f18f8c1e385f3d5b79df9d025d
-
SHA512
9f5869d6e6ae67559f5a82d0841307ac1b6d09946c5ba963964d6a01e1c9aa17a229bfe30ec67e72c7f514e21c585c8ad1369bb6100d1aa16de3f829e7f527e1
-
SSDEEP
98304:ylQKxQh+98myGsy1slENtrE7pQ8kq34vEStCAsDrP7J8yStyBCWLRV7VtC4bksxI:uQPY9mgGvkHEAsdtLRVRXgFqKQbEZxRp
Malware Config
Extracted
redline
LXIX
5.35.33.167:17154
-
auth_value
3f30d9c8480a0830cfcc9a091fac5fca
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/4692-152-0x0000000000400000-0x0000000001DAA000-memory.dmp family_redline -
Shurk
Shurk is an infostealer, written in C++ which appeared in 2021.
-
Shurk Stealer payload 5 IoCs
resource yara_rule behavioral2/files/0x0007000000023281-137.dat shurk_stealer behavioral2/files/0x0007000000023281-140.dat shurk_stealer behavioral2/files/0x0007000000023281-151.dat shurk_stealer behavioral2/memory/4692-152-0x0000000000400000-0x0000000001DAA000-memory.dmp shurk_stealer behavioral2/memory/2796-156-0x00007FF6F2A60000-0x00007FF6F436B000-memory.dmp shurk_stealer -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\Control Panel\International\Geo\Nation 1fd972fa7b5d9b8b1457dd025aa1ffe7.exe -
Executes dropped EXE 2 IoCs
pid Process 2796 Aurora.exe 1288 LXIX.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1288 LXIX.exe 1288 LXIX.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1288 LXIX.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4692 wrote to memory of 2796 4692 1fd972fa7b5d9b8b1457dd025aa1ffe7.exe 87 PID 4692 wrote to memory of 2796 4692 1fd972fa7b5d9b8b1457dd025aa1ffe7.exe 87 PID 4692 wrote to memory of 1288 4692 1fd972fa7b5d9b8b1457dd025aa1ffe7.exe 89 PID 4692 wrote to memory of 1288 4692 1fd972fa7b5d9b8b1457dd025aa1ffe7.exe 89 PID 4692 wrote to memory of 1288 4692 1fd972fa7b5d9b8b1457dd025aa1ffe7.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\1fd972fa7b5d9b8b1457dd025aa1ffe7.exe"C:\Users\Admin\AppData\Local\Temp\1fd972fa7b5d9b8b1457dd025aa1ffe7.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\Aurora.exe"C:\Users\Admin\AppData\Local\Temp\Aurora.exe"2⤵
- Executes dropped EXE
PID:2796
-
-
C:\Users\Admin\AppData\Local\Temp\LXIX.exe"C:\Users\Admin\AppData\Local\Temp\LXIX.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1288
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25.4MB
MD5ad9aa927339dc830a38021afbe20a85f
SHA18017bea5f073064a27f61390ce6433cc110f55ea
SHA2566815733e84bc19b0e7d24533f6295c929cd48be501b226e3a9fd12806a7a4e71
SHA51243d95d09404f4407083f25ac59f9c31855ed715309037be6ba9e05d26af3ee073e786ee2d12f72f3e1fedebf8529c8b31dc2b7e485ab08b7e21fce2abcf260fd
-
Filesize
25.4MB
MD5ad9aa927339dc830a38021afbe20a85f
SHA18017bea5f073064a27f61390ce6433cc110f55ea
SHA2566815733e84bc19b0e7d24533f6295c929cd48be501b226e3a9fd12806a7a4e71
SHA51243d95d09404f4407083f25ac59f9c31855ed715309037be6ba9e05d26af3ee073e786ee2d12f72f3e1fedebf8529c8b31dc2b7e485ab08b7e21fce2abcf260fd
-
Filesize
25.4MB
MD5ad9aa927339dc830a38021afbe20a85f
SHA18017bea5f073064a27f61390ce6433cc110f55ea
SHA2566815733e84bc19b0e7d24533f6295c929cd48be501b226e3a9fd12806a7a4e71
SHA51243d95d09404f4407083f25ac59f9c31855ed715309037be6ba9e05d26af3ee073e786ee2d12f72f3e1fedebf8529c8b31dc2b7e485ab08b7e21fce2abcf260fd
-
Filesize
201KB
MD5e25ed1abec99ab85498dbe0ac648875b
SHA1739af601d9eaccae5bdc7c314d30de324f1a342b
SHA256977536c6412d8d8e24310baf3515ff0992b3f29350587a0c8bcc1c279a849b6b
SHA5124197d4d9248a87179055e4965a3bd543c892929378f896ef44209293b51775ba5270dd2967fe08971f4c712c2d735cbba9beee972ac0127247f1efdf2e88e6f3
-
Filesize
201KB
MD5e25ed1abec99ab85498dbe0ac648875b
SHA1739af601d9eaccae5bdc7c314d30de324f1a342b
SHA256977536c6412d8d8e24310baf3515ff0992b3f29350587a0c8bcc1c279a849b6b
SHA5124197d4d9248a87179055e4965a3bd543c892929378f896ef44209293b51775ba5270dd2967fe08971f4c712c2d735cbba9beee972ac0127247f1efdf2e88e6f3
-
Filesize
201KB
MD5e25ed1abec99ab85498dbe0ac648875b
SHA1739af601d9eaccae5bdc7c314d30de324f1a342b
SHA256977536c6412d8d8e24310baf3515ff0992b3f29350587a0c8bcc1c279a849b6b
SHA5124197d4d9248a87179055e4965a3bd543c892929378f896ef44209293b51775ba5270dd2967fe08971f4c712c2d735cbba9beee972ac0127247f1efdf2e88e6f3