Analysis

  • max time kernel
    143s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-08-2023 14:19

General

  • Target

    8a599ff1cee0f25d36332cc64f722673.exe

  • Size

    483KB

  • MD5

    8a599ff1cee0f25d36332cc64f722673

  • SHA1

    242f2816c83cf26d49abc40079ba3458b1d58b2f

  • SHA256

    ad6672b5390661b265f162f695ce7e75d0f8a11bbc9847d04893155219c9c2b5

  • SHA512

    53a9a33a6889b3fa1c193f6bc9ec6606b6c780ef7f0c0749e64a15f744c9eca5d67531695b76a5508d8c1c49ce4098d414e90f58bb619447dc8ab4be5ab8ebd0

  • SSDEEP

    12288:sW3RmeuWCLraizRk5KnNOKNAPhCmjN/WN9i7cBapTkxyKW:ZoeuWCXd1zNORQO5WN4iWkxrW

Malware Config

Extracted

Family

redline

Botnet

trial

C2

173.44.141.116:38411

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Drops startup file 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8a599ff1cee0f25d36332cc64f722673.exe
    "C:\Users\Admin\AppData\Local\Temp\8a599ff1cee0f25d36332cc64f722673.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2628
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe
      "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\Admin\AppData\Local\Temp\8a599ff1cee0f25d36332cc64f722673.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mozilla.exe.exe'
      2⤵
      • Drops startup file
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1652
    • C:\Users\Admin\AppData\Local\Temp\8a599ff1cee0f25d36332cc64f722673.exe
      "C:\Users\Admin\AppData\Local\Temp\8a599ff1cee0f25d36332cc64f722673.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\8a599ff1cee0f25d36332cc64f722673.exe.log

    Filesize

    706B

    MD5

    2ef5ef69dadb8865b3d5b58c956077b8

    SHA1

    af2d869bac00685c745652bbd8b3fe82829a8998

    SHA256

    363502eb2a4e53ba02d2d85412b901fcf8e06de221736bdffa949799ef3d21e3

    SHA512

    66d4db5dd17d88e1d54ea0df3a7211a503dc4355de701259cefccc9f2e4e3ced9534b700099ffbb089a5a3acb082011c80b61801aa14aff76b379ce8f90d4fd3

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_cxhr5j0n.3dc.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\tmpBAD5.tmp

    Filesize

    46KB

    MD5

    02d2c46697e3714e49f46b680b9a6b83

    SHA1

    84f98b56d49f01e9b6b76a4e21accf64fd319140

    SHA256

    522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

    SHA512

    60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

  • C:\Users\Admin\AppData\Local\Temp\tmpBB19.tmp

    Filesize

    92KB

    MD5

    395af5c6fe8e84f27b3be9b1a95e412d

    SHA1

    386230fc368fff5ba685322a8177ebecd9a665e1

    SHA256

    4c8984d8400a8ea0c4f407c91c9e2be623b6bbbb0d4f418a7ccee8f1c96f6ae6

    SHA512

    376116e25f7b5d10b724c1a9ca40aebf17bdd386b9858ef34b05c66454984b88f09978484f770e2cdc477cf2a0025a35a8b9c8f196c2aa86d5c68a44d0388a7b

  • C:\Users\Admin\AppData\Local\Temp\tmpBB64.tmp

    Filesize

    48KB

    MD5

    349e6eb110e34a08924d92f6b334801d

    SHA1

    bdfb289daff51890cc71697b6322aa4b35ec9169

    SHA256

    c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

    SHA512

    2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

  • C:\Users\Admin\AppData\Local\Temp\tmpBB7A.tmp

    Filesize

    20KB

    MD5

    49693267e0adbcd119f9f5e02adf3a80

    SHA1

    3ba3d7f89b8ad195ca82c92737e960e1f2b349df

    SHA256

    d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f

    SHA512

    b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2

  • C:\Users\Admin\AppData\Local\Temp\tmpBB8E.tmp

    Filesize

    116KB

    MD5

    f70aa3fa04f0536280f872ad17973c3d

    SHA1

    50a7b889329a92de1b272d0ecf5fce87395d3123

    SHA256

    8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

    SHA512

    30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

  • C:\Users\Admin\AppData\Local\Temp\tmpBBCA.tmp

    Filesize

    96KB

    MD5

    d367ddfda80fdcf578726bc3b0bc3e3c

    SHA1

    23fcd5e4e0e5e296bee7e5224a8404ecd92cf671

    SHA256

    0b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0

    SHA512

    40e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77

  • memory/1652-143-0x0000000005A20000-0x0000000006048000-memory.dmp

    Filesize

    6.2MB

  • memory/1652-142-0x00000000053E0000-0x00000000053F0000-memory.dmp

    Filesize

    64KB

  • memory/1652-208-0x0000000007800000-0x0000000007896000-memory.dmp

    Filesize

    600KB

  • memory/1652-144-0x0000000005900000-0x0000000005922000-memory.dmp

    Filesize

    136KB

  • memory/1652-145-0x0000000006050000-0x00000000060B6000-memory.dmp

    Filesize

    408KB

  • memory/1652-146-0x0000000006170000-0x00000000061D6000-memory.dmp

    Filesize

    408KB

  • memory/1652-141-0x00000000053E0000-0x00000000053F0000-memory.dmp

    Filesize

    64KB

  • memory/1652-156-0x00000000067F0000-0x000000000680E000-memory.dmp

    Filesize

    120KB

  • memory/1652-140-0x0000000005210000-0x0000000005246000-memory.dmp

    Filesize

    216KB

  • memory/1652-221-0x00000000748B0000-0x0000000075060000-memory.dmp

    Filesize

    7.7MB

  • memory/1652-139-0x00000000748B0000-0x0000000075060000-memory.dmp

    Filesize

    7.7MB

  • memory/1652-211-0x0000000006D30000-0x0000000006D52000-memory.dmp

    Filesize

    136KB

  • memory/1652-210-0x0000000006CB0000-0x0000000006CCA000-memory.dmp

    Filesize

    104KB

  • memory/2628-192-0x0000000005450000-0x0000000005473000-memory.dmp

    Filesize

    140KB

  • memory/2628-166-0x0000000005450000-0x0000000005473000-memory.dmp

    Filesize

    140KB

  • memory/2628-170-0x0000000005450000-0x0000000005473000-memory.dmp

    Filesize

    140KB

  • memory/2628-172-0x0000000005450000-0x0000000005473000-memory.dmp

    Filesize

    140KB

  • memory/2628-174-0x0000000005450000-0x0000000005473000-memory.dmp

    Filesize

    140KB

  • memory/2628-176-0x0000000005450000-0x0000000005473000-memory.dmp

    Filesize

    140KB

  • memory/2628-178-0x0000000005450000-0x0000000005473000-memory.dmp

    Filesize

    140KB

  • memory/2628-180-0x0000000005450000-0x0000000005473000-memory.dmp

    Filesize

    140KB

  • memory/2628-182-0x0000000005450000-0x0000000005473000-memory.dmp

    Filesize

    140KB

  • memory/2628-184-0x0000000005450000-0x0000000005473000-memory.dmp

    Filesize

    140KB

  • memory/2628-186-0x0000000005450000-0x0000000005473000-memory.dmp

    Filesize

    140KB

  • memory/2628-188-0x0000000005450000-0x0000000005473000-memory.dmp

    Filesize

    140KB

  • memory/2628-190-0x0000000005450000-0x0000000005473000-memory.dmp

    Filesize

    140KB

  • memory/2628-133-0x00000000748B0000-0x0000000075060000-memory.dmp

    Filesize

    7.7MB

  • memory/2628-194-0x0000000005450000-0x0000000005473000-memory.dmp

    Filesize

    140KB

  • memory/2628-196-0x0000000005450000-0x0000000005473000-memory.dmp

    Filesize

    140KB

  • memory/2628-198-0x0000000005450000-0x0000000005473000-memory.dmp

    Filesize

    140KB

  • memory/2628-200-0x0000000005450000-0x0000000005473000-memory.dmp

    Filesize

    140KB

  • memory/2628-202-0x0000000005450000-0x0000000005473000-memory.dmp

    Filesize

    140KB

  • memory/2628-204-0x0000000005450000-0x0000000005473000-memory.dmp

    Filesize

    140KB

  • memory/2628-206-0x0000000005450000-0x0000000005473000-memory.dmp

    Filesize

    140KB

  • memory/2628-207-0x00000000054A0000-0x00000000054A1000-memory.dmp

    Filesize

    4KB

  • memory/2628-134-0x00000000008A0000-0x0000000000920000-memory.dmp

    Filesize

    512KB

  • memory/2628-168-0x0000000005450000-0x0000000005473000-memory.dmp

    Filesize

    140KB

  • memory/2628-164-0x0000000005450000-0x0000000005473000-memory.dmp

    Filesize

    140KB

  • memory/2628-162-0x0000000005450000-0x0000000005473000-memory.dmp

    Filesize

    140KB

  • memory/2628-160-0x0000000005450000-0x0000000005473000-memory.dmp

    Filesize

    140KB

  • memory/2628-215-0x00000000748B0000-0x0000000075060000-memory.dmp

    Filesize

    7.7MB

  • memory/2628-135-0x0000000005850000-0x0000000005DF4000-memory.dmp

    Filesize

    5.6MB

  • memory/2628-136-0x0000000005340000-0x00000000053D2000-memory.dmp

    Filesize

    584KB

  • memory/2628-137-0x00000000052C0000-0x00000000052D0000-memory.dmp

    Filesize

    64KB

  • memory/2628-158-0x0000000005450000-0x0000000005473000-memory.dmp

    Filesize

    140KB

  • memory/2628-138-0x00000000054F0000-0x000000000558C000-memory.dmp

    Filesize

    624KB

  • memory/2628-157-0x0000000005450000-0x0000000005473000-memory.dmp

    Filesize

    140KB

  • memory/4908-222-0x0000000005300000-0x000000000533C000-memory.dmp

    Filesize

    240KB

  • memory/4908-224-0x0000000005590000-0x000000000569A000-memory.dmp

    Filesize

    1.0MB

  • memory/4908-226-0x0000000006F70000-0x000000000749C000-memory.dmp

    Filesize

    5.2MB

  • memory/4908-227-0x0000000006A40000-0x0000000006AB6000-memory.dmp

    Filesize

    472KB

  • memory/4908-228-0x0000000006D20000-0x0000000006D3E000-memory.dmp

    Filesize

    120KB

  • memory/4908-223-0x0000000002DF0000-0x0000000002E00000-memory.dmp

    Filesize

    64KB

  • memory/4908-225-0x0000000006870000-0x0000000006A32000-memory.dmp

    Filesize

    1.8MB

  • memory/4908-219-0x00000000052A0000-0x00000000052B2000-memory.dmp

    Filesize

    72KB

  • memory/4908-209-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/4908-214-0x00000000748B0000-0x0000000075060000-memory.dmp

    Filesize

    7.7MB

  • memory/4908-217-0x00000000058A0000-0x0000000005EB8000-memory.dmp

    Filesize

    6.1MB

  • memory/4908-407-0x00000000748B0000-0x0000000075060000-memory.dmp

    Filesize

    7.7MB

  • memory/4908-408-0x0000000002DF0000-0x0000000002E00000-memory.dmp

    Filesize

    64KB

  • memory/4908-409-0x00000000748B0000-0x0000000075060000-memory.dmp

    Filesize

    7.7MB