Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    25-08-2023 02:49

General

  • Target

    Setup.exe

  • Size

    238KB

  • MD5

    c913d783de7b3d8af7f333abdab32d59

  • SHA1

    f5a36e0622b482c886aed99ab2ec75f391db4f9c

  • SHA256

    e31cd4a352c3550c113a4b3a15646688afd2e92d9f7cf0e23e147203da08d173

  • SHA512

    4825018c0e74a3cad0bfe53afc459b95ad658f13505f92291d8aa628cb6c7521a9d5097919bbccb4d850500ba3f4734d1dc528c89b81204b8384010328c9cab1

  • SSDEEP

    6144:jf/8Rlc0jWtxg3FSwC76VtloLQnfbUyz24q9v:jylrsxg3FSwC76VfHp2/l

Malware Config

Extracted

Family

redline

Botnet

@prsvt6666

C2

94.142.138.4:80

Attributes
  • auth_value

    87d1997a564fa7581db209cc71c07a4e

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Users\Admin\AppData\Local\Temp\conhost.exe
      "C:\Users\Admin\AppData\Local\Temp\conhost.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2748
      • C:\Windows\system32\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1108
        • C:\Windows\system32\mode.com
          mode 65,10
          4⤵
            PID:1652
          • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
            7z.exe e file.zip -p55432280245522270875720630 -oextracted
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:2964
          • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
            7z.exe e extracted/file_2.zip -oextracted
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:2164
          • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
            7z.exe e extracted/file_1.zip -oextracted
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:2492
          • C:\Windows\system32\attrib.exe
            attrib +H "4523423.exe"
            4⤵
            • Views/modifies file attributes
            PID:2888
          • C:\Users\Admin\AppData\Local\Temp\main\4523423.exe
            "4523423.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1368

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\conhost.exe

      Filesize

      2.5MB

      MD5

      477dbc33c6dea724c0a9d6969f1aea0e

      SHA1

      e9642b2e0c1f58bab6119b5d9713a2af987715fe

      SHA256

      cff4738febe9bfbeeaecf20bf24ec7acd19ed5b94f364da02d09bdedcbf50f91

      SHA512

      dcbf9f127becbd9d007bbb30332ae1425d15dea2ba89f2f3a0bdb594510fe830014fc433d8d6a5b83b4993308458df3e3c82d6863371ca3eaf055609550578d7

    • C:\Users\Admin\AppData\Local\Temp\conhost.exe

      Filesize

      2.5MB

      MD5

      477dbc33c6dea724c0a9d6969f1aea0e

      SHA1

      e9642b2e0c1f58bab6119b5d9713a2af987715fe

      SHA256

      cff4738febe9bfbeeaecf20bf24ec7acd19ed5b94f364da02d09bdedcbf50f91

      SHA512

      dcbf9f127becbd9d007bbb30332ae1425d15dea2ba89f2f3a0bdb594510fe830014fc433d8d6a5b83b4993308458df3e3c82d6863371ca3eaf055609550578d7

    • C:\Users\Admin\AppData\Local\Temp\main\4523423.exe

      Filesize

      21KB

      MD5

      5e4d1f77fa67bca57824de97cc56605f

      SHA1

      6cde79f690ba1572e14a0a174767d500b8e048ad

      SHA256

      4e7d3921daf47b0bfed937de307efdd0fc1ff9b4ced47a9823ff89365ccb5a48

      SHA512

      fdabe1982cbef5e1cd895426c4f72ead8707d917454dc09ff93cc6fcc15a991521994462f31a36f00c5e271c710dcf101576b9847ed107175577a5cd3af4a84a

    • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\4523423.exe

      Filesize

      21KB

      MD5

      5e4d1f77fa67bca57824de97cc56605f

      SHA1

      6cde79f690ba1572e14a0a174767d500b8e048ad

      SHA256

      4e7d3921daf47b0bfed937de307efdd0fc1ff9b4ced47a9823ff89365ccb5a48

      SHA512

      fdabe1982cbef5e1cd895426c4f72ead8707d917454dc09ff93cc6fcc15a991521994462f31a36f00c5e271c710dcf101576b9847ed107175577a5cd3af4a84a

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\ANTIAV~1.DAT

      Filesize

      2.1MB

      MD5

      e8b201a4b8fce953d69c09f0085dd749

      SHA1

      ca75ad554052ffa065463ce0156c7b0dc16b1df8

      SHA256

      40f1d0d4eb5473eef3173aaba9250531ff1871b7d700de774d0be789cbed35ef

      SHA512

      9b6e03372cba61ac1261296d9f380a88d56207f3895e09ea2c80679468ce21d642ab7d20e5409341a816377cd35f08877c69207266f7c2272e76091084a69b33

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_1.zip

      Filesize

      9KB

      MD5

      666c8266a976df850ed19b07203cc4b6

      SHA1

      89fb3813c4efcaf077745628a81bd70eea19421c

      SHA256

      3dc11ee55a9bf680cfe88ac8723d7495c2acafd807ef31f23ce49201a07895dd

      SHA512

      8c242e12e90c78cd753d67cfac95f8d310d82f5d22a94b2cfb38d0a5859ac72d7b3664570db98dd0289ecf388ded9b3f9c0676aa9b03ca0e866a0871c82de45d

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_2.zip

      Filesize

      1.6MB

      MD5

      aa69043eeea777e914f1f08575cd9f7a

      SHA1

      b6ff2003aeefafe6661f62e4ddac614978dbb8e8

      SHA256

      d33b3dbd42c7a206ce2b97df098e489a836706412a7743270854f4c681ab9a79

      SHA512

      19f1876fc1dfa2e33d0b60435a278c27539029b4b5d00a7c6ebaa7b1ed89910657d0514a024b5a4b3cc9408125167ad9c4d28686426eb0e37042feaf9b92aa35

    • C:\Users\Admin\AppData\Local\Temp\main\file.bin

      Filesize

      1.6MB

      MD5

      b586c44c4576d39300636570675e0a63

      SHA1

      25be36ac1896873d7a804979d04c8f12aceaa5ee

      SHA256

      19aa87dc9bac08807fcb1261b5d4cb529cc257f4b291c1ff4312f52b19a8c91d

      SHA512

      204c592f1a6845a967cd864661dc83406f9a5c61f684b85796bcbf90861e170ce0a772d0c8caaa000dc046779e3d5f3d129ee3cfb77220b5bd0968faefcaabc9

    • C:\Users\Admin\AppData\Local\Temp\main\main.bat

      Filesize

      462B

      MD5

      b346625abcd2170c91f7dd5f240c6c5c

      SHA1

      eb5f62169eba2b678ccc7d1790bf4dad6e7e492b

      SHA256

      bd82ed78714891bcb476436ea097acd704785a19133b66e78467d227927f2f3a

      SHA512

      f8f2ffec71e5354eb6815293b5b183f89455228a890eaf2df84704a9390e7b83ba1b7aa74c7497e3696e4f02754c255a95df9166a13392e25b176b68515f901b

    • C:\Users\Admin\AppData\Local\Temp\main\main.bat

      Filesize

      462B

      MD5

      b346625abcd2170c91f7dd5f240c6c5c

      SHA1

      eb5f62169eba2b678ccc7d1790bf4dad6e7e492b

      SHA256

      bd82ed78714891bcb476436ea097acd704785a19133b66e78467d227927f2f3a

      SHA512

      f8f2ffec71e5354eb6815293b5b183f89455228a890eaf2df84704a9390e7b83ba1b7aa74c7497e3696e4f02754c255a95df9166a13392e25b176b68515f901b

    • \Users\Admin\AppData\Local\Temp\conhost.exe

      Filesize

      2.5MB

      MD5

      477dbc33c6dea724c0a9d6969f1aea0e

      SHA1

      e9642b2e0c1f58bab6119b5d9713a2af987715fe

      SHA256

      cff4738febe9bfbeeaecf20bf24ec7acd19ed5b94f364da02d09bdedcbf50f91

      SHA512

      dcbf9f127becbd9d007bbb30332ae1425d15dea2ba89f2f3a0bdb594510fe830014fc433d8d6a5b83b4993308458df3e3c82d6863371ca3eaf055609550578d7

    • \Users\Admin\AppData\Local\Temp\conhost.exe

      Filesize

      2.5MB

      MD5

      477dbc33c6dea724c0a9d6969f1aea0e

      SHA1

      e9642b2e0c1f58bab6119b5d9713a2af987715fe

      SHA256

      cff4738febe9bfbeeaecf20bf24ec7acd19ed5b94f364da02d09bdedcbf50f91

      SHA512

      dcbf9f127becbd9d007bbb30332ae1425d15dea2ba89f2f3a0bdb594510fe830014fc433d8d6a5b83b4993308458df3e3c82d6863371ca3eaf055609550578d7

    • \Users\Admin\AppData\Local\Temp\conhost.exe

      Filesize

      2.5MB

      MD5

      477dbc33c6dea724c0a9d6969f1aea0e

      SHA1

      e9642b2e0c1f58bab6119b5d9713a2af987715fe

      SHA256

      cff4738febe9bfbeeaecf20bf24ec7acd19ed5b94f364da02d09bdedcbf50f91

      SHA512

      dcbf9f127becbd9d007bbb30332ae1425d15dea2ba89f2f3a0bdb594510fe830014fc433d8d6a5b83b4993308458df3e3c82d6863371ca3eaf055609550578d7

    • \Users\Admin\AppData\Local\Temp\main\4523423.exe

      Filesize

      21KB

      MD5

      5e4d1f77fa67bca57824de97cc56605f

      SHA1

      6cde79f690ba1572e14a0a174767d500b8e048ad

      SHA256

      4e7d3921daf47b0bfed937de307efdd0fc1ff9b4ced47a9823ff89365ccb5a48

      SHA512

      fdabe1982cbef5e1cd895426c4f72ead8707d917454dc09ff93cc6fcc15a991521994462f31a36f00c5e271c710dcf101576b9847ed107175577a5cd3af4a84a

    • \Users\Admin\AppData\Local\Temp\main\4523423.exe

      Filesize

      21KB

      MD5

      5e4d1f77fa67bca57824de97cc56605f

      SHA1

      6cde79f690ba1572e14a0a174767d500b8e048ad

      SHA256

      4e7d3921daf47b0bfed937de307efdd0fc1ff9b4ced47a9823ff89365ccb5a48

      SHA512

      fdabe1982cbef5e1cd895426c4f72ead8707d917454dc09ff93cc6fcc15a991521994462f31a36f00c5e271c710dcf101576b9847ed107175577a5cd3af4a84a

    • \Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • \Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • \Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • \Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • \Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • \Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • memory/1368-63-0x0000000000FC0000-0x0000000000FCC000-memory.dmp

      Filesize

      48KB

    • memory/2220-1-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/2220-5-0x0000000001DD0000-0x0000000001DD6000-memory.dmp

      Filesize

      24KB

    • memory/2220-0-0x0000000000250000-0x0000000000280000-memory.dmp

      Filesize

      192KB