Resubmissions
20-09-2023 14:30
230920-rt5nzagg9v 10Analysis
-
max time kernel
135s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
20-09-2023 14:30
Behavioral task
behavioral1
Sample
55aa5e.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
55aa5e.exe
Resource
win10-20230915-en
General
-
Target
55aa5e.exe
-
Size
6.9MB
-
MD5
56c197e493f74f9233a16cdefab3109f
-
SHA1
af35bd2fd5d884bdf6bea8aac695e98f5a00715a
-
SHA256
172cb28c1c7948ece5287c566e9a684c56e64d85574d1636d5204e168771ce01
-
SHA512
d2830cfebfaa859f5fca15e3c81799e99c3cb31f72b1075d8828f03a490bfe6196b34d35bbcaede32a6d63d5c2d9bc17bea009e1bd8787cb4397f6627328b086
-
SSDEEP
98304:ULop5mhzd71cBjG9Azp56BV8cM0AnwGSOnTXsYGeCW1zbiG54WeOVEMMRHGV7E:0op5mqU9KE8nNZnTXaexbZWsMGV7E
Malware Config
Extracted
amadey
3.89
http://5.42.64.33/vu3skClDn/index.php
-
install_dir
a304d35d74
-
install_file
yiueea.exe
-
strings_key
3ae6c4e6339065c6f5a368011bb5cb8c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4812-65-0x0000000000400000-0x000000000045A000-memory.dmp family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
BestSoftware.exeBestSoftware.exepid process 4308 BestSoftware.exe 1956 BestSoftware.exe -
Processes:
resource yara_rule behavioral2/memory/4944-1-0x0000000000B70000-0x00000000015E0000-memory.dmp vmprotect behavioral2/memory/4944-2-0x0000000000B70000-0x00000000015E0000-memory.dmp vmprotect behavioral2/memory/4944-16-0x0000000000B70000-0x00000000015E0000-memory.dmp vmprotect behavioral2/memory/2204-17-0x0000000000B70000-0x00000000015E0000-memory.dmp vmprotect behavioral2/memory/2204-19-0x0000000000B70000-0x00000000015E0000-memory.dmp vmprotect behavioral2/memory/2204-22-0x0000000000B70000-0x00000000015E0000-memory.dmp vmprotect behavioral2/memory/4420-86-0x0000000000B70000-0x00000000015E0000-memory.dmp vmprotect behavioral2/memory/4420-85-0x0000000000B70000-0x00000000015E0000-memory.dmp vmprotect behavioral2/memory/4420-90-0x0000000000B70000-0x00000000015E0000-memory.dmp vmprotect behavioral2/memory/3204-140-0x0000000000B70000-0x00000000015E0000-memory.dmp vmprotect behavioral2/memory/3204-139-0x0000000000B70000-0x00000000015E0000-memory.dmp vmprotect behavioral2/memory/3204-143-0x0000000000B70000-0x00000000015E0000-memory.dmp vmprotect -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
BestSoftware.exeBestSoftware.exedescription pid process target process PID 4308 set thread context of 4812 4308 BestSoftware.exe RegSvcs.exe PID 1956 set thread context of 4852 1956 BestSoftware.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
55aa5e.exe55aa5e.exeBestSoftware.exeRegSvcs.exe55aa5e.exeRegSvcs.exe55aa5e.exepid process 4944 55aa5e.exe 4944 55aa5e.exe 2204 55aa5e.exe 2204 55aa5e.exe 4308 BestSoftware.exe 4308 BestSoftware.exe 4308 BestSoftware.exe 4308 BestSoftware.exe 4812 RegSvcs.exe 4812 RegSvcs.exe 4812 RegSvcs.exe 4420 55aa5e.exe 4420 55aa5e.exe 4852 RegSvcs.exe 4852 RegSvcs.exe 4852 RegSvcs.exe 3204 55aa5e.exe 3204 55aa5e.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
BestSoftware.exeRegSvcs.exeBestSoftware.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 4308 BestSoftware.exe Token: SeDebugPrivilege 4812 RegSvcs.exe Token: SeDebugPrivilege 1956 BestSoftware.exe Token: SeDebugPrivilege 4852 RegSvcs.exe -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
55aa5e.exeBestSoftware.exeBestSoftware.exedescription pid process target process PID 4944 wrote to memory of 2320 4944 55aa5e.exe schtasks.exe PID 4944 wrote to memory of 2320 4944 55aa5e.exe schtasks.exe PID 4944 wrote to memory of 2320 4944 55aa5e.exe schtasks.exe PID 4944 wrote to memory of 4308 4944 55aa5e.exe BestSoftware.exe PID 4944 wrote to memory of 4308 4944 55aa5e.exe BestSoftware.exe PID 4944 wrote to memory of 4308 4944 55aa5e.exe BestSoftware.exe PID 4308 wrote to memory of 1376 4308 BestSoftware.exe RegSvcs.exe PID 4308 wrote to memory of 1376 4308 BestSoftware.exe RegSvcs.exe PID 4308 wrote to memory of 1376 4308 BestSoftware.exe RegSvcs.exe PID 4308 wrote to memory of 3716 4308 BestSoftware.exe RegSvcs.exe PID 4308 wrote to memory of 3716 4308 BestSoftware.exe RegSvcs.exe PID 4308 wrote to memory of 3716 4308 BestSoftware.exe RegSvcs.exe PID 4308 wrote to memory of 4812 4308 BestSoftware.exe RegSvcs.exe PID 4308 wrote to memory of 4812 4308 BestSoftware.exe RegSvcs.exe PID 4308 wrote to memory of 4812 4308 BestSoftware.exe RegSvcs.exe PID 4308 wrote to memory of 4812 4308 BestSoftware.exe RegSvcs.exe PID 4308 wrote to memory of 4812 4308 BestSoftware.exe RegSvcs.exe PID 4308 wrote to memory of 4812 4308 BestSoftware.exe RegSvcs.exe PID 4308 wrote to memory of 4812 4308 BestSoftware.exe RegSvcs.exe PID 4308 wrote to memory of 4812 4308 BestSoftware.exe RegSvcs.exe PID 4944 wrote to memory of 1956 4944 55aa5e.exe BestSoftware.exe PID 4944 wrote to memory of 1956 4944 55aa5e.exe BestSoftware.exe PID 4944 wrote to memory of 1956 4944 55aa5e.exe BestSoftware.exe PID 1956 wrote to memory of 4852 1956 BestSoftware.exe RegSvcs.exe PID 1956 wrote to memory of 4852 1956 BestSoftware.exe RegSvcs.exe PID 1956 wrote to memory of 4852 1956 BestSoftware.exe RegSvcs.exe PID 1956 wrote to memory of 4852 1956 BestSoftware.exe RegSvcs.exe PID 1956 wrote to memory of 4852 1956 BestSoftware.exe RegSvcs.exe PID 1956 wrote to memory of 4852 1956 BestSoftware.exe RegSvcs.exe PID 1956 wrote to memory of 4852 1956 BestSoftware.exe RegSvcs.exe PID 1956 wrote to memory of 4852 1956 BestSoftware.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\55aa5e.exe"C:\Users\Admin\AppData\Local\Temp\55aa5e.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN 55aa5e.exe /TR "C:\Users\Admin\AppData\Local\Temp\55aa5e.exe" /F2⤵
- Creates scheduled task(s)
PID:2320
-
-
C:\Users\Admin\AppData\Local\Temp\1000066001\BestSoftware.exe"C:\Users\Admin\AppData\Local\Temp\1000066001\BestSoftware.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:1376
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:3716
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4812
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000068001\BestSoftware.exe"C:\Users\Admin\AppData\Local\Temp\1000068001\BestSoftware.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4852
-
-
-
C:\Users\Admin\AppData\Local\Temp\55aa5e.exeC:\Users\Admin\AppData\Local\Temp\55aa5e.exe1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2204
-
C:\Users\Admin\AppData\Local\Temp\55aa5e.exeC:\Users\Admin\AppData\Local\Temp\55aa5e.exe1⤵
- Suspicious behavior: EnumeratesProcesses
PID:4420
-
C:\Users\Admin\AppData\Local\Temp\55aa5e.exeC:\Users\Admin\AppData\Local\Temp\55aa5e.exe1⤵
- Suspicious behavior: EnumeratesProcesses
PID:3204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
522B
MD518b4b20964ba71871f587253160ae3b1
SHA1b0670adc90ecec31186448446ed43fc188be4559
SHA256cb7844efb0b5fa59684743fa546012600ffe6fcc3aeb6c243796c1b1d8978987
SHA5123fd458c517e43734477b209d38cd79f44f0b46de2c81386f83db99bd2f1fe27bff6594422c747d6b7eb32d24738d7257c94716c28a26205200958265d0cb5826
-
Filesize
2KB
MD5177e4097e995e27ef16a82fdc42d1199
SHA14ad1985213a7747facc2daa618a23e0c75b37755
SHA256b0ea0451e27f185b31105e5d796e8af4363134e636d23af3a388679b5027b0b6
SHA51285bad113d4a6a661223e9f14711af6f59e546aa8afbc9d36166434b4d69fe413807746249a09e7b575ed917aa50c49b586495ce5ded048159a516ca4c876e937
-
Filesize
708B
MD52382378378c002d88b9a507c712c3349
SHA12e894db3808b554abadc8b144338ad9e2ea937ba
SHA25637a4e56c497e170de6e152bc479624eb8d7ccb35bad5a190f2fdb17ac699cffa
SHA5122120f9ae9e5d63ee9aa5aa25e24081662059bdeb01afd8b21ddb8bdfff22832ea0c1dec51dbcbf714e1e82537d624f0ddf0b862ff218b9d2a38941fbe63c3258
-
Filesize
1.4MB
MD51c9cb19f72b337353fab5826b145b2f3
SHA12fe6ddb2fb7fc0082388904ffddb5902c520179b
SHA256f217f02bbbf1b37386d8611b2ef07dd562d33dc1b31d84a260e11decf082b66a
SHA51290a14e5be34e1f6b23c1ccbfb80b5f29d1ce6e1d58573de82abeb14b5a00f2bfbda4fc0d45058d6a5362274c08b0d280a4d280097f72ba3eb9b59db46acaf1bc
-
Filesize
1.4MB
MD51c9cb19f72b337353fab5826b145b2f3
SHA12fe6ddb2fb7fc0082388904ffddb5902c520179b
SHA256f217f02bbbf1b37386d8611b2ef07dd562d33dc1b31d84a260e11decf082b66a
SHA51290a14e5be34e1f6b23c1ccbfb80b5f29d1ce6e1d58573de82abeb14b5a00f2bfbda4fc0d45058d6a5362274c08b0d280a4d280097f72ba3eb9b59db46acaf1bc
-
Filesize
1.4MB
MD51c9cb19f72b337353fab5826b145b2f3
SHA12fe6ddb2fb7fc0082388904ffddb5902c520179b
SHA256f217f02bbbf1b37386d8611b2ef07dd562d33dc1b31d84a260e11decf082b66a
SHA51290a14e5be34e1f6b23c1ccbfb80b5f29d1ce6e1d58573de82abeb14b5a00f2bfbda4fc0d45058d6a5362274c08b0d280a4d280097f72ba3eb9b59db46acaf1bc
-
Filesize
1.4MB
MD51c9cb19f72b337353fab5826b145b2f3
SHA12fe6ddb2fb7fc0082388904ffddb5902c520179b
SHA256f217f02bbbf1b37386d8611b2ef07dd562d33dc1b31d84a260e11decf082b66a
SHA51290a14e5be34e1f6b23c1ccbfb80b5f29d1ce6e1d58573de82abeb14b5a00f2bfbda4fc0d45058d6a5362274c08b0d280a4d280097f72ba3eb9b59db46acaf1bc
-
Filesize
1.4MB
MD51c9cb19f72b337353fab5826b145b2f3
SHA12fe6ddb2fb7fc0082388904ffddb5902c520179b
SHA256f217f02bbbf1b37386d8611b2ef07dd562d33dc1b31d84a260e11decf082b66a
SHA51290a14e5be34e1f6b23c1ccbfb80b5f29d1ce6e1d58573de82abeb14b5a00f2bfbda4fc0d45058d6a5362274c08b0d280a4d280097f72ba3eb9b59db46acaf1bc
-
Filesize
1KB
MD5bf00c8de950425eb991277d0f6521954
SHA1b905849dac07a1893e14ce75b23d6e9170b4f972
SHA256a93b38ed77ad75dc0119f8787cbcc699cd17192b1bb06209460be92d156ffff4
SHA512dceb513f914cbd501c7ed94f623d3f6d9eb84f72bc1b8cd69ae141ead383dd04f0671a97a54002b7b4f2d55acb1f1c2b01f4b54511650f6ff8cca8322f31ce29