Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2023, 11:43

General

  • Target

    winPEASx64.exe

  • Size

    2.3MB

  • MD5

    4b63208d99641fbb72aa57e54886423c

  • SHA1

    6db92837b1c60716bb2a84f91405c20b637b9c2d

  • SHA256

    54717ae2ead16c76d36799347143b3de322ee07c0836b504b383bbf6eaebeaca

  • SHA512

    bb0bc01e9fe5dc18543ccadab8391e1672fabfd790f994b472d98c10eef8d262147cb6ac76ad7a62b39fed76ac36d777ac2903bb3ab8f535d85fd3d43590e02c

  • SSDEEP

    24576:aJjmTSVj3ZwZ/3AhysPoxBMF7Cpx6hBdNKkThXHf5geLPA:UmT0Wt34ysPxM0j4kBHf5g4

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\winPEASx64.exe
    "C:\Users\Admin\AppData\Local\Temp\winPEASx64.exe"
    1⤵
    • Checks whether UAC is enabled
    • Enumerates connected drives
    • Drops file in Windows directory
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Windows\system32\systeminfo.exe
      "systeminfo.exe"
      2⤵
      • Gathers system information
      PID:2808
    • C:\Windows\system32\netsh.exe
      "netsh" wlan show profiles
      2⤵
        PID:1740
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" # Check if appcmd.exe exists if (Test-Path ('C:\Windows\system32\inetsrv\appcmd.exe')) { # Create data table to house results $DataTable = New-Object System.Data.DataTable # Create and name columns in the data table $Null = $DataTable.Columns.Add('user') $Null = $DataTable.Columns.Add('pass') $Null = $DataTable.Columns.Add('type') $Null = $DataTable.Columns.Add('vdir') $Null = $DataTable.Columns.Add('apppool') # Get list of application pools Invoke-Expression 'C:\Windows\system32\inetsrv\appcmd.exe list apppools /text:name' | ForEach-Object { # Get application pool name $PoolName = $_ # Get username $PoolUserCmd = 'C:\Windows\system32\inetsrv\appcmd.exe list apppool ' + $PoolName + ' /text:processmodel.username' $PoolUser = Invoke-Expression $PoolUserCmd # Get password $PoolPasswordCmd = 'C:\Windows\system32\inetsrv\appcmd.exe list apppool ' + $PoolName + ' /text:processmodel.password' $PoolPassword = Invoke-Expression $PoolPasswordCmd # Check if credentials exists if (($PoolPassword -ne '') -and ($PoolPassword -isnot [system.array])) { # Add credentials to database $Null = $DataTable.Rows.Add($PoolUser, $PoolPassword,'Application Pool','NA',$PoolName) } } # Get list of virtual directories Invoke-Expression 'C:\Windows\system32\inetsrv\appcmd.exe list vdir /text:vdir.name' | ForEach-Object { # Get Virtual Directory Name $VdirName = $_ # Get username $VdirUserCmd = 'C:\Windows\system32\inetsrv\appcmd.exe list vdir ' + $VdirName + ' /text:userName' $VdirUser = Invoke-Expression $VdirUserCmd # Get password $VdirPasswordCmd = 'C:\Windows\system32\inetsrv\appcmd.exe list vdir ' + $VdirName + ' /text:password' $VdirPassword = Invoke-Expression $VdirPasswordCmd # Check if credentials exists if (($VdirPassword -ne '') -and ($VdirPassword -isnot [system.array])) { # Add credentials to database $Null = $DataTable.Rows.Add($VdirUser, $VdirPassword,'Virtual Directory',$VdirName,'NA') } } # Check if any passwords were found if( $DataTable.rows.Count -gt 0 ) { # Display results in list view that can feed into the pipeline #$DataTable | Sort-Object type,user,pass,vdir,apppool | Select-Object user,pass,type,vdir,apppool -Unique $DataTable | Select-Object user,pass,type,vdir,apppool } else { # Status user Write-host 'No application pool or virtual directory passwords were found.' } }
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2452

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1976-0-0x000000013F6C0000-0x000000013F908000-memory.dmp

            Filesize

            2.3MB

          • memory/1976-1-0x000007FEF5820000-0x000007FEF620C000-memory.dmp

            Filesize

            9.9MB

          • memory/1976-2-0x000000001BE10000-0x000000001BE90000-memory.dmp

            Filesize

            512KB

          • memory/1976-3-0x000000001BE10000-0x000000001BE90000-memory.dmp

            Filesize

            512KB

          • memory/1976-4-0x000007FEF5820000-0x000007FEF620C000-memory.dmp

            Filesize

            9.9MB

          • memory/1976-5-0x000000001BE10000-0x000000001BE90000-memory.dmp

            Filesize

            512KB

          • memory/1976-6-0x0000000140000000-0x00000001405E8000-memory.dmp

            Filesize

            5.9MB

          • memory/1976-11-0x000000001C310000-0x000000001C35F000-memory.dmp

            Filesize

            316KB

          • memory/1976-10-0x000000001C310000-0x000000001C35F000-memory.dmp

            Filesize

            316KB

          • memory/1976-9-0x000007FF70450000-0x000007FF7045A000-memory.dmp

            Filesize

            40KB

          • memory/1976-8-0x000007FF70450000-0x000007FF7045A000-memory.dmp

            Filesize

            40KB

          • memory/1976-7-0x000007FF346C0000-0x000007FF34709000-memory.dmp

            Filesize

            292KB

          • memory/1976-12-0x000007FF709E0000-0x000007FF709F4000-memory.dmp

            Filesize

            80KB

          • memory/1976-13-0x000007FF709E0000-0x000007FF709F4000-memory.dmp

            Filesize

            80KB

          • memory/1976-14-0x000000001C310000-0x000000001C36E000-memory.dmp

            Filesize

            376KB

          • memory/1976-16-0x000007FF404C0000-0x000007FF40580000-memory.dmp

            Filesize

            768KB

          • memory/1976-15-0x000000001C310000-0x000000001C36E000-memory.dmp

            Filesize

            376KB

          • memory/1976-17-0x000000001DCA0000-0x000000001DD44000-memory.dmp

            Filesize

            656KB

          • memory/1976-18-0x000000001DCA0000-0x000000001DD44000-memory.dmp

            Filesize

            656KB

          • memory/1976-23-0x00000000021F0000-0x00000000021F9000-memory.dmp

            Filesize

            36KB

          • memory/1976-28-0x00000000021F0000-0x00000000021FD000-memory.dmp

            Filesize

            52KB

          • memory/1976-31-0x00000000021F0000-0x0000000002205000-memory.dmp

            Filesize

            84KB

          • memory/1976-32-0x000000001C310000-0x000000001C36C000-memory.dmp

            Filesize

            368KB

          • memory/1976-33-0x000000001C310000-0x000000001C36C000-memory.dmp

            Filesize

            368KB

          • memory/1976-38-0x000000001B9D0000-0x000000001B9FA000-memory.dmp

            Filesize

            168KB

          • memory/1976-45-0x000000001C310000-0x000000001C35C000-memory.dmp

            Filesize

            304KB

          • memory/1976-46-0x00000000021F0000-0x0000000002204000-memory.dmp

            Filesize

            80KB

          • memory/1976-47-0x00000000021F0000-0x0000000002204000-memory.dmp

            Filesize

            80KB

          • memory/1976-44-0x00000000021F0000-0x00000000021FB000-memory.dmp

            Filesize

            44KB

          • memory/1976-48-0x000000001FC10000-0x000000001FDB3000-memory.dmp

            Filesize

            1.6MB

          • memory/1976-43-0x00000000021F0000-0x0000000002200000-memory.dmp

            Filesize

            64KB

          • memory/1976-49-0x000000001FC10000-0x000000001FDB3000-memory.dmp

            Filesize

            1.6MB

          • memory/1976-50-0x000000001C310000-0x000000001C36E000-memory.dmp

            Filesize

            376KB

          • memory/1976-53-0x00000000021F0000-0x000000000220B000-memory.dmp

            Filesize

            108KB

          • memory/1976-52-0x00000000021F0000-0x000000000220B000-memory.dmp

            Filesize

            108KB

          • memory/1976-51-0x000000001C310000-0x000000001C36E000-memory.dmp

            Filesize

            376KB

          • memory/1976-42-0x00000000021F0000-0x0000000002200000-memory.dmp

            Filesize

            64KB

          • memory/1976-41-0x00000000021F0000-0x00000000021FB000-memory.dmp

            Filesize

            44KB

          • memory/1976-40-0x00000000021F0000-0x00000000021FB000-memory.dmp

            Filesize

            44KB

          • memory/1976-39-0x000000001B9D0000-0x000000001B9FA000-memory.dmp

            Filesize

            168KB

          • memory/1976-37-0x00000000021F0000-0x00000000021F9000-memory.dmp

            Filesize

            36KB

          • memory/1976-54-0x000000001C910000-0x000000001C982000-memory.dmp

            Filesize

            456KB

          • memory/1976-55-0x000000001C910000-0x000000001C982000-memory.dmp

            Filesize

            456KB

          • memory/1976-56-0x00000000021F0000-0x0000000002201000-memory.dmp

            Filesize

            68KB

          • memory/1976-60-0x000000001C310000-0x000000001C370000-memory.dmp

            Filesize

            384KB

          • memory/1976-61-0x000000001B9D0000-0x000000001B9FB000-memory.dmp

            Filesize

            172KB

          • memory/1976-63-0x000000001FC10000-0x000000001FE14000-memory.dmp

            Filesize

            2.0MB

          • memory/1976-62-0x000000001B9D0000-0x000000001B9FB000-memory.dmp

            Filesize

            172KB

          • memory/1976-59-0x000000001C310000-0x000000001C370000-memory.dmp

            Filesize

            384KB

          • memory/1976-58-0x00000000021F0000-0x00000000021FA000-memory.dmp

            Filesize

            40KB

          • memory/1976-57-0x00000000021F0000-0x0000000002201000-memory.dmp

            Filesize

            68KB

          • memory/1976-36-0x00000000021F0000-0x00000000021F9000-memory.dmp

            Filesize

            36KB

          • memory/1976-35-0x00000000021F0000-0x000000000220A000-memory.dmp

            Filesize

            104KB

          • memory/1976-34-0x00000000021F0000-0x000000000220A000-memory.dmp

            Filesize

            104KB

          • memory/1976-30-0x00000000021F0000-0x0000000002205000-memory.dmp

            Filesize

            84KB

          • memory/1976-29-0x00000000021F0000-0x0000000002205000-memory.dmp

            Filesize

            84KB

          • memory/1976-27-0x00000000021F0000-0x00000000021FD000-memory.dmp

            Filesize

            52KB

          • memory/1976-26-0x000000001C310000-0x000000001C343000-memory.dmp

            Filesize

            204KB

          • memory/1976-25-0x00000000021F0000-0x00000000021FA000-memory.dmp

            Filesize

            40KB

          • memory/1976-24-0x00000000021F0000-0x00000000021FA000-memory.dmp

            Filesize

            40KB

          • memory/1976-22-0x00000000021F0000-0x00000000021F9000-memory.dmp

            Filesize

            36KB

          • memory/1976-21-0x000000001C310000-0x000000001C367000-memory.dmp

            Filesize

            348KB

          • memory/1976-20-0x00000000021F0000-0x00000000021FF000-memory.dmp

            Filesize

            60KB

          • memory/1976-19-0x00000000021F0000-0x00000000021FF000-memory.dmp

            Filesize

            60KB