Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2023 12:31
Static task
static1
Behavioral task
behavioral1
Sample
a13a1f2fe5ee62cfd08004277f557664.exe
Resource
win10v2004-20231020-en
General
-
Target
a13a1f2fe5ee62cfd08004277f557664.exe
-
Size
611KB
-
MD5
a13a1f2fe5ee62cfd08004277f557664
-
SHA1
af8581903c06152c9650deba3abe92260fa891e2
-
SHA256
8982eecbc6365b0320c57d0d186f0b0569a6cb619da669f5a87ad3ad7b09e698
-
SHA512
acf62fed3e86b850152349a6cae3b0d68d493f6ad09e5594f1528c15e93392635caad1d237ba1ab4fc4a539340d21e16d49102489bc58c05e9a5b9d123e94357
-
SSDEEP
12288:yivy90H6buQKNrjeqrvbg7tvXyfl7W1FgQNPuZtPF:yky5buQcmuWvXgW16ePu/d
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/4760-15-0x0000000000400000-0x000000000045A000-memory.dmp family_redline -
Executes dropped EXE 1 IoCs
pid Process 3788 lessoutsourcing.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a13a1f2fe5ee62cfd08004277f557664.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3788 set thread context of 4760 3788 lessoutsourcing.exe 96 -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 3788 lessoutsourcing.exe 4760 InstallUtil.exe 4760 InstallUtil.exe 4760 InstallUtil.exe 4760 InstallUtil.exe 4760 InstallUtil.exe 4760 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3788 lessoutsourcing.exe Token: SeDebugPrivilege 4760 InstallUtil.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2236 wrote to memory of 3788 2236 a13a1f2fe5ee62cfd08004277f557664.exe 84 PID 2236 wrote to memory of 3788 2236 a13a1f2fe5ee62cfd08004277f557664.exe 84 PID 2236 wrote to memory of 3788 2236 a13a1f2fe5ee62cfd08004277f557664.exe 84 PID 3788 wrote to memory of 4760 3788 lessoutsourcing.exe 96 PID 3788 wrote to memory of 4760 3788 lessoutsourcing.exe 96 PID 3788 wrote to memory of 4760 3788 lessoutsourcing.exe 96 PID 3788 wrote to memory of 4760 3788 lessoutsourcing.exe 96 PID 3788 wrote to memory of 4760 3788 lessoutsourcing.exe 96 PID 3788 wrote to memory of 4760 3788 lessoutsourcing.exe 96 PID 3788 wrote to memory of 4760 3788 lessoutsourcing.exe 96 PID 3788 wrote to memory of 4760 3788 lessoutsourcing.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\a13a1f2fe5ee62cfd08004277f557664.exe"C:\Users\Admin\AppData\Local\Temp\a13a1f2fe5ee62cfd08004277f557664.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lessoutsourcing.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lessoutsourcing.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4760
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5cf8e316f1d6361352ced42c91f9410e1
SHA1c34b228f33d4e9a37a6cc37fc0163cd2908b0131
SHA2564f443b5e9f2635471f6f1af9b2941f8c811802c619547800b14c5eb90e6c2751
SHA512540478e0782ec35beb61a2f3753223e177d4dde1355fb618ffc332c5940f1247a792e370bf4ca0bf26d10ea97694ade98ec55177db65d357e96ad27da4196f13
-
Filesize
1.3MB
MD5cf8e316f1d6361352ced42c91f9410e1
SHA1c34b228f33d4e9a37a6cc37fc0163cd2908b0131
SHA2564f443b5e9f2635471f6f1af9b2941f8c811802c619547800b14c5eb90e6c2751
SHA512540478e0782ec35beb61a2f3753223e177d4dde1355fb618ffc332c5940f1247a792e370bf4ca0bf26d10ea97694ade98ec55177db65d357e96ad27da4196f13