Analysis
-
max time kernel
96s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
21/02/2024, 11:53
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20231215-en
General
-
Target
tmp.exe
-
Size
1.5MB
-
MD5
362b8e049e3ab792eeee6bde4ca2491b
-
SHA1
e185df4e0e40cf2a68251d18979b21a812c5a545
-
SHA256
b08a80b3d8ed960304fd66086b3c2cf13745118e04d6db99f9b0ff68b869b4cf
-
SHA512
7beb758ee55c1c8577fc1a148a50949e48138e2a41681851a3681cbe5077d129e8fa11045bf42dd9cbb22e6b1aaee86a889bc2a04e61b6030892333bf2859643
-
SSDEEP
24576:QW5V1bZzMgWhLtsYsvkdnddMF2ScVC3oKNVpNXIRf4cvuy4jS:j6hJhXnddG2lCYKTpNXIt
Malware Config
Extracted
redline
YT&TEAM CLOUD
185.172.128.33:8924
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/files/0x00090000000231ed-10.dat family_redline behavioral2/memory/3448-27-0x0000000000C80000-0x0000000000CD4000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation tmp.exe Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation STAR.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe STAR.exe -
Executes dropped EXE 3 IoCs
pid Process 2412 STAR.exe 3448 yttam.exe 1324 qemu-ga.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2776 3448 WerFault.exe 86 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2412 STAR.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2412 STAR.exe Token: SeDebugPrivilege 4412 tmp.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4412 wrote to memory of 2412 4412 tmp.exe 85 PID 4412 wrote to memory of 2412 4412 tmp.exe 85 PID 4412 wrote to memory of 2412 4412 tmp.exe 85 PID 4412 wrote to memory of 3448 4412 tmp.exe 86 PID 4412 wrote to memory of 3448 4412 tmp.exe 86 PID 4412 wrote to memory of 3448 4412 tmp.exe 86 PID 2412 wrote to memory of 1324 2412 STAR.exe 91 PID 2412 wrote to memory of 1324 2412 STAR.exe 91 PID 4412 wrote to memory of 4068 4412 tmp.exe 92 PID 4412 wrote to memory of 4068 4412 tmp.exe 92 PID 4412 wrote to memory of 4068 4412 tmp.exe 92 PID 4068 wrote to memory of 4604 4068 cmd.exe 94 PID 4068 wrote to memory of 4604 4068 cmd.exe 94 PID 4068 wrote to memory of 4604 4068 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Roaming\configurationValue\STAR.exe"C:\Users\Admin\AppData\Roaming\configurationValue\STAR.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe"3⤵
- Executes dropped EXE
PID:1324
-
-
-
C:\Users\Admin\AppData\Roaming\configurationValue\yttam.exe"C:\Users\Admin\AppData\Roaming\configurationValue\yttam.exe"2⤵
- Executes dropped EXE
PID:3448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3448 -s 7683⤵
- Program crash
PID:2776
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "tmp.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 33⤵PID:4604
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3448 -ip 34481⤵PID:3172
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5a5ce3aba68bdb438e98b1d0c70a3d95c
SHA1013f5aa9057bf0b3c0c24824de9d075434501354
SHA2569b860be98a046ea97a7f67b006e0b1bc9ab7731dd2a0f3a9fd3d710f6c43278a
SHA5127446f1256873b51a59b9d2d3498cef5a41dbce55864c2a5fb8cb7d25f7d6e6d8ea249d551a45b75d99b1ad0d6fb4b5e4544e5ca77bcd627717d6598b5f566a79
-
Filesize
570KB
MD5ea037914e6f1aa6a8ad565407158d49b
SHA15fbbd923c0bbcf33fafca5a0ed847c19478856e5
SHA2569deee2315490381305b70eeaff5805df00d10feb9d9f78fbce33b3cd5795ed73
SHA512369943b3ac01a8c89c7d163391e60c2a4f9f616ade5161df8a67e75c490ff4a70b37d4b617675518c924d2fbc07605a37d4f76166da9becefcb4bd5052a69e55
-
Filesize
313KB
MD55c8486dd5bd5b0c6200ccd283cf55cce
SHA1156476322236a27ff550015c0042d91524e406a7
SHA2568c86ad926fc0a8599a210fdac2d60a461e183b154d6db62a67777cd301aa671f
SHA51266f66fc8ac117751cdfa1bae87513909b04784c9580bc768a3c3388fe7cc76058b3349ebd15c51c256347a2394292154c3119d37970764c39aed1d5605c59e07