Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
22/02/2024, 04:54
Behavioral task
behavioral1
Sample
362b8e049e3ab792eeee6bde4ca2491b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
362b8e049e3ab792eeee6bde4ca2491b.exe
Resource
win10v2004-20240221-en
General
-
Target
362b8e049e3ab792eeee6bde4ca2491b.exe
-
Size
1.5MB
-
MD5
362b8e049e3ab792eeee6bde4ca2491b
-
SHA1
e185df4e0e40cf2a68251d18979b21a812c5a545
-
SHA256
b08a80b3d8ed960304fd66086b3c2cf13745118e04d6db99f9b0ff68b869b4cf
-
SHA512
7beb758ee55c1c8577fc1a148a50949e48138e2a41681851a3681cbe5077d129e8fa11045bf42dd9cbb22e6b1aaee86a889bc2a04e61b6030892333bf2859643
-
SSDEEP
24576:QW5V1bZzMgWhLtsYsvkdnddMF2ScVC3oKNVpNXIRf4cvuy4jS:j6hJhXnddG2lCYKTpNXIt
Malware Config
Extracted
redline
YT&TEAM CLOUD
185.172.128.33:8924
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/files/0x0006000000023112-9.dat family_redline behavioral2/memory/4284-26-0x0000000000D40000-0x0000000000D94000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\Control Panel\International\Geo\Nation 362b8e049e3ab792eeee6bde4ca2491b.exe Key value queried \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\Control Panel\International\Geo\Nation STAR.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe STAR.exe -
Executes dropped EXE 3 IoCs
pid Process 4284 yttam.exe 1716 STAR.exe 3336 qemu-ga.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1664 4284 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1716 STAR.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1716 STAR.exe Token: SeDebugPrivilege 3664 362b8e049e3ab792eeee6bde4ca2491b.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3664 wrote to memory of 4284 3664 362b8e049e3ab792eeee6bde4ca2491b.exe 83 PID 3664 wrote to memory of 4284 3664 362b8e049e3ab792eeee6bde4ca2491b.exe 83 PID 3664 wrote to memory of 4284 3664 362b8e049e3ab792eeee6bde4ca2491b.exe 83 PID 3664 wrote to memory of 1716 3664 362b8e049e3ab792eeee6bde4ca2491b.exe 82 PID 3664 wrote to memory of 1716 3664 362b8e049e3ab792eeee6bde4ca2491b.exe 82 PID 3664 wrote to memory of 1716 3664 362b8e049e3ab792eeee6bde4ca2491b.exe 82 PID 1716 wrote to memory of 3336 1716 STAR.exe 88 PID 1716 wrote to memory of 3336 1716 STAR.exe 88 PID 3664 wrote to memory of 4800 3664 362b8e049e3ab792eeee6bde4ca2491b.exe 91 PID 3664 wrote to memory of 4800 3664 362b8e049e3ab792eeee6bde4ca2491b.exe 91 PID 3664 wrote to memory of 4800 3664 362b8e049e3ab792eeee6bde4ca2491b.exe 91 PID 4800 wrote to memory of 2884 4800 cmd.exe 90 PID 4800 wrote to memory of 2884 4800 cmd.exe 90 PID 4800 wrote to memory of 2884 4800 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\362b8e049e3ab792eeee6bde4ca2491b.exe"C:\Users\Admin\AppData\Local\Temp\362b8e049e3ab792eeee6bde4ca2491b.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Users\Admin\AppData\Roaming\configurationValue\STAR.exe"C:\Users\Admin\AppData\Roaming\configurationValue\STAR.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe"3⤵
- Executes dropped EXE
PID:3336
-
-
-
C:\Users\Admin\AppData\Roaming\configurationValue\yttam.exe"C:\Users\Admin\AppData\Roaming\configurationValue\yttam.exe"2⤵
- Executes dropped EXE
PID:4284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 8043⤵
- Program crash
PID:1664
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "362b8e049e3ab792eeee6bde4ca2491b.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4284 -ip 42841⤵PID:904
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 31⤵PID:2884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5a5ce3aba68bdb438e98b1d0c70a3d95c
SHA1013f5aa9057bf0b3c0c24824de9d075434501354
SHA2569b860be98a046ea97a7f67b006e0b1bc9ab7731dd2a0f3a9fd3d710f6c43278a
SHA5127446f1256873b51a59b9d2d3498cef5a41dbce55864c2a5fb8cb7d25f7d6e6d8ea249d551a45b75d99b1ad0d6fb4b5e4544e5ca77bcd627717d6598b5f566a79
-
Filesize
570KB
MD5ea037914e6f1aa6a8ad565407158d49b
SHA15fbbd923c0bbcf33fafca5a0ed847c19478856e5
SHA2569deee2315490381305b70eeaff5805df00d10feb9d9f78fbce33b3cd5795ed73
SHA512369943b3ac01a8c89c7d163391e60c2a4f9f616ade5161df8a67e75c490ff4a70b37d4b617675518c924d2fbc07605a37d4f76166da9becefcb4bd5052a69e55
-
Filesize
313KB
MD55c8486dd5bd5b0c6200ccd283cf55cce
SHA1156476322236a27ff550015c0042d91524e406a7
SHA2568c86ad926fc0a8599a210fdac2d60a461e183b154d6db62a67777cd301aa671f
SHA51266f66fc8ac117751cdfa1bae87513909b04784c9580bc768a3c3388fe7cc76058b3349ebd15c51c256347a2394292154c3119d37970764c39aed1d5605c59e07