Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    14-03-2024 22:45

General

  • Target

    A u r о r a X.rar

  • Size

    8.1MB

  • MD5

    6847de14c6e1457fc14fe029e2b1f490

  • SHA1

    97d0f4c6c0431982d1555f1fb759c8b81853b13d

  • SHA256

    09390304176d930c2ff463be7537b7134c74a39ddd13030642d0cb4956cc6d15

  • SHA512

    aa4a723b2df6f752588c7d21d1a657a61bea6a0823cfb8d7e7341b7a1c802b98773b01bedecfe2c94224957e9424a563bebc975ac6fede2dc2bff425dda5f423

  • SSDEEP

    196608:UjN/pzpHYy3Fvo6G6Qypd+DlJa+seheTjkuPDEjVGCDXzG8SuMRTgf8iQ:UBRzp4iA6DQypdaXcTjb7kGC5RUUf83

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Modifies registry class 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3304
      • C:\Windows\system32\cmd.exe
        cmd /c "C:\Users\Admin\AppData\Local\Temp\A u r о r a X.rar"
        2⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2656
        • C:\Program Files\7-Zip\7zFM.exe
          "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\A u r о r a X.rar"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:1888
          • C:\Users\Admin\AppData\Local\Temp\7zO0678C588\A u r о r a X.exe
            "C:\Users\Admin\AppData\Local\Temp\7zO0678C588\A u r о r a X.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:3024
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k move Tv Tv.bat & Tv.bat & exit
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:1360
              • C:\Windows\SysWOW64\tasklist.exe
                tasklist
                6⤵
                • Enumerates processes with tasklist
                • Suspicious use of AdjustPrivilegeToken
                PID:1412
              • C:\Windows\SysWOW64\findstr.exe
                findstr /I "wrsa.exe opssvc.exe"
                6⤵
                  PID:3348
                • C:\Windows\SysWOW64\tasklist.exe
                  tasklist
                  6⤵
                  • Enumerates processes with tasklist
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2136
                • C:\Windows\SysWOW64\findstr.exe
                  findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"
                  6⤵
                    PID:2212
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c md 30494
                    6⤵
                      PID:1532
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c copy /b 30494\Present.pif + Summary + Impact + Ray + Smoke + Prevention 30494\Present.pif
                      6⤵
                        PID:4424
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c copy /b Beat + Turtle + Hurricane 30494\u
                        6⤵
                          PID:2036
                        • C:\Users\Admin\AppData\Local\Temp\30494\Present.pif
                          30494\Present.pif 30494\u
                          6⤵
                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                          • Executes dropped EXE
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          • Suspicious use of WriteProcessMemory
                          PID:4396
                        • C:\Windows\SysWOW64\PING.EXE
                          ping -n 5 127.0.0.1
                          6⤵
                          • Runs ping.exe
                          PID:3148
                • C:\Users\Admin\AppData\Local\Temp\30494\RegAsm.exe
                  C:\Users\Admin\AppData\Local\Temp\30494\RegAsm.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2940
              • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
                "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
                1⤵
                • Modifies registry class
                • Suspicious use of SetWindowsHookEx
                PID:2344
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
                1⤵
                  PID:3340

                Network

                MITRE ATT&CK Matrix ATT&CK v13

                Credential Access

                Unsecured Credentials

                2
                T1552

                Credentials In Files

                2
                T1552.001

                Discovery

                Query Registry

                1
                T1012

                System Information Discovery

                1
                T1082

                Process Discovery

                1
                T1057

                Remote System Discovery

                1
                T1018

                Collection

                Data from Local System

                2
                T1005

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
                  Filesize

                  10KB

                  MD5

                  d3c1574e06e9c0ed4ddfecf7eda00476

                  SHA1

                  e90dcb7eeb77fdeee2883c9c99fea03c50f80eca

                  SHA256

                  0b643c95e32e8cb6c8ad9a28231243f3d028db10560130aabe10cd65c62dace7

                  SHA512

                  06a7e8fa4859fd6902e842760ab1be755247ced2cb5d5b92fda7e25483749d2a65acc7ada0dd351c943711eef033f152137aafc18b5283bf3c310737b8b7077b

                • C:\Users\Admin\AppData\Local\Temp\30494\Present.pif
                  Filesize

                  2B

                  MD5

                  ac6ad5d9b99757c3a878f2d275ace198

                  SHA1

                  439baa1b33514fb81632aaf44d16a9378c5664fc

                  SHA256

                  9b8db510ef42b8ed54a3712636fda55a4f8cfcd5493e20b74ab00cd4f3979f2d

                  SHA512

                  bfcdcb26b6f0c288838da7b0d338c2af63798a2ece9dcd6bc07b7cadf44477e3d5cfbba5b72446c61a1ecf74a0bccc62894ea87a40730cd1d4c2a3e15a7bb55b

                • C:\Users\Admin\AppData\Local\Temp\30494\Present.pif
                  Filesize

                  872KB

                  MD5

                  6ee7ddebff0a2b78c7ac30f6e00d1d11

                  SHA1

                  f2f57024c7cc3f9ff5f999ee20c4f5c38bfc20a2

                  SHA256

                  865347471135bb5459ad0e647e75a14ad91424b6f13a5c05d9ecd9183a8a1cf4

                  SHA512

                  57d56de2bb882f491e633972003d7c6562ef2758c3731b913ff4d15379ada575062f4de2a48ca6d6d9241852a5b8a007f52792753fd8d8fee85b9a218714efd0

                • C:\Users\Admin\AppData\Local\Temp\30494\RegAsm.exe
                  Filesize

                  63KB

                  MD5

                  42ab6e035df99a43dbb879c86b620b91

                  SHA1

                  c6e116569d17d8142dbb217b1f8bfa95bc148c38

                  SHA256

                  53195987d396986ebcb20425ac130e78ad308fdbd918f33f3fd92b99abda314b

                  SHA512

                  2e79de2d394ad33023d71611bb728b254aa4680b5a3a1ef5282b1155ddfaa2f3585c840a6700dfe0d1a276dac801298431f0187086d2e8f96b22f6c808fb97e5

                • C:\Users\Admin\AppData\Local\Temp\30494\u
                  Filesize

                  721KB

                  MD5

                  2ad3c442ab0a4f154223e1776c26ba74

                  SHA1

                  4c11ac6a557fb29d863564136963797e4e7af7c3

                  SHA256

                  5dd99ff84144d4e252833cd468c97928647bb47d53d68e9978f77c8f95765952

                  SHA512

                  37fd383135f8d48ab16911ea2d1ab05b6f7883fc246150129bef5afd25e80100ef8ce90929d72248eb5b0279eb293f63ec02c9d5cc5189a31d38ad40c70be27d

                • C:\Users\Admin\AppData\Local\Temp\7zO0678C588\A u r о r a X.exe
                  Filesize

                  715KB

                  MD5

                  f476fc8e39528472df2b1ab6c5a469e2

                  SHA1

                  4d2e57a77b87b99ddcc5369d5fe98e5bac6856f4

                  SHA256

                  b245a9e880b92b5525233c4a8cdb8e4d1cda15c7e1a4a6ca7ee99d97cf51488a

                  SHA512

                  88c800a78f4ee407afd88ef8ef1e82b4b1217af6e3631edb6b7c6d99364c49417036634204f5f197ef0b8111637468e6cbecc3c2ef2c9d490e89d0a9ada7cce7

                • C:\Users\Admin\AppData\Local\Temp\Beat
                  Filesize

                  286KB

                  MD5

                  032357703b5ce3baf1c1c8e2cfbecd53

                  SHA1

                  d2fd7b21dde1ffe42c541c7077a04f5b7c0a05ea

                  SHA256

                  735cda19d881ee2c28101d09414cfb873ba17587f77a7fac24125da18e4afebe

                  SHA512

                  2476fe332260ddff35d27c6fc29d150510c9828f79b27933854b4282653c2956807072fe99dcbe8fa9c5aedda1e6a219887d2427bc0eaf9f1837fcdb2d9f6299

                • C:\Users\Admin\AppData\Local\Temp\Hurricane
                  Filesize

                  174KB

                  MD5

                  35bafb2670374b40e7565d2375a0398e

                  SHA1

                  408588981f40afd9b9cde22b1730a9b0b6c786da

                  SHA256

                  589b656a6b34233fb305bc1be6bcdedb821f9efbbd2dd2089e1a93196b0daa19

                  SHA512

                  11d868d3ba9a7156d12d1794951ded13d3cab7e93aa46e8fa73df2bcfdf820c75b8f4c2e0b90a1aae871cef591b245279db88314cabc4b8f3ad11198f248a27f

                • C:\Users\Admin\AppData\Local\Temp\Impact
                  Filesize

                  109KB

                  MD5

                  cb653da94140e5c70e9c86e7fbda1d29

                  SHA1

                  36c4a6955ac0b7fa890b65c66b5f3f14087dc978

                  SHA256

                  ccf96df9859615a179ae7b975b0130ff28ff869b1289c0cd963ed2236638708b

                  SHA512

                  6f35ff9fd752d077d92c66ad147ea3c449e9dc60a2cf762da5991b8f25afafa130af6ae0395c0777af94b54079a6a1dbeba744c475e0b7e72704d42216d86877

                • C:\Users\Admin\AppData\Local\Temp\Prevention
                  Filesize

                  56KB

                  MD5

                  81d88021025188b208e3e5bee870a35f

                  SHA1

                  167d2b860097a9baccd09ed41e8c922065c42ba9

                  SHA256

                  0df0214c701b1ee01d73b37174835c06674e3e509a31d26e2cb8b4ad78286314

                  SHA512

                  80b2b1c7ca92af39bd4633ed8cb86d13257e24c0750d841cc5169f331a9b77b263b68c62cd99a2c198fd07d3ef70ab3385749e42defe9a6e25c5cc98b338b7ce

                • C:\Users\Admin\AppData\Local\Temp\Ray
                  Filesize

                  233KB

                  MD5

                  8f5dc8c2edd6d31892833f02c91e06d8

                  SHA1

                  3aa7a22e9c2b9ef55f6ab8fdbd871d905e693e81

                  SHA256

                  177c7d6763739c7bd54cd62270a1a9e28560a1ec0dc3bc1d88ecd1d6e4a9e15f

                  SHA512

                  c4e7feedad4d22356fd8aea8ae593ce40dd28e540cdb5162d1c0f8300bfaa22a05202cb91eb3eb4f37724008b3d9df966e58dbea0d76e66c0e5de8410a2a3daa

                • C:\Users\Admin\AppData\Local\Temp\Smoke
                  Filesize

                  266KB

                  MD5

                  cecbfa5f9956a5c0e60933b58288c280

                  SHA1

                  715c43aae2eed1836e459bff9717ab97494704d8

                  SHA256

                  bd6a32bb4829a271c4ae9f7c6dbffd920cb22865ed3bf356eddd9df596d99f7d

                  SHA512

                  95dbba9961dd8411acafc04b2393f968d4544a5171a632632c0f114813f71498ff9033ba45f4b7c34afd4c6208f1349606b7548b1e125d8b38f77e508927ff7e

                • C:\Users\Admin\AppData\Local\Temp\Summary
                  Filesize

                  208KB

                  MD5

                  c4b889b1379e2b3eeb956553b719b22a

                  SHA1

                  678cd18741c398010aec9f59233d472644d0079f

                  SHA256

                  c7a139b90d5d6c0a25d636b76fc32ebeeb06c426595063c925c383cf4bb6445d

                  SHA512

                  2611b3b3ff0a0198e08375ac5614427c8e97e796b3e677430f13fb0993645fc80ba610f9e68c6418d6d859349af84372fe000ae26bf2e0ec605880d03c61a86c

                • C:\Users\Admin\AppData\Local\Temp\Turtle
                  Filesize

                  261KB

                  MD5

                  7a6ca99cafcf2598d131d5d3e9d5cf65

                  SHA1

                  360e087c9ba4a2cbb9ceec9401bc4d784430bc95

                  SHA256

                  ef13ed4da127b37926ae39c90b1538facc29468d9a92be8d5c23f8e2042bf492

                  SHA512

                  7c43b2d52fe70bf7608cb695bb68adde625daab0098b303382f0d66e05016b3c26cb9a717e82425c9744bbb3f8dfa79834554ca20e008d0b1af02fed4f0aded3

                • C:\Users\Admin\AppData\Local\Temp\Tv
                  Filesize

                  15KB

                  MD5

                  b679ce0e773bb53d98bcca4938135ecf

                  SHA1

                  b9607174cdc497bc424ed70402ac217f765244b0

                  SHA256

                  9b032e9f6b36d85aed8ae30c2f1212096cc0fb48ca65f13ef11cee6ecf295839

                  SHA512

                  c8492ad5a312108d266ea043461ffb8664b7a46dec83c270c924b7618215f7b2a882b1ab6d0223d6296b5105022b5659ff75837626b3fdd032caa93d1b21f4b2

                • memory/2940-45-0x0000000000810000-0x000000000086C000-memory.dmp
                  Filesize

                  368KB

                • memory/2940-54-0x0000000007FC0000-0x00000000080CA000-memory.dmp
                  Filesize

                  1.0MB

                • memory/2940-64-0x0000000073B90000-0x0000000074341000-memory.dmp
                  Filesize

                  7.7MB

                • memory/2940-48-0x0000000073B90000-0x0000000074341000-memory.dmp
                  Filesize

                  7.7MB

                • memory/2940-49-0x00000000054A0000-0x0000000005A46000-memory.dmp
                  Filesize

                  5.6MB

                • memory/2940-50-0x0000000004E10000-0x0000000004EA2000-memory.dmp
                  Filesize

                  584KB

                • memory/2940-51-0x00000000050D0000-0x00000000050E0000-memory.dmp
                  Filesize

                  64KB

                • memory/2940-52-0x0000000004EC0000-0x0000000004ECA000-memory.dmp
                  Filesize

                  40KB

                • memory/2940-53-0x0000000008460000-0x0000000008A78000-memory.dmp
                  Filesize

                  6.1MB

                • memory/2940-62-0x000000000A220000-0x000000000A74C000-memory.dmp
                  Filesize

                  5.2MB

                • memory/2940-55-0x0000000007F00000-0x0000000007F12000-memory.dmp
                  Filesize

                  72KB

                • memory/2940-56-0x0000000007F60000-0x0000000007F9C000-memory.dmp
                  Filesize

                  240KB

                • memory/2940-57-0x00000000080D0000-0x000000000811C000-memory.dmp
                  Filesize

                  304KB

                • memory/2940-58-0x0000000008270000-0x00000000082D6000-memory.dmp
                  Filesize

                  408KB

                • memory/2940-59-0x0000000008C00000-0x0000000008C76000-memory.dmp
                  Filesize

                  472KB

                • memory/2940-60-0x0000000008430000-0x000000000844E000-memory.dmp
                  Filesize

                  120KB

                • memory/2940-61-0x0000000009B20000-0x0000000009CE2000-memory.dmp
                  Filesize

                  1.8MB

                • memory/4396-43-0x0000000000BE0000-0x0000000000BE1000-memory.dmp
                  Filesize

                  4KB

                • memory/4396-34-0x00000000773C1000-0x00000000774E3000-memory.dmp
                  Filesize

                  1.1MB