Analysis

  • max time kernel
    121s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    28-04-2024 17:13

General

  • Target

    Build.exe

  • Size

    141KB

  • MD5

    4793635d89c00e6f9fc0b6953530a4c0

  • SHA1

    dc168256f1b27093c7b6699fcf8ac9d4393adbe2

  • SHA256

    9adbdf6077ac14b7dd2a4e37f15881bbf2fa25b56690bc5000fcfb93ed3cfbe2

  • SHA512

    14aa1035d4343e898b42c70e075df65bdaa3265149806becf3e88b056f64486ac9219d137ed51af74edb0398cdab445741aa9b1a19c3e6db3e4ee260a2b04427

  • SSDEEP

    3072:BK1JZOpTvVQZ+rcIeRYs6YmszJqoD277BpGGoMTb3R35dINX9r5Pxk:QOpu0rjeRbVJqoDm1pGGoMTb3RDINN

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Build.exe
    "C:\Users\Admin\AppData\Local\Temp\Build.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2916
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://localhost:13105/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2736
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2736 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2864
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C taskkill /F /PID 2916 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\Build.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1480
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /F /PID 2916
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:588
      • C:\Windows\SysWOW64\choice.exe
        choice /C Y /N /D Y /T 3
        3⤵
          PID:1820

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Defense Evasion

    Modify Registry

    1
    T1112

    Credential Access

    Unsecured Credentials

    2
    T1552

    Credentials In Files

    1
    T1552.001

    Credentials in Registry

    1
    T1552.002

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC
      Filesize

      914B

      MD5

      e4a68ac854ac5242460afd72481b2a44

      SHA1

      df3c24f9bfd666761b268073fe06d1cc8d4f82a4

      SHA256

      cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

      SHA512

      5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
      Filesize

      252B

      MD5

      bf565328068fc902728b59e9605eef69

      SHA1

      7147d92186196b04d4ce16768e1522335b3ae6dc

      SHA256

      edf99469f10d2a7c5be63e349f189366e6f221d67f1e7965b3cfbe5f2a520ae7

      SHA512

      8d140aea4a2693826f1dba209abf78d7ff113852535ca1cdc8e10c7d9917e602d0d36e2d98aa7d577f5593cc5bddb437536d477386ba7be491bf7291e7cfc306

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      5149a5e5c42f37cdf746482022545127

      SHA1

      c4df30d84bc3ae7f4517ade7ca35c30b3866c487

      SHA256

      b8a326a436c6f764fcd24c1831fc8a32d496d5b1010e65c6255a8e6d56cf0b64

      SHA512

      c3594c6e731bb52c9df985014cb266b6797c0ba1b8fd63182183ae245665ab26a8be34b66c7add62c88303e6e9d2a37258023f2392e9b406d27190eb9913f01d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      a027657c4cb49042ce150819fb513493

      SHA1

      0f0ea99507750f04c94227f9b489190e0c441c5e

      SHA256

      b28cea1a9df0e3d08ebb8e1297041699ac3f2c327e8034ab91795aeb6cd73b9d

      SHA512

      c867d781517d357aa0c8be3ebd4d99259624b2964f9766bd9705f8bf9e34c16f53aefded5a17514df01be1373f87b9762dbf2a9561628c425cb5805026eec69d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      14a99413cac70312b012914ee4164e4a

      SHA1

      e50e4c948e9fd4c1322593dbcfc0dd261088635a

      SHA256

      2ad6a94ffc29321869e0abfd3c04f204ec1d1da18a4d90e0b06cdf8e353c1bef

      SHA512

      f745ba5b377f9e3939834563b48743f137776a030fc2ef10dfeb97f8ca55e5b5406e9c65461d6771d993a03ffd0e79ee4f30fa4688f54fcabedcc8d753f5225d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      c1433dd1ae6141b1b4d593c895001297

      SHA1

      b00324a4c2cac297e107913d120eda7adddce9e6

      SHA256

      68a356378e4a0cf3f4c8ee2691e115aca1323494d82e714b9b90e05bbb2922ce

      SHA512

      106a6744fb6d72ae62c287b73578484fbb27b09765aa4cae9512e93c3599d84046d4dcc5c6d47079a4719585507341d3d051f24cbb820db22d7e35fdcd8df2ca

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      bce380facdfcad004e403b18afdb1e54

      SHA1

      76a05b61dd81e236f3ad8545111f63e5c16b9e24

      SHA256

      32a569fbd2ac2fe67eea4dffc9661709f403b56cb7ff68372e5bf471984b277d

      SHA512

      d553dd6f3fdea2aa68c05cb798c86f9fe2799b13a34e2107c4a5138d7911abbc85edb4cfe7885990ad14ea5eab755f8f93a98885033827eba5512cc28f6fac3b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      b2147058248c758c221f4b37f8dad37f

      SHA1

      e1d95952dfc541ba04138762e9f7c9706996802a

      SHA256

      2a64cd6851fac3a9841d1059f9bfc3a1088f29a3a0114b8ebdbbedc5b75a9ddf

      SHA512

      6ddbe9c17942b9c86a89abf0971be0de0fc06f8f118e2befb965faee78f48925ef0384f1ea6f6fb49697cab246b0c16c102b06027267b90bb3b083d3517c526a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      340eae57b27d540a94679140c17545bd

      SHA1

      4d0a561e0007e4e51a8f6bebdb58cf575b2c53df

      SHA256

      5f85fb618eed9fecee4077a189dee4e064c51bb6c4e6491d140f61bbc5af22b1

      SHA512

      5122ffbe4d154f7dd4d7ff6bc54959e05beaba4e3a2207269f40ff1c66a62a0034a7f8590d44eaf4269f0736921f292b0ca747210e30d19de96c7f5f07eeee1a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      0475035c480c9a2cf0c224859b65d5f6

      SHA1

      d83c5462367d6574c5a2bb3b50d2bf3ce2cebb3b

      SHA256

      30686c913b8722f794e4ddc8fe75d0efc87b13956a706db40ccf5a41d1fe991a

      SHA512

      04f3b5459ce6fc4d50e760f92ba9fe98411cb678562de98c3386813e86ddb7521134b9cd1c4df659e7187419923d3efefdcf7d9c9b8a994ef3f0027452172be5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      1fcbcc976992bb88db7081fd1560a23b

      SHA1

      a36b9d97482d2443033661a7f1af05fdd690b4a7

      SHA256

      f5d7e55094cfc1fc453eb8974d74976a6037e79091bac9f01e350d077065650a

      SHA512

      220ee2c52ce454c82cae3fe339fad26d302500420425e966bab32cfd739576d215a68829ff7ec948caef1158e80448250ce27f11964b223dd2061b7696ac0ab4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      14db55598936119d00f72cfc405a99a7

      SHA1

      c165eb3b4f6118e2e733558e3c53c67cecaead40

      SHA256

      2ecbe04cd383e328206fc3b9de830b13dbc446ecdd05f8d2c6a2940cd4410f2d

      SHA512

      e399c2c00144281ebae63f4c9624154c847b0c2d768925be714e9c911e96becee19d10b61afc7cc3e41b61e70b3c66c9fd2fd002cb1606ebc5e573ea5d5f0e2c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      624994216e27ca6466fccacbed645000

      SHA1

      5ae19f4de2efb88b072b68283e09d029ea8dc53c

      SHA256

      2448febb05ee0f52be17f6fa2677480a6060794609e068ed97275d2f0a598da4

      SHA512

      0815a36f4fec2a66a2747fc04f1a8b2131af822acaaedd7aa85a32edf423985176790f5354ddf302a4551e691b3a4b9a8b452cfb452a12af4e5d1a1796159a5b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      847910e9863211cc3bfe84b3027c42a9

      SHA1

      0a4e4f2fb60c0fc86f33bf516eb45fc17d85d920

      SHA256

      1452d8b0ad22a0345e4a806d70bec1b4af120c042e5ddce31dc1df73d79b0687

      SHA512

      012ad5c08006dbb754f2d00102eeb415c57755f32fb4df1c2c0390e879c1b7068c08ecc70fef5be0c96bb9dd734d687d040c5da35898e85e266b34e8ba35585e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      dc485ad488096698a5916b662169e2a1

      SHA1

      a5b70986a60962050619354a9b4ecda54bfc2751

      SHA256

      d8b62f456f2a61587cd7df11958e313c609108df74ed78501fd2c2b74bb6f5ed

      SHA512

      b25558b80fc55254c4dd2c542827162230d9b0fddc1973a70e0f14810b675635f0cd2eca2a09adb8e33058d0ab7c987fd2e40e0d2d3e47c8689ee7203b93e10b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      efc27c18c1054a1c05bdc2d07fc5762a

      SHA1

      45d6405dd024840e888e89f3d6efb2968dddf23c

      SHA256

      49c5fe251ec0d6acf31e5cedb42892eb606b5b141cedc12cf704d6d57d234adb

      SHA512

      c56c73b9efc5385bdb50a2ad2c0befc5e22a0ee4f48025d58ca356686519c81859b8d292404f25e2f1fbfff2253f5ba80cd2f4756243dd180f9ae248cd59ddb5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      1fafebb38652b0dee1d49457a9579600

      SHA1

      074fd65782e25eb0f9c25f276dc66228a9745d66

      SHA256

      13f7dde0e5ce0984b8e94a025b7adab6befa0cd2cf4f1a819035ba1a7067440f

      SHA512

      49270311ead16f30254637c95a23f1d1b85cdd2aa6df500aab633b4d6af523500b4cec657c2c8c9449720bcc38e8c74f3537646fe40fbd003f5da14855444174

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      4e813956cd78e2e2c1cdd770045287c7

      SHA1

      7b0512824bbd0e38ac8c28e05ac975d05f68395f

      SHA256

      67559d7948b93b863286910a13bfc2a35350b711365ed07e529ac219d8d58e8d

      SHA512

      b78a6449ca49f0e36b0f21e439758e67f13a66092bc6af57fd3fcae091de29361f97abcfe05250eafd2f313a77fe1d3d1b6df8617f8372158bd58397abe225c3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      843eb2c4e4418be10c211e987cf9807e

      SHA1

      3319e29b690dba2724e12225eb624630b01657ff

      SHA256

      7e47da32aedd2bfa30b0591808d6260e838007b8dec0c418444940530df4078f

      SHA512

      f3869fa002111ca4ade0865b9b3f16cdf6c853c5cb4072bee733bd41f785bd1ff14e80f852fa2fcd701940ce969ef04dbc51989cdb22d20a7a1868cef626ef5e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      39bedcef2927e1bb0b5f78d8f529fb5b

      SHA1

      6f399956c56bfdbd200d88fafa6231eb559d90fa

      SHA256

      266da1d4b0bbf54f20e542b15233b4c5e26463d7bfa2a86ff153098192e5762d

      SHA512

      5fb241aa78076b4489449a893319c49b53c170ad7890519ccac6d3ff21e862590d0937ee2a96f3b4f238f2912ba31c501e62bd63bc2e2aa128b02bf731fb9ed0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      4cbeb103578fd4ee773ab3545838549a

      SHA1

      c488c664b7285dbda227752ed121946360faf526

      SHA256

      4e638edba4aef22eed98f9d5c363c2e0b7eeae4e5489280ef0bb571d80bdc879

      SHA512

      364a72cee3703b825ae42f577e7265b6b4a83e9609647e720941fab5bb917b791a8e5afcbb52126ac78576c74d290d47859f89bfb08389ef14739bfe4e59b194

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      47dc75debdf889931d97dc2b2ad2a203

      SHA1

      5ac813e6fd4505caf311e7746b1b4259b7416641

      SHA256

      dd311f6593d09c11e562095069d69adcafcb8c9b6d1da40fa6fd7aa7d245823c

      SHA512

      08c91fcb0f77f5ed6e8298b30198701930113d3bb9479c78021cafdcadeeea16a657a3556e9d5e3d404ea59666fede5a924368826973cee88b533d46f5574c7f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
      Filesize

      242B

      MD5

      f2614e1888704e649c9d0c2ec92fecf9

      SHA1

      69eeb93b7bd094df659ecd3b64f41cd021e2e4d1

      SHA256

      d6c4b564d1231551748c3a1d4fa9853860cf06162b2ef662857fce7aa33216d2

      SHA512

      122f6ed5fd097b9013768eedaa700e70381b373bfcfda34766b33f01322e468d18180eceac1cba0e745f17e16f6a26fe0de891ad7afe900dc15df19f2b6c3896

    • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
      Filesize

      4KB

      MD5

      da597791be3b6e732f0bc8b20e38ee62

      SHA1

      1125c45d285c360542027d7554a5c442288974de

      SHA256

      5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

      SHA512

      d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\s8rbov0\imagestore.dat
      Filesize

      5KB

      MD5

      6968f4e7b2ebf8e598338a33adab70b5

      SHA1

      91c1eeeab2d080548ecf5471b2fa64c3b9bd2332

      SHA256

      87f7559aff48c0464439db6bac543bd3725280d35e9f80e0e5dfb4549eb9ae5c

      SHA512

      4c94a9963fe2eb72f6e7f0ca4623bf3bebfc3174d0566e8421372280fc5f94e73d48932437c0b4ead54252733aa7c3b7a2377a5e577318f2b0e353780140ae5a

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IXSL5NQ0\favicon[1].ico
      Filesize

      5KB

      MD5

      f3418a443e7d841097c714d69ec4bcb8

      SHA1

      49263695f6b0cdd72f45cf1b775e660fdc36c606

      SHA256

      6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770

      SHA512

      82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563

    • C:\Users\Admin\AppData\Local\Temp\Tar1DE2.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • memory/2916-0-0x0000000000FF0000-0x000000000101A000-memory.dmp
      Filesize

      168KB

    • memory/2916-1-0x0000000074DC0000-0x00000000754AE000-memory.dmp
      Filesize

      6.9MB

    • memory/2916-2-0x0000000000F40000-0x0000000000F80000-memory.dmp
      Filesize

      256KB

    • memory/2916-109-0x0000000074DC0000-0x00000000754AE000-memory.dmp
      Filesize

      6.9MB