Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    10-05-2024 15:48

General

  • Target

    SoftWare(2).exe

  • Size

    840KB

  • MD5

    74a600df1669384b09dd75dc6bb34017

  • SHA1

    250eed70583094d4b8331f15232d626c204b36f1

  • SHA256

    82160bc5eebc3b8f0f06a8a5cac49f208593f8c2510f636f51a9c269771d9245

  • SHA512

    371bad5b1825b30ae2ea050b02662261ca4817626a20c0bbfcca193c4356dca0936ef5a832cb343d6e26aa450a289cb6e03f747093aa572ac43c8ac9349d82f6

  • SSDEEP

    12288:ctf8SWek8KQsqU+lqYCginzm+ZwDOCGezsVVDgH1Ba2Il4H9h8pP0r772VU7L3cQ:kEZb/glqYCg0zwDo/j

Malware Config

Extracted

Family

redline

C2

194.26.232.43:20746

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 6 IoCs
  • Loads dropped DLL 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SoftWare(2).exe
    "C:\Users\Admin\AppData\Local\Temp\SoftWare(2).exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2176
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Tmp170B.tmp

    Filesize

    2KB

    MD5

    1420d30f964eac2c85b2ccfe968eebce

    SHA1

    bdf9a6876578a3e38079c4f8cf5d6c79687ad750

    SHA256

    f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

    SHA512

    6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

  • \Users\Admin\AppData\Roaming\d3d9.dll

    Filesize

    400KB

    MD5

    303ce85624027bcd1cdd298c3893cea8

    SHA1

    ac96919914cc167b3a7f7151b53f3dcb2c2e8c89

    SHA256

    8783cb9231c1490f9b68e80f55de54c68ece383ae5cfaaef2095553bafb078cf

    SHA512

    890d141cb874534d15563826ee5c2314eeca2c7624ac87c0a9910027d6627f187b38e47a791884856c1ee3d5ea60db6c11eab52c56c771039e057a038e177904

  • memory/1740-25-0x0000000000080000-0x00000000000D2000-memory.dmp

    Filesize

    328KB

  • memory/1740-19-0x0000000000080000-0x00000000000D2000-memory.dmp

    Filesize

    328KB

  • memory/1740-42-0x00000000741C0000-0x00000000748AE000-memory.dmp

    Filesize

    6.9MB

  • memory/1740-10-0x0000000000080000-0x00000000000D2000-memory.dmp

    Filesize

    328KB

  • memory/1740-11-0x0000000000080000-0x00000000000D2000-memory.dmp

    Filesize

    328KB

  • memory/1740-9-0x0000000000080000-0x00000000000D2000-memory.dmp

    Filesize

    328KB

  • memory/1740-12-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/1740-13-0x0000000000080000-0x00000000000D2000-memory.dmp

    Filesize

    328KB

  • memory/1740-8-0x0000000000080000-0x00000000000D2000-memory.dmp

    Filesize

    328KB

  • memory/1740-26-0x00000000741C0000-0x00000000748AE000-memory.dmp

    Filesize

    6.9MB

  • memory/1740-15-0x0000000000080000-0x00000000000D2000-memory.dmp

    Filesize

    328KB

  • memory/1740-24-0x00000000741C0000-0x00000000748AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2176-23-0x00000000741C0000-0x00000000748AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2176-0-0x00000000741CE000-0x00000000741CF000-memory.dmp

    Filesize

    4KB

  • memory/2176-2-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB

  • memory/2176-1-0x0000000000240000-0x000000000031C000-memory.dmp

    Filesize

    880KB

  • memory/2176-7-0x00000000741C0000-0x00000000748AE000-memory.dmp

    Filesize

    6.9MB