Analysis

  • max time kernel
    118s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    24-06-2024 01:22

General

  • Target

    b4a1e470f814bbcf1bc26c087eb513f4bab6165c90ecf43ac71dd87702561c30.exe

  • Size

    297KB

  • MD5

    5d860e52bfa60fec84b6a46661b45246

  • SHA1

    1259e9f868d0d80ac09aadb9387662347cd4bd68

  • SHA256

    b4a1e470f814bbcf1bc26c087eb513f4bab6165c90ecf43ac71dd87702561c30

  • SHA512

    04ea5757d01508a44e0152b3aa78f530908da649d59b8ce7ee3e15c2d4d0314c97f346c1e79b1810edb27165d04781c022937d02536dc9b1dd4c55f023a47701

  • SSDEEP

    3072:WqFFrqwIOGdTypEmz07sFPaF16CVyeR+LhdwT5TZMfvgZcZqf7D34NeqiOLCbBOy:tBIOG6hPPLd05TZaYcZqf7DI3L

Malware Config

Extracted

Family

redline

Botnet

AMA

C2

185.215.113.67:40960

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b4a1e470f814bbcf1bc26c087eb513f4bab6165c90ecf43ac71dd87702561c30.exe
    "C:\Users\Admin\AppData\Local\Temp\b4a1e470f814bbcf1bc26c087eb513f4bab6165c90ecf43ac71dd87702561c30.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Users\Admin\AppData\Local\Temp\6.exe
      "C:\Users\Admin\AppData\Local\Temp\6.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2468
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.co/1lLub
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2604
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2604 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    9abf3019f2b51184c8290d6400a26125

    SHA1

    df0556111a1e9ca49fddd80532c49dc0741e5ec9

    SHA256

    ab1e075e17fd28fed93896041bba4598a82989d53d403eff2587c8e9a1806f33

    SHA512

    43348215b6c20445dda09c8e2de828258d4b2a49321ee620251c6d90248cbc4df03eed9626913027820def101922b66644b79e9396fac460ad72ee434f9f4456

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    47701248a22dd6af79b448eff1a49eb3

    SHA1

    e4c817b85e0c79cbb8f10c37742c08b72bde8d80

    SHA256

    dd71e609b63c6ab661e8de59474667a8205c6a38348366cbe63af9068d490fb6

    SHA512

    b839266597a9a82238f2730e3cd5ec85ef6ca080d7d3c6885a9eff928a0a947ff70b57f6e0204d5e556775ccad4a11545f34ece238892c4592ec9b8f1f0a46f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    01a36a052260873b8e7368fc35e4c072

    SHA1

    f41cc8ff95b10920675672e2dc496b693a70f2a4

    SHA256

    fe176a5035f96fc4330a8c4c0e4577e3c41ab98ac6d2af31a0a5121130529c31

    SHA512

    b941466d75df7f113385668ef3f747268d9a8bf0185f1100d71074b9c8cdd632883bf62f00d59a2b3b1e05936d3cdba717856af27bf4de4efc1bb66af986eec0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    659efc7b5c4c13498fb3bf05d21d7ed9

    SHA1

    aeb1cf8f3299371a0bfe9e557aca21f14e57f637

    SHA256

    4f1420a951bf7656bb96b48dd183f2cb688b62fbc64543767b075c6241ded9d1

    SHA512

    db41ac75ff1e85b21f08c6a8f0c5b895f890190ade77ff6b7b1f0b40da4bd4516b2d1caa0a73b9c457cb804a1a5fc77343c61d5ad353b28e9c4a1d35605e66ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    479f20ec5615c15b795cd60bca5fd3d2

    SHA1

    f88eb1abebe8f3233fb0bf68dcfd38a06c3c5530

    SHA256

    2d8fa1f713a21843de9dc94d143b3a070fb603953683bc3058465f5e60754896

    SHA512

    ada798cbb467d00c652c5b6cd2f9b46f455257338150185652e1b0ef2f05c54c6f719dc672083d416722ac1b0ec418c25b1622c5015e01f2b90b6eacba57edb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    822e6f63e98bc553b1feb781f225f4c9

    SHA1

    1e2e787c6421f55662c6f548f6e1ecb9b8234673

    SHA256

    f8a4c172fec6eaaadd6cebd88989ad3081378d4209e31c0075ac4496c2f6f15d

    SHA512

    1486755d7c084d9fa0b5d8c04831046753d23157303379ae8724f970b95fdeb474a989f6581e51f3b74182ea904b3e04a5dd8081e5713751d2b24bd98dc11d85

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fa781699dc57ec0e4502d9e78f186782

    SHA1

    205d50efa5135f117d73d921f5a66e4730ac6283

    SHA256

    ad637709372a02a843bedaf2f03d28fd558c69357ac31f03d826f7d5e4695752

    SHA512

    211bd7ffa7f2eb5809b2e6c36514d19a25d3088811fca7d35d154f517fdc99bfcc560471477a776bab279dcbca47ee318feb8164d4e1b71f36c5aa17eadf95f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    30215ace77769388197e01c4ee4f23d5

    SHA1

    a8f26399988c4aee42388eece96c67b7406975d2

    SHA256

    38b69ac87417f0bfd602209724115244a6216c767411229156b47420bf71a5df

    SHA512

    713b275fd4bcc81160012f71df25e39347b1b84576712d415c85a5fb850162a5dbddc032c340ad051048da5845857f92596db7530af10407d5ebed64dcf4174c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d9977825ebc3ea878cd20ad2e71dd02f

    SHA1

    80491448907d256712f41be580d956210c318758

    SHA256

    bfe0e28e1d2badd5357a9085d0e80da186f9818fee4051a614657a0809665c0b

    SHA512

    225e10d4948da8afe8d543e4b14f3342414ef40dfd07fa1784777122958ae2224cc7601cbdf20a83c341ec9b6bae46d5a0ff0113badf2131ed86807fcd43bca1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9ddd6f4366fbccc540947d220dbd413b

    SHA1

    66765b9ce1240d6f62c6ab4ccf61dce582dee161

    SHA256

    5c58aee1a7a661bf728a3defe1ef1acb102089bc80a9f8bfb09d7a6b46873c02

    SHA512

    d1b23d9b0e275fcd898831707a86c30334661a0ee7fa3b22aefe1c69829bdf8592d7aca459c180a7153654fee62c19ccd6e36a02b7918a8f4c97c2bccefbaf9d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0ce961c6857ea8749c0952d0685711cb

    SHA1

    56224d37d30c62cc9a8c6d7e8735a0a0ce86d4dd

    SHA256

    e496e1692f3fc6fd9dcf4d9fb00bc369c37796bfba665c6759e17079a61c1104

    SHA512

    f12c7a53f79e871219e63a0a8f2e475e9c15234597fbe69a2a91259b8ac1939d13385cd98b51501974a9d2cbb5c1cea4adec86b3b3493554b4fd88fef22d533e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    888240b5bb65468098b2244ac729f18c

    SHA1

    e43905d37b9617cfc61aeb341759c52e01c3cbed

    SHA256

    d1e19af12a6ce0a70472aedf8589ee60d33103b624efbebc601a65a28ffec66b

    SHA512

    9496a083f66e9de77c05d336e1b9c716f759687d811ff7107f37e27574db3d0084a9240e02c76dd356fb628dc5d3c4d881357e4ccc5c13282725b73f7523b1da

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0454ac81c05ea32de6b55b43ae033f30

    SHA1

    eac7f9b12264f7af5d86c84991f0c04973be4afc

    SHA256

    6c5cc8f0fcac7f343661d8336d8a1373727ee09dd91c387116f5a9465213248f

    SHA512

    5d91e300692b50c2558daf3cb293dba2d51c83bf479c62cab8bf10cb922372ba968d7f03a177479fc601abd6bc06b78006c68225a52197e402c8af5f8bfdb337

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    182a239ff9b0ae996d9de5110a2bda8d

    SHA1

    a7bd3d7cf8cf8658e61dfea9d57ddb44538a8cbe

    SHA256

    88b72bb436d40beb67b33b318577454d30bcd0cc1a6bd7e8c6feb3d1f34f347d

    SHA512

    5222c03e5c0d1ab13e80e2411b97ed703b3b27da1151aac56b51bb3970a13f3d24ca9bba827b424ea397daf33c04d6426d38359b32ad2446e7a1dd027565bc95

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    1a03a7773668b6e0b7684aee586c237f

    SHA1

    849784b745d7f09c1d25a77ba37b696d8b1cbf0b

    SHA256

    231ce624a91ccca4f82adbc01cd4d8b677096deb6f536f752b13660048dee8b2

    SHA512

    dbcdbb2ace939d9017019122b77a33dbd4b49aba5579bb8eb9d4dd1ec31b27e0f689403aff232ed4ed73f0472609e6eecad871a6fa8d9c41a6ff62af4c64e5d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

    Filesize

    4KB

    MD5

    da597791be3b6e732f0bc8b20e38ee62

    SHA1

    1125c45d285c360542027d7554a5c442288974de

    SHA256

    5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

    SHA512

    d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\s8rbov0\imagestore.dat

    Filesize

    2KB

    MD5

    d1c4abd06aa17665cb2be07ddc6309f6

    SHA1

    261ec6b58cdcf082e589509f906de0c1945a7e0c

    SHA256

    fa9795505193496f8a8ec33d8579e6df400612d8de0cd6ebf56f0aafd3a6575e

    SHA512

    2796873f6ae8bb5e35a97e624be2372e062e440c7fb4332d8fd12405470ff47754a2446692d3e5479d583707189c59df70c03135f979d839e02f7306d3c0c56d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0XO7MV7L\favicon[1].png

    Filesize

    2KB

    MD5

    18c023bc439b446f91bf942270882422

    SHA1

    768d59e3085976dba252232a65a4af562675f782

    SHA256

    e0e71acef1efbfab69a1a60cd8fadded948d0e47a0a27c59a0be7033f6a84482

    SHA512

    a95ad7b48596bc0af23d05d1e58681e5d65e707247f96c5bc088880f4525312a1834a89615a0e33aea6b066793088a193ec29b5c96ea216f531c443487ae0735

  • C:\Users\Admin\AppData\Local\Temp\Cab6873.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar69D0.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\6.exe

    Filesize

    4.8MB

    MD5

    5bb3677a298d7977d73c2d47b805b9c3

    SHA1

    91933eb9b40281e59dd7e73d8b7dac77c5e42798

    SHA256

    85eb3f6ba52fe0fd232f8c3371d87f7d363f821953c344936ab87728ba6a627f

    SHA512

    d20f862e9fadb5ad12eddaae8c6ebbfa03d67d35c5ca272e185206eb256cd6a89c338ce608c992df715d36a3f1624a507dbe324a057bd412b87438f4a008f33d

  • memory/2212-0-0x000000007498E000-0x000000007498F000-memory.dmp

    Filesize

    4KB

  • memory/2212-10-0x0000000074980000-0x000000007506E000-memory.dmp

    Filesize

    6.9MB

  • memory/2212-2-0x0000000074980000-0x000000007506E000-memory.dmp

    Filesize

    6.9MB

  • memory/2212-1-0x0000000001200000-0x0000000001250000-memory.dmp

    Filesize

    320KB

  • memory/2468-16-0x00000000003C0000-0x0000000000BDE000-memory.dmp

    Filesize

    8.1MB

  • memory/2468-11-0x0000000000100000-0x0000000000101000-memory.dmp

    Filesize

    4KB

  • memory/2468-13-0x0000000000100000-0x0000000000101000-memory.dmp

    Filesize

    4KB

  • memory/2468-15-0x0000000000100000-0x0000000000101000-memory.dmp

    Filesize

    4KB