Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/09/2024, 01:59

General

  • Target

    92a24e160937ec00bd6a8e855cd55b9329760131c1412f35b18c92aacc299883.exe

  • Size

    1.4MB

  • MD5

    9f5fea618279281fdc697b0d43760a16

  • SHA1

    198b4078dd03e7cc8d58c024fcc8956704a87893

  • SHA256

    92a24e160937ec00bd6a8e855cd55b9329760131c1412f35b18c92aacc299883

  • SHA512

    e80df43046447f29c23ec05a16ffd4003efacec15eca5ad16dbe15345174621f5ad7752a23cd1b5268ec46ae74c283233dbb223e8e2557a9f3c87a70c4f4f6e4

  • SSDEEP

    24576:Z9/YFro7myA9aUx6P2lms+OKMREuMJY3cOz9ra:ZOp9MUxKyKMRfMJMla

Malware Config

Extracted

Family

redline

Botnet

unique0109

C2

185.215.113.67:21405

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\92a24e160937ec00bd6a8e855cd55b9329760131c1412f35b18c92aacc299883.exe
    "C:\Users\Admin\AppData\Local\Temp\92a24e160937ec00bd6a8e855cd55b9329760131c1412f35b18c92aacc299883.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:540
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /k move Jose Jose.bat & Jose.bat & exit
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2320
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2960
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "wrsa opssvc"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1828
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2764
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2772
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 827243
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2636
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "CATCIRWILLIAMSPROFESSION" Burlington
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2644
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Cameras + ..\Affect + ..\Amenities + ..\Ja + ..\Los + ..\Birthday + ..\Eliminate + ..\Melissa C
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2628
      • C:\Users\Admin\AppData\Local\Temp\827243\Christmas.pif
        Christmas.pif C
        3⤵
        • Deletes itself
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1632
        • C:\Users\Admin\AppData\Local\Temp\827243\RegAsm.exe
          C:\Users\Admin\AppData\Local\Temp\827243\RegAsm.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2632
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\827243\C

    Filesize

    576KB

    MD5

    af2c7ab0b47e3f89131c1f477701bcd2

    SHA1

    842db71eee4440ea1090eee708aa3a0b27da5301

    SHA256

    8c8ed94e58a4456a0aabd448425cb7602019f0efce146bb5d3670c471ff9de80

    SHA512

    1a9de34608da60fa2bb14c503debe4131eabb8156b2ed7ae51489ffab13181a88df1c4a02b1331dc8731bb6418ea93030df7789382a7046a0aea5bfbe19b25bd

  • C:\Users\Admin\AppData\Local\Temp\Affect

    Filesize

    95KB

    MD5

    47ca6ff2405757093a39dd21d9a90055

    SHA1

    dec4f32b7201484609cb2597d126ec11bbac5aef

    SHA256

    fb9efeb562fd817252d78023ec09f0a81f478e834bcca263d9679759a089fc1b

    SHA512

    a5b3ca22723ed7fac1903c37093c2cc4daa65fbd25ad2b012e7877b4d6037af3610be79bd293756357f1eafddafb92db464c14dca2ed8d464f6d65baf55fb53f

  • C:\Users\Admin\AppData\Local\Temp\Amenities

    Filesize

    68KB

    MD5

    540e2e531f3ef953ee24e41fc3c4b734

    SHA1

    fae277f98217519de3154eddf208d15eaca86e13

    SHA256

    b271b477ed275355e180503c8928b9cfc943285eddbb277201548e9cb1cbbdfb

    SHA512

    a83a9f1370e5714d042038a4f7047cf880c6dadb8cae8c4db44da93a50431dc3902eaf40f1f84a5ba5a20172f09d4353568263c576fe39a2e5d400923ad8c28d

  • C:\Users\Admin\AppData\Local\Temp\Bdsm

    Filesize

    871KB

    MD5

    44693bc6ae29647e826324f1cb03b8f8

    SHA1

    dc08c1144d112116e72227408bd6c6f7a5ba8112

    SHA256

    458b8a482d601b04ecbc85865f2fecb8dd35790be2b7cf272d54efb8f07f341c

    SHA512

    c9def728e63aad9d93051bc6e7dfe1c50fe5a183c7c1bdfa30e242c02611cc902dcfa42f7900fbf2e5818a6336e4f3018cccc1272139f061c52a121435e499e6

  • C:\Users\Admin\AppData\Local\Temp\Birthday

    Filesize

    80KB

    MD5

    a45b810c4e588f70b6d9f7868cf41021

    SHA1

    5b06afd2e70a0ec78149ec561302a00d6ef8d9e8

    SHA256

    0f6bdebfbca53c6d4d9c4ab95090fecf502616c74d8d3e06dd533e84c0be7b4d

    SHA512

    4b0687b4ce8f3e4f0e771cc1c32088c2d199159b6433604408f8e8be0dda71d56984857dc9a8de3f0f5213ee20916112adabd33d30c5b45327f688aee429610c

  • C:\Users\Admin\AppData\Local\Temp\Burlington

    Filesize

    947B

    MD5

    d396944732116d039ed215fc45daf80b

    SHA1

    4ba51a03e4082ed3df9e15216693a86bb6889488

    SHA256

    9bbe702d70718c86a4cf31c8cf89badbb2148cf65b5c1e55f02f94bbf9bb391b

    SHA512

    91c8b219856cdad1ec976903001e24bfa500db3dcb316a95470c713f1e06dbc9f8acc3022407991a6feaf4859366796da9e5d56269b5b214b8817ff4a9a37c78

  • C:\Users\Admin\AppData\Local\Temp\Cameras

    Filesize

    76KB

    MD5

    8c2e280e0ae378d740b2290dd32a3b8f

    SHA1

    4f17a062dc7b4900323ad04858c054d241091bd1

    SHA256

    fe69bfec7083056b954bedda974eefcf698e8cacc77e70e1d3b52ca2a5a59a7d

    SHA512

    cc47a8a97326e927e63cae3f647cd481f537b322187219c7940275e493a3a05128db0f9b305ce448dfe7bd722d1917412770ba15202d939263bded4accdcf2c4

  • C:\Users\Admin\AppData\Local\Temp\Eliminate

    Filesize

    56KB

    MD5

    91db20bed71a9d0e1aac5bad5f8d6a9b

    SHA1

    28f5d8d18ab339b673cd7776918c14e32812402d

    SHA256

    227c0a7bef3c456647d7573131e8fc0dcd3983e13288d35da675d9a0bf176ebc

    SHA512

    cf5f887fe006c6559ad5610bab8cc0afbae1c4e9ef2c55915f710efe90c8a09a9d33d6dad6c286a1386bf1addbd7c88d3704ea315a579e88e53b6cef5f2584c1

  • C:\Users\Admin\AppData\Local\Temp\Ja

    Filesize

    71KB

    MD5

    17b202fa8093854fea43232078df4f1b

    SHA1

    f430b9fcab891cdd8a057b1b8267b312475bb2d9

    SHA256

    4956b8296c6b0344e97e1a310889240d21f42bf11f2259848e99646d04e9b1ba

    SHA512

    041073de3e8c004f3eee0f8f580bc8a1656fa2e7e4dc3524f2a61bf8630b08dff1c51d7c563c8d4b62fcc6857c48ea7ada0790ab00db026b48443a62b52708cf

  • C:\Users\Admin\AppData\Local\Temp\Jose

    Filesize

    22KB

    MD5

    7b5b6151e9d1151fac435551f34579ac

    SHA1

    4ac29aaa2efeb120c6dcbd1909bdb87c170b01ef

    SHA256

    2da8df91d10965a9e496f0339e25968d27db9308c2311dbd8ff82dce1c166d97

    SHA512

    f53a905a870d01525f85fc127fc2530b0eb745050b276624fcba1a9043c0e56ef576673310b681647c661f4d61f5d9c8dcd3843548fc40738cdd7da8c7e913fa

  • C:\Users\Admin\AppData\Local\Temp\Los

    Filesize

    78KB

    MD5

    37abbdfd1a62b68e162ca95ad86e1163

    SHA1

    7257315d7a98065278f927fc9d531d6a5e81e98e

    SHA256

    ec01ce72a1e6f975ea78104ffa2207d9cc737762f2e001591282ec16f3394467

    SHA512

    8c22a43647a30371f0fed6d7f8a3cba4596d5ac6d2198db8984b1906fae9cd0923b94ff5117f1a52e1d2fbc6009bdcc42f3f4694ba2629345bf6a2026caf844d

  • C:\Users\Admin\AppData\Local\Temp\Melissa

    Filesize

    52KB

    MD5

    ae8ece3d790ffd78e6b91a6b64e48fe5

    SHA1

    78a5b5662c8a7c92eacf2d1094ca635bea67ec62

    SHA256

    fd00df2aa9c3a903590c392ef0fb081ec8f07fd0844618138a743ee368d920e8

    SHA512

    a670f47bfe87bed6e412bbe699bb1662802d0d3950aee69c63a79d0e16c2ed4abd86980f5cc77c9bef18e5957484deee7ed47a60aee95c4c40032983f31e4f85

  • C:\Users\Admin\AppData\Local\Temp\Tmp30D1.tmp

    Filesize

    2KB

    MD5

    1420d30f964eac2c85b2ccfe968eebce

    SHA1

    bdf9a6876578a3e38079c4f8cf5d6c79687ad750

    SHA256

    f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

    SHA512

    6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

  • \Users\Admin\AppData\Local\Temp\827243\Christmas.pif

    Filesize

    872KB

    MD5

    18ce19b57f43ce0a5af149c96aecc685

    SHA1

    1bd5ca29fc35fc8ac346f23b155337c5b28bbc36

    SHA256

    d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd

    SHA512

    a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558

  • \Users\Admin\AppData\Local\Temp\827243\RegAsm.exe

    Filesize

    63KB

    MD5

    b58b926c3574d28d5b7fdd2ca3ec30d5

    SHA1

    d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

    SHA256

    6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

    SHA512

    b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

  • memory/2632-35-0x0000000000090000-0x00000000000E2000-memory.dmp

    Filesize

    328KB

  • memory/2632-37-0x0000000000090000-0x00000000000E2000-memory.dmp

    Filesize

    328KB

  • memory/2632-38-0x0000000000090000-0x00000000000E2000-memory.dmp

    Filesize

    328KB