Analysis

  • max time kernel
    170s
  • max time network
    188s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23-09-2024 05:00

General

  • Target

    07d4b7768e13d79ac5f05f81167b29bb6fbf97828a289d8d11eec38939846834.exe

  • Size

    304KB

  • MD5

    58e8b2eb19704c5a59350d4ff92e5ab6

  • SHA1

    171fc96dda05e7d275ec42840746258217d9caf0

  • SHA256

    07d4b7768e13d79ac5f05f81167b29bb6fbf97828a289d8d11eec38939846834

  • SHA512

    e7655762c5f2d10ec246d11f82d437a2717ad05be847b5e0fd055e3241caaca85430f424055b343e3a44c90d76a0ba07a6913c2208f374f59b61f8aa4477889f

  • SSDEEP

    3072:Eq6EgY6iArUjOvWUJwPYT8QADFKoRJTA+tJSiK1cZqf7D34leqiOLibBOT:vqY6iULwP/xnRJTAKJ81cZqf7DIvL

Malware Config

Extracted

Family

redline

Botnet

newbundle2

C2

185.215.113.67:15206

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\07d4b7768e13d79ac5f05f81167b29bb6fbf97828a289d8d11eec38939846834.exe
    "C:\Users\Admin\AppData\Local\Temp\07d4b7768e13d79ac5f05f81167b29bb6fbf97828a289d8d11eec38939846834.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Users\Admin\AppData\Local\Temp\NetSup_Buil2d.exe
      "C:\Users\Admin\AppData\Local\Temp\NetSup_Buil2d.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2100
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://yoodrabodoln.beget.app/WTYDDc?&se_referrer=&default_keyword=&|%tmp%\NetSup_Bil2d.exe
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1520
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1520 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    da98c14b881579296fa2adc8f56169f0

    SHA1

    699896720d8f26a9310a50a87cefd57786bdf136

    SHA256

    3d162b507948b4b907d640ca07530c2ff9954083f1bba2e2940aa2e143a18781

    SHA512

    b003ca8feb4707a3d3120627b2c31406bd8ca19be96a4ce6bf4664a81dee888dd6f25b9502c562cc421669cb2b082e9ac47fc570d6e75ff46a49f4819bd07d80

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    26184be378cff63937f7d016404b2154

    SHA1

    7861cd9f31bb0490cc04dbd9d00e24cf7d9015e0

    SHA256

    73a095ae656b057ab68521de45bdadca5d4f94312312d89c09564b08605ecab3

    SHA512

    1b306e4097c3e7d49c746e0ab4e4587b5a93df370781a6d3194bdd2baf4db540975ebd7a52b3502fd67aae193542df0eeccb504981f64ec5001eec268e672392

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7229973120f09d59b1e7fba22def243e

    SHA1

    cf547b75f6663a08b47e79ddc7f92e78f1836cfc

    SHA256

    4752a467c5ac686a70fbe70ff6cd4d1eaecb793df215861511803d3d9cc65544

    SHA512

    c510aff8fc705e35c81614a752e97680f639dba3a3dcfc5b0621dbd4c9b4d5717d5f4fa90194cd81adaf5f8fba51605fe4e6394d1ada92839d0889d3c8f6e566

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e3b5377dcc5cd53b14c7d90c6182612c

    SHA1

    d0e1dc79216e04ded1e8de48f33068bfb82fa7bd

    SHA256

    ff8e408c1771e52fd00174cb1f96f2bfe4a69c038c8c80e5565a41aeb0c0814a

    SHA512

    d82dc2158a223afdfa55efeaf9d7dabeea98afc1a5e60c7f37162e6aeda1b969e4a4896015e2c801beb4069396c3efee4b201932b3e620ef76d9cfeb5e3e2760

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    336c7d1d769cc5dcc74fff4c71486f83

    SHA1

    dc28c9ac509cdfee0dc4d77d1eb68be98ec4d701

    SHA256

    d13d5cd2212d214942718058264e9146b809b39973804d86286de6ba6a8b3ad8

    SHA512

    296fbb55f703f0ee1804d1b9e2c94aec540b385509e35842c03c49568b7b9aa1ce533ee0076ea351a4eeca9aba223151683aa02dce5ee79c42f5d6ecfb4b5329

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    be4532d9d9352786f50ac73507e35a57

    SHA1

    32dded0798bd0c239822f4a1a5a520efecbc4b80

    SHA256

    82cc95980c0a8001d09e6c20aa440da6949ef40d96dfe43792463a2939fbc3e7

    SHA512

    cf5a735faa8a82f66f6a04e400871ad11da70e9874ef6cfef2dfc75d439ad077c919283bbe25475205add4d951ac9725cd687e8f206f6a6a42498f2e2138c5bc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    99dee94d30ba01da1d72d0db462e6591

    SHA1

    22293c34e4f8126666989fddc06713b06af3c9a6

    SHA256

    f5562dc101498bbf0e8ef639241e0ba8e240f1aa64948e06acadb83eebf3d0d1

    SHA512

    d8051333d70c6e50c29dac033591849b96eeedacf2b47c56aa2a35fcd27682b9651a0bbc04ac414b0d52104c49a55fdbad186c2b4929a320bbe6c7a01a7bd41a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7c7694f727418bfe4c669fa12b449a42

    SHA1

    a8a7677b77caca158cc3b47d7450b4a8730bed18

    SHA256

    e34de097ab0e75aaef965649ccf50740673ec073fdc782ca8e61146fe01721fc

    SHA512

    851d7eb373e126226b9a47618f87bcb19af7971090a564f64dfcdca51e184db15fb2607c76800e43a61dd5c2f32e585f31b1f60bb7b23b674f1dfd886517c1de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bb108f97021ca85d1328e4c36d2c25de

    SHA1

    1ffde3a2f08ec11a26090db2cb84f2fd79d97282

    SHA256

    fb9d3dbb38391af233a58c0c7e8d9f4905198f40de38dc02304527e3b0f1fe29

    SHA512

    24261162568eddcd345cd103202074fa85b1ac2110ea7dc1df6bd7a56f721d60fcf2c9ec06324781eec587523cb9469852b97d111f67e004e1fe5bc1163be294

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2b1589dc06c2d61f273bffc5d98023c4

    SHA1

    8e1c36c60c224d23a82dd9a90adc3085d6365b8e

    SHA256

    c33b40f0e602d0126b3dfcc9be208ac0bbc0b6e0f4aab2ebd1df2db463681562

    SHA512

    27f301781c4ba02ddf62b480fef63f125a64a2b38d9fc1162fa6cfa11fe95c63ce53ea8318a2d3cd79a064d36556b156c2170c3d05fc749b966175178051cbe6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    46c61d05e38772750538fc1f2edbc755

    SHA1

    267692d494524057f5dff993dce3ddc4b956b6c5

    SHA256

    7ef91bbb3c3d8c3713ad9a49a73b63f126cc7b6b8c6790c3266f11e1b3e31b7f

    SHA512

    819aacfd5dc47238be73d4cc0e4c25edaaaa5bfb8b980dcb62274a14b2a763b4f9e6720fd4214b692787be13c06a05905b7ff183ac9f9580214e399fad75a101

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1da38b669a91f2bb4bbb0f8064de2db8

    SHA1

    fdf47fb8528143427ed43e517cd1858385883a97

    SHA256

    6665da337b8f633e71d073d5cb42d76ee46ef65be6923891da08fe3a68b0133d

    SHA512

    8db0ad98a642ef7b6cdc5ae2d4b0e0e5346ca30098d35f45887ccdcf1c77dcac56d1e779acfbc06cb2cfed95b353d145924d9ac7ff8bf227799bc3002c7b75e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7b069871d658f3a94af815bac57240b4

    SHA1

    3d60ae4f180389d3320b0870af116a54aa3e000e

    SHA256

    180653171f01116f6eabcfa1ec111e1867ebf137f72721dc1861e158940ae4a3

    SHA512

    81a9c15f6963b8b741198a3a7739da843d9f8671612c98bf387f3e34146127a1bc7f5c49e508f45813b5b1610011662438a1ed6939d500a2837c52330602f83f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c3d197f0b900828ed8e5777ca89a22f7

    SHA1

    b81faa691e9aefcb7ab643725687374b4056ba22

    SHA256

    ed7aa5befd3f24d81208d81553c5322243fe704cafb70f00a833e30ad535a876

    SHA512

    9128386549946490bf4584fc6e2ac9f9bca77ce9afa32618deaa4ca04e29ad0a249da2caf50db294e8d53608ebd2fb6f675ffa8d48b36e1e83261fbb63eeed05

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    17d0a804351ef4e49f7494bffe78ab31

    SHA1

    5234be2f1f0438d469b37b221c293c95aafb1f2c

    SHA256

    49a7dcc0e793fe9e1fa9dc9df5e29d1a1e5a86ef144f25703c72c5f194c90b37

    SHA512

    9dc39338dc3822000032f8b504203cdbd17f55e191d806de3f19f359563c0165dfe154aac0280ae8e2b7874d5fcf6b4ef50e15841b8b32827c76d4fbd64867c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f85ba7afa5f2e38771b90d0fba80c3a7

    SHA1

    5c18095f41a26c1def6ad48c38140e3ecf6cf310

    SHA256

    9ee6c25b6f2bc87727d4527aae5e79ec97761d4a60694a6c7b61ce14663aea11

    SHA512

    5e899f30cdb22da498cde27a597400641434d7f0f7316371bf3d8c8b850a2ba0ea62073f17f6ab6347f51083ff72909a079ab3765e681a7aa8182d9b162f293a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc89745f061ec97ce8d6aa7b7a6c40ca

    SHA1

    a4f3e52d7eae79285547ea43c80c8fceb3aa0b7f

    SHA256

    2cacab00b0240e5e4e6f6087056458739b29306bdffc6c8b0cf769d468db5ac1

    SHA512

    faddbc51c136421903efda5b829ee10764e5c1f0648b0acda81d39a782adb100e131ee8720d0c795a55bd41b9b76eb916e240a9e21fa2bdb94ac8f41a3b039b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9623956ef74ec2c40efefc5db01e3b16

    SHA1

    16163528ba4bbd1b0e8f9740c1ade55d7f8c0963

    SHA256

    ec0d452b23dac33907981494810b0435a6f7baac1b8c21c8648b570ccedf5e49

    SHA512

    c2b65128b00874fbcdb81a0ce460eea933fd493119714f27b8875e75e85840dad8b301cb95fccee8d6c084113cea1cfef85ae864716ea3d38b90a34a105d9809

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0d4c33dae0ef45d250c35487a2ef71b5

    SHA1

    2419d294a1bfb2c6b3b400aed625e6c3e561c564

    SHA256

    b7e344476297b79e6f094a11708d967e66cd85e36f076d89032f28b5736c82db

    SHA512

    1fb8bfadd29f92c57681d20491e0953f5d51278674b5a9cb14f65da570d6e0afb881e8ea7d1b1d5b1a52ff92540ffb4f6ca1f403e582a90b74b74650a4b54102

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bd142249bb58bab2b66edc7c14a8f7d0

    SHA1

    cea0b6b1d29ff9ca0ba1789cf5b73021b03e6641

    SHA256

    853e7a9ab30bfdd3a7e39aff8a573fa46e81b4cc4998e80229514d051654375f

    SHA512

    1078f27c268344c59bf183f93e75da42c062241069cedbb1c8a1a1d61cd54cb388d98ebc65f49fa2dd056bbbeb01b30fac537b693ac37bada21fe2e9d987bc35

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d65e18fc0b19c7a9f7ff665c88d92619

    SHA1

    e2995b4fbd7338c99cdeab03368c6b6f7add110e

    SHA256

    60921829c2219b1f2c6364c41fdf88876cccb93f326caf42f5d4a70cf3b3300c

    SHA512

    baccf4e2440d7f474c5ef09e60ee87234b7d38f1006e73bc7695b72d68203eb601c6c618d5f6696c879588e4c73c84ec4e903c8e297d82552cdd837095850370

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f9a6cd41752930e86f2dd907277863f6

    SHA1

    025550582d6285696532b02fd94403401fc403d3

    SHA256

    6c877fa6084c5bd883991b2118d668a46f01cef5dd336b8ac36db0c4bcf1f46f

    SHA512

    c4544d3d53d2965843563a4e1bb026b17ddf9223df2d5bc486282a690df3172793795f95eddf37afeea2728780210da7f33f83089ff5f7806e5ae394e79d7988

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2271cbaba09bad9384c7e2a7efcece39

    SHA1

    b4a8f2e015f45315c9f1436db1960c5b818b03eb

    SHA256

    e40d90ffc2b121f6104c569bfac0dc9b2cefd90811244a42753348ef30c60e70

    SHA512

    cf40c1e7f98896ab41d88c2a26793bb50991b5b605c9683ebb00bf0ec86711b7fbb9d85c840dcf322dc273a2765da7d7f22013492adbf462af1493871c7383d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    634ff67be1cd8491364f1854cc68ae9f

    SHA1

    b334d914e1c4e5092144b4c2abca1ebdcebd789b

    SHA256

    e432aadf188a977ec57c3bb0fc73cdb505cd34357d752a01052722bde1ea8552

    SHA512

    ccbeedb2d837931a93ad256929cba4fa38daeb1c4df6186ab466cdb2d200237b59691353d4d09a52ba83b00f5490f17e945c9faa345543b29e71ded0551b30c4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d97e8fb54ac29c3a3a6cc50c8e3e5c0d

    SHA1

    25f7a9c359d0d4ecd538ba3f590146804c161c32

    SHA256

    3d38468007bf643639c29937979d744e452e7b53000564ed13f3e7e1495ddcde

    SHA512

    24ac9f08d8f73b7a4ea10155cf383271baaa3d1cd93846098c9c540ba39ac334668268703b99804bc017feca61dc4bf83dfeb9f8e22f7057c5b964d8dbf946a0

  • C:\Users\Admin\AppData\Local\Temp\Cab8BED.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe - Shortcut.lnk

    Filesize

    1KB

    MD5

    5644490605d6df42051367c896630626

    SHA1

    8eab5187ccbaceffbd57012ea696e79a7be63b8e

    SHA256

    ad6ff681280b6e80ade145c353309e2ae1af4f07bdc27e7885ee6e4e9c14f476

    SHA512

    b7705e43a8b26160f84833f7f71efac685e792d320bc6977169c857776c1449547fbe750d69e70ed1d321313faf43e49b329f313623f01d4fed5d50eb61ce7ec

  • C:\Users\Admin\AppData\Local\Temp\Tar8BFF.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\TmpF6DE.tmp

    Filesize

    2KB

    MD5

    1420d30f964eac2c85b2ccfe968eebce

    SHA1

    bdf9a6876578a3e38079c4f8cf5d6c79687ad750

    SHA256

    f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

    SHA512

    6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

  • memory/2132-35-0x0000000073EF0000-0x00000000745DE000-memory.dmp

    Filesize

    6.9MB

  • memory/2132-19-0x0000000073EF0000-0x00000000745DE000-memory.dmp

    Filesize

    6.9MB

  • memory/2132-18-0x0000000073EFE000-0x0000000073EFF000-memory.dmp

    Filesize

    4KB

  • memory/2132-0-0x0000000073EFE000-0x0000000073EFF000-memory.dmp

    Filesize

    4KB

  • memory/2132-2-0x0000000073EF0000-0x00000000745DE000-memory.dmp

    Filesize

    6.9MB

  • memory/2132-1-0x0000000000CC0000-0x0000000000D12000-memory.dmp

    Filesize

    328KB