Analysis

  • max time kernel
    143s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2024 18:09

General

  • Target

    142a2665fecb3dba09c1e4aa85b8c0d7.exe

  • Size

    920KB

  • MD5

    142a2665fecb3dba09c1e4aa85b8c0d7

  • SHA1

    d7e8bc456caa0f7e6e9af5229e86b409253d5c06

  • SHA256

    5a227bf354dbad129be8c6e1b82eca5bbe6f27587a522fd5fa9e30bdd61b8618

  • SHA512

    0d99edc929b6864b3c1c7c0f37586bc91e53e5676ae6fd9fd5bd2f303296e0781f771e495fc9363e575d5f79f0d0b4be194a0c1d02844a70778c57d3ee65775d

  • SSDEEP

    24576:FvUxOo74WAZ6QsoZIFhWZHNd8JE9wvUyX6:foUWAMToZCsHNdGYk+

Malware Config

Extracted

Family

redline

Botnet

L0GZ

C2

93.185.156.125:1912

Extracted

Family

strrat

C2

93.185.156.124:1912

127.0.0.1:1912

Attributes
  • license_id

    khonsari

  • plugins_url

    http://jbfrost.live/strigoi/server/?hwid=1&lid=m&ht=5

  • scheduled_task

    true

  • secondary_startup

    true

  • startup

    true

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • STRRAT

    STRRAT is a remote access tool than can steal credentials and log keystrokes.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\142a2665fecb3dba09c1e4aa85b8c0d7.exe
    "C:\Users\Admin\AppData\Local\Temp\142a2665fecb3dba09c1e4aa85b8c0d7.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Users\Admin\AppData\Local\Temp\142a2665fecb3dba09c1e4aa85b8c0d7.exe
      "C:\Users\Admin\AppData\Local\Temp\142a2665fecb3dba09c1e4aa85b8c0d7.exe"
      2⤵
        PID:3016
      • C:\Users\Admin\AppData\Local\Temp\142a2665fecb3dba09c1e4aa85b8c0d7.exe
        "C:\Users\Admin\AppData\Local\Temp\142a2665fecb3dba09c1e4aa85b8c0d7.exe"
        2⤵
          PID:2452
        • C:\Users\Admin\AppData\Local\Temp\142a2665fecb3dba09c1e4aa85b8c0d7.exe
          "C:\Users\Admin\AppData\Local\Temp\142a2665fecb3dba09c1e4aa85b8c0d7.exe"
          2⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1792
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c start "" "C:\Users\Admin\AppData\Local\Temp\A.jar"
            3⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2736
            • C:\Program Files\Java\jre7\bin\javaw.exe
              "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\A.jar"
              4⤵
                PID:2604
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c start "" "C:\Users\Admin\AppData\Local\Temp\build.exe"
              3⤵
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2820
              • C:\Users\Admin\AppData\Local\Temp\build.exe
                "C:\Users\Admin\AppData\Local\Temp\build.exe"
                4⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2964

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\A.jar

          Filesize

          92KB

          MD5

          105a14c6fce083e80f49b30db88ec915

          SHA1

          46187697a87562210e785917ce6ca16aeb4912b3

          SHA256

          7e5adae008afee158168b1943fcc41157c7de63ab4792cc5eba8d1830edd6d65

          SHA512

          2322eeeb100b644d53641ec3c1b0588579565636a2ea934924931f6f77b156b6d4e5925a2f36b0520e1f568d771860af53e9f3c39bb5238f7e7520389692c963

        • \Users\Admin\AppData\Local\Temp\build.exe

          Filesize

          300KB

          MD5

          c6e5f6c13c19e4f366c2f5c989965833

          SHA1

          5ccf4135651e28b54b7865ecc81a6924ce795371

          SHA256

          db08c075bbe23490deb3f53b954a4751a562e9548c839ce170ff5ea76d059d5a

          SHA512

          ca3cb032164bcc8d561113a409118fbae7da77ac8f29e7f663ac27837338525a82c0d8b482003e4ad76be9c052ccffa79a36249f371d05f1cd32cf29241050fb

        • memory/1792-16-0x0000000000400000-0x0000000000466000-memory.dmp

          Filesize

          408KB

        • memory/1792-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/1792-7-0x0000000000400000-0x0000000000466000-memory.dmp

          Filesize

          408KB

        • memory/1792-8-0x0000000000400000-0x0000000000466000-memory.dmp

          Filesize

          408KB

        • memory/1792-9-0x0000000000400000-0x0000000000466000-memory.dmp

          Filesize

          408KB

        • memory/1792-12-0x0000000000400000-0x0000000000466000-memory.dmp

          Filesize

          408KB

        • memory/2484-6-0x00000000006F0000-0x000000000079C000-memory.dmp

          Filesize

          688KB

        • memory/2484-3-0x00000000007E0000-0x00000000007FE000-memory.dmp

          Filesize

          120KB

        • memory/2484-5-0x0000000074B60000-0x000000007524E000-memory.dmp

          Filesize

          6.9MB

        • memory/2484-4-0x0000000074B6E000-0x0000000074B6F000-memory.dmp

          Filesize

          4KB

        • memory/2484-0-0x0000000074B6E000-0x0000000074B6F000-memory.dmp

          Filesize

          4KB

        • memory/2484-19-0x0000000074B60000-0x000000007524E000-memory.dmp

          Filesize

          6.9MB

        • memory/2484-2-0x0000000074B60000-0x000000007524E000-memory.dmp

          Filesize

          6.9MB

        • memory/2484-1-0x0000000000280000-0x000000000036A000-memory.dmp

          Filesize

          936KB

        • memory/2604-71-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/2604-90-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/2604-65-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/2604-68-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/2604-135-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/2604-74-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/2604-76-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/2604-77-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/2604-79-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/2604-82-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/2604-83-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/2604-87-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/2604-88-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/2604-58-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/2604-93-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/2604-95-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/2604-96-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/2604-98-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/2604-99-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/2604-100-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/2604-109-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/2604-118-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/2604-125-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/2604-124-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/2964-48-0x00000000013B0000-0x0000000001402000-memory.dmp

          Filesize

          328KB