Analysis
-
max time kernel
121s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 16:54
Static task
static1
Behavioral task
behavioral1
Sample
Netflix Checker v0.2.2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Netflix Checker v0.2.2.exe
Resource
win10v2004-20241007-en
General
-
Target
Netflix Checker v0.2.2.exe
-
Size
1.3MB
-
MD5
a4327898c6814b4c3abfff706d1190a1
-
SHA1
e77787afb0ef28c577f133c5df3afa6f6235d83f
-
SHA256
06d0ec937e36ab2c995ee8fda4ea3299dcd5764c31ed4d6248f12d7d709e11a0
-
SHA512
f211a015cfddee4ad2eb68221ae277368f7d2091d4ffe450ca3c3c9ed0b6ea6f44a57b9e8918a2f9ed89018748858eb150138df7a36462aa9e9cf1688220c852
-
SSDEEP
6144:dwjTEJu+ax2jFVQ4KjaklytOkRiJhtO07OCtO:dwjIJuDx2HQ4QgiJ3
Malware Config
Extracted
redline
Diamotrix
176.111.174.140:1912
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x00090000000173fc-35.dat family_redline behavioral1/memory/2548-37-0x00000000012E0000-0x0000000001332000-memory.dmp family_redline -
Redline family
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 2300 sysappec.exe 2596 Netflix Checker.exe 2548 23A7.tmp.x.exe -
Loads dropped DLL 2 IoCs
pid Process 780 Netflix Checker v0.2.2.exe 780 Netflix Checker v0.2.2.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Roaming\\F761AE1969052312027626\\F761AE1969052312027626.exe" sysappec.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 23A7.tmp.x.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2300 sysappec.exe 1208 Explorer.EXE 2548 23A7.tmp.x.exe 2548 23A7.tmp.x.exe 2548 23A7.tmp.x.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2300 sysappec.exe Token: SeSecurityPrivilege 2300 sysappec.exe Token: SeTakeOwnershipPrivilege 2300 sysappec.exe Token: SeLoadDriverPrivilege 2300 sysappec.exe Token: SeSystemProfilePrivilege 2300 sysappec.exe Token: SeSystemtimePrivilege 2300 sysappec.exe Token: SeProfSingleProcessPrivilege 2300 sysappec.exe Token: SeIncBasePriorityPrivilege 2300 sysappec.exe Token: SeCreatePagefilePrivilege 2300 sysappec.exe Token: SeBackupPrivilege 2300 sysappec.exe Token: SeRestorePrivilege 2300 sysappec.exe Token: SeShutdownPrivilege 2300 sysappec.exe Token: SeDebugPrivilege 2300 sysappec.exe Token: SeSystemEnvironmentPrivilege 2300 sysappec.exe Token: SeRemoteShutdownPrivilege 2300 sysappec.exe Token: SeUndockPrivilege 2300 sysappec.exe Token: SeManageVolumePrivilege 2300 sysappec.exe Token: 33 2300 sysappec.exe Token: 34 2300 sysappec.exe Token: 35 2300 sysappec.exe Token: SeDebugPrivilege 2300 sysappec.exe Token: SeShutdownPrivilege 1208 Explorer.EXE Token: SeDebugPrivilege 2548 23A7.tmp.x.exe Token: SeShutdownPrivilege 1208 Explorer.EXE Token: SeShutdownPrivilege 1208 Explorer.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 780 wrote to memory of 2300 780 Netflix Checker v0.2.2.exe 31 PID 780 wrote to memory of 2300 780 Netflix Checker v0.2.2.exe 31 PID 780 wrote to memory of 2300 780 Netflix Checker v0.2.2.exe 31 PID 780 wrote to memory of 2596 780 Netflix Checker v0.2.2.exe 32 PID 780 wrote to memory of 2596 780 Netflix Checker v0.2.2.exe 32 PID 780 wrote to memory of 2596 780 Netflix Checker v0.2.2.exe 32 PID 2300 wrote to memory of 1208 2300 sysappec.exe 21 PID 1208 wrote to memory of 2548 1208 Explorer.EXE 34 PID 1208 wrote to memory of 2548 1208 Explorer.EXE 34 PID 1208 wrote to memory of 2548 1208 Explorer.EXE 34 PID 1208 wrote to memory of 2548 1208 Explorer.EXE 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\Netflix Checker v0.2.2.exe"C:\Users\Admin\AppData\Local\Temp\Netflix Checker v0.2.2.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Users\Admin\AppData\Roaming\sysappec.exe"C:\Users\Admin\AppData\Roaming\sysappec.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2300
-
-
C:\Users\Admin\AppData\Local\Temp\Netflix Checker.exe"Netflix Checker.exe"3⤵
- Executes dropped EXE
PID:2596
-
-
-
C:\Users\Admin\AppData\Local\Temp\23A7.tmp.x.exe"C:\Users\Admin\AppData\Local\Temp\23A7.tmp.x.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2548
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300KB
MD597eb7baa28471ec31e5373fcd7b8c880
SHA1397efcd2fae0589e9e29fc2153ffb18a86a9b709
SHA2569053b6bbaf941a840a7af09753889873e51f9b15507990979537b6c982d618cb
SHA512323389357a9ffc5e96f5d6ef78ceb2ec5c62e4dcc1e868524b4188aff2497810ad16de84e498a3e49640ad0d58eadf2ba9c6ec24e512aa64d319331f003d7ced
-
Filesize
751KB
MD5c281afd76e71557e53a1b90a42a30c0f
SHA14531733877d48ccef6d63c8834776dfb9d2c412d
SHA2566fd0cfcb7c15612d415a89901bffd3187792056c963ceba586a1359b0aa88971
SHA5123c25bd4b72190144fcd419048a1fdeb2adb0d44e53673268b73d3056151fb53a7b7072e5ea8f072b39ca3132ca02b3e328c65a8eb4370c323b11743cc17144bf
-
Filesize
25KB
MD5b99a85f8ca740de99e7be9e48ec3b583
SHA1957f9e3118643940e34890ef93331853583278bf
SHA2569e3cd0ec2efeaf37b93aa63c995ebbe8bc5c57fc91a693e8d82ab2e6066e07f3
SHA51238fafc87cc391092b9d05faf4d81eb3b2ca4cb618fba75165b12a4a620945de69ed4faa2e042e0a8d166d399dd9f71095da887293f9ff5bc80e2d6845e0998e1