Analysis

  • max time kernel
    121s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2024 16:54

General

  • Target

    Netflix Checker v0.2.2.exe

  • Size

    1.3MB

  • MD5

    a4327898c6814b4c3abfff706d1190a1

  • SHA1

    e77787afb0ef28c577f133c5df3afa6f6235d83f

  • SHA256

    06d0ec937e36ab2c995ee8fda4ea3299dcd5764c31ed4d6248f12d7d709e11a0

  • SHA512

    f211a015cfddee4ad2eb68221ae277368f7d2091d4ffe450ca3c3c9ed0b6ea6f44a57b9e8918a2f9ed89018748858eb150138df7a36462aa9e9cf1688220c852

  • SSDEEP

    6144:dwjTEJu+ax2jFVQ4KjaklytOkRiJhtO07OCtO:dwjIJuDx2HQ4QgiJ3

Malware Config

Extracted

Family

redline

Botnet

Diamotrix

C2

176.111.174.140:1912

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 25 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1208
    • C:\Users\Admin\AppData\Local\Temp\Netflix Checker v0.2.2.exe
      "C:\Users\Admin\AppData\Local\Temp\Netflix Checker v0.2.2.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:780
      • C:\Users\Admin\AppData\Roaming\sysappec.exe
        "C:\Users\Admin\AppData\Roaming\sysappec.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2300
      • C:\Users\Admin\AppData\Local\Temp\Netflix Checker.exe
        "Netflix Checker.exe"
        3⤵
        • Executes dropped EXE
        PID:2596
    • C:\Users\Admin\AppData\Local\Temp\23A7.tmp.x.exe
      "C:\Users\Admin\AppData\Local\Temp\23A7.tmp.x.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\23A7.tmp.x.exe

    Filesize

    300KB

    MD5

    97eb7baa28471ec31e5373fcd7b8c880

    SHA1

    397efcd2fae0589e9e29fc2153ffb18a86a9b709

    SHA256

    9053b6bbaf941a840a7af09753889873e51f9b15507990979537b6c982d618cb

    SHA512

    323389357a9ffc5e96f5d6ef78ceb2ec5c62e4dcc1e868524b4188aff2497810ad16de84e498a3e49640ad0d58eadf2ba9c6ec24e512aa64d319331f003d7ced

  • C:\Users\Admin\AppData\Local\Temp\Netflix Checker.exe

    Filesize

    751KB

    MD5

    c281afd76e71557e53a1b90a42a30c0f

    SHA1

    4531733877d48ccef6d63c8834776dfb9d2c412d

    SHA256

    6fd0cfcb7c15612d415a89901bffd3187792056c963ceba586a1359b0aa88971

    SHA512

    3c25bd4b72190144fcd419048a1fdeb2adb0d44e53673268b73d3056151fb53a7b7072e5ea8f072b39ca3132ca02b3e328c65a8eb4370c323b11743cc17144bf

  • \Users\Admin\AppData\Roaming\sysappec.exe

    Filesize

    25KB

    MD5

    b99a85f8ca740de99e7be9e48ec3b583

    SHA1

    957f9e3118643940e34890ef93331853583278bf

    SHA256

    9e3cd0ec2efeaf37b93aa63c995ebbe8bc5c57fc91a693e8d82ab2e6066e07f3

    SHA512

    38fafc87cc391092b9d05faf4d81eb3b2ca4cb618fba75165b12a4a620945de69ed4faa2e042e0a8d166d399dd9f71095da887293f9ff5bc80e2d6845e0998e1

  • memory/1208-29-0x0000000004210000-0x0000000004262000-memory.dmp

    Filesize

    328KB

  • memory/1208-22-0x0000000002ED0000-0x0000000002F14000-memory.dmp

    Filesize

    272KB

  • memory/1208-21-0x0000000002ED0000-0x0000000002F14000-memory.dmp

    Filesize

    272KB

  • memory/1208-24-0x0000000004210000-0x0000000004262000-memory.dmp

    Filesize

    328KB

  • memory/1208-32-0x0000000077790000-0x0000000077791000-memory.dmp

    Filesize

    4KB

  • memory/2548-37-0x00000000012E0000-0x0000000001332000-memory.dmp

    Filesize

    328KB

  • memory/2596-20-0x000007FEF5D30000-0x000007FEF671C000-memory.dmp

    Filesize

    9.9MB

  • memory/2596-27-0x000007FEF5D30000-0x000007FEF671C000-memory.dmp

    Filesize

    9.9MB

  • memory/2596-28-0x000000001AAE0000-0x000000001AB60000-memory.dmp

    Filesize

    512KB

  • memory/2596-26-0x000007FEF5D33000-0x000007FEF5D34000-memory.dmp

    Filesize

    4KB

  • memory/2596-25-0x000000001AAE0000-0x000000001AB60000-memory.dmp

    Filesize

    512KB

  • memory/2596-19-0x00000000011A0000-0x0000000001262000-memory.dmp

    Filesize

    776KB

  • memory/2596-18-0x000007FEF5D33000-0x000007FEF5D34000-memory.dmp

    Filesize

    4KB