Resubmissions
10-05-2021 10:26
210510-51q2zwvjce 10Analysis
-
max time kernel
104s -
max time network
138s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
10-05-2021 10:26
Static task
static1
Behavioral task
behavioral1
Sample
22F9967C010BF3B752D56BCDEE846BF5.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
22F9967C010BF3B752D56BCDEE846BF5.exe
Resource
win10v20210410
General
-
Target
22F9967C010BF3B752D56BCDEE846BF5.exe
-
Size
612KB
-
MD5
22f9967c010bf3b752d56bcdee846bf5
-
SHA1
688b82c1eb648ee5eea04042da253d77c706f945
-
SHA256
d8a12da66c3b95e1f2dc9c7e5667a5baf7dbdbbaff01f342222dc696c07455fa
-
SHA512
b4dfd895af0f98de30d6446e847e3451c8d8fa7a6571aaac7db3c0fd40febc982e52035af709db3bba68b0e19037ee71443863b25ed3d5dcc13bb0375d69c3c6
Malware Config
Extracted
redline
source1
199.195.251.96:43073
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
resource yara_rule behavioral1/memory/1752-73-0x00000000004163CE-mapping.dmp family_redline behavioral1/memory/1752-72-0x0000000000400000-0x000000000041C000-memory.dmp family_redline behavioral1/memory/1752-74-0x0000000000400000-0x000000000041C000-memory.dmp family_redline -
Executes dropped EXE 1 IoCs
pid Process 1996 File.exe -
Loads dropped DLL 4 IoCs
pid Process 1688 22F9967C010BF3B752D56BCDEE846BF5.exe 1688 22F9967C010BF3B752D56BCDEE846BF5.exe 1688 22F9967C010BF3B752D56BCDEE846BF5.exe 1688 22F9967C010BF3B752D56BCDEE846BF5.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 22F9967C010BF3B752D56BCDEE846BF5.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1996 set thread context of 1752 1996 File.exe 27 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "327414337" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000529101d5c9814b4eb0f580b37542e45000000000020000000000106600000001000020000000a26079a7ed7bad184d6b4becacc01c6ef32f5e72b1ada7db9a765e93e56914af000000000e800000000200002000000055c5c3655f5e8865a96c951b425ca1d7ef1175f4651495ce1bf288599ffce0a3900000001a73f67e946a11841a514ae326b2f7d42647e660a5531999c749ae7c5dcf30e5a2ee682575ebd3ed03cbcb05b699cbe6d208172aeab0f79131c92dd85d4f7f2798b7095019954b4b969fc11f3bacbc6243209d82250acad57e88e557b801ace31d789300750974c1707ec29c0708841af56152cd4ff5a1662b6d798787488c7a4bfc86e39786847f74c432d275270aaa40000000f54dcd09c6843b500b47d1e4246fb61f3bf2156dc145f203fc417b2dd0b7bb09d67f73a3e1f391afedbc2ffb34cca1b834b4e541fb9afe1c54a9eaad7dac8e21 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{69D48731-B18A-11EB-83FC-FEBA24881352} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000529101d5c9814b4eb0f580b37542e45000000000020000000000106600000001000020000000531109fe5160d43c64044a648a2697856cb79d3b2f73c6b533ae9d3986635a95000000000e80000000020000200000003723a0a085714c7d29d188ce3c99e0426aec1b82d68d2c6cb2f3718acfb15dd1200000007c2941a21f9a0a5d2a73edb26632b8224f7d31aea7f834379d8d5f5ec09cbdd440000000e1e493a6486dafed43dc84688eff43b0ffde7e12639b17a9fd7a2da93cc2def6234dad396124fa7e00d85b7f61be1f87b5503bebaae5ea631ba2651821b901a0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f073da429745d701 iexplore.exe -
NTFS ADS 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\RarSFX0\fdjf.url:favicon IEXPLORE.EXE File created C:\Users\Admin\AppData\Local\Temp\wwwA853.tmp\:favicon:$DATA IEXPLORE.EXE File created C:\Users\Admin\AppData\Local\Temp\RarSFX0\fdjf.url\:favicon:$DATA IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1752 AddInProcess32.exe 1752 AddInProcess32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1996 File.exe Token: SeDebugPrivilege 1752 AddInProcess32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1392 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1392 iexplore.exe 1392 iexplore.exe 1520 IEXPLORE.EXE 1520 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1688 wrote to memory of 1996 1688 22F9967C010BF3B752D56BCDEE846BF5.exe 26 PID 1688 wrote to memory of 1996 1688 22F9967C010BF3B752D56BCDEE846BF5.exe 26 PID 1688 wrote to memory of 1996 1688 22F9967C010BF3B752D56BCDEE846BF5.exe 26 PID 1688 wrote to memory of 1996 1688 22F9967C010BF3B752D56BCDEE846BF5.exe 26 PID 1996 wrote to memory of 1752 1996 File.exe 27 PID 1996 wrote to memory of 1752 1996 File.exe 27 PID 1996 wrote to memory of 1752 1996 File.exe 27 PID 1996 wrote to memory of 1752 1996 File.exe 27 PID 1996 wrote to memory of 1752 1996 File.exe 27 PID 1996 wrote to memory of 1752 1996 File.exe 27 PID 1996 wrote to memory of 1752 1996 File.exe 27 PID 1996 wrote to memory of 1752 1996 File.exe 27 PID 1996 wrote to memory of 1752 1996 File.exe 27 PID 1392 wrote to memory of 1520 1392 iexplore.exe 30 PID 1392 wrote to memory of 1520 1392 iexplore.exe 30 PID 1392 wrote to memory of 1520 1392 iexplore.exe 30 PID 1392 wrote to memory of 1520 1392 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\22F9967C010BF3B752D56BCDEE846BF5.exe"C:\Users\Admin\AppData\Local\Temp\22F9967C010BF3B752D56BCDEE846BF5.exe"1⤵
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\File.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\File.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1752
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1392 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:1520
-