Analysis

  • max time kernel
    130s
  • max time network
    139s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    24-05-2021 19:01

General

  • Target

    omar (1).exe

  • Size

    1.2MB

  • MD5

    13db34cab435d9858269c5e823f4b575

  • SHA1

    c6e9c301d3cfaf6671490c47c1ed4eb59f343f21

  • SHA256

    63ca5cde7141ae503639f3022f4dc4a244e8b19bf320d55a9567789aa632d036

  • SHA512

    dfd36c39b35cf1aed2b76e38d4a08c41792611cf886d337d129a19c963878cc53fb7a0d71e078d2d38e61d8341a938869686f62673f080a7182020cd08c2c6a8

Malware Config

Extracted

Family

redline

Botnet

omar

C2

217.12.209.28:44444

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 3 IoCs
  • Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\omar (1).exe
    "C:\Users\Admin\AppData\Local\Temp\omar (1).exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3232
    • C:\Users\Admin\AppData\Local\Temp\omar (1).exe
      "{path}"
      2⤵
        PID:3936
      • C:\Users\Admin\AppData\Local\Temp\omar (1).exe
        "{path}"
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3992
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:2224
      • C:\Windows\system32\mspaint.exe
        "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\HideUnblock.jpg" /ForceBootstrapPaint3D
        1⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:2724
      • C:\Program Files\WindowsApps\Microsoft.MSPaint_1.1702.28017.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe
        "C:\Program Files\WindowsApps\Microsoft.MSPaint_1.1702.28017.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe" -ServerName:Microsoft.MSPaint.AppX437q68k2qc2asvaagas2prv9tjej6ja9.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2140
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 2140 -s 4252
          2⤵
          • Suspicious use of NtCreateProcessExOtherParentProcess
          • Program crash
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4364
      • C:\Windows\system32\mspaint.exe
        "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\HideUnblock.jpg" /ForceBootstrapPaint3D
        1⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:4612
      • C:\Program Files\WindowsApps\Microsoft.MSPaint_1.1702.28017.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe
        "C:\Program Files\WindowsApps\Microsoft.MSPaint_1.1702.28017.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe" -ServerName:Microsoft.MSPaint.AppX437q68k2qc2asvaagas2prv9tjej6ja9.mca
        1⤵
        • Modifies registry class
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:4656
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 4656 -s 4152
          2⤵
          • Suspicious use of NtCreateProcessExOtherParentProcess
          • Program crash
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4888

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3232-116-0x0000000004F80000-0x0000000004F81000-memory.dmp

        Filesize

        4KB

      • memory/3232-117-0x0000000004A80000-0x0000000004A81000-memory.dmp

        Filesize

        4KB

      • memory/3232-118-0x0000000004A20000-0x0000000004A21000-memory.dmp

        Filesize

        4KB

      • memory/3232-119-0x0000000004A80000-0x0000000004F7E000-memory.dmp

        Filesize

        5.0MB

      • memory/3232-120-0x0000000004E50000-0x0000000004E55000-memory.dmp

        Filesize

        20KB

      • memory/3232-121-0x00000000081E0000-0x00000000081E1000-memory.dmp

        Filesize

        4KB

      • memory/3232-122-0x0000000008430000-0x00000000084D7000-memory.dmp

        Filesize

        668KB

      • memory/3232-123-0x000000000AAD0000-0x000000000AB2B000-memory.dmp

        Filesize

        364KB

      • memory/3232-114-0x00000000000D0000-0x00000000000D1000-memory.dmp

        Filesize

        4KB

      • memory/3992-130-0x0000000005080000-0x0000000005081000-memory.dmp

        Filesize

        4KB

      • memory/3992-131-0x00000000050E0000-0x00000000050E1000-memory.dmp

        Filesize

        4KB

      • memory/3992-132-0x0000000005120000-0x0000000005121000-memory.dmp

        Filesize

        4KB

      • memory/3992-133-0x0000000005060000-0x0000000005666000-memory.dmp

        Filesize

        6.0MB

      • memory/3992-134-0x00000000053D0000-0x00000000053D1000-memory.dmp

        Filesize

        4KB

      • memory/3992-129-0x0000000005670000-0x0000000005671000-memory.dmp

        Filesize

        4KB

      • memory/3992-124-0x0000000000400000-0x000000000041C000-memory.dmp

        Filesize

        112KB