Analysis

  • max time kernel
    149s
  • max time network
    159s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    14-07-2021 16:23

General

  • Target

    1cb84d9bebb65cd72ed36cef22e59b8c.exe

  • Size

    485KB

  • MD5

    1cb84d9bebb65cd72ed36cef22e59b8c

  • SHA1

    5c76d0b4d2b723e7d757a539e3f9e257c11162ef

  • SHA256

    fb58621fe07c9c86655bd41a9e643fd98f1d3f0aad7fcc3a39f6c83421ebacac

  • SHA512

    50af1279252f4afa12a13a73f78d55330fed0121a38942218ca4f8f50ff964000c35f8002f051d0f25925ac763745036582e42ff3097fbe51d946ad43a0b4b0e

Malware Config

Extracted

Family

redline

Botnet

1

C2

ynabrdosmc.xyz:80

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 7 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Runs .reg file with regedit 2 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1cb84d9bebb65cd72ed36cef22e59b8c.exe
    "C:\Users\Admin\AppData\Local\Temp\1cb84d9bebb65cd72ed36cef22e59b8c.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\EverestSoftrade\TonerRecover\log.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4012
      • C:\Windows\SysWOW64\explorer.exe
        explorer https://iplogger.org/2BD837
        3⤵
          PID:3592
        • C:\Windows\SysWOW64\regedit.exe
          regedit /s adj.reg
          3⤵
          • Runs .reg file with regedit
          PID:4124
        • C:\Windows\SysWOW64\regedit.exe
          regedit /s adj2.reg
          3⤵
          • Runs .reg file with regedit
          PID:4168
      • C:\Program Files (x86)\EverestSoftrade\TonerRecover\Updater.exe
        "C:\Program Files (x86)\EverestSoftrade\TonerRecover\Updater.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3044
        • C:\Program Files (x86)\EverestSoftrade\TonerRecover\Updater.exe
          "C:\Program Files (x86)\EverestSoftrade\TonerRecover\Updater.exe"
          3⤵
          • Executes dropped EXE
          PID:4912
        • C:\Program Files (x86)\EverestSoftrade\TonerRecover\Updater.exe
          "C:\Program Files (x86)\EverestSoftrade\TonerRecover\Updater.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:4924
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
        PID:1276
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
        1⤵
        • Drops file in Windows directory
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:3184
      • C:\Windows\system32\browser_broker.exe
        C:\Windows\system32\browser_broker.exe -Embedding
        1⤵
        • Modifies Internet Explorer settings
        PID:2656
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
        1⤵
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4208
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:4284
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
        1⤵
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:4776
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
        1⤵
        • Modifies registry class
        PID:5060
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
        1⤵
        • Modifies registry class
        PID:3592

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      1
      T1082

      Command and Control

      Web Service

      1
      T1102

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\EverestSoftrade\TonerRecover\Updater.exe
        MD5

        7429da7c02ddd73d0d070f9ef56b7a8d

        SHA1

        88242efec692579178de8de851cf885b39d91ee8

        SHA256

        a4ff4c9fd29f03ff5d2d455863948fb841656eff5595e765e44cf5b2f79d27b8

        SHA512

        4db4d712aaf48b2ff84ba4f4489db270ef6858d29de51544e3502f46f1cf864b8cbf06c50398c085c273e3e3b3c10af542490d54fef86e1836fefed0861822ed

      • C:\Program Files (x86)\EverestSoftrade\TonerRecover\Updater.exe
        MD5

        7429da7c02ddd73d0d070f9ef56b7a8d

        SHA1

        88242efec692579178de8de851cf885b39d91ee8

        SHA256

        a4ff4c9fd29f03ff5d2d455863948fb841656eff5595e765e44cf5b2f79d27b8

        SHA512

        4db4d712aaf48b2ff84ba4f4489db270ef6858d29de51544e3502f46f1cf864b8cbf06c50398c085c273e3e3b3c10af542490d54fef86e1836fefed0861822ed

      • C:\Program Files (x86)\EverestSoftrade\TonerRecover\Updater.exe
        MD5

        7429da7c02ddd73d0d070f9ef56b7a8d

        SHA1

        88242efec692579178de8de851cf885b39d91ee8

        SHA256

        a4ff4c9fd29f03ff5d2d455863948fb841656eff5595e765e44cf5b2f79d27b8

        SHA512

        4db4d712aaf48b2ff84ba4f4489db270ef6858d29de51544e3502f46f1cf864b8cbf06c50398c085c273e3e3b3c10af542490d54fef86e1836fefed0861822ed

      • C:\Program Files (x86)\EverestSoftrade\TonerRecover\Updater.exe
        MD5

        7429da7c02ddd73d0d070f9ef56b7a8d

        SHA1

        88242efec692579178de8de851cf885b39d91ee8

        SHA256

        a4ff4c9fd29f03ff5d2d455863948fb841656eff5595e765e44cf5b2f79d27b8

        SHA512

        4db4d712aaf48b2ff84ba4f4489db270ef6858d29de51544e3502f46f1cf864b8cbf06c50398c085c273e3e3b3c10af542490d54fef86e1836fefed0861822ed

      • C:\Program Files (x86)\EverestSoftrade\TonerRecover\adj.reg
        MD5

        d47d2f19c6485d61826df03b0b6efd7d

        SHA1

        a3285ea2c8072a5c9b7b2ff0e255343baab2d81e

        SHA256

        f702cbfc518787caec26189a065e1dfd92c62597d8cd22c58e889151e45a635f

        SHA512

        17fa33c12395da633deb03181bf383e56cb3f40ef0f2fcc4802d0f46829dbce0e65528f4b6b5dfdd88d28aa40502df8a826894ff21a12e18558cd0cc4fe7bf94

      • C:\Program Files (x86)\EverestSoftrade\TonerRecover\adj2.reg
        MD5

        81b371bfb7d48f53e6dce6a3b05f76ba

        SHA1

        a073408555dfd110183313e2b1d41c3a8dfdd4ee

        SHA256

        0fd594d185676181e86c3fb81be116069acb86b6c5839a73b9d5fb197924fd94

        SHA512

        34bf59556bf238e0d15d6f934c8caf28c3313bbadad984370e1f912d2a1e4a1ce6b3e06f7bc5af01df28a2e321b43bfc100f61330c89ec4270dbb4120e5764cc

      • C:\Program Files (x86)\EverestSoftrade\TonerRecover\log.bat
        MD5

        a9cffbd384bdfe7f60627cefff2dc5cc

        SHA1

        2c3bd0931a087e0966002a9464609d74e59b0102

        SHA256

        82bc4bf80ed2b2ffddb0be5be9848feb0d891e14672e7be70e580a5ee3190b16

        SHA512

        d4c7737b7f422a4de76c1f99a595f1aae6bfbd7278e9fc7a2244406bc1d28b5f8719e11d6038b59f9e59025511d45be44330a73ae3fb0b8f714e7b31cd1d25d8

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Updater.exe.log
        MD5

        7438b57da35c10c478469635b79e33e1

        SHA1

        5ffcbdfbfd800f67d6d9d6ee46de2eb13fcbb9a5

        SHA256

        b253c066d4a6604aaa5204b09c1edde92c410b0af351f3760891f5e56c867f70

        SHA512

        5887796f8ceb1c5ae790caff0020084df49ea8d613b78656a47dc9a569c5c86a9b16ec2ebe0d6f34c5e3001026385bb1282434cc3ffc7bda99427c154c04b45a

      • memory/3044-118-0x0000000000710000-0x0000000000711000-memory.dmp
        Filesize

        4KB

      • memory/3044-127-0x00000000028A0000-0x00000000028A7000-memory.dmp
        Filesize

        28KB

      • memory/3044-128-0x0000000005050000-0x0000000005051000-memory.dmp
        Filesize

        4KB

      • memory/3044-129-0x0000000002920000-0x0000000002921000-memory.dmp
        Filesize

        4KB

      • memory/3044-130-0x0000000002940000-0x0000000002941000-memory.dmp
        Filesize

        4KB

      • memory/3044-115-0x0000000000000000-mapping.dmp
      • memory/3592-121-0x0000000000000000-mapping.dmp
      • memory/4012-114-0x0000000000000000-mapping.dmp
      • memory/4124-122-0x0000000000000000-mapping.dmp
      • memory/4168-124-0x0000000000000000-mapping.dmp
      • memory/4924-132-0x0000000000400000-0x0000000000432000-memory.dmp
        Filesize

        200KB

      • memory/4924-133-0x000000000040CD2F-mapping.dmp
      • memory/4924-136-0x0000000001230000-0x000000000124B000-memory.dmp
        Filesize

        108KB

      • memory/4924-137-0x0000000005BB0000-0x0000000005BB1000-memory.dmp
        Filesize

        4KB

      • memory/4924-138-0x0000000003180000-0x0000000003199000-memory.dmp
        Filesize

        100KB

      • memory/4924-139-0x00000000066C0000-0x00000000066C1000-memory.dmp
        Filesize

        4KB

      • memory/4924-140-0x0000000003260000-0x0000000003261000-memory.dmp
        Filesize

        4KB

      • memory/4924-141-0x0000000003300000-0x0000000003301000-memory.dmp
        Filesize

        4KB

      • memory/4924-142-0x00000000056B0000-0x00000000056B1000-memory.dmp
        Filesize

        4KB

      • memory/4924-144-0x00000000032B0000-0x00000000032B1000-memory.dmp
        Filesize

        4KB

      • memory/4924-143-0x0000000000400000-0x0000000000432000-memory.dmp
        Filesize

        200KB

      • memory/4924-145-0x00000000032B2000-0x00000000032B3000-memory.dmp
        Filesize

        4KB

      • memory/4924-146-0x00000000032B3000-0x00000000032B4000-memory.dmp
        Filesize

        4KB

      • memory/4924-147-0x00000000032B4000-0x00000000032B6000-memory.dmp
        Filesize

        8KB

      • memory/4924-148-0x00000000058C0000-0x00000000058C1000-memory.dmp
        Filesize

        4KB