Analysis

  • max time kernel
    141s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-en
  • submitted
    10-09-2021 21:28

General

  • Target

    Fri192c305b4a.exe

  • Size

    1.5MB

  • MD5

    b9d6fa9af107c8f185fa981e9365a3ec

  • SHA1

    77b4459537959d478a4dc9ba64c80d44a278f679

  • SHA256

    37b758e9d8ac0212bde2acff6c6a1d53f0bfcc202f2d129a7ee4e0a4dcac3770

  • SHA512

    a9c631b58686dd0b86c95046709d667fae31dddd7a74b62235840d67d2aa4b2ce1cdc235f87d151c880137ee7d69cb934dc6239aada7de9b532b331b9e54b090

Malware Config

Extracted

Family

redline

Botnet

jane06

C2

94.103.94.214:29899

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Fri192c305b4a.exe
    "C:\Users\Admin\AppData\Local\Temp\Fri192c305b4a.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Users\Admin\AppData\Local\Temp\tmp5C53_tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp5C53_tmp.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:372
      • C:\Windows\SysWOW64\dllhost.exe
        dllhost.exe
        3⤵
          PID:684
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c cmd < Attesa.wmv
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:772
          • C:\Windows\SysWOW64\cmd.exe
            cmd
            4⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:112
            • C:\Windows\SysWOW64\findstr.exe
              findstr /V /R "^VksJcWfNcDMqfgfCCoOQaENLrlkioAEZRevWUFgpnuTZyylQxdxsqDodbFGlKiEVZMohRaHWUFajKOGYZxNRyhZgTymgZtndBYqaWXYwInbclWFIZIldx$" Braccio.wmv
              5⤵
                PID:1796
              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Adorarti.exe.com
                Adorarti.exe.com u
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of WriteProcessMemory
                PID:580
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Adorarti.exe.com
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Adorarti.exe.com u
                  6⤵
                  • Executes dropped EXE
                  • Drops startup file
                  • Loads dropped DLL
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: MapViewOfSection
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of WriteProcessMemory
                  PID:636
                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe
                    7⤵
                    • Executes dropped EXE
                    PID:1848
                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe
                    7⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1636
              • C:\Windows\SysWOW64\PING.EXE
                ping localhost
                5⤵
                • Runs ping.exe
                PID:1496

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      1
      T1112

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      1
      T1082

      Remote System Discovery

      1
      T1018

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Adorarti.exe.com
        MD5

        c56b5f0201a3b3de53e561fe76912bfd

        SHA1

        2a4062e10a5de813f5688221dbeb3f3ff33eb417

        SHA256

        237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

        SHA512

        195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Adorarti.exe.com
        MD5

        c56b5f0201a3b3de53e561fe76912bfd

        SHA1

        2a4062e10a5de813f5688221dbeb3f3ff33eb417

        SHA256

        237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

        SHA512

        195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Adorarti.exe.com
        MD5

        c56b5f0201a3b3de53e561fe76912bfd

        SHA1

        2a4062e10a5de813f5688221dbeb3f3ff33eb417

        SHA256

        237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

        SHA512

        195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Attesa.wmv
        MD5

        1708e123cef16c0ebc0ec0a74c3abc7e

        SHA1

        e02fb9b5ffe06ef360142ec1316b301f42efef6b

        SHA256

        0d9b3b98f58a4630a86fd32ea957f262ecab5b4a523ff5adb326d451c726da43

        SHA512

        3927ea2be312aad9fd27e511bf9a94c8411d65359352c2369df803412a47101ef4fab7e636e79c7e11a5d8ce90aab617f4c115dd8c86b234d396dafb3581af57

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Braccio.wmv
        MD5

        21ee2a7d988d7196cccef916a8018f17

        SHA1

        984bbf626cc76a6ec66fd577a7aee86320416658

        SHA256

        8308b0b408c1b46ccc7e11d4644dd6f07bf8f250c500259953650ee62bd8996c

        SHA512

        734df8c648cc1e740da42672344b4f4a5e0f9b145147a9f7640d783843194665d1c38b08394b029d6a1080817ff481198bb60d26c0fbded83325c19420d18902

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Mia.wmv
        MD5

        0e03032f9ce2cd8d30fc7c03e8b1b6f4

        SHA1

        17a4b85fa589a1c2326b38d1ff12b76ffb9ef460

        SHA256

        54d9b0a0221a365c4ed91d5ac1115aebc6e4bd64326f4451b0c2791597d74fc8

        SHA512

        7bb0bed2f2579bf55f5232d3884fa5592239e077be0726f79bf95b3f5adae0fe8e714144e4da0d18cef4d69b540f64502e3c5e22d67d4633d354822a739ad73c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Rarissima.wmv
        MD5

        e041fcbeb695c33065f08fbefc998a48

        SHA1

        a3d68dfbd5516aba8b053b8da960df5af3672ed3

        SHA256

        e7641802859a938e433e93aeb4490996b8a02365100bb541f03a84961c9e612a

        SHA512

        0e54dba0d808ea9590ad365ad10ec3ef77ca04a3cb85022525013ba2208b12df3c4eb6a2bff950aab501bfa5488ade7db5057ec45e9511990bfb249c4e855569

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe
        MD5

        b58b926c3574d28d5b7fdd2ca3ec30d5

        SHA1

        d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

        SHA256

        6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

        SHA512

        b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe
        MD5

        b58b926c3574d28d5b7fdd2ca3ec30d5

        SHA1

        d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

        SHA256

        6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

        SHA512

        b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe
        MD5

        b58b926c3574d28d5b7fdd2ca3ec30d5

        SHA1

        d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

        SHA256

        6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

        SHA512

        b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\u
        MD5

        e041fcbeb695c33065f08fbefc998a48

        SHA1

        a3d68dfbd5516aba8b053b8da960df5af3672ed3

        SHA256

        e7641802859a938e433e93aeb4490996b8a02365100bb541f03a84961c9e612a

        SHA512

        0e54dba0d808ea9590ad365ad10ec3ef77ca04a3cb85022525013ba2208b12df3c4eb6a2bff950aab501bfa5488ade7db5057ec45e9511990bfb249c4e855569

      • C:\Users\Admin\AppData\Local\Temp\tmp5C53_tmp.exe
        MD5

        7d0957ec9f3546557c71d4ea7bf04038

        SHA1

        3a581680722106c65de14212f05ee9f14a5c7a46

        SHA256

        52b103a31f03ba940cf56a290837c3686b264f772e11628e87f631945987c37d

        SHA512

        550cf795257570cce06c31d153634ea5ab887c64db098ad1fe91f1a7410acc2ff8e52f011cdbf3215dcb0b70c585fb50b9b01a8db003230fdbd41cf6f1195ab4

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Adorarti.exe.com
        MD5

        c56b5f0201a3b3de53e561fe76912bfd

        SHA1

        2a4062e10a5de813f5688221dbeb3f3ff33eb417

        SHA256

        237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

        SHA512

        195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Adorarti.exe.com
        MD5

        c56b5f0201a3b3de53e561fe76912bfd

        SHA1

        2a4062e10a5de813f5688221dbeb3f3ff33eb417

        SHA256

        237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

        SHA512

        195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe
        MD5

        b58b926c3574d28d5b7fdd2ca3ec30d5

        SHA1

        d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

        SHA256

        6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

        SHA512

        b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe
        MD5

        b58b926c3574d28d5b7fdd2ca3ec30d5

        SHA1

        d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

        SHA256

        6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

        SHA512

        b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe
        MD5

        b58b926c3574d28d5b7fdd2ca3ec30d5

        SHA1

        d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

        SHA256

        6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

        SHA512

        b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

      • memory/112-64-0x0000000000000000-mapping.dmp
      • memory/372-59-0x0000000000000000-mapping.dmp
      • memory/580-69-0x0000000000000000-mapping.dmp
      • memory/580-72-0x0000000076071000-0x0000000076073000-memory.dmp
        Filesize

        8KB

      • memory/636-91-0x00000000001C0000-0x00000000001C2000-memory.dmp
        Filesize

        8KB

      • memory/636-76-0x0000000000000000-mapping.dmp
      • memory/636-80-0x00000000001B0000-0x00000000001B1000-memory.dmp
        Filesize

        4KB

      • memory/684-61-0x0000000000000000-mapping.dmp
      • memory/772-62-0x0000000000000000-mapping.dmp
      • memory/1376-58-0x0000000000A86000-0x0000000000AA5000-memory.dmp
        Filesize

        124KB

      • memory/1376-53-0x00000000011E0000-0x00000000011E1000-memory.dmp
        Filesize

        4KB

      • memory/1376-57-0x000000001A8E0000-0x000000001A95E000-memory.dmp
        Filesize

        504KB

      • memory/1376-56-0x0000000000A80000-0x0000000000A82000-memory.dmp
        Filesize

        8KB

      • memory/1376-55-0x0000000000140000-0x000000000014B000-memory.dmp
        Filesize

        44KB

      • memory/1496-71-0x0000000000000000-mapping.dmp
      • memory/1636-84-0x000000000041C5DA-mapping.dmp
      • memory/1636-89-0x0000000000400000-0x0000000000422000-memory.dmp
        Filesize

        136KB

      • memory/1636-92-0x0000000004CA0000-0x0000000004CA1000-memory.dmp
        Filesize

        4KB

      • memory/1796-65-0x0000000000000000-mapping.dmp