Analysis

  • max time kernel
    26s
  • max time network
    37s
  • platform
    windows11_x64
  • resource
    win11
  • submitted
    14-09-2021 19:40

General

  • Target

    installer.exe

  • Size

    598KB

  • MD5

    239394fafc18ebb639f8fad447bdb0af

  • SHA1

    e4ffb14ea1ad842d144bf829cbcfa27461ba8981

  • SHA256

    9cb48f855afbd1e83c9ba2060592b4da0a8cf3a57f5a37fcf5aa27effcc878a4

  • SHA512

    b2da692e0dafd618c8f4301aa7f6e5903663931345211b688599de7641cdd883fffc691cb744720281a033fdd33f36c187d72328b1b0296491dbe4516aa0bc15

Malware Config

Extracted

Family

redline

Botnet

H

C2

185.180.231.69:2796

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 1 IoCs
  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 40 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\installer.exe
    "C:\Users\Admin\AppData\Local\Temp\installer.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4736
    • C:\Users\Admin\AppData\Local\Temp\installer.exe
      "C:\Users\Admin\AppData\Local\Temp\installer.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4148
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 1076
      2⤵
      • Program crash
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4608
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4736 -ip 4736
    1⤵
    • Suspicious use of NtCreateProcessExOtherParentProcess
    • Suspicious use of WriteProcessMemory
    PID:3696
  • C:\Windows\System32\sihclient.exe
    C:\Windows\System32\sihclient.exe /cv 92GwURs0+UOTl7UTHcO7Cw.0.2
    1⤵
    • Modifies data under HKEY_USERS
    PID:4700

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4148-161-0x00000000052B0000-0x00000000052B1000-memory.dmp
    Filesize

    4KB

  • memory/4148-168-0x0000000009170000-0x0000000009171000-memory.dmp
    Filesize

    4KB

  • memory/4148-173-0x0000000004EB0000-0x0000000005456000-memory.dmp
    Filesize

    5.6MB

  • memory/4148-172-0x0000000009630000-0x0000000009631000-memory.dmp
    Filesize

    4KB

  • memory/4148-162-0x0000000005D10000-0x0000000005D11000-memory.dmp
    Filesize

    4KB

  • memory/4148-171-0x0000000009480000-0x0000000009481000-memory.dmp
    Filesize

    4KB

  • memory/4148-152-0x0000000000000000-mapping.dmp
  • memory/4148-163-0x0000000005400000-0x0000000005401000-memory.dmp
    Filesize

    4KB

  • memory/4148-170-0x00000000090C0000-0x00000000090C1000-memory.dmp
    Filesize

    4KB

  • memory/4148-155-0x0000000000400000-0x0000000000401000-memory.dmp
    Filesize

    4KB

  • memory/4148-158-0x0000000006030000-0x0000000006031000-memory.dmp
    Filesize

    4KB

  • memory/4148-160-0x0000000005080000-0x0000000005081000-memory.dmp
    Filesize

    4KB

  • memory/4148-169-0x0000000009870000-0x0000000009871000-memory.dmp
    Filesize

    4KB

  • memory/4148-167-0x0000000004D60000-0x0000000004D61000-memory.dmp
    Filesize

    4KB

  • memory/4148-153-0x0000000000400000-0x0000000000466000-memory.dmp
    Filesize

    408KB

  • memory/4148-164-0x0000000007A80000-0x0000000007A81000-memory.dmp
    Filesize

    4KB

  • memory/4148-166-0x0000000004EB0000-0x0000000005456000-memory.dmp
    Filesize

    5.6MB

  • memory/4148-165-0x0000000005F80000-0x0000000005F81000-memory.dmp
    Filesize

    4KB

  • memory/4736-150-0x00000000051B0000-0x00000000051EA000-memory.dmp
    Filesize

    232KB

  • memory/4736-147-0x00000000056C0000-0x00000000056C1000-memory.dmp
    Filesize

    4KB

  • memory/4736-148-0x0000000005110000-0x0000000005111000-memory.dmp
    Filesize

    4KB

  • memory/4736-154-0x0000000005210000-0x0000000005213000-memory.dmp
    Filesize

    12KB

  • memory/4736-151-0x00000000050F0000-0x00000000050F1000-memory.dmp
    Filesize

    4KB

  • memory/4736-149-0x0000000005250000-0x0000000005251000-memory.dmp
    Filesize

    4KB

  • memory/4736-146-0x0000000000590000-0x0000000000591000-memory.dmp
    Filesize

    4KB