Analysis

  • max time kernel
    610s
  • max time network
    1556s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    22-10-2021 14:39

General

  • Target

    Fri05f84fa77402bf.exe

  • Size

    394KB

  • MD5

    8e0abf31bbb7005be2893af10fcceaa9

  • SHA1

    a48259c2346d7aed8cf14566d066695a8c2db55c

  • SHA256

    2df6cc430475ae053ad2772a3a9d1de1a03af31c3ebfdd0e5d5bd7fbdc61866a

  • SHA512

    ba76470f4896e6bdac508e6a901b352a3bf731ab5680b9931cc1a8c874482cf0c19a374a6a58dda5237178c1861509529a5174bf76fa768efac7989dbc1c1970

Malware Config

Extracted

Family

redline

Botnet

ChrisNEW

C2

194.104.136.5:46013

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Fri05f84fa77402bf.exe
    "C:\Users\Admin\AppData\Local\Temp\Fri05f84fa77402bf.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4332
    • C:\Users\Admin\AppData\Local\Temp\Fri05f84fa77402bf.exe
      C:\Users\Admin\AppData\Local\Temp\Fri05f84fa77402bf.exe
      2⤵
      • Checks computer location settings
      • Suspicious use of AdjustPrivilegeToken
      PID:4660
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1520
  • C:\Windows\system32\browser_broker.exe
    C:\Windows\system32\browser_broker.exe -Embedding
    1⤵
    • Modifies Internet Explorer settings
    PID:2872
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5008
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:2012

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Fri05f84fa77402bf.exe.log
    MD5

    41fbed686f5700fc29aaccf83e8ba7fd

    SHA1

    5271bc29538f11e42a3b600c8dc727186e912456

    SHA256

    df4e9d012687cdabd15e86bf37be15d6c822e1f50dde530a02468f0006586437

    SHA512

    234b2235c1ced25810a4121c5eabcbf9f269e82c126a1adc363ee34478173f8b462e90eb53f5f11533641663350b90ec1e2360fd805b10c041fab12f4da7a034

  • memory/4332-120-0x0000000005840000-0x0000000005841000-memory.dmp
    Filesize

    4KB

  • memory/4332-121-0x0000000005810000-0x0000000005811000-memory.dmp
    Filesize

    4KB

  • memory/4332-122-0x00000000059C0000-0x00000000059C1000-memory.dmp
    Filesize

    4KB

  • memory/4332-123-0x0000000005ED0000-0x0000000005ED1000-memory.dmp
    Filesize

    4KB

  • memory/4332-118-0x0000000000F00000-0x0000000000F01000-memory.dmp
    Filesize

    4KB

  • memory/4660-129-0x0000000005620000-0x0000000005621000-memory.dmp
    Filesize

    4KB

  • memory/4660-125-0x0000000000418542-mapping.dmp
  • memory/4660-124-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/4660-130-0x00000000050A0000-0x00000000050A1000-memory.dmp
    Filesize

    4KB

  • memory/4660-131-0x00000000051D0000-0x00000000051D1000-memory.dmp
    Filesize

    4KB

  • memory/4660-132-0x0000000005100000-0x0000000005101000-memory.dmp
    Filesize

    4KB

  • memory/4660-133-0x0000000005010000-0x0000000005616000-memory.dmp
    Filesize

    6.0MB

  • memory/4660-134-0x0000000005140000-0x0000000005141000-memory.dmp
    Filesize

    4KB

  • memory/4660-136-0x0000000005460000-0x0000000005461000-memory.dmp
    Filesize

    4KB

  • memory/4660-138-0x0000000006050000-0x0000000006051000-memory.dmp
    Filesize

    4KB

  • memory/4660-140-0x0000000006C70000-0x0000000006C71000-memory.dmp
    Filesize

    4KB

  • memory/4660-141-0x0000000007370000-0x0000000007371000-memory.dmp
    Filesize

    4KB