Resubmissions

27-10-2021 14:44

211027-r4madafbg6 10

27-10-2021 14:28

211027-rs7f6sfah4 10

Analysis

  • max time kernel
    154s
  • max time network
    168s
  • submitted
    01-01-1970 00:00

General

  • Target

    setup_installer/Wed09e95ff6b5.exe

Malware Config

Extracted

Family

redline

Botnet

serman

C2

135.181.129.119:4805

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • autoit_exe 3 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 15 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09e95ff6b5.exe
    "C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09e95ff6b5.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:776
    • C:\Users\Public\run.exe
      C:\Users\Public\run.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1204
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:912
    • C:\Users\Public\run2.exe
      C:\Users\Public\run2.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1052
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/18tji7
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1836
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1836 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1380
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1836 CREDAT:865294 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:956

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
    MD5

    26f54bb46f9ca9bb4a7be2d01113cdf3

    SHA1

    21a3bed8c8dcd5bc82639f798f6c625b460dba19

    SHA256

    46b1c53bbb94fa53cbaec17b4ad9e60601895f03d18665fa60eb44328adb1369

    SHA512

    c6737170e8fb417cc54ce42a4773f3c54da419314bc0a569b09ea8bd8cbfc8285703eb44b0b22acc7f6c1f1443e690cd059fd14dcb16dbdbc946ac8dade73250

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5EE9003E3DC4134E8CF26DC55FD926FA
    MD5

    79ce1a6691312890da9b24ccd0b5c970

    SHA1

    d83168d647ec4df3963d55d3801d80989f8f7c59

    SHA256

    e95c3d34f3b9ca4798a289cc0f7fdd3e739cfaed660a516c5966c62245d0aede

    SHA512

    044d44ae3774a6493daa7070b40121cc436f8db123c2b68d71894d1968a8ef947087314619087e64fc4c5498a8ce2bb9b5ae817f157e43ea1cd463879a3d9044

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
    MD5

    faca18b060094191c97231f9a5332822

    SHA1

    f3cc588aa00c140de4b00b462a1af6e39bd3818f

    SHA256

    33cc65407c32a0a889ffad734469724c4c0c9f7b2294723f26ffeee8f1e5e75a

    SHA512

    90d20c43f2ce082a4e2e5a80917194e9cc692d0d41a092ef4226cb0275bd70015aa1019cab44b64ad9e7c59c138ec5a213e910430b91d82c5374996bb14aa344

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
    MD5

    386facbf642f83583ec0e63d614645ab

    SHA1

    4b0fdc55c082611ec9bc32b847d1f1732b11abb1

    SHA256

    1fe9c46ca823f1393c71f160d905abd668752ec970647a404e638cdf7377ff88

    SHA512

    166d67658dfa95cddb75ff5cea8a87015d0019ac7f79ad4bc02a0a6eea0a2353db435eb2d6f7c1ecc104990e43254a21c5b99801f50841174f031d42d6616ded

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5EE9003E3DC4134E8CF26DC55FD926FA
    MD5

    5e8986e521f7ea3fbe3909ef2ddaf0a5

    SHA1

    89034a16e91a2cabf13d7c20cbb00d5ff101ee3b

    SHA256

    fbc8d670951a0e7c300c1279a0b3bf31b6b7b7b109a4f6894596b7809876f61d

    SHA512

    3be209e7c93624ceeaf9fc14eb197122d2a3f0907822f3564777555bd33b9aec1223eac3e472abfe485ea5274754a7dc0cc4c0b944b67f02b3f51ca15f5c28d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    9f485316ecc1e9d2fae43986d65ab360

    SHA1

    db8fcf981651ed88d36347b4387bf5682066f8fe

    SHA256

    4e0d1aa5445b350e9309eaa37cf71e9c6a1e24c5ee443d645f265812c702df1c

    SHA512

    2c2bf60bc4e8d2fa4261e07517a287d265676e129948125e3d72656dee42a28f7cdc1dad7d4889b921de6860c2265a2b0ea7a365f6ed86955faafade141d52e4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
    MD5

    45315ba35c90c4bc3b7300fcd559ef5c

    SHA1

    47cab307566fcc94d73c83e59035c42205be853a

    SHA256

    0841dfb5b15727aed87705bbd85be70a32205115cd4ca8e2d0eaa29291a401fe

    SHA512

    b39918313c6eb6b83d92cc251fb7a4f9477e3cc1050dea81e9ccfa604e3c8750e10c5e216824c1eb0a35ee434d6462d744343ed1bf230365535b6cc2e7657a88

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\r32q9i9\imagestore.dat
    MD5

    7ec1b6d90a01ba5afacbabd1561cbb6b

    SHA1

    19b9875a9c519e89233891c4ca3c94ad952350ba

    SHA256

    3b6ebf57c240c4dfb8b29e4f2ef4f9878a95209b12b33820f51e75ca6a9a2c1c

    SHA512

    06a5f0b708ebb24faa72f1ccf8efea8a2ada132c09a566a441e69163824d913b8e998eb8f1cd63c47597a98dacdd59130b114b54a565ad0d2699f4b229c0ea92

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KC94CCU5\favicon[2].ico
    MD5

    dd345aee82d34847e8abd2a695302336

    SHA1

    87e2444681a0c4d9127b5328740ec8957d7972d1

    SHA256

    377e20a354fd825b9763c87836482bb7b79d2794e6d25ed693376ca33eac990a

    SHA512

    4f0c1d408bdbe2bd2202a0ea0ea95a86699d13023d715b4a6559f7f74b5037d56a3e8d3abeff24e67db0099175d5b32c63933f1eafd63c5c03043f7a23dca74c

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\AQV4PGS7.txt
    MD5

    2af87667b0480ef728b700d62913f927

    SHA1

    66d4d81b95c24f8000f2bb1b8f9e4db3747dcbbd

    SHA256

    9bef41ac226dc034679b82134f5694d0b43cd666543518e16255c8298a056e51

    SHA512

    5d2067555a7dc0a0518207f2b634cf2d3156d048a498fad8bd71b381478eabe29fb811e356049bd61877dd9d6dbab0a42a40101338ed951a43594cf932713642

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\OQMX9753.txt
    MD5

    3d539e3d64c7a95a17c5868218f5d6e9

    SHA1

    c6594a725fb60a86630d12e108bb787d43d74085

    SHA256

    1865b89c4d3dbe6c633730ac8fb62fa24093956973b1083951d083c433b80d70

    SHA512

    6e58888b97777da41b8e2198b40e3797fe417778e7f407b166975d524341f7601a473dbad81825fa5245a27c1ad48b61361aa0d86805a05f034fff885873677a

  • C:\Users\Public\run.exe
    MD5

    b804ea11feb74be302e4c81cd20fd53e

    SHA1

    7d8b4f854b13875226d22d4066ebbea09f8ab512

    SHA256

    eac802653eed6b9db8fbf7a0ecfe559bd2e7dac148504a393aa7f536291a1d7e

    SHA512

    2e7f10b34bb368b50be9d199c7180255b51d2dd6eb9625df11cbd89bcda7c65b0327057147cd3dfa116a320b06e5be7593a8c19635823dd7facc9f8f4f5bd813

  • C:\Users\Public\run2.exe
    MD5

    5ce9a5442c3050e99d03ea4abeb4c667

    SHA1

    d5d6906be3dc11bd87cec8fc128143906ab6d213

    SHA256

    62e6faefb82888dbad5c295bf21d8eb08d494665da2cac5c429944cf7d0c3724

    SHA512

    4cbc6ca45fffaa77e9900dad2f6f1ce41a3646b3a94108873b57e91fe65780e30fdb3aadc927c1aafdfdfeecf0cfd6d02734723f99b1fd63e6692cea7517bd3f

  • C:\Users\Public\run2.exe
    MD5

    5ce9a5442c3050e99d03ea4abeb4c667

    SHA1

    d5d6906be3dc11bd87cec8fc128143906ab6d213

    SHA256

    62e6faefb82888dbad5c295bf21d8eb08d494665da2cac5c429944cf7d0c3724

    SHA512

    4cbc6ca45fffaa77e9900dad2f6f1ce41a3646b3a94108873b57e91fe65780e30fdb3aadc927c1aafdfdfeecf0cfd6d02734723f99b1fd63e6692cea7517bd3f

  • \Users\Public\run.exe
    MD5

    b804ea11feb74be302e4c81cd20fd53e

    SHA1

    7d8b4f854b13875226d22d4066ebbea09f8ab512

    SHA256

    eac802653eed6b9db8fbf7a0ecfe559bd2e7dac148504a393aa7f536291a1d7e

    SHA512

    2e7f10b34bb368b50be9d199c7180255b51d2dd6eb9625df11cbd89bcda7c65b0327057147cd3dfa116a320b06e5be7593a8c19635823dd7facc9f8f4f5bd813

  • \Users\Public\run2.exe
    MD5

    5ce9a5442c3050e99d03ea4abeb4c667

    SHA1

    d5d6906be3dc11bd87cec8fc128143906ab6d213

    SHA256

    62e6faefb82888dbad5c295bf21d8eb08d494665da2cac5c429944cf7d0c3724

    SHA512

    4cbc6ca45fffaa77e9900dad2f6f1ce41a3646b3a94108873b57e91fe65780e30fdb3aadc927c1aafdfdfeecf0cfd6d02734723f99b1fd63e6692cea7517bd3f

  • memory/776-56-0x0000000002A90000-0x0000000002A91000-memory.dmp
    Filesize

    4KB

  • memory/776-55-0x0000000075901000-0x0000000075903000-memory.dmp
    Filesize

    8KB

  • memory/912-96-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/912-88-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/912-100-0x00000000049C0000-0x00000000049C1000-memory.dmp
    Filesize

    4KB

  • memory/912-98-0x0000000000400000-0x0000000000401000-memory.dmp
    Filesize

    4KB

  • memory/912-95-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/912-94-0x0000000000418D2A-mapping.dmp
  • memory/912-89-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/956-102-0x0000000000000000-mapping.dmp
  • memory/1052-61-0x0000000000000000-mapping.dmp
  • memory/1204-70-0x00000000002C0000-0x00000000002C1000-memory.dmp
    Filesize

    4KB

  • memory/1204-81-0x0000000000AF0000-0x0000000000AF1000-memory.dmp
    Filesize

    4KB

  • memory/1204-58-0x0000000000000000-mapping.dmp
  • memory/1204-65-0x00000000002B0000-0x00000000002B1000-memory.dmp
    Filesize

    4KB

  • memory/1204-73-0x00000000003D0000-0x00000000003D1000-memory.dmp
    Filesize

    4KB

  • memory/1204-83-0x0000000000400000-0x0000000000AEE000-memory.dmp
    Filesize

    6.9MB

  • memory/1204-75-0x00000000003E0000-0x00000000003E1000-memory.dmp
    Filesize

    4KB

  • memory/1204-76-0x00000000003E0000-0x00000000003E1000-memory.dmp
    Filesize

    4KB

  • memory/1204-78-0x00000000003F0000-0x00000000003F1000-memory.dmp
    Filesize

    4KB

  • memory/1204-72-0x00000000003D0000-0x00000000003D1000-memory.dmp
    Filesize

    4KB

  • memory/1204-82-0x0000000000AF0000-0x0000000000AF1000-memory.dmp
    Filesize

    4KB

  • memory/1204-79-0x00000000003F0000-0x00000000003F1000-memory.dmp
    Filesize

    4KB

  • memory/1204-66-0x00000000002B0000-0x00000000002B1000-memory.dmp
    Filesize

    4KB

  • memory/1204-67-0x00000000002B0000-0x00000000002B1000-memory.dmp
    Filesize

    4KB

  • memory/1204-68-0x00000000002C0000-0x00000000002C1000-memory.dmp
    Filesize

    4KB

  • memory/1204-69-0x00000000002C0000-0x00000000002C1000-memory.dmp
    Filesize

    4KB

  • memory/1380-87-0x0000000000000000-mapping.dmp
  • memory/1836-84-0x0000000000000000-mapping.dmp
  • memory/1836-85-0x000007FEFB8C1000-0x000007FEFB8C3000-memory.dmp
    Filesize

    8KB

  • memory/1836-86-0x0000000001F60000-0x0000000001F70000-memory.dmp
    Filesize

    64KB