Analysis

  • max time kernel
    133s
  • max time network
    125s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    11-11-2021 23:34

General

  • Target

    InstallerTool.exe

  • Size

    1.4MB

  • MD5

    963a69f3894ea42c7352337772a2d9d3

  • SHA1

    e4da98fad2f4468ce44dab1d1462c8b6c489ead2

  • SHA256

    1e718ba10afeffd0173f8a685541c705246cea8a2776765403fb2b948aed4c9f

  • SHA512

    04739fecffcf9132048ca0f886b1b8ddd040a6c887bfcfa54a5b7c572afcfc266f0b80cc70c79d540b9bbfe041d74cbd8df4ea75f06f3f6f9b79c322224c0024

Malware Config

Extracted

Family

redline

Botnet

@whizzkid1

C2

185.215.113.83:60722

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 3 IoCs
  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\InstallerTool.exe
    "C:\Users\Admin\AppData\Local\Temp\InstallerTool.exe"
    1⤵
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4076
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3904
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4076 -s 556
      2⤵
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3528

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3904-171-0x00000000007A0000-0x00000000007C0000-memory.dmp
    Filesize

    128KB

  • memory/3904-209-0x000000000B9F0000-0x000000000B9F1000-memory.dmp
    Filesize

    4KB

  • memory/3904-208-0x000000000B2F0000-0x000000000B2F1000-memory.dmp
    Filesize

    4KB

  • memory/3904-199-0x000000000B0D0000-0x000000000B0D1000-memory.dmp
    Filesize

    4KB

  • memory/3904-198-0x0000000009B70000-0x0000000009B71000-memory.dmp
    Filesize

    4KB

  • memory/3904-195-0x00000000097C0000-0x00000000097C1000-memory.dmp
    Filesize

    4KB

  • memory/3904-194-0x0000000009CA0000-0x0000000009CA1000-memory.dmp
    Filesize

    4KB

  • memory/3904-193-0x00000000090F0000-0x00000000090F1000-memory.dmp
    Filesize

    4KB

  • memory/3904-192-0x0000000008FD0000-0x0000000008FD1000-memory.dmp
    Filesize

    4KB

  • memory/3904-188-0x00000000003F0000-0x00000000003F1000-memory.dmp
    Filesize

    4KB

  • memory/3904-187-0x0000000008CE0000-0x0000000008CE1000-memory.dmp
    Filesize

    4KB

  • memory/3904-186-0x0000000008CA0000-0x0000000008CA1000-memory.dmp
    Filesize

    4KB

  • memory/3904-185-0x0000000008B80000-0x0000000009186000-memory.dmp
    Filesize

    6.0MB

  • memory/3904-184-0x0000000008D40000-0x0000000008D41000-memory.dmp
    Filesize

    4KB

  • memory/3904-183-0x0000000008C10000-0x0000000008C11000-memory.dmp
    Filesize

    4KB

  • memory/3904-182-0x0000000009190000-0x0000000009191000-memory.dmp
    Filesize

    4KB

  • memory/3904-180-0x00000000007A0000-0x00000000007A1000-memory.dmp
    Filesize

    4KB

  • memory/3904-179-0x00000000003F0000-0x00000000003F1000-memory.dmp
    Filesize

    4KB

  • memory/3904-178-0x00000000003F0000-0x00000000003F1000-memory.dmp
    Filesize

    4KB

  • memory/3904-177-0x00000000003F0000-0x00000000003F1000-memory.dmp
    Filesize

    4KB

  • memory/3904-176-0x00000000007B8F16-mapping.dmp
  • memory/4076-136-0x0000000002660000-0x0000000002661000-memory.dmp
    Filesize

    4KB

  • memory/4076-166-0x0000000000400000-0x00000000007B7000-memory.dmp
    Filesize

    3.7MB

  • memory/4076-140-0x0000000002790000-0x0000000002791000-memory.dmp
    Filesize

    4KB

  • memory/4076-143-0x00000000027C0000-0x00000000027C1000-memory.dmp
    Filesize

    4KB

  • memory/4076-142-0x0000000002750000-0x0000000002751000-memory.dmp
    Filesize

    4KB

  • memory/4076-145-0x0000000002770000-0x0000000002771000-memory.dmp
    Filesize

    4KB

  • memory/4076-144-0x0000000002780000-0x0000000002781000-memory.dmp
    Filesize

    4KB

  • memory/4076-146-0x00000000027E0000-0x00000000027E1000-memory.dmp
    Filesize

    4KB

  • memory/4076-147-0x0000000003520000-0x0000000003521000-memory.dmp
    Filesize

    4KB

  • memory/4076-150-0x0000000003520000-0x0000000003521000-memory.dmp
    Filesize

    4KB

  • memory/4076-148-0x0000000003520000-0x0000000003521000-memory.dmp
    Filesize

    4KB

  • memory/4076-151-0x0000000003520000-0x0000000003521000-memory.dmp
    Filesize

    4KB

  • memory/4076-149-0x0000000003520000-0x0000000003521000-memory.dmp
    Filesize

    4KB

  • memory/4076-152-0x00000000024D0000-0x00000000024D1000-memory.dmp
    Filesize

    4KB

  • memory/4076-153-0x00000000028F0000-0x00000000028F1000-memory.dmp
    Filesize

    4KB

  • memory/4076-154-0x0000000002900000-0x0000000002901000-memory.dmp
    Filesize

    4KB

  • memory/4076-156-0x0000000002920000-0x0000000002921000-memory.dmp
    Filesize

    4KB

  • memory/4076-155-0x00000000028B0000-0x00000000028B1000-memory.dmp
    Filesize

    4KB

  • memory/4076-158-0x00000000028D0000-0x00000000028D1000-memory.dmp
    Filesize

    4KB

  • memory/4076-159-0x0000000002940000-0x0000000002941000-memory.dmp
    Filesize

    4KB

  • memory/4076-157-0x00000000028E0000-0x00000000028E1000-memory.dmp
    Filesize

    4KB

  • memory/4076-160-0x00000000024D0000-0x00000000024D1000-memory.dmp
    Filesize

    4KB

  • memory/4076-162-0x0000000002930000-0x0000000002931000-memory.dmp
    Filesize

    4KB

  • memory/4076-161-0x00000000024D0000-0x00000000024D1000-memory.dmp
    Filesize

    4KB

  • memory/4076-163-0x0000000002690000-0x0000000002691000-memory.dmp
    Filesize

    4KB

  • memory/4076-164-0x00000000024D0000-0x00000000024D1000-memory.dmp
    Filesize

    4KB

  • memory/4076-165-0x00000000024D0000-0x00000000024D1000-memory.dmp
    Filesize

    4KB

  • memory/4076-141-0x00000000027A0000-0x00000000027A1000-memory.dmp
    Filesize

    4KB

  • memory/4076-167-0x0000000000400000-0x00000000007B7000-memory.dmp
    Filesize

    3.7MB

  • memory/4076-168-0x0000000000400000-0x00000000007B7000-memory.dmp
    Filesize

    3.7MB

  • memory/4076-169-0x0000000000400000-0x00000000007B7000-memory.dmp
    Filesize

    3.7MB

  • memory/4076-170-0x0000000000400000-0x00000000007B7000-memory.dmp
    Filesize

    3.7MB

  • memory/4076-139-0x0000000003520000-0x0000000003521000-memory.dmp
    Filesize

    4KB

  • memory/4076-137-0x0000000002680000-0x0000000002681000-memory.dmp
    Filesize

    4KB

  • memory/4076-138-0x0000000003520000-0x0000000003521000-memory.dmp
    Filesize

    4KB

  • memory/4076-119-0x0000000002840000-0x0000000002841000-memory.dmp
    Filesize

    4KB

  • memory/4076-135-0x0000000002500000-0x0000000002501000-memory.dmp
    Filesize

    4KB

  • memory/4076-134-0x00000000024E0000-0x00000000024E1000-memory.dmp
    Filesize

    4KB

  • memory/4076-133-0x0000000002530000-0x0000000002531000-memory.dmp
    Filesize

    4KB

  • memory/4076-132-0x0000000002520000-0x0000000002521000-memory.dmp
    Filesize

    4KB

  • memory/4076-131-0x0000000003520000-0x0000000003521000-memory.dmp
    Filesize

    4KB

  • memory/4076-130-0x0000000003520000-0x0000000003521000-memory.dmp
    Filesize

    4KB

  • memory/4076-129-0x0000000003520000-0x0000000003521000-memory.dmp
    Filesize

    4KB

  • memory/4076-128-0x0000000003520000-0x0000000003521000-memory.dmp
    Filesize

    4KB

  • memory/4076-127-0x0000000003530000-0x0000000003531000-memory.dmp
    Filesize

    4KB

  • memory/4076-125-0x0000000002890000-0x0000000002891000-memory.dmp
    Filesize

    4KB

  • memory/4076-126-0x0000000002860000-0x0000000002861000-memory.dmp
    Filesize

    4KB

  • memory/4076-124-0x0000000002820000-0x0000000002821000-memory.dmp
    Filesize

    4KB

  • memory/4076-122-0x0000000002870000-0x0000000002871000-memory.dmp
    Filesize

    4KB

  • memory/4076-123-0x0000000002830000-0x0000000002831000-memory.dmp
    Filesize

    4KB

  • memory/4076-120-0x0000000002850000-0x0000000002851000-memory.dmp
    Filesize

    4KB

  • memory/4076-121-0x0000000002800000-0x0000000002801000-memory.dmp
    Filesize

    4KB

  • memory/4076-118-0x0000000002430000-0x0000000002490000-memory.dmp
    Filesize

    384KB