Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-en-20211104
  • submitted
    22-11-2021 21:41

General

  • Target

    build.exe

  • Size

    1.7MB

  • MD5

    618ea7b0e2a26f3c6db0a8664c63fc6f

  • SHA1

    f2d41df1d55178b5f7de0512912159f2663296cd

  • SHA256

    3215decffc40b3257ebeb9b6e5c81c45e298a020f33ef90c9418c153c6071b36

  • SHA512

    5bda8aef91d4ac0a4eb09427b996b8fb0792297991af8a2ddf563676ae14a724eed77e1b4dd0573c9abc094604c172b1a5a2587ae33814105afc7fc87fc872a5

Malware Config

Extracted

Family

redline

C2

135.181.245.89:24368

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 5 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Sets file to hidden 1 TTPs

    Modifies file attributes to stop it showing in Explorer etc.

  • Loads dropped DLL 1 IoCs
  • Obfuscated with Agile.Net obfuscator 4 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\build.exe
    "C:\Users\Admin\AppData\Local\Temp\build.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1988
    • C:\Windows\system32\cmd.exe
      cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\Admin\AppData\Local\Temp"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:772
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command Add-MpPreference -ExclusionPath C:\Users\Admin\AppData\Local\Temp
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1092
    • C:\Windows\system32\cmd.exe
      cmd /Q /C move /Y C:\Users\Admin\AppData\Local\Temp\build.exe C:\Users\Admin\AppData\Roaming\Microsoft\Registry.exe
      2⤵
      • Suspicious behavior: RenamesItself
      PID:1528
    • C:\Windows\system32\cmd.exe
      cmd /Q /C reg add "HKCU\Software\Networking5 Servic1e" /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1768
      • C:\Windows\system32\reg.exe
        reg add "HKCU\Software\Networking5 Servic1e" /f
        3⤵
          PID:1748
      • C:\Windows\system32\cmd.exe
        cmd /C "attrib +S +H C:\Users\Admin\AppData\Roaming\Microsoft\Registry.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1384
        • C:\Windows\system32\attrib.exe
          attrib +S +H C:\Users\Admin\AppData\Roaming\Microsoft\Registry.exe
          3⤵
          • Views/modifies file attributes
          PID:2000
      • C:\Windows\system32\cmd.exe
        cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\Admin\AppData\Roaming\Microsoft"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1512
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command Add-MpPreference -ExclusionPath C:\Users\Admin\AppData\Roaming\Microsoft
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1888
      • C:\Windows\system32\cmd.exe
        cmd /C C:\Users\Admin\AppData\Local\Temp\1637617173.exe
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:836
        • C:\Users\Admin\AppData\Local\Temp\1637617173.exe
          C:\Users\Admin\AppData\Local\Temp\1637617173.exe
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Modifies system certificate store
          • Suspicious behavior: CmdExeWriteProcessMemorySpam
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1816
          • C:\Users\Admin\AppData\Local\Temp\1637617173.exe
            C:\Users\Admin\AppData\Local\Temp\1637617173.exe
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1936

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Hidden Files and Directories

    2
    T1158

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Hidden Files and Directories

    2
    T1158

    Modify Registry

    2
    T1112

    Install Root Certificate

    1
    T1130

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\1637617173.exe
      MD5

      093cdb435c4003e1a7d4269e332730a1

      SHA1

      c8cff0231c22d5285a73f03b7624b4c60d79b820

      SHA256

      bff2a3fa0b7e711b342901d3e67e8cee7d08dda4fc7b8809ab5e6c5858b76613

      SHA512

      9df903c6e990c2f253f82aa9f618f9cfbdead034d34a4cbfdf1fb08f36ceaeb65041faa1fbf17fee972d15a577269aec400cc9ce948041cb7bc77cc04d39ffb8

    • C:\Users\Admin\AppData\Local\Temp\1637617173.exe
      MD5

      093cdb435c4003e1a7d4269e332730a1

      SHA1

      c8cff0231c22d5285a73f03b7624b4c60d79b820

      SHA256

      bff2a3fa0b7e711b342901d3e67e8cee7d08dda4fc7b8809ab5e6c5858b76613

      SHA512

      9df903c6e990c2f253f82aa9f618f9cfbdead034d34a4cbfdf1fb08f36ceaeb65041faa1fbf17fee972d15a577269aec400cc9ce948041cb7bc77cc04d39ffb8

    • C:\Users\Admin\AppData\Local\Temp\1637617173.exe
      MD5

      093cdb435c4003e1a7d4269e332730a1

      SHA1

      c8cff0231c22d5285a73f03b7624b4c60d79b820

      SHA256

      bff2a3fa0b7e711b342901d3e67e8cee7d08dda4fc7b8809ab5e6c5858b76613

      SHA512

      9df903c6e990c2f253f82aa9f618f9cfbdead034d34a4cbfdf1fb08f36ceaeb65041faa1fbf17fee972d15a577269aec400cc9ce948041cb7bc77cc04d39ffb8

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
      MD5

      91fa97a4387c9b59349ba88df870680c

      SHA1

      190ddf6c08f85626e91a02b72a6a5b4058d0728c

      SHA256

      949480e72bf428f9425b695ab03dce171ccd34a87046c270013291e31d27ff94

      SHA512

      7c3585e6cea33601b4aa484666a0ddfd0df967b2480901c76c736329307fb69b2216217260514b14cc43f1811d4ba2a485def294c7e23d4f26a8ac3c0ecef503

    • \Users\Admin\AppData\Local\Temp\1637617173.exe
      MD5

      093cdb435c4003e1a7d4269e332730a1

      SHA1

      c8cff0231c22d5285a73f03b7624b4c60d79b820

      SHA256

      bff2a3fa0b7e711b342901d3e67e8cee7d08dda4fc7b8809ab5e6c5858b76613

      SHA512

      9df903c6e990c2f253f82aa9f618f9cfbdead034d34a4cbfdf1fb08f36ceaeb65041faa1fbf17fee972d15a577269aec400cc9ce948041cb7bc77cc04d39ffb8

    • memory/772-55-0x0000000000000000-mapping.dmp
    • memory/836-78-0x0000000000000000-mapping.dmp
    • memory/1092-67-0x0000000002970000-0x0000000002972000-memory.dmp
      Filesize

      8KB

    • memory/1092-76-0x000000000297B000-0x000000000299A000-memory.dmp
      Filesize

      124KB

    • memory/1092-56-0x0000000000000000-mapping.dmp
    • memory/1092-58-0x000007FEFC4C1000-0x000007FEFC4C3000-memory.dmp
      Filesize

      8KB

    • memory/1092-68-0x0000000002972000-0x0000000002974000-memory.dmp
      Filesize

      8KB

    • memory/1092-69-0x0000000002974000-0x0000000002977000-memory.dmp
      Filesize

      12KB

    • memory/1092-63-0x000000001B840000-0x000000001BB3F000-memory.dmp
      Filesize

      3.0MB

    • memory/1092-59-0x000007FEF3120000-0x000007FEF3C7D000-memory.dmp
      Filesize

      11.4MB

    • memory/1384-62-0x0000000000000000-mapping.dmp
    • memory/1512-64-0x0000000000000000-mapping.dmp
    • memory/1528-57-0x0000000000000000-mapping.dmp
    • memory/1748-61-0x0000000000000000-mapping.dmp
    • memory/1768-60-0x0000000000000000-mapping.dmp
    • memory/1816-80-0x0000000000000000-mapping.dmp
    • memory/1816-82-0x0000000000870000-0x0000000000871000-memory.dmp
      Filesize

      4KB

    • memory/1816-86-0x0000000001F00000-0x0000000001F18000-memory.dmp
      Filesize

      96KB

    • memory/1816-85-0x0000000004AE0000-0x0000000004B31000-memory.dmp
      Filesize

      324KB

    • memory/1816-84-0x0000000004A40000-0x0000000004A41000-memory.dmp
      Filesize

      4KB

    • memory/1888-72-0x000007FEF3120000-0x000007FEF3C7D000-memory.dmp
      Filesize

      11.4MB

    • memory/1888-77-0x000000000272B000-0x000000000274A000-memory.dmp
      Filesize

      124KB

    • memory/1888-73-0x0000000002720000-0x0000000002722000-memory.dmp
      Filesize

      8KB

    • memory/1888-74-0x0000000002722000-0x0000000002724000-memory.dmp
      Filesize

      8KB

    • memory/1888-75-0x0000000002724000-0x0000000002727000-memory.dmp
      Filesize

      12KB

    • memory/1888-66-0x0000000000000000-mapping.dmp
    • memory/1936-91-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/1936-88-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/1936-90-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/1936-89-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/1936-92-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/1936-93-0x0000000000418EEA-mapping.dmp
    • memory/1936-95-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/1936-97-0x0000000000830000-0x0000000000831000-memory.dmp
      Filesize

      4KB

    • memory/2000-65-0x0000000000000000-mapping.dmp