Analysis

  • max time kernel
    166s
  • max time network
    192s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    08-02-2022 04:44

General

  • Target

    56da9aa053adec2eb685d9f81532ad23.exe

  • Size

    491KB

  • MD5

    56da9aa053adec2eb685d9f81532ad23

  • SHA1

    58e47cd4abf19c6a2ddc5d5dc2cbad2e90f68a32

  • SHA256

    18354bab9009498b48010c0acb0eba274eba5b9d27f197b773b9c376d7932167

  • SHA512

    a7526356ae35dc95d0c90fbb5779db0fe01b1f09a00553e064bbf53310e881215aa00256558fdf3ff7f457f450dd23c5b5b009b59da5625cc78cae76ff376a36

Malware Config

Extracted

Family

redline

Botnet

GIZMIK

C2

185.215.113.107:1433

Attributes
  • auth_value

    b9102ed52a68ee77f4e68f740474332e

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 45 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\56da9aa053adec2eb685d9f81532ad23.exe
    "C:\Users\Admin\AppData\Local\Temp\56da9aa053adec2eb685d9f81532ad23.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2548
    • C:\Users\Admin\AppData\Local\Temp\56da9aa053adec2eb685d9f81532ad23.exe
      C:\Users\Admin\AppData\Local\Temp\56da9aa053adec2eb685d9f81532ad23.exe
      2⤵
        PID:400
    • C:\Windows\system32\MusNotifyIcon.exe
      %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13
      1⤵
      • Checks processor information in registry
      PID:3608
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k NetworkService -p
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      PID:3896

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/400-139-0x0000000005030000-0x0000000005042000-memory.dmp
      Filesize

      72KB

    • memory/400-140-0x0000000005160000-0x000000000526A000-memory.dmp
      Filesize

      1.0MB

    • memory/400-144-0x0000000005E30000-0x0000000005E96000-memory.dmp
      Filesize

      408KB

    • memory/400-143-0x0000000004E20000-0x0000000004EB2000-memory.dmp
      Filesize

      584KB

    • memory/400-142-0x0000000005110000-0x000000000514C000-memory.dmp
      Filesize

      240KB

    • memory/400-141-0x0000000005D20000-0x0000000005D21000-memory.dmp
      Filesize

      4KB

    • memory/400-137-0x0000000074EA0000-0x0000000075650000-memory.dmp
      Filesize

      7.7MB

    • memory/400-138-0x0000000005590000-0x0000000005BA8000-memory.dmp
      Filesize

      6.1MB

    • memory/400-136-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/2548-130-0x0000000000B50000-0x0000000000BD2000-memory.dmp
      Filesize

      520KB

    • memory/2548-131-0x0000000074EA0000-0x0000000075650000-memory.dmp
      Filesize

      7.7MB

    • memory/2548-135-0x0000000005D50000-0x00000000062F4000-memory.dmp
      Filesize

      5.6MB

    • memory/2548-134-0x00000000053D0000-0x00000000053EE000-memory.dmp
      Filesize

      120KB

    • memory/2548-133-0x0000000005430000-0x00000000054A6000-memory.dmp
      Filesize

      472KB

    • memory/2548-132-0x0000000005590000-0x0000000005591000-memory.dmp
      Filesize

      4KB