Analysis

  • max time kernel
    177s
  • max time network
    98s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    09-05-2022 01:11

General

  • Target

    ff791e2212ce12a8e334ce553857eb89.exe

  • Size

    1.8MB

  • MD5

    ff791e2212ce12a8e334ce553857eb89

  • SHA1

    1d76dc8f24fe839b8938a6c84fa55dfabaa10e39

  • SHA256

    5d4cd0ca70d224e17ba7f0c1a0a64cd68505d8ac10ffc23d96fba3ae166c60c8

  • SHA512

    559407e2d66ae8f5741fb38527b2f5ee98deaf13054226ca43f6bf00bb40380c8c8d5fc6a64d5640b7d72dc52a727ca3e6f5f71422147e63b1214a5193e15295

Malware Config

Extracted

Family

redline

Botnet

@ansdvsvsvd

C2

46.8.220.88:65531

Attributes
  • auth_value

    d7b874c6650abbcb219b4f56f4676fee

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 4 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • VMProtect packed file 8 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Loads dropped DLL 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Drops file in System32 directory 7 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff791e2212ce12a8e334ce553857eb89.exe
    "C:\Users\Admin\AppData\Local\Temp\ff791e2212ce12a8e334ce553857eb89.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:996
      • C:\Users\Admin\AppData\Local\Temp\fl.exe
        "C:\Users\Admin\AppData\Local\Temp\fl.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:968
        • C:\Windows\system32\cmd.exe
          "cmd" cmd /c powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1180
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"
            5⤵
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1132
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"
            5⤵
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:840
        • C:\Windows\system32\cmd.exe
          "cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr "C:\Windows\system32\services32.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1744
          • C:\Windows\system32\schtasks.exe
            schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr "C:\Windows\system32\services32.exe"
            5⤵
            • Creates scheduled task(s)
            PID:1776
        • C:\Windows\system32\cmd.exe
          "cmd" cmd /c "C:\Windows\system32\services32.exe"
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1784
          • C:\Windows\system32\services32.exe
            C:\Windows\system32\services32.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1988
            • C:\Windows\system32\cmd.exe
              "cmd" cmd /c powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1728
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"
                7⤵
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1612
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"
                7⤵
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:800
            • C:\Windows\system32\Microsoft\Telemetry\sihost32.exe
              "C:\Windows\system32\Microsoft\Telemetry\sihost32.exe"
              6⤵
              • Executes dropped EXE
              PID:1540

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\fl.exe
    Filesize

    4.1MB

    MD5

    2500ec467ff51e3fa1f0bec71c419372

    SHA1

    047542e3c35dd8e3775a70c08ac0243ee394adb4

    SHA256

    de115955f1e0ff59c5ff3a388f81185b0873af4573f354f2972938b6366ab6ad

    SHA512

    5a69d59afe0c161798028725282dc646152a63a71671cd7fe3f89d92f51bf41d1f1867632ad1439a3387c56a2aa98bfce058d23dafeb442042028cb6ab05da52

  • C:\Users\Admin\AppData\Local\Temp\fl.exe
    Filesize

    4.1MB

    MD5

    2500ec467ff51e3fa1f0bec71c419372

    SHA1

    047542e3c35dd8e3775a70c08ac0243ee394adb4

    SHA256

    de115955f1e0ff59c5ff3a388f81185b0873af4573f354f2972938b6366ab6ad

    SHA512

    5a69d59afe0c161798028725282dc646152a63a71671cd7fe3f89d92f51bf41d1f1867632ad1439a3387c56a2aa98bfce058d23dafeb442042028cb6ab05da52

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
    Filesize

    7KB

    MD5

    4407b61713a046112183249bf198e17f

    SHA1

    c8fa7fa31cfc318c7efbd40819bd984686ac805d

    SHA256

    b05e7836834a99e9aaa927699448b5e636f2c8342d25a33bdbfd3758b500cfe6

    SHA512

    17e9607f62d48fffae070394067ee4560fc3e5b9a4a7519e9f3b3bafd7b5248817e4214af70aa32056a6fdd0b287b19a711d331bb7309353101ae6dceec7bd7e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
    Filesize

    7KB

    MD5

    4407b61713a046112183249bf198e17f

    SHA1

    c8fa7fa31cfc318c7efbd40819bd984686ac805d

    SHA256

    b05e7836834a99e9aaa927699448b5e636f2c8342d25a33bdbfd3758b500cfe6

    SHA512

    17e9607f62d48fffae070394067ee4560fc3e5b9a4a7519e9f3b3bafd7b5248817e4214af70aa32056a6fdd0b287b19a711d331bb7309353101ae6dceec7bd7e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
    Filesize

    7KB

    MD5

    05a0abf3711c04e5e60ec25c28933d11

    SHA1

    57de61c70ab3be3e275e64297aaa7462234b8867

    SHA256

    2beac031f977651f2ca3bf20d6cae3aecdd2b3c7a990786504c54dc11a90e687

    SHA512

    9621ddfae58422c381cf21e5aa643673044a29560fe8946c6fdbcbf9c867cd134527dcfcd4cb25fb709d54525b8495f14ebb01f87848a561c2998505102f8e6b

  • C:\Windows\System32\Microsoft\Telemetry\sihost32.exe
    Filesize

    8KB

    MD5

    77cca26e33820b2af4c3fabf55a59da4

    SHA1

    12db96b1f931c7844dfb9e35b85ccc1dd4b5d1a7

    SHA256

    5aba7ad9de8e24460cd36042fab70a5e3f0b3d8661b331a1cc67ce9c45874270

    SHA512

    bf3211c976216e99742145e81140197860cc14e6a8e1083bd2e5bc9efa6020cb8d7146272a0f2ac9e171899f47ba683f1e2908017a7277649995d163a46e92b2

  • C:\Windows\System32\services32.exe
    Filesize

    4.1MB

    MD5

    2500ec467ff51e3fa1f0bec71c419372

    SHA1

    047542e3c35dd8e3775a70c08ac0243ee394adb4

    SHA256

    de115955f1e0ff59c5ff3a388f81185b0873af4573f354f2972938b6366ab6ad

    SHA512

    5a69d59afe0c161798028725282dc646152a63a71671cd7fe3f89d92f51bf41d1f1867632ad1439a3387c56a2aa98bfce058d23dafeb442042028cb6ab05da52

  • C:\Windows\system32\Microsoft\Telemetry\sihost32.exe
    Filesize

    8KB

    MD5

    77cca26e33820b2af4c3fabf55a59da4

    SHA1

    12db96b1f931c7844dfb9e35b85ccc1dd4b5d1a7

    SHA256

    5aba7ad9de8e24460cd36042fab70a5e3f0b3d8661b331a1cc67ce9c45874270

    SHA512

    bf3211c976216e99742145e81140197860cc14e6a8e1083bd2e5bc9efa6020cb8d7146272a0f2ac9e171899f47ba683f1e2908017a7277649995d163a46e92b2

  • C:\Windows\system32\services32.exe
    Filesize

    4.1MB

    MD5

    2500ec467ff51e3fa1f0bec71c419372

    SHA1

    047542e3c35dd8e3775a70c08ac0243ee394adb4

    SHA256

    de115955f1e0ff59c5ff3a388f81185b0873af4573f354f2972938b6366ab6ad

    SHA512

    5a69d59afe0c161798028725282dc646152a63a71671cd7fe3f89d92f51bf41d1f1867632ad1439a3387c56a2aa98bfce058d23dafeb442042028cb6ab05da52

  • \??\PIPE\srvsvc
    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • \Users\Admin\AppData\Local\Temp\fl.exe
    Filesize

    4.1MB

    MD5

    2500ec467ff51e3fa1f0bec71c419372

    SHA1

    047542e3c35dd8e3775a70c08ac0243ee394adb4

    SHA256

    de115955f1e0ff59c5ff3a388f81185b0873af4573f354f2972938b6366ab6ad

    SHA512

    5a69d59afe0c161798028725282dc646152a63a71671cd7fe3f89d92f51bf41d1f1867632ad1439a3387c56a2aa98bfce058d23dafeb442042028cb6ab05da52

  • \Windows\System32\Microsoft\Telemetry\sihost32.exe
    Filesize

    8KB

    MD5

    77cca26e33820b2af4c3fabf55a59da4

    SHA1

    12db96b1f931c7844dfb9e35b85ccc1dd4b5d1a7

    SHA256

    5aba7ad9de8e24460cd36042fab70a5e3f0b3d8661b331a1cc67ce9c45874270

    SHA512

    bf3211c976216e99742145e81140197860cc14e6a8e1083bd2e5bc9efa6020cb8d7146272a0f2ac9e171899f47ba683f1e2908017a7277649995d163a46e92b2

  • \Windows\System32\services32.exe
    Filesize

    4.1MB

    MD5

    2500ec467ff51e3fa1f0bec71c419372

    SHA1

    047542e3c35dd8e3775a70c08ac0243ee394adb4

    SHA256

    de115955f1e0ff59c5ff3a388f81185b0873af4573f354f2972938b6366ab6ad

    SHA512

    5a69d59afe0c161798028725282dc646152a63a71671cd7fe3f89d92f51bf41d1f1867632ad1439a3387c56a2aa98bfce058d23dafeb442042028cb6ab05da52

  • memory/800-114-0x000007FEF1AE0000-0x000007FEF2503000-memory.dmp
    Filesize

    10.1MB

  • memory/800-118-0x0000000002374000-0x0000000002377000-memory.dmp
    Filesize

    12KB

  • memory/800-107-0x0000000000000000-mapping.dmp
  • memory/800-122-0x000000001B750000-0x000000001BA4F000-memory.dmp
    Filesize

    3.0MB

  • memory/800-123-0x000000000237B000-0x000000000239A000-memory.dmp
    Filesize

    124KB

  • memory/800-116-0x000007FEEDD80000-0x000007FEEE8DD000-memory.dmp
    Filesize

    11.4MB

  • memory/840-117-0x000007FEEDD80000-0x000007FEEE8DD000-memory.dmp
    Filesize

    11.4MB

  • memory/840-119-0x0000000002904000-0x0000000002907000-memory.dmp
    Filesize

    12KB

  • memory/840-120-0x000000001B8E0000-0x000000001BBDF000-memory.dmp
    Filesize

    3.0MB

  • memory/840-115-0x000007FEF1AE0000-0x000007FEF2503000-memory.dmp
    Filesize

    10.1MB

  • memory/840-108-0x0000000000000000-mapping.dmp
  • memory/840-121-0x000000000290B000-0x000000000292A000-memory.dmp
    Filesize

    124KB

  • memory/968-74-0x000000001C580000-0x000000001C768000-memory.dmp
    Filesize

    1.9MB

  • memory/968-71-0x000000013F090000-0x000000013F8AA000-memory.dmp
    Filesize

    8.1MB

  • memory/968-68-0x0000000000000000-mapping.dmp
  • memory/996-66-0x0000000074E91000-0x0000000074E93000-memory.dmp
    Filesize

    8KB

  • memory/996-62-0x000000000041BC4E-mapping.dmp
  • memory/996-57-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/996-55-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/996-65-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/996-63-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/1132-76-0x0000000000000000-mapping.dmp
  • memory/1132-99-0x000007FEF1F50000-0x000007FEF2AAD000-memory.dmp
    Filesize

    11.4MB

  • memory/1132-77-0x000007FEFBA91000-0x000007FEFBA93000-memory.dmp
    Filesize

    8KB

  • memory/1132-103-0x000000001B8A0000-0x000000001BB9F000-memory.dmp
    Filesize

    3.0MB

  • memory/1132-101-0x0000000002854000-0x0000000002857000-memory.dmp
    Filesize

    12KB

  • memory/1132-106-0x000000000285B000-0x000000000287A000-memory.dmp
    Filesize

    124KB

  • memory/1132-79-0x000007FEEC630000-0x000007FEED053000-memory.dmp
    Filesize

    10.1MB

  • memory/1180-75-0x0000000000000000-mapping.dmp
  • memory/1540-98-0x000000013F670000-0x000000013F676000-memory.dmp
    Filesize

    24KB

  • memory/1540-95-0x0000000000000000-mapping.dmp
  • memory/1612-104-0x000000001B700000-0x000000001B9FF000-memory.dmp
    Filesize

    3.0MB

  • memory/1612-100-0x000007FEF1F50000-0x000007FEF2AAD000-memory.dmp
    Filesize

    11.4MB

  • memory/1612-105-0x00000000026CB000-0x00000000026EA000-memory.dmp
    Filesize

    124KB

  • memory/1612-90-0x0000000000000000-mapping.dmp
  • memory/1612-93-0x000007FEEC630000-0x000007FEED053000-memory.dmp
    Filesize

    10.1MB

  • memory/1612-102-0x00000000026C4000-0x00000000026C7000-memory.dmp
    Filesize

    12KB

  • memory/1620-64-0x0000000000D10000-0x0000000000EDC000-memory.dmp
    Filesize

    1.8MB

  • memory/1620-54-0x0000000000D10000-0x0000000000EDC000-memory.dmp
    Filesize

    1.8MB

  • memory/1728-89-0x0000000000000000-mapping.dmp
  • memory/1744-78-0x0000000000000000-mapping.dmp
  • memory/1776-80-0x0000000000000000-mapping.dmp
  • memory/1784-81-0x0000000000000000-mapping.dmp
  • memory/1988-83-0x0000000000000000-mapping.dmp
  • memory/1988-86-0x000000013F7F0000-0x000000014000A000-memory.dmp
    Filesize

    8.1MB