Analysis

  • max time kernel
    122s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    24-05-2022 06:30

General

  • Target

    PurchaseorderN3455.xll

  • Size

    560KB

  • MD5

    831052f170e6d906cdc9dbed25ac1f24

  • SHA1

    6b51a5a21dfc8b68ad85ef9a93d815b56b38d058

  • SHA256

    fe0c53f6201f2bc220745f6fd58a8bad448aea825320341389feb6b42cbd76e9

  • SHA512

    a054cff00bc79aef5891c074fbcf9b4954f2295a80fd4a900b133413c38da56d3cf469ec30ac3f6231b57d48f23532b0ea79d790c674ba1bbafe4745cd62ca61

Malware Config

Extracted

Language
xlm4.0
Source

Extracted

Family

redline

Botnet

love

C2

101.99.93.62:43200

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\PurchaseorderN3455.xll"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3040
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of AdjustPrivilegeToken
      PID:4680

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\PurchaseorderN3455.xll
    Filesize

    560KB

    MD5

    831052f170e6d906cdc9dbed25ac1f24

    SHA1

    6b51a5a21dfc8b68ad85ef9a93d815b56b38d058

    SHA256

    fe0c53f6201f2bc220745f6fd58a8bad448aea825320341389feb6b42cbd76e9

    SHA512

    a054cff00bc79aef5891c074fbcf9b4954f2295a80fd4a900b133413c38da56d3cf469ec30ac3f6231b57d48f23532b0ea79d790c674ba1bbafe4745cd62ca61

  • C:\Users\Admin\AppData\Local\Temp\PurchaseorderN3455.xll
    Filesize

    560KB

    MD5

    831052f170e6d906cdc9dbed25ac1f24

    SHA1

    6b51a5a21dfc8b68ad85ef9a93d815b56b38d058

    SHA256

    fe0c53f6201f2bc220745f6fd58a8bad448aea825320341389feb6b42cbd76e9

    SHA512

    a054cff00bc79aef5891c074fbcf9b4954f2295a80fd4a900b133413c38da56d3cf469ec30ac3f6231b57d48f23532b0ea79d790c674ba1bbafe4745cd62ca61

  • memory/3040-141-0x00007FF81B4B0000-0x00007FF81BF71000-memory.dmp
    Filesize

    10.8MB

  • memory/3040-142-0x000001FBB450C000-0x000001FBB450F000-memory.dmp
    Filesize

    12KB

  • memory/3040-134-0x00007FF803530000-0x00007FF803540000-memory.dmp
    Filesize

    64KB

  • memory/3040-135-0x00007FF8013C0000-0x00007FF8013D0000-memory.dmp
    Filesize

    64KB

  • memory/3040-136-0x00007FF8013C0000-0x00007FF8013D0000-memory.dmp
    Filesize

    64KB

  • memory/3040-132-0x00007FF803530000-0x00007FF803540000-memory.dmp
    Filesize

    64KB

  • memory/3040-138-0x000001FBB43F0000-0x000001FBB4496000-memory.dmp
    Filesize

    664KB

  • memory/3040-131-0x00007FF803530000-0x00007FF803540000-memory.dmp
    Filesize

    64KB

  • memory/3040-130-0x00007FF803530000-0x00007FF803540000-memory.dmp
    Filesize

    64KB

  • memory/3040-133-0x00007FF803530000-0x00007FF803540000-memory.dmp
    Filesize

    64KB

  • memory/3040-153-0x00007FF803530000-0x00007FF803540000-memory.dmp
    Filesize

    64KB

  • memory/3040-152-0x00007FF803530000-0x00007FF803540000-memory.dmp
    Filesize

    64KB

  • memory/3040-151-0x00007FF803530000-0x00007FF803540000-memory.dmp
    Filesize

    64KB

  • memory/3040-150-0x00007FF803530000-0x00007FF803540000-memory.dmp
    Filesize

    64KB

  • memory/4680-147-0x00000000050D0000-0x000000000510C000-memory.dmp
    Filesize

    240KB

  • memory/4680-148-0x0000000005370000-0x000000000547A000-memory.dmp
    Filesize

    1.0MB

  • memory/4680-146-0x0000000005070000-0x0000000005082000-memory.dmp
    Filesize

    72KB

  • memory/4680-145-0x0000000005600000-0x0000000005C18000-memory.dmp
    Filesize

    6.1MB

  • memory/4680-144-0x000000000041932E-mapping.dmp
  • memory/4680-143-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB