Analysis

  • max time kernel
    107s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    27-05-2022 14:21

General

  • Target

    a76608f42563198c86f4a7f10ea910cc.exe

  • Size

    374KB

  • MD5

    a76608f42563198c86f4a7f10ea910cc

  • SHA1

    8ea79e0e0523e9b7d1993ab08408d3b369c2a802

  • SHA256

    05a3028bc4f10ff3387b486c171178f7d5a4864de59f6693d2dcbdae035820d1

  • SHA512

    0bad64c511d78964da9397813876c49102cd34031dbdbd61304cef33136c82b3830bee8623ed7f4dc067f0b6c90956d5b04843c64b218458ad8a3cdf44378091

Malware Config

Extracted

Family

redline

Botnet

RuzkiUNIKALNO

C2

193.233.48.58:38989

Attributes
  • auth_value

    c504b04cfbdd4bf85ce6195bcb37fba6

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3

    suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a76608f42563198c86f4a7f10ea910cc.exe
    "C:\Users\Admin\AppData\Local\Temp\a76608f42563198c86f4a7f10ea910cc.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1092
    • C:\Users\Admin\Pictures\Adobe Films\rrun.exe.exe
      "C:\Users\Admin\Pictures\Adobe Films\rrun.exe.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1068

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

2
T1112

Disabling Security Tools

1
T1089

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Pictures\Adobe Films\rrun.exe.exe
    Filesize

    415KB

    MD5

    77f3685864f058d9bd47298fb2741e04

    SHA1

    18b02934b2c22fb8786fdd03fba266a19bbaffd3

    SHA256

    0556d888fbe5dbc66e2ff5acf9e82c9d971bfb5983a9fb9786b1956030506dc8

    SHA512

    dd8cae914255e94c677588fda0409e3bb49db2451f7a8dfbccb5ac927a3ac6c8d5e1c8112d557a2ef196419335862020a8664ed45562137bd941b90f0709fb30

  • \Users\Admin\Pictures\Adobe Films\rrun.exe.exe
    Filesize

    415KB

    MD5

    77f3685864f058d9bd47298fb2741e04

    SHA1

    18b02934b2c22fb8786fdd03fba266a19bbaffd3

    SHA256

    0556d888fbe5dbc66e2ff5acf9e82c9d971bfb5983a9fb9786b1956030506dc8

    SHA512

    dd8cae914255e94c677588fda0409e3bb49db2451f7a8dfbccb5ac927a3ac6c8d5e1c8112d557a2ef196419335862020a8664ed45562137bd941b90f0709fb30

  • \Users\Admin\Pictures\Adobe Films\rrun.exe.exe
    Filesize

    415KB

    MD5

    77f3685864f058d9bd47298fb2741e04

    SHA1

    18b02934b2c22fb8786fdd03fba266a19bbaffd3

    SHA256

    0556d888fbe5dbc66e2ff5acf9e82c9d971bfb5983a9fb9786b1956030506dc8

    SHA512

    dd8cae914255e94c677588fda0409e3bb49db2451f7a8dfbccb5ac927a3ac6c8d5e1c8112d557a2ef196419335862020a8664ed45562137bd941b90f0709fb30

  • memory/1068-63-0x00000000009C0000-0x00000000009F4000-memory.dmp
    Filesize

    208KB

  • memory/1068-61-0x0000000000000000-mapping.dmp
  • memory/1068-65-0x0000000000220000-0x000000000025A000-memory.dmp
    Filesize

    232KB

  • memory/1068-64-0x0000000000AAE000-0x0000000000ADA000-memory.dmp
    Filesize

    176KB

  • memory/1068-66-0x0000000000400000-0x0000000000930000-memory.dmp
    Filesize

    5.2MB

  • memory/1068-67-0x00000000009F0000-0x0000000000A24000-memory.dmp
    Filesize

    208KB

  • memory/1092-58-0x0000000005FD0000-0x0000000006190000-memory.dmp
    Filesize

    1.8MB

  • memory/1092-57-0x0000000000400000-0x0000000002B7B000-memory.dmp
    Filesize

    39.5MB

  • memory/1092-55-0x0000000002D3E000-0x0000000002D5A000-memory.dmp
    Filesize

    112KB

  • memory/1092-56-0x0000000000230000-0x0000000000263000-memory.dmp
    Filesize

    204KB

  • memory/1092-54-0x00000000765C1000-0x00000000765C3000-memory.dmp
    Filesize

    8KB