Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10-20220414-en
  • submitted
    23-06-2022 14:05

General

  • Target

    5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9.exe

  • Size

    54KB

  • MD5

    bf3f098255fe2c23b9135409652e72c2

  • SHA1

    a8ec905d04c72ec2fa4099fafa2fc29caa8749a7

  • SHA256

    5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9

  • SHA512

    67dee018ca82b424d6607f79a2978a2727d08b1ca0495b6099eb2b493d5981d7b9c98d8adeba10272208ea7136339d239733b997636554179dda6771cf3fa9ee

Malware Config

Extracted

Family

redline

Botnet

kista

C2

65.108.27.131:45256

Attributes
  • auth_value

    4573bf97dc6f0f5ec522dbf1c8c7410e

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Executes dropped EXE 5 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9.exe
    "C:\Users\Admin\AppData\Local\Temp\5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2308
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c timeout 45
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4740
      • C:\Windows\SysWOW64\timeout.exe
        timeout 45
        3⤵
        • Delays execution with timeout.exe
        PID:1956
    • C:\Users\Admin\AppData\Local\Temp\Ddxrrdkydmax2.exe
      "C:\Users\Admin\AppData\Local\Temp\Ddxrrdkydmax2.exe"
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:4832
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4920
  • C:\Users\Admin\AppData\Local\Temp\B94D.exe
    C:\Users\Admin\AppData\Local\Temp\B94D.exe
    1⤵
    • Executes dropped EXE
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4208
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Installer_ovl.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Installer_ovl.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:300
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c timeout 45
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2584
        • C:\Windows\system32\timeout.exe
          timeout 45
          4⤵
          • Delays execution with timeout.exe
          PID:3508
  • C:\Users\Admin\AppData\Local\Temp\BC4C.exe
    C:\Users\Admin\AppData\Local\Temp\BC4C.exe
    1⤵
    • Executes dropped EXE
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3840
    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Installer_ovl.exe
      C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Installer_ovl.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1624
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c timeout 45
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3852
        • C:\Windows\system32\timeout.exe
          timeout 45
          4⤵
          • Delays execution with timeout.exe
          PID:2564
  • C:\Windows\SysWOW64\explorer.exe
    C:\Windows\SysWOW64\explorer.exe
    1⤵
    • Accesses Microsoft Outlook profiles
    • outlook_office_path
    • outlook_win_path
    PID:664
  • C:\Windows\explorer.exe
    C:\Windows\explorer.exe
    1⤵
      PID:1040

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\B94D.exe

      Filesize

      233KB

      MD5

      c6763d96b0d93b647ccd9e92d05a9515

      SHA1

      bfa3a6e5d0e5a911c1c0df5fe7a70d34dc5853df

      SHA256

      6ac7bdfcec3a05380e0b0a0b98f69402228a42231e1b971da608b3ae2e53b3f3

      SHA512

      bf74f537af8fc04b6efc11a3feb142043f98b35c738d5a6d75adf4772a4bf957e9e9fb0703c339ddf346f58a1dc358980d22e981b7f6295509dfa8cca885aac0

    • C:\Users\Admin\AppData\Local\Temp\BC4C.exe

      Filesize

      1.7MB

      MD5

      6ebe920611d779570697c3aaa7a47990

      SHA1

      343830e9727f173eef48a9f565a98ed4abe3e0f8

      SHA256

      fefde35b7516cdc47f063eb152fcea8d7302ecfb02edc1826c7e36f3b1a90c8f

      SHA512

      ae2f0e457ee1fcd80637b9bf6e1d110a99d8470a1b0932a9341cc54664d4f6ea1bcd216899c2888040bbd179f8e34caa9bbc7b22f11c202da0729659c1ee4560

    • C:\Users\Admin\AppData\Local\Temp\Ddxrrdkydmax2.exe

      Filesize

      29KB

      MD5

      45cdecf77c4b82438412f4d1245c8330

      SHA1

      61f2a7263e8e499acd0982795f08c61f67ad1c1b

      SHA256

      5701c203c90172150cb55c80e26509f0e2fafc7fc97e04b4706f433daaebc1d7

      SHA512

      f9b26b53fedaffd9b21a68192c9a5d7c69017b35e4a75c5a6b7646c54b8e2b6592fda9e85b81b5dd4967166cb73987aa640adf8bbb93e2186dadb8839d6fd1e1

    • C:\Users\Admin\AppData\Local\Temp\Ddxrrdkydmax2.exe

      Filesize

      29KB

      MD5

      45cdecf77c4b82438412f4d1245c8330

      SHA1

      61f2a7263e8e499acd0982795f08c61f67ad1c1b

      SHA256

      5701c203c90172150cb55c80e26509f0e2fafc7fc97e04b4706f433daaebc1d7

      SHA512

      f9b26b53fedaffd9b21a68192c9a5d7c69017b35e4a75c5a6b7646c54b8e2b6592fda9e85b81b5dd4967166cb73987aa640adf8bbb93e2186dadb8839d6fd1e1

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Installer_ovl.exe

      Filesize

      95.4MB

      MD5

      3eb740375f0bfb1e1a33caae9196ecac

      SHA1

      d1cf9f18e09cfe243c901dbf7f6770e5696c305e

      SHA256

      07b0ed7c89d46efd0b09a54938eded91ba0c894752c2ff0fccd5503157e6ff1c

      SHA512

      e008846771cbcce839449675c9d5bb1abdced540fa691e54a1b59f5e03970250d3edbefed976230894a55b34ac141399734272f307bb0c4438f060b42091a22f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Installer_ovl.exe

      Filesize

      95.4MB

      MD5

      3eb740375f0bfb1e1a33caae9196ecac

      SHA1

      d1cf9f18e09cfe243c901dbf7f6770e5696c305e

      SHA256

      07b0ed7c89d46efd0b09a54938eded91ba0c894752c2ff0fccd5503157e6ff1c

      SHA512

      e008846771cbcce839449675c9d5bb1abdced540fa691e54a1b59f5e03970250d3edbefed976230894a55b34ac141399734272f307bb0c4438f060b42091a22f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Installer_ovl.exe

      Filesize

      331.9MB

      MD5

      a75b062e777e657eb9bd0fed9e649522

      SHA1

      0e3dcbc476715287a1cde80931f45435fd452a31

      SHA256

      e6bb6b6d67fe4825aca2da3df22a6ed539e2d6a20618db9c95a13391e0c3f6e8

      SHA512

      9f0a80095e515c5f8127d71b83e81b5387c8915938b504f316a9b30bc4ec365ed7a9aabe238b33401df772079162293a3ec0252888ccb509f78e0b0ad136cfec

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Installer_ovl.exe

      Filesize

      340.0MB

      MD5

      ea7a392d598f019aef884eb6ed4228e9

      SHA1

      9f49dda62e9c79592f8200ad3b8bb2d6ac7094d2

      SHA256

      5f6a97419e72a8b72308c8aec4fd3b240813af81c59c5f8f134d95942b981750

      SHA512

      a46de27e1395f1feb582004c769a1ebc2ea4eba3838dadef25fb973779ca7a256a73090b201847fed4910aeebef34ea5553827cc1003203e48a9fab3971e809c

    • memory/300-417-0x0000000000640000-0x0000000000648000-memory.dmp

      Filesize

      32KB

    • memory/300-461-0x0000000020180000-0x00000000202B2000-memory.dmp

      Filesize

      1.2MB

    • memory/300-410-0x0000000000000000-mapping.dmp

    • memory/300-457-0x000000001D7C0000-0x000000001D982000-memory.dmp

      Filesize

      1.8MB

    • memory/664-458-0x0000000001200000-0x000000000126B000-memory.dmp

      Filesize

      428KB

    • memory/664-438-0x00000000036B0000-0x0000000003724000-memory.dmp

      Filesize

      464KB

    • memory/664-439-0x0000000001200000-0x000000000126B000-memory.dmp

      Filesize

      428KB

    • memory/664-374-0x0000000000000000-mapping.dmp

    • memory/1040-408-0x0000000000330000-0x000000000033C000-memory.dmp

      Filesize

      48KB

    • memory/1040-398-0x0000000000000000-mapping.dmp

    • memory/1624-453-0x00000250BB0B0000-0x00000250BB1E0000-memory.dmp

      Filesize

      1.2MB

    • memory/1624-459-0x00000250BB3E0000-0x00000250BB480000-memory.dmp

      Filesize

      640KB

    • memory/1624-446-0x0000000000000000-mapping.dmp

    • memory/1624-450-0x000002509F440000-0x000002509F57C000-memory.dmp

      Filesize

      1.2MB

    • memory/1956-219-0x0000000000000000-mapping.dmp

    • memory/2308-173-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-185-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-140-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-141-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-142-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-143-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-144-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-145-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-146-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-147-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-148-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-149-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-150-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-151-0x00000000004E0000-0x00000000004F2000-memory.dmp

      Filesize

      72KB

    • memory/2308-152-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-153-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-154-0x00000000051E0000-0x00000000056DE000-memory.dmp

      Filesize

      5.0MB

    • memory/2308-155-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-156-0x0000000004DC0000-0x0000000004E52000-memory.dmp

      Filesize

      584KB

    • memory/2308-157-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-158-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-159-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-160-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-161-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-162-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-163-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-164-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-165-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-166-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-167-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-168-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-169-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-170-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-171-0x00000000027E0000-0x00000000027EA000-memory.dmp

      Filesize

      40KB

    • memory/2308-172-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-138-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-174-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-175-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-176-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-177-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-178-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-179-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-180-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-181-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-182-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-183-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-184-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-139-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-202-0x0000000007C30000-0x0000000007CFA000-memory.dmp

      Filesize

      808KB

    • memory/2308-203-0x0000000007E20000-0x0000000007E6C000-memory.dmp

      Filesize

      304KB

    • memory/2308-118-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-119-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-120-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-121-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-122-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-123-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-124-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-125-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-126-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-127-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-128-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-129-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-130-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-131-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-132-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-133-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-134-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-137-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-136-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2308-135-0x0000000077920000-0x0000000077AAE000-memory.dmp

      Filesize

      1.6MB

    • memory/2564-462-0x0000000000000000-mapping.dmp

    • memory/2584-463-0x0000000000000000-mapping.dmp

    • memory/3508-464-0x0000000000000000-mapping.dmp

    • memory/3840-372-0x0000000000000000-mapping.dmp

    • memory/3852-460-0x0000000000000000-mapping.dmp

    • memory/4208-370-0x0000000000000000-mapping.dmp

    • memory/4740-213-0x0000000000000000-mapping.dmp

    • memory/4832-344-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/4832-242-0x0000000000000000-mapping.dmp

    • memory/4832-254-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/4920-345-0x0000000005940000-0x00000000059B6000-memory.dmp

      Filesize

      472KB

    • memory/4920-312-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/4920-274-0x000000000041AD82-mapping.dmp

    • memory/4920-333-0x0000000005B00000-0x0000000006106000-memory.dmp

      Filesize

      6.0MB

    • memory/4920-334-0x0000000005550000-0x0000000005562000-memory.dmp

      Filesize

      72KB

    • memory/4920-335-0x0000000005680000-0x000000000578A000-memory.dmp

      Filesize

      1.0MB

    • memory/4920-338-0x00000000055B0000-0x00000000055EE000-memory.dmp

      Filesize

      248KB

    • memory/4920-340-0x00000000055F0000-0x000000000563B000-memory.dmp

      Filesize

      300KB

    • memory/4920-349-0x0000000005A20000-0x0000000005A3E000-memory.dmp

      Filesize

      120KB

    • memory/4920-351-0x00000000064C0000-0x0000000006526000-memory.dmp

      Filesize

      408KB

    • memory/4920-359-0x00000000070E0000-0x00000000072A2000-memory.dmp

      Filesize

      1.8MB

    • memory/4920-360-0x00000000077E0000-0x0000000007D0C000-memory.dmp

      Filesize

      5.2MB

    • memory/4920-365-0x00000000072B0000-0x0000000007300000-memory.dmp

      Filesize

      320KB