Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
28-06-2022 02:58
Static task
static1
Behavioral task
behavioral1
Sample
Pre Order July.js
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Pre Order July.js
Resource
win10v2004-20220414-en
General
-
Target
Pre Order July.js
-
Size
215KB
-
MD5
2e159cf4f5924625a4eaa85394878bf3
-
SHA1
9d5f3c428d9681fe05804b24bc38b6131c3bef19
-
SHA256
4f21d283e1fec9f76d4855d6dc903a18f356ee0f71334f8dc5780047a9f1ad86
-
SHA512
7fad1197e2c0f216e75986ba7044c1f02ebb01c8b2175ace3156a5d88f065b8c49da1ba3c2310200bd1bf9bb51b76a6a1f01cc4de8a73dc87dddd0443b7ba072
Malware Config
Extracted
redline
Mr TT
45.138.16.233:1985
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\build.exe family_redline C:\Users\Admin\AppData\Local\Temp\build.exe family_redline behavioral1/memory/1272-61-0x0000000000170000-0x000000000018E000-memory.dmp family_redline -
Blocklisted process makes network request 16 IoCs
Processes:
wscript.exeflow pid process 5 1428 wscript.exe 8 1428 wscript.exe 9 1428 wscript.exe 11 1428 wscript.exe 13 1428 wscript.exe 14 1428 wscript.exe 16 1428 wscript.exe 17 1428 wscript.exe 18 1428 wscript.exe 20 1428 wscript.exe 21 1428 wscript.exe 22 1428 wscript.exe 24 1428 wscript.exe 25 1428 wscript.exe 26 1428 wscript.exe 28 1428 wscript.exe -
Executes dropped EXE 1 IoCs
Processes:
build.exepid process 1272 build.exe -
Drops startup file 2 IoCs
Processes:
wscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\JnljuzseMt.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\JnljuzseMt.js wscript.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
wscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows\CurrentVersion\Run\YVBPFHTJIQ = "\"C:\\Users\\Admin\\AppData\\Roaming\\JnljuzseMt.js\"" wscript.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
build.exepid process 1272 build.exe 1272 build.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
build.exedescription pid process Token: SeDebugPrivilege 1272 build.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
wscript.exedescription pid process target process PID 1172 wrote to memory of 1428 1172 wscript.exe wscript.exe PID 1172 wrote to memory of 1428 1172 wscript.exe wscript.exe PID 1172 wrote to memory of 1428 1172 wscript.exe wscript.exe PID 1172 wrote to memory of 1272 1172 wscript.exe build.exe PID 1172 wrote to memory of 1272 1172 wscript.exe build.exe PID 1172 wrote to memory of 1272 1172 wscript.exe build.exe PID 1172 wrote to memory of 1272 1172 wscript.exe build.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\Pre Order July.js"1⤵
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\JnljuzseMt.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:1428
-
-
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1272
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD5c30ab843caae4b12e9aa920c4255d643
SHA1b40641463c19ff90e81ac3429fd75f2c07551bd6
SHA256f98805db5cd7a1efd80f8d7ff63da61892e738a659840a490e0fb41a05b364f7
SHA51274ac72cde2e955d4579928c1570c8369e6c6be5a93294c8df9fb86868a615ef5bcc8b52dfa958ba11d185c175e404b100ee46bd89c184d5a610cce9a5f16c75d
-
Filesize
95KB
MD5c30ab843caae4b12e9aa920c4255d643
SHA1b40641463c19ff90e81ac3429fd75f2c07551bd6
SHA256f98805db5cd7a1efd80f8d7ff63da61892e738a659840a490e0fb41a05b364f7
SHA51274ac72cde2e955d4579928c1570c8369e6c6be5a93294c8df9fb86868a615ef5bcc8b52dfa958ba11d185c175e404b100ee46bd89c184d5a610cce9a5f16c75d
-
Filesize
17KB
MD59d7e8289bbdbe8e180ea8f34b27272df
SHA1a8b81ca2f4f2d0d3860e1f89bb5b26b205f5c296
SHA2568a7822ef6de75f7369f813589d517863961930d61b284a5b0825186e4e2a7f8b
SHA512f30392ee5ee2b24bb0edc334e745c06d31b892b44aa8a1533ebb1364e92652f0a9b207bc7231b2c790416bf00017269f9056f52b3ac1c5955ffd3aca681541e2