Analysis

  • max time kernel
    60s
  • max time network
    64s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-07-2022 19:02

General

  • Target

    F37840944A4FB524B17D6F9C8EF20CE4.exe

  • Size

    4.9MB

  • MD5

    f37840944a4fb524b17d6f9c8ef20ce4

  • SHA1

    d1269e6ed28e04d4e977ca35ba8264191aa1a9c3

  • SHA256

    bdd0e54346507ed5f33f4ef7f1261ce899764c64ec7eb0b2d722e509fc3b7b3a

  • SHA512

    7cb39fb8e22c126e8132a75bab82297bd9176839546060a686f6540bab7405bcb4671dd41e5a2903e2d45894c0a111866a3fa95287cce4d175c627b0e9b7ca0c

Malware Config

Extracted

Family

redline

Botnet

allsup

C2

193.150.103.38:18410

Attributes
  • auth_value

    e46711734d1a10599f62ed229e676578

Extracted

Family

redline

Botnet

top1

C2

pemararslava.xyz:80

Attributes
  • auth_value

    e3ff30d1ffe0ffdb11211b351a0179a1

Extracted

Family

redline

Botnet

Lyla29.07

C2

185.215.113.216:21921

Attributes
  • auth_value

    ce5605b2c036c2c3b7bdfb23dcf5f5a2

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\F37840944A4FB524B17D6F9C8EF20CE4.exe
    "C:\Users\Admin\AppData\Local\Temp\F37840944A4FB524B17D6F9C8EF20CE4.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3824
    • C:\Users\Admin\AppData\Local\Temp\F37840944A4FB524B17D6F9C8EF20CE4.exe
      "C:\Users\Admin\AppData\Local\Temp\F37840944A4FB524B17D6F9C8EF20CE4.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4624
      • C:\Users\Admin\AppData\Local\Temp\5992MGKM7BG2970.exe
        "C:\Users\Admin\AppData\Local\Temp\5992MGKM7BG2970.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4044
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:134308
      • C:\Users\Admin\AppData\Local\Temp\H3IM01BH0GH52KB.exe
        "C:\Users\Admin\AppData\Local\Temp\H3IM01BH0GH52KB.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:85548
        • C:\Users\Admin\AppData\Local\Temp\H3IM01BH0GH52KB.exe
          "C:\Users\Admin\AppData\Local\Temp\H3IM01BH0GH52KB.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:124784
      • C:\Users\Admin\AppData\Local\Temp\2C88I3L78BIAI2M.exe
        "C:\Users\Admin\AppData\Local\Temp\2C88I3L78BIAI2M.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:134372
        • C:\Users\Admin\AppData\Local\Temp\2C88I3L78BIAI2M.exe
          "C:\Users\Admin\AppData\Local\Temp\2C88I3L78BIAI2M.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:134424
      • C:\Users\Admin\AppData\Local\Temp\M342BE0JAACC5EC.exe
        https://iplogger.org/1x5az7
        3⤵
        • Executes dropped EXE
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:134932

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\2C88I3L78BIAI2M.exe.log
    Filesize

    42B

    MD5

    84cfdb4b995b1dbf543b26b86c863adc

    SHA1

    d2f47764908bf30036cf8248b9ff5541e2711fa2

    SHA256

    d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b

    SHA512

    485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\H3IM01BH0GH52KB.exe.log
    Filesize

    42B

    MD5

    84cfdb4b995b1dbf543b26b86c863adc

    SHA1

    d2f47764908bf30036cf8248b9ff5541e2711fa2

    SHA256

    d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b

    SHA512

    485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce

  • C:\Users\Admin\AppData\Local\Temp\2C88I3L78BIAI2M.exe
    Filesize

    2.0MB

    MD5

    2eef072591fa615c5a3e8762076210d2

    SHA1

    9d1346230f5d49439bfa5556f9cd35fc2466217b

    SHA256

    4cc07d33c48084395ed0c7ffcaf9549d9cbe961b7e9c33ef546826cbe3b94817

    SHA512

    325f695ebef428c80371c1d1ddf7bbbab71df12c3a695972c38efdb687d1b9f358736832055337fc834a703b5479faba408f5e57d18d8aba5725ac89513118a6

  • C:\Users\Admin\AppData\Local\Temp\2C88I3L78BIAI2M.exe
    Filesize

    2.0MB

    MD5

    2eef072591fa615c5a3e8762076210d2

    SHA1

    9d1346230f5d49439bfa5556f9cd35fc2466217b

    SHA256

    4cc07d33c48084395ed0c7ffcaf9549d9cbe961b7e9c33ef546826cbe3b94817

    SHA512

    325f695ebef428c80371c1d1ddf7bbbab71df12c3a695972c38efdb687d1b9f358736832055337fc834a703b5479faba408f5e57d18d8aba5725ac89513118a6

  • C:\Users\Admin\AppData\Local\Temp\2C88I3L78BIAI2M.exe
    Filesize

    2.0MB

    MD5

    2eef072591fa615c5a3e8762076210d2

    SHA1

    9d1346230f5d49439bfa5556f9cd35fc2466217b

    SHA256

    4cc07d33c48084395ed0c7ffcaf9549d9cbe961b7e9c33ef546826cbe3b94817

    SHA512

    325f695ebef428c80371c1d1ddf7bbbab71df12c3a695972c38efdb687d1b9f358736832055337fc834a703b5479faba408f5e57d18d8aba5725ac89513118a6

  • C:\Users\Admin\AppData\Local\Temp\5992MGKM7BG2970.exe
    Filesize

    1.2MB

    MD5

    610f45e860890aa17b10d76892abf71b

    SHA1

    5e9ed4e242e469bd1a833880a7cdeb2d34cbc993

    SHA256

    234c66dc304dd9fc71382a6db667adf012235c189b23c849b902b94fb8446e07

    SHA512

    ae6efe6dc11a1ff767b87ba64bc9db209514c6ad640d6932218850d7c946cdf26ac8f7adb15ffa573df4ccf2643b01b9806830695561a6fc883f39c441a837be

  • C:\Users\Admin\AppData\Local\Temp\5992MGKM7BG2970.exe
    Filesize

    1.2MB

    MD5

    610f45e860890aa17b10d76892abf71b

    SHA1

    5e9ed4e242e469bd1a833880a7cdeb2d34cbc993

    SHA256

    234c66dc304dd9fc71382a6db667adf012235c189b23c849b902b94fb8446e07

    SHA512

    ae6efe6dc11a1ff767b87ba64bc9db209514c6ad640d6932218850d7c946cdf26ac8f7adb15ffa573df4ccf2643b01b9806830695561a6fc883f39c441a837be

  • C:\Users\Admin\AppData\Local\Temp\H3IM01BH0GH52KB.exe
    Filesize

    5.4MB

    MD5

    ac46ec2d34d137b39cdde96e804d6128

    SHA1

    2ab4df67e4223b5c08776d5dbc246f461f88d204

    SHA256

    74258ee714848100e986b7524913f65fec36e60f24c25f295b985c3314ed4167

    SHA512

    bcc9c789d7733a2bb63c427a2bedbd649d20674664278bf22bbbde5bd57a62aa5c779cfa31377c428c8307bcb0c48c0f58d991d50411eb49a51d2f46fc31c16c

  • C:\Users\Admin\AppData\Local\Temp\H3IM01BH0GH52KB.exe
    Filesize

    5.4MB

    MD5

    ac46ec2d34d137b39cdde96e804d6128

    SHA1

    2ab4df67e4223b5c08776d5dbc246f461f88d204

    SHA256

    74258ee714848100e986b7524913f65fec36e60f24c25f295b985c3314ed4167

    SHA512

    bcc9c789d7733a2bb63c427a2bedbd649d20674664278bf22bbbde5bd57a62aa5c779cfa31377c428c8307bcb0c48c0f58d991d50411eb49a51d2f46fc31c16c

  • C:\Users\Admin\AppData\Local\Temp\H3IM01BH0GH52KB.exe
    Filesize

    5.4MB

    MD5

    ac46ec2d34d137b39cdde96e804d6128

    SHA1

    2ab4df67e4223b5c08776d5dbc246f461f88d204

    SHA256

    74258ee714848100e986b7524913f65fec36e60f24c25f295b985c3314ed4167

    SHA512

    bcc9c789d7733a2bb63c427a2bedbd649d20674664278bf22bbbde5bd57a62aa5c779cfa31377c428c8307bcb0c48c0f58d991d50411eb49a51d2f46fc31c16c

  • C:\Users\Admin\AppData\Local\Temp\M342BE0JAACC5EC.exe
    Filesize

    8KB

    MD5

    8719ce641e7c777ac1b0eaec7b5fa7c7

    SHA1

    c04de52cb511480cc7d00d67f1d9e17b02d6406b

    SHA256

    6283ac6ecbf4c4038cf44896dd221c7c11152bac77273709330409032c3e72ea

    SHA512

    7be5bd6d2342dd02818f1979e7e74a6376658711ac82a59b2af1a67207cfd3c7416b657af01216473b15132e4aa5c6675f0eb8ee6343192c7dfc4a5249ccaa97

  • C:\Users\Admin\AppData\Local\Temp\M342BE0JAACC5EC.exe
    Filesize

    8KB

    MD5

    8719ce641e7c777ac1b0eaec7b5fa7c7

    SHA1

    c04de52cb511480cc7d00d67f1d9e17b02d6406b

    SHA256

    6283ac6ecbf4c4038cf44896dd221c7c11152bac77273709330409032c3e72ea

    SHA512

    7be5bd6d2342dd02818f1979e7e74a6376658711ac82a59b2af1a67207cfd3c7416b657af01216473b15132e4aa5c6675f0eb8ee6343192c7dfc4a5249ccaa97

  • memory/3824-130-0x0000000000F30000-0x0000000001449000-memory.dmp
    Filesize

    5.1MB

  • memory/4044-142-0x0000000000000000-mapping.dmp
  • memory/4624-141-0x0000000000B00000-0x0000000000B33000-memory.dmp
    Filesize

    204KB

  • memory/4624-132-0x0000000000B00000-0x0000000000B33000-memory.dmp
    Filesize

    204KB

  • memory/4624-137-0x0000000000B00000-0x0000000000B33000-memory.dmp
    Filesize

    204KB

  • memory/4624-131-0x0000000000000000-mapping.dmp
  • memory/85548-145-0x0000000000000000-mapping.dmp
  • memory/85548-148-0x0000000000640000-0x0000000000BC8000-memory.dmp
    Filesize

    5.5MB

  • memory/124784-149-0x0000000000000000-mapping.dmp
  • memory/124784-178-0x00000000080C0000-0x0000000008110000-memory.dmp
    Filesize

    320KB

  • memory/124784-150-0x0000000000F90000-0x0000000000FB0000-memory.dmp
    Filesize

    128KB

  • memory/124784-165-0x0000000005550000-0x000000000565A000-memory.dmp
    Filesize

    1.0MB

  • memory/124784-163-0x0000000005980000-0x0000000005F98000-memory.dmp
    Filesize

    6.1MB

  • memory/134308-164-0x0000000004920000-0x0000000004932000-memory.dmp
    Filesize

    72KB

  • memory/134308-175-0x0000000006070000-0x000000000608E000-memory.dmp
    Filesize

    120KB

  • memory/134308-153-0x0000000000000000-mapping.dmp
  • memory/134308-154-0x0000000000180000-0x000000000019E000-memory.dmp
    Filesize

    120KB

  • memory/134308-170-0x0000000004980000-0x00000000049BC000-memory.dmp
    Filesize

    240KB

  • memory/134308-171-0x0000000005CA0000-0x0000000005D06000-memory.dmp
    Filesize

    408KB

  • memory/134308-172-0x00000000063D0000-0x0000000006974000-memory.dmp
    Filesize

    5.6MB

  • memory/134308-173-0x0000000005F10000-0x0000000005FA2000-memory.dmp
    Filesize

    584KB

  • memory/134308-174-0x0000000005FB0000-0x0000000006026000-memory.dmp
    Filesize

    472KB

  • memory/134308-177-0x00000000074A0000-0x00000000079CC000-memory.dmp
    Filesize

    5.2MB

  • memory/134308-176-0x0000000006DA0000-0x0000000006F62000-memory.dmp
    Filesize

    1.8MB

  • memory/134372-159-0x0000000000000000-mapping.dmp
  • memory/134372-162-0x0000000000A00000-0x0000000000C1B000-memory.dmp
    Filesize

    2.1MB

  • memory/134424-166-0x0000000000000000-mapping.dmp
  • memory/134424-167-0x0000000000DE0000-0x0000000000DFE000-memory.dmp
    Filesize

    120KB

  • memory/134932-179-0x0000000000000000-mapping.dmp
  • memory/134932-182-0x0000020DAFE20000-0x0000020DAFE26000-memory.dmp
    Filesize

    24KB

  • memory/134932-183-0x00007FFCF2E40000-0x00007FFCF3901000-memory.dmp
    Filesize

    10.8MB

  • memory/134932-185-0x00000215CD860000-0x00000215CE006000-memory.dmp
    Filesize

    7.6MB

  • memory/134932-186-0x00007FFCF2E40000-0x00007FFCF3901000-memory.dmp
    Filesize

    10.8MB