Analysis

  • max time kernel
    83s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/07/2022, 04:26

General

  • Target

    Kiddions Mod Menu/modest-menu.exe

  • Size

    500.1MB

  • MD5

    8e3a0566155d6310391de7011d9c3b33

  • SHA1

    3a5e635addf62e54ee9c86774a2fac8abc7a4c1b

  • SHA256

    7f1a50c3ccef0f5173b87e25b597d9610292f0d956e15f2f31d3d5373adec5c3

  • SHA512

    b9686d1be20b0df6bf32de7e46c95e1ecd6f155849eba2b0635799631a3aa264e35276eaae87a0913484628c225c452cd209c84b9f0ea52f01ab2b414dd64b7e

Malware Config

Extracted

Family

redline

C2

193.106.191.160:8673

Attributes
  • auth_value

    9c8dd7353be7ed4b6832da21d8d0d902

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Kiddions Mod Menu\modest-menu.exe
    "C:\Users\Admin\AppData\Local\Temp\Kiddions Mod Menu\modest-menu.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2696

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2696-130-0x00000000008D0000-0x00000000008F0000-memory.dmp

    Filesize

    128KB

  • memory/2696-131-0x00000000057D0000-0x0000000005DE8000-memory.dmp

    Filesize

    6.1MB

  • memory/2696-132-0x0000000005260000-0x0000000005272000-memory.dmp

    Filesize

    72KB

  • memory/2696-133-0x0000000005390000-0x000000000549A000-memory.dmp

    Filesize

    1.0MB

  • memory/2696-134-0x00000000052C0000-0x00000000052FC000-memory.dmp

    Filesize

    240KB

  • memory/2696-135-0x0000000005640000-0x00000000056B6000-memory.dmp

    Filesize

    472KB

  • memory/2696-136-0x00000000056C0000-0x0000000005752000-memory.dmp

    Filesize

    584KB

  • memory/2696-137-0x00000000063A0000-0x0000000006944000-memory.dmp

    Filesize

    5.6MB

  • memory/2696-138-0x0000000005F30000-0x0000000005F4E000-memory.dmp

    Filesize

    120KB

  • memory/2696-139-0x0000000006250000-0x00000000062B6000-memory.dmp

    Filesize

    408KB

  • memory/2696-140-0x0000000007950000-0x00000000079A0000-memory.dmp

    Filesize

    320KB

  • memory/2696-141-0x0000000007B70000-0x0000000007D32000-memory.dmp

    Filesize

    1.8MB

  • memory/2696-142-0x0000000008270000-0x000000000879C000-memory.dmp

    Filesize

    5.2MB