Analysis

  • max time kernel
    109s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    07-08-2022 07:31

General

  • Target

    379a6a4f7be0d0e21a5e5b996ea8aeeb.exe

  • Size

    1.2MB

  • MD5

    379a6a4f7be0d0e21a5e5b996ea8aeeb

  • SHA1

    27df283dcb89ee72f304df89d3938239acc32439

  • SHA256

    3080f7ed1cb9ec8fbf4c0cf992bd0eb9dba5f69d0342f58ebcc8943d28c77a97

  • SHA512

    e6705fc43877d4f46052f03dbd0a17cdc5afee7b2d6eec4f944556d005a613e9b356361ad3df9cb5164925f5429109d348a4c0b90018220047f8956d9b32f4b8

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Sup: @mr_golds)

C2

193.233.193.14:8163

Attributes
  • auth_value

    56c6f7b9024c076f0a96931453da7e56

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 4 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 46 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\379a6a4f7be0d0e21a5e5b996ea8aeeb.exe
    "C:\Users\Admin\AppData\Local\Temp\379a6a4f7be0d0e21a5e5b996ea8aeeb.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1656
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:186120
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://take-realprize.life/?u=lq1pd08&o=hdck0gl
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:186144
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:186144 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:816

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    1d34ba5b878bd7e4d3b7591514148330

    SHA1

    0a6debfb7644eef455c553d5ba9008dac8d81cd9

    SHA256

    d203e801ef8640e07c7f801933cc387e593f17502d522d62489ee9b4a7e631a4

    SHA512

    2ba16d271042eae2bac31ce1259007d31f9564ea0961a483754c751718279f7049a36e802b6171e227722c02cc1fac26d7564427b3847ded642118151dd05000

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\IKV4TDFQ.txt
    Filesize

    605B

    MD5

    b6abc2d27f5f920f3e460c99262b1eac

    SHA1

    80ada88012a4756763367c3f1fb6ac82c68dd115

    SHA256

    8746ac418ac65cc629e777454095b55ffd1d0404f61044866490970b5d8085e2

    SHA512

    1f9e9f0db43865c6d8a8926224282d77672838914a6ebb208808c0ec0062671ca46a5f27652220c3ef87f1b5ff90ade55de5956df3b1a928d9c141a1566d6dd5

  • memory/186120-54-0x0000000000090000-0x00000000000B0000-memory.dmp
    Filesize

    128KB

  • memory/186120-56-0x0000000000090000-0x00000000000B0000-memory.dmp
    Filesize

    128KB

  • memory/186120-61-0x00000000000AAE1E-mapping.dmp
  • memory/186120-63-0x0000000000090000-0x00000000000B0000-memory.dmp
    Filesize

    128KB

  • memory/186120-62-0x0000000000090000-0x00000000000B0000-memory.dmp
    Filesize

    128KB

  • memory/186120-64-0x0000000075591000-0x0000000075593000-memory.dmp
    Filesize

    8KB