Analysis

  • max time kernel
    40s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    09/09/2022, 10:40

General

  • Target

    redacted.jpg.scr

  • Size

    700.0MB

  • MD5

    272f96f8b005dab844b267860ce3082d

  • SHA1

    0ed1e76aaf1adff201a1ac2a63d8ede09a7b98bd

  • SHA256

    ed76dd6460c93d09238b4d858e977daa442cf2949c4883865490d9b2c12567c9

  • SHA512

    ea929a1a3c70f8a087eb0f974358ecb4e48c2836697be04b574ae69b582623d3322e7f79bda951a9c2eb7bd6dd28591e24f5fa856557bf973442eb7c947fe53f

  • SSDEEP

    6144:tojroPa0Cy0YLcZtXC/m3fqvHUkxChx48RLwJ:toYKyFgZ/3fhkxChx4f

Malware Config

Extracted

Family

redline

Botnet

08-09-2022

C2

212.162.153.140:3710

Attributes
  • auth_value

    9dceadc00edb791e53b479021774f4c6

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • .NET Reactor proctector 1 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\redacted.jpg.scr
    "C:\Users\Admin\AppData\Local\Temp\redacted.jpg.scr" /S
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1100
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAyAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1332
    • C:\Users\Admin\AppData\Local\Temp\redacted.jpg.scr
      C:\Users\Admin\AppData\Local\Temp\redacted.jpg.scr
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1504
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:584

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Qbaxjjtdzhjphneimage 2022-09-08 105602.jpg

          Filesize

          130KB

          MD5

          4cad44ab96b13db13d95e5e67bba4805

          SHA1

          962c6edd6648c69b32957e9b46d0b06c92833329

          SHA256

          2db57f3f42be9cb18ba59a77d93013565bd2bc4c66b60ecda995e8e77f70b577

          SHA512

          0d14e631d022aa617a883e18617236c0a6a4f9107f782c3275ac863dcf1bcb8fb0908037f5a2bb4074fee2b2506b4ea50788768d9f826c1ab99317d83ddf15c6

        • memory/1100-54-0x00000000008B0000-0x000000000095C000-memory.dmp

          Filesize

          688KB

        • memory/1100-55-0x00000000763F1000-0x00000000763F3000-memory.dmp

          Filesize

          8KB

        • memory/1100-56-0x00000000058A0000-0x0000000005990000-memory.dmp

          Filesize

          960KB

        • memory/1100-57-0x00000000054D0000-0x0000000005562000-memory.dmp

          Filesize

          584KB

        • memory/1332-60-0x000000006FB20000-0x00000000700CB000-memory.dmp

          Filesize

          5.7MB

        • memory/1332-61-0x000000006FB20000-0x00000000700CB000-memory.dmp

          Filesize

          5.7MB

        • memory/1504-64-0x0000000000400000-0x000000000041C000-memory.dmp

          Filesize

          112KB

        • memory/1504-66-0x0000000000400000-0x000000000041C000-memory.dmp

          Filesize

          112KB

        • memory/1504-67-0x0000000000400000-0x000000000041C000-memory.dmp

          Filesize

          112KB

        • memory/1504-68-0x0000000000400000-0x000000000041C000-memory.dmp

          Filesize

          112KB

        • memory/1504-73-0x0000000000400000-0x000000000041C000-memory.dmp

          Filesize

          112KB

        • memory/1504-71-0x0000000000400000-0x000000000041C000-memory.dmp

          Filesize

          112KB

        • memory/1504-63-0x0000000000400000-0x000000000041C000-memory.dmp

          Filesize

          112KB