Analysis

  • max time kernel
    93s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-09-2022 23:24

General

  • Target

    file.exe

  • Size

    247KB

  • MD5

    95e21e08113fa1ee861e09172fc3b320

  • SHA1

    bc96895c1924a58c0aa41252633ab447e0fdd979

  • SHA256

    0bcccf1737d0879c490a4769bf80d80b33c9d0cc6fe014862f88411ae35d500d

  • SHA512

    ca0cb250aaf9befeb1dd2529b8b4b9a72c71ae5925bd4cd9e0608994d271d87273fb81bb5977d2acaeb7a79a5149d3923d9f0875c4d57374d721a08b8cf9ba7f

  • SSDEEP

    6144:jighTBjzf+vi1OJ+Zdf3EzZv2jZGY93Mxg4S:RT/iEtoxg7

Malware Config

Extracted

Family

redline

Botnet

Lyla3.12.09

C2

185.215.113.216:21921

Attributes
  • auth_value

    893298c4bebea403e4a59dd151c4fcc2

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3172
    • C:\Users\Admin\AppData\Local\Temp\file.exe
      "C:\Users\Admin\AppData\Local\Temp\file.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2872
      • C:\Users\Admin\AppData\Local\Temp\560BLMC7DG56MH9.exe
        "C:\Users\Admin\AppData\Local\Temp\560BLMC7DG56MH9.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4364
        • C:\Users\Admin\AppData\Local\Temp\560BLMC7DG56MH9.exe
          "C:\Users\Admin\AppData\Local\Temp\560BLMC7DG56MH9.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2296
      • C:\Users\Admin\AppData\Local\Temp\560BLMC7DG56MH9.exe
        "C:\Users\Admin\AppData\Local\Temp\560BLMC7DG56MH9.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3512
        • C:\Users\Admin\AppData\Local\Temp\560BLMC7DG56MH9.exe
          "C:\Users\Admin\AppData\Local\Temp\560BLMC7DG56MH9.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:428
      • C:\Users\Admin\AppData\Local\Temp\0JMKAHGJ13764E1.exe
        "C:\Users\Admin\AppData\Local\Temp\0JMKAHGJ13764E1.exe"
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:5112
        • C:\Windows\SysWOW64\control.exe
          "C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\0QEt.CpL",
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4864
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\0QEt.CpL",
            5⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:3284
            • C:\Windows\system32\RunDll32.exe
              C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\0QEt.CpL",
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2504
              • C:\Windows\SysWOW64\rundll32.exe
                "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\0QEt.CpL",
                7⤵
                • Loads dropped DLL
                PID:4300
      • C:\Users\Admin\AppData\Local\Temp\0JMKAHGJ13764E1.exe
        https://iplogger.org/1DLDa7
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2588
        • C:\Windows\SysWOW64\control.exe
          "C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\0QEt.CpL",
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:364
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\0QEt.CpL",
            5⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:1412
            • C:\Windows\system32\RunDll32.exe
              C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\0QEt.CpL",
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2268
              • C:\Windows\SysWOW64\rundll32.exe
                "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\0QEt.CpL",
                7⤵
                • Loads dropped DLL
                PID:3272

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\560BLMC7DG56MH9.exe.log
    Filesize

    42B

    MD5

    84cfdb4b995b1dbf543b26b86c863adc

    SHA1

    d2f47764908bf30036cf8248b9ff5541e2711fa2

    SHA256

    d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b

    SHA512

    485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce

  • C:\Users\Admin\AppData\Local\Temp\0JMKAHGJ13764E1.exe
    Filesize

    1.5MB

    MD5

    40d21e1f27ac1a603cdefbd8508542ee

    SHA1

    c625130af4446f3eb716a31507ffebaa494ce202

    SHA256

    1fc3eb22fe604330eed50113494bd2e5a9e80d26277ee81113d04505cb545967

    SHA512

    cc5a761b9e46e7252633f80c414bdf43577c70a89046a168ca2adbcb136bec3170e773f6982d560eadf6a704c6c638f255a7d546f9d46203dd654af0aec4639d

  • C:\Users\Admin\AppData\Local\Temp\0JMKAHGJ13764E1.exe
    Filesize

    1.5MB

    MD5

    40d21e1f27ac1a603cdefbd8508542ee

    SHA1

    c625130af4446f3eb716a31507ffebaa494ce202

    SHA256

    1fc3eb22fe604330eed50113494bd2e5a9e80d26277ee81113d04505cb545967

    SHA512

    cc5a761b9e46e7252633f80c414bdf43577c70a89046a168ca2adbcb136bec3170e773f6982d560eadf6a704c6c638f255a7d546f9d46203dd654af0aec4639d

  • C:\Users\Admin\AppData\Local\Temp\0JMKAHGJ13764E1.exe
    Filesize

    1.5MB

    MD5

    40d21e1f27ac1a603cdefbd8508542ee

    SHA1

    c625130af4446f3eb716a31507ffebaa494ce202

    SHA256

    1fc3eb22fe604330eed50113494bd2e5a9e80d26277ee81113d04505cb545967

    SHA512

    cc5a761b9e46e7252633f80c414bdf43577c70a89046a168ca2adbcb136bec3170e773f6982d560eadf6a704c6c638f255a7d546f9d46203dd654af0aec4639d

  • C:\Users\Admin\AppData\Local\Temp\0QEt.CpL
    Filesize

    1.6MB

    MD5

    bd154e2fb1ef1012b1404b6e38764359

    SHA1

    764ef4cb67ed21a8efbfc04d6fcced98647e9193

    SHA256

    7143a0057267d81454aa68fd638bfece46ec0a4aac6334aa0d692ac4e1d6b4fe

    SHA512

    6d0a7cfc9749e29620e65140082308a0f72428ad76aa5c6542e352f195233dbb88628b7e08cb6065b73a7b4733070be232309b38925763d789c0cf01977c66c1

  • C:\Users\Admin\AppData\Local\Temp\0qet.cpl
    Filesize

    1.6MB

    MD5

    bd154e2fb1ef1012b1404b6e38764359

    SHA1

    764ef4cb67ed21a8efbfc04d6fcced98647e9193

    SHA256

    7143a0057267d81454aa68fd638bfece46ec0a4aac6334aa0d692ac4e1d6b4fe

    SHA512

    6d0a7cfc9749e29620e65140082308a0f72428ad76aa5c6542e352f195233dbb88628b7e08cb6065b73a7b4733070be232309b38925763d789c0cf01977c66c1

  • C:\Users\Admin\AppData\Local\Temp\0qet.cpl
    Filesize

    1.6MB

    MD5

    bd154e2fb1ef1012b1404b6e38764359

    SHA1

    764ef4cb67ed21a8efbfc04d6fcced98647e9193

    SHA256

    7143a0057267d81454aa68fd638bfece46ec0a4aac6334aa0d692ac4e1d6b4fe

    SHA512

    6d0a7cfc9749e29620e65140082308a0f72428ad76aa5c6542e352f195233dbb88628b7e08cb6065b73a7b4733070be232309b38925763d789c0cf01977c66c1

  • C:\Users\Admin\AppData\Local\Temp\0qet.cpl
    Filesize

    1.6MB

    MD5

    bd154e2fb1ef1012b1404b6e38764359

    SHA1

    764ef4cb67ed21a8efbfc04d6fcced98647e9193

    SHA256

    7143a0057267d81454aa68fd638bfece46ec0a4aac6334aa0d692ac4e1d6b4fe

    SHA512

    6d0a7cfc9749e29620e65140082308a0f72428ad76aa5c6542e352f195233dbb88628b7e08cb6065b73a7b4733070be232309b38925763d789c0cf01977c66c1

  • C:\Users\Admin\AppData\Local\Temp\0qet.cpl
    Filesize

    1.6MB

    MD5

    bd154e2fb1ef1012b1404b6e38764359

    SHA1

    764ef4cb67ed21a8efbfc04d6fcced98647e9193

    SHA256

    7143a0057267d81454aa68fd638bfece46ec0a4aac6334aa0d692ac4e1d6b4fe

    SHA512

    6d0a7cfc9749e29620e65140082308a0f72428ad76aa5c6542e352f195233dbb88628b7e08cb6065b73a7b4733070be232309b38925763d789c0cf01977c66c1

  • C:\Users\Admin\AppData\Local\Temp\0qet.cpl
    Filesize

    1.6MB

    MD5

    bd154e2fb1ef1012b1404b6e38764359

    SHA1

    764ef4cb67ed21a8efbfc04d6fcced98647e9193

    SHA256

    7143a0057267d81454aa68fd638bfece46ec0a4aac6334aa0d692ac4e1d6b4fe

    SHA512

    6d0a7cfc9749e29620e65140082308a0f72428ad76aa5c6542e352f195233dbb88628b7e08cb6065b73a7b4733070be232309b38925763d789c0cf01977c66c1

  • C:\Users\Admin\AppData\Local\Temp\560BLMC7DG56MH9.exe
    Filesize

    145KB

    MD5

    9547dd1fc88dc8cef6210d82b3ed0ad8

    SHA1

    38eedb531c5ecab6fd3d3f585d7760ee4c5b2d81

    SHA256

    d9f03a142d11c22b9a4d6f672d4d2733d01b9ef3a7d4760910f7c1f766daef0e

    SHA512

    23751bad429149f3e0e0507a62ab043a1dd914ad9f5ff630024e452d9538feadbb257121b43fbc7adb7e937262155410028db4895c6ff9a21bafc681ca770ea4

  • C:\Users\Admin\AppData\Local\Temp\560BLMC7DG56MH9.exe
    Filesize

    145KB

    MD5

    9547dd1fc88dc8cef6210d82b3ed0ad8

    SHA1

    38eedb531c5ecab6fd3d3f585d7760ee4c5b2d81

    SHA256

    d9f03a142d11c22b9a4d6f672d4d2733d01b9ef3a7d4760910f7c1f766daef0e

    SHA512

    23751bad429149f3e0e0507a62ab043a1dd914ad9f5ff630024e452d9538feadbb257121b43fbc7adb7e937262155410028db4895c6ff9a21bafc681ca770ea4

  • C:\Users\Admin\AppData\Local\Temp\560BLMC7DG56MH9.exe
    Filesize

    145KB

    MD5

    9547dd1fc88dc8cef6210d82b3ed0ad8

    SHA1

    38eedb531c5ecab6fd3d3f585d7760ee4c5b2d81

    SHA256

    d9f03a142d11c22b9a4d6f672d4d2733d01b9ef3a7d4760910f7c1f766daef0e

    SHA512

    23751bad429149f3e0e0507a62ab043a1dd914ad9f5ff630024e452d9538feadbb257121b43fbc7adb7e937262155410028db4895c6ff9a21bafc681ca770ea4

  • C:\Users\Admin\AppData\Local\Temp\560BLMC7DG56MH9.exe
    Filesize

    145KB

    MD5

    9547dd1fc88dc8cef6210d82b3ed0ad8

    SHA1

    38eedb531c5ecab6fd3d3f585d7760ee4c5b2d81

    SHA256

    d9f03a142d11c22b9a4d6f672d4d2733d01b9ef3a7d4760910f7c1f766daef0e

    SHA512

    23751bad429149f3e0e0507a62ab043a1dd914ad9f5ff630024e452d9538feadbb257121b43fbc7adb7e937262155410028db4895c6ff9a21bafc681ca770ea4

  • C:\Users\Admin\AppData\Local\Temp\560BLMC7DG56MH9.exe
    Filesize

    145KB

    MD5

    9547dd1fc88dc8cef6210d82b3ed0ad8

    SHA1

    38eedb531c5ecab6fd3d3f585d7760ee4c5b2d81

    SHA256

    d9f03a142d11c22b9a4d6f672d4d2733d01b9ef3a7d4760910f7c1f766daef0e

    SHA512

    23751bad429149f3e0e0507a62ab043a1dd914ad9f5ff630024e452d9538feadbb257121b43fbc7adb7e937262155410028db4895c6ff9a21bafc681ca770ea4

  • memory/364-166-0x0000000000000000-mapping.dmp
  • memory/428-182-0x00000000078C0000-0x0000000007DEC000-memory.dmp
    Filesize

    5.2MB

  • memory/428-153-0x0000000000000000-mapping.dmp
  • memory/428-170-0x0000000005F10000-0x0000000005F76000-memory.dmp
    Filesize

    408KB

  • memory/428-176-0x0000000006C90000-0x0000000006D06000-memory.dmp
    Filesize

    472KB

  • memory/428-158-0x0000000005300000-0x000000000540A000-memory.dmp
    Filesize

    1.0MB

  • memory/428-181-0x0000000006EE0000-0x00000000070A2000-memory.dmp
    Filesize

    1.8MB

  • memory/428-183-0x0000000006DF0000-0x0000000006E0E000-memory.dmp
    Filesize

    120KB

  • memory/1412-171-0x0000000000000000-mapping.dmp
  • memory/1412-178-0x0000000003540000-0x0000000003655000-memory.dmp
    Filesize

    1.1MB

  • memory/1412-215-0x0000000003540000-0x0000000003655000-memory.dmp
    Filesize

    1.1MB

  • memory/1412-185-0x0000000003660000-0x000000000371D000-memory.dmp
    Filesize

    756KB

  • memory/1412-186-0x0000000003730000-0x00000000037D8000-memory.dmp
    Filesize

    672KB

  • memory/1412-177-0x00000000032B0000-0x0000000003417000-memory.dmp
    Filesize

    1.4MB

  • memory/2268-192-0x0000000000000000-mapping.dmp
  • memory/2296-157-0x0000000005200000-0x0000000005212000-memory.dmp
    Filesize

    72KB

  • memory/2296-169-0x00000000063E0000-0x0000000006984000-memory.dmp
    Filesize

    5.6MB

  • memory/2296-168-0x0000000005D90000-0x0000000005E22000-memory.dmp
    Filesize

    584KB

  • memory/2296-156-0x0000000005770000-0x0000000005D88000-memory.dmp
    Filesize

    6.1MB

  • memory/2296-146-0x0000000000000000-mapping.dmp
  • memory/2296-159-0x0000000005260000-0x000000000529C000-memory.dmp
    Filesize

    240KB

  • memory/2296-147-0x0000000000D80000-0x0000000000D9C000-memory.dmp
    Filesize

    112KB

  • memory/2296-175-0x0000000006AE0000-0x0000000006B30000-memory.dmp
    Filesize

    320KB

  • memory/2504-193-0x0000000000000000-mapping.dmp
  • memory/2588-162-0x0000000000000000-mapping.dmp
  • memory/2872-133-0x0000000000000000-mapping.dmp
  • memory/2872-141-0x0000000000530000-0x0000000000562000-memory.dmp
    Filesize

    200KB

  • memory/2872-134-0x0000000000530000-0x0000000000562000-memory.dmp
    Filesize

    200KB

  • memory/2872-138-0x0000000000530000-0x0000000000562000-memory.dmp
    Filesize

    200KB

  • memory/3172-132-0x0000000000DD0000-0x0000000000E11000-memory.dmp
    Filesize

    260KB

  • memory/3272-209-0x0000000003470000-0x0000000003518000-memory.dmp
    Filesize

    672KB

  • memory/3272-194-0x0000000000000000-mapping.dmp
  • memory/3272-203-0x0000000003280000-0x0000000003395000-memory.dmp
    Filesize

    1.1MB

  • memory/3272-208-0x00000000033A0000-0x000000000345D000-memory.dmp
    Filesize

    756KB

  • memory/3272-214-0x0000000003280000-0x0000000003395000-memory.dmp
    Filesize

    1.1MB

  • memory/3272-202-0x0000000002FF0000-0x0000000003157000-memory.dmp
    Filesize

    1.4MB

  • memory/3284-187-0x0000000002B00000-0x0000000002BA8000-memory.dmp
    Filesize

    672KB

  • memory/3284-213-0x0000000003300000-0x0000000003415000-memory.dmp
    Filesize

    1.1MB

  • memory/3284-179-0x0000000003070000-0x00000000031D7000-memory.dmp
    Filesize

    1.4MB

  • memory/3284-180-0x0000000003300000-0x0000000003415000-memory.dmp
    Filesize

    1.1MB

  • memory/3284-172-0x0000000000000000-mapping.dmp
  • memory/3284-184-0x0000000003420000-0x00000000034DD000-memory.dmp
    Filesize

    756KB

  • memory/3512-152-0x0000000000730000-0x0000000000758000-memory.dmp
    Filesize

    160KB

  • memory/3512-150-0x0000000000000000-mapping.dmp
  • memory/4300-199-0x0000000002660000-0x0000000002800000-memory.dmp
    Filesize

    1.6MB

  • memory/4300-201-0x0000000002D00000-0x0000000002E15000-memory.dmp
    Filesize

    1.1MB

  • memory/4300-200-0x0000000002A70000-0x0000000002BD7000-memory.dmp
    Filesize

    1.4MB

  • memory/4300-204-0x0000000002E30000-0x0000000002EED000-memory.dmp
    Filesize

    756KB

  • memory/4300-205-0x0000000002F00000-0x0000000002FA8000-memory.dmp
    Filesize

    672KB

  • memory/4300-195-0x0000000000000000-mapping.dmp
  • memory/4300-212-0x0000000002D00000-0x0000000002E15000-memory.dmp
    Filesize

    1.1MB

  • memory/4364-142-0x0000000000000000-mapping.dmp
  • memory/4364-145-0x0000000000730000-0x0000000000758000-memory.dmp
    Filesize

    160KB

  • memory/4864-167-0x0000000000000000-mapping.dmp
  • memory/5112-160-0x0000000000000000-mapping.dmp