Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/09/2022, 19:17

General

  • Target

    https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbkg4SGxHanlLZ2t3WWpBbUlfTFlfWGtqMy1NQXxBQ3Jtc0trMVFaNU9lRmJlWFU5eXp1b0xMWGZOcGhRWWZLZ2o2VkoxY1BpSmZFOXF0RXNWSjRvTS1FTm5LeFBpX1E0MHY5NjhWRHJwa3EtNm5VV2s5WWlON2YwLThtTGppdVpYQUdMTlJZWGFQZjIwalN5Q2pKTQ&q=https%3A%2F%2Fwa.sv%2Ffort&v=LGTmk6cLE84

Malware Config

Extracted

Family

redline

Botnet

Scarflog

C2

135.181.123.31:32708

Attributes
  • auth_value

    01eab890df4b5da430be4638d836c22f

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 14 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 52 IoCs
  • Modifies registry class 2 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 20 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbkg4SGxHanlLZ2t3WWpBbUlfTFlfWGtqMy1NQXxBQ3Jtc0trMVFaNU9lRmJlWFU5eXp1b0xMWGZOcGhRWWZLZ2o2VkoxY1BpSmZFOXF0RXNWSjRvTS1FTm5LeFBpX1E0MHY5NjhWRHJwa3EtNm5VV2s5WWlON2YwLThtTGppdVpYQUdMTlJZWGFQZjIwalN5Q2pKTQ&q=https%3A%2F%2Fwa.sv%2Ffort&v=LGTmk6cLE84
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1348
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1348 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:780
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1348 CREDAT:17416 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:452
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3752
    • C:\Users\Admin\Documents\Fortnite_Cheat\Fortnite_Cheat\Launject.exe
      "C:\Users\Admin\Documents\Fortnite_Cheat\Fortnite_Cheat\Launject.exe"
      1⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:820
    • C:\Users\Admin\Documents\Fortnite_Cheat\Fortnite_Cheat\Launject.exe
      "C:\Users\Admin\Documents\Fortnite_Cheat\Fortnite_Cheat\Launject.exe"
      1⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4972
    • C:\Users\Admin\Documents\Fortnite_Cheat\Fortnite_Cheat\Launject.exe
      "C:\Users\Admin\Documents\Fortnite_Cheat\Fortnite_Cheat\Launject.exe"
      1⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3856
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Documents\Fortnite_Cheat\Fortnite_Cheat\READMY.txt
      1⤵
      • Opens file in notepad (likely ransom note)
      PID:2236
    • C:\Windows\system32\mspaint.exe
      "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Documents\Fortnite_Cheat\Fortnite_Cheat\zicon_128981.ico"
      1⤵
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4808
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService
      1⤵
        PID:4984
      • C:\Users\Admin\Documents\Fortnite_Cheat\Fortnite_Cheat\Launject.exe
        "C:\Users\Admin\Documents\Fortnite_Cheat\Fortnite_Cheat\Launject.exe"
        1⤵
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetWindowsHookEx
        PID:4748

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2936A5F9B224F6A6A3A09414A0B32F30_C87D7591237310C3D5ACC4D865841542

              Filesize

              1KB

              MD5

              cdbc2b9d2124ed961da41c86ac81f8f3

              SHA1

              5b201557843f31d93112de2a573d9ee0d49a09d2

              SHA256

              a49fbadc8e69bb8fb51b8d119f0db5645fe9b24de5620a13fc6e347deedda94b

              SHA512

              30317a14b74bb6e5ec4d506dbcf25d5275ab2232ad03b7156452a0c5c436e9b0d1407ed9962be2d44af5fe93eb2e0d3caaa7ab2d57ec2b17b4c932bfab9a3291

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2EE749B7E1A15635422518BB5EBFD338_954F2B09506D1D49A629A06193BBB92E

              Filesize

              1KB

              MD5

              4b2ee7e8517a4f760de33814d85f3810

              SHA1

              4f562075d5619f839dbf4f01dd486263d2c9a59e

              SHA256

              dedafbce78aaec61255f6821d6a4b9e79cdbd3ffdaeca7c3c2e3fdc6e6f963b2

              SHA512

              7f43b62e6723266a3e5eab0edc55177b35d8db332fdfd28f9094559c932b90ecac02e462d8c63b09aafc6b71a9b6063f91deb75b248b3be1b35b21984a77318b

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2936A5F9B224F6A6A3A09414A0B32F30_C87D7591237310C3D5ACC4D865841542

              Filesize

              502B

              MD5

              a086345a199ca463ac420cc5675df633

              SHA1

              2393d8ab88d2688b0cbba6e4f059d8f1939a30d4

              SHA256

              5328945a98d24df3f96d8f6251281ea3dec0201a72e6fd651de067cd78d2262c

              SHA512

              5fe9b8f82d4cb44834e3d5044c52b3b4042b03c060efb8465b8e35bf7babc97f20e29e425dfefcadb97af837a7c8e0b0d74b731d61b7ca6a4fecf35fdc0c74df

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2EE749B7E1A15635422518BB5EBFD338_954F2B09506D1D49A629A06193BBB92E

              Filesize

              502B

              MD5

              51c2b6cf45f01daa1cc04e2ff762b218

              SHA1

              c7e08f5a3ac74d7c1ca68db8b976bf09c4aa8eed

              SHA256

              22d411418a79e61c965e02603851cec59d6b0ff527d08c28ae2fb93d78de94f1

              SHA512

              67a0595aeb98c9e217ff99f3908140cb209338c2d40cc0a7450a39e23a90383bcaf2baeaced945916d82539b7ec9ed170e0f352021c4617c20bd0fa84420a961

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Launject.exe.log

              Filesize

              2KB

              MD5

              467e33722458ccc9dd774bee4132446a

              SHA1

              787f5f211299ef097f3640d964711a42d5465280

              SHA256

              af8285f93b2846eb221831e8dbf92fd72005e246af67f40035b12c4065685289

              SHA512

              897f362ad8be6e1538f682ec94007406f0f74b1ce4ab264cc029b140b0d101ee8e825106f95d03d2e3ce77445038524579c18ffb51e2b6e1274efdbf2501c317

            • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\versionlist.xml

              Filesize

              15KB

              MD5

              1a545d0052b581fbb2ab4c52133846bc

              SHA1

              62f3266a9b9925cd6d98658b92adec673cbe3dd3

              SHA256

              557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

              SHA512

              bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

            • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\z2evvp3\imagestore.dat

              Filesize

              478B

              MD5

              cdd3f35df94345770683fccc1ca79fc6

              SHA1

              b637f1faef196a9ca05cec1fd4ba46a01923f902

              SHA256

              44cd95d7b29619f05ee9c09f73bc4154f1691d40a70e6e16fc409ffc581a0ed8

              SHA512

              98cb634a951ae4e293783c6e4411fc91e6859298e53df94b10c61ebefc76ef804341a9e48f2ca40691cda4a59afc873d3256645cdc1047145d1283fe79acc22e

            • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\z2evvp3\imagestore.dat

              Filesize

              1KB

              MD5

              7236ecc35b35a6e8148eb195dccb0f45

              SHA1

              1d653e2394fc3fa4933e54fa3b7c5a2564008f7a

              SHA256

              320ca85e5f144d92008beb5ee031b6ae309556f8f1b43fa32d6b4f4cabd2fa77

              SHA512

              52909fa56fe9901cdc9c6a277606f84c1d8bd78b779087ef775abff7330a9936b890d67712b37ac4604a732a09574bcb43ad46393c4f6189fe0096486347e0eb

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\MWIURFX4\Fortnite_Cheat.zip.fvu2zw7.partial

              Filesize

              8.5MB

              MD5

              07b86402ed41c13a0c7389c9f0430010

              SHA1

              237e00280d81a94fa68d086df4f2cb70116aca6a

              SHA256

              972317d6bb12712f255dbdfaab96fb30926523cf44819618b20f860bebe78418

              SHA512

              e1b5719edb3324c7451aa7ce279db6928d93dff34e5a29483784cfe1a1e066f5c6b786998dec19c5c8458207acc2bb1862b679236a8bc84d24de6f3542dfb61f

            • memory/820-144-0x0000000007DA0000-0x00000000083B8000-memory.dmp

              Filesize

              6.1MB

            • memory/820-140-0x00000000000D0000-0x0000000001992000-memory.dmp

              Filesize

              24.8MB

            • memory/820-143-0x00000000000D0000-0x0000000001992000-memory.dmp

              Filesize

              24.8MB

            • memory/820-141-0x000000007F4E0000-0x000000007F8B1000-memory.dmp

              Filesize

              3.8MB

            • memory/820-145-0x0000000007900000-0x0000000007A0A000-memory.dmp

              Filesize

              1.0MB

            • memory/820-146-0x0000000007830000-0x0000000007842000-memory.dmp

              Filesize

              72KB

            • memory/820-147-0x0000000007890000-0x00000000078CC000-memory.dmp

              Filesize

              240KB

            • memory/820-142-0x00000000000D0000-0x0000000001992000-memory.dmp

              Filesize

              24.8MB

            • memory/820-163-0x00000000000D0000-0x0000000001992000-memory.dmp

              Filesize

              24.8MB

            • memory/820-161-0x00000000099F0000-0x0000000009F1C000-memory.dmp

              Filesize

              5.2MB

            • memory/820-160-0x00000000092F0000-0x00000000094B2000-memory.dmp

              Filesize

              1.8MB

            • memory/820-152-0x00000000000D0000-0x0000000001992000-memory.dmp

              Filesize

              24.8MB

            • memory/820-153-0x0000000007C10000-0x0000000007CA2000-memory.dmp

              Filesize

              584KB

            • memory/820-154-0x0000000008970000-0x0000000008F14000-memory.dmp

              Filesize

              5.6MB

            • memory/820-155-0x0000000007CB0000-0x0000000007D16000-memory.dmp

              Filesize

              408KB

            • memory/3856-159-0x00000000000D0000-0x0000000001992000-memory.dmp

              Filesize

              24.8MB

            • memory/3856-167-0x00000000000D0000-0x0000000001992000-memory.dmp

              Filesize

              24.8MB

            • memory/3856-158-0x00000000000D0000-0x0000000001992000-memory.dmp

              Filesize

              24.8MB

            • memory/3856-156-0x00000000000D0000-0x0000000001992000-memory.dmp

              Filesize

              24.8MB

            • memory/3856-157-0x000000007F3D0000-0x000000007F7A1000-memory.dmp

              Filesize

              3.8MB

            • memory/3856-164-0x00000000000D0000-0x0000000001992000-memory.dmp

              Filesize

              24.8MB

            • memory/4748-170-0x000000007F600000-0x000000007F9D1000-memory.dmp

              Filesize

              3.8MB

            • memory/4748-169-0x00000000000D0000-0x0000000001992000-memory.dmp

              Filesize

              24.8MB

            • memory/4748-168-0x00000000000D0000-0x0000000001992000-memory.dmp

              Filesize

              24.8MB

            • memory/4972-149-0x00000000000D0000-0x0000000001992000-memory.dmp

              Filesize

              24.8MB

            • memory/4972-166-0x00000000000D0000-0x0000000001992000-memory.dmp

              Filesize

              24.8MB

            • memory/4972-148-0x00000000000D0000-0x0000000001992000-memory.dmp

              Filesize

              24.8MB

            • memory/4972-162-0x00000000000D0000-0x0000000001992000-memory.dmp

              Filesize

              24.8MB

            • memory/4972-150-0x00000000000D0000-0x0000000001992000-memory.dmp

              Filesize

              24.8MB

            • memory/4972-151-0x000000007F870000-0x000000007FC41000-memory.dmp

              Filesize

              3.8MB