Analysis
-
max time kernel
109s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28-09-2022 14:22
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220901-en
General
-
Target
file.exe
-
Size
1.7MB
-
MD5
0869629e5fc4b5b7088fee6b06038d17
-
SHA1
ddfc132d410fc3c38e3fda093ca3cf76fe1a843f
-
SHA256
5ec3a8d538cf38f9be9ba8419dee05bf711b70baf155ae6d6728ab15444fd24c
-
SHA512
20733334a1ecd38c23d21360035b88e4ec4aa84b498ebf159afb321dd2426c24afe2a7085f6b5e95ac8aa8030d7f92dabf6219288c2eac23048f97e59be57138
-
SSDEEP
24576:LnAUWkcdUd7MyD0LeFwIXyua+cBLYkxChx4Q:UUWkcdUd7fD0iFx3pc3xChxd
Malware Config
Extracted
redline
LogsDiller Cloud (Sup: @mr_golds)
51.89.201.21:7161
-
auth_value
56c6f7b9024c076f0a96931453da7e56
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1628-61-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral1/memory/1628-62-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral1/memory/1628-63-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral1/memory/1628-64-0x0000000000422176-mapping.dmp family_redline behavioral1/memory/1628-66-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral1/memory/1628-68-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
setup.exepid process 572 setup.exe -
Loads dropped DLL 2 IoCs
Processes:
file.exepid process 1628 file.exe 1036 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
file.exesetup.exedescription pid process target process PID 1044 set thread context of 1628 1044 file.exe file.exe PID 572 set thread context of 1032 572 setup.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "16" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\bestrealprizes.life IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\bestrealprizes.life\Total = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30674ab556d3d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\bestrealprizes.life\ = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\bestrealprizes.life\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "371147164" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e0f3d159765a7f43b6bf060b4b70c9a30000000002000000000010660000000100002000000092ffe8bb67281d4221112c3e0e11afca95ab154c1284f8174876278f53436e87000000000e8000000002000020000000b23d9f4ec3cb598e77a14539572debd5602afb4fb97298d025e633a4d168c5cd20000000321a5488c201c2ba7910bf775968c7bb787d16ddf02d418de312d149adb484d440000000193a484b9528189722697dae29b33a5ef8f1f5369d681b553dd69f14aff2aedda7d610269e462e51ce0e8f6adb61c6755cdc0e80b554e049e88574b2f4eef319 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\bestrealprizes.life\ = "16" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\bestrealprizes.life\Total = "16" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D732E201-3F49-11ED-A064-6A6CB2F85B9F} = "0" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
file.exepid process 1628 file.exe 1628 file.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
file.exefile.exedescription pid process Token: SeDebugPrivilege 1044 file.exe Token: SeDebugPrivilege 1628 file.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 748 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 748 iexplore.exe 748 iexplore.exe 1756 IEXPLORE.EXE 1756 IEXPLORE.EXE 1756 IEXPLORE.EXE 1756 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
file.exefile.exeiexplore.exesetup.exedescription pid process target process PID 1044 wrote to memory of 1628 1044 file.exe file.exe PID 1044 wrote to memory of 1628 1044 file.exe file.exe PID 1044 wrote to memory of 1628 1044 file.exe file.exe PID 1044 wrote to memory of 1628 1044 file.exe file.exe PID 1044 wrote to memory of 1628 1044 file.exe file.exe PID 1044 wrote to memory of 1628 1044 file.exe file.exe PID 1044 wrote to memory of 1628 1044 file.exe file.exe PID 1044 wrote to memory of 1628 1044 file.exe file.exe PID 1044 wrote to memory of 1628 1044 file.exe file.exe PID 1628 wrote to memory of 748 1628 file.exe iexplore.exe PID 1628 wrote to memory of 748 1628 file.exe iexplore.exe PID 1628 wrote to memory of 748 1628 file.exe iexplore.exe PID 1628 wrote to memory of 748 1628 file.exe iexplore.exe PID 748 wrote to memory of 1756 748 iexplore.exe IEXPLORE.EXE PID 748 wrote to memory of 1756 748 iexplore.exe IEXPLORE.EXE PID 748 wrote to memory of 1756 748 iexplore.exe IEXPLORE.EXE PID 748 wrote to memory of 1756 748 iexplore.exe IEXPLORE.EXE PID 1628 wrote to memory of 572 1628 file.exe setup.exe PID 1628 wrote to memory of 572 1628 file.exe setup.exe PID 1628 wrote to memory of 572 1628 file.exe setup.exe PID 1628 wrote to memory of 572 1628 file.exe setup.exe PID 572 wrote to memory of 1032 572 setup.exe RegSvcs.exe PID 572 wrote to memory of 1032 572 setup.exe RegSvcs.exe PID 572 wrote to memory of 1032 572 setup.exe RegSvcs.exe PID 572 wrote to memory of 1032 572 setup.exe RegSvcs.exe PID 572 wrote to memory of 1032 572 setup.exe RegSvcs.exe PID 572 wrote to memory of 1032 572 setup.exe RegSvcs.exe PID 572 wrote to memory of 1032 572 setup.exe RegSvcs.exe PID 572 wrote to memory of 1032 572 setup.exe RegSvcs.exe PID 572 wrote to memory of 1032 572 setup.exe RegSvcs.exe PID 572 wrote to memory of 1032 572 setup.exe RegSvcs.exe PID 572 wrote to memory of 1032 572 setup.exe RegSvcs.exe PID 572 wrote to memory of 1032 572 setup.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\file.exeC:\Users\Admin\AppData\Local\Temp\file.exe2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://bestrealprizes.life/?u=lq1pd08&o=hdck0gl3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:748 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe4⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
60KB
MD5d15aaa7c9be910a9898260767e2490e1
SHA12090c53f8d9fc3fbdbafd3a1e4dc25520eb74388
SHA256f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e
SHA5127e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5bfba4d93e8c24aa28df36d22846034a9
SHA11216f20626fa5fce072f71144102fb028fc2ea45
SHA256fd1f44987c98f672870eb8df24e0c29e0bed7c0cff0e24080b3db34a52e45eb4
SHA51219d05f751a7f5dc94d3be79c8948ab55135384d2d98864812b4f165df6c7c29de07209a92e6d7aedc9a5005c2f580b188de5adee2c6f6be1c2105e279d1428f9
-
C:\Users\Admin\AppData\Local\Temp\setup.exeFilesize
345KB
MD5074f4690e37f519e136a17d673fb023c
SHA16ae97f82fafb429df5c4af4e1f708fa72570cedb
SHA256b642e29066bc94c378a3de14ba7263ab2190aa4b7c140a667014e388b1fa1da8
SHA512b3f268cc367d21d5454c906c23a6830677631c0dc1deb6b1ee3d39fba9e9fec7f9b557f0714a75a0bfff1e72416db15bca7d6757f2089024d4ad55d47a3bc9b7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\PIXBT60Y.txtFilesize
608B
MD56f8650424a716a29648ed66a0b0529d9
SHA1e1ce6ab0acdd51a2c025bff4a413018d8c4ca1b2
SHA25693636e1a9f6471e353731987e0b4bd992efa310c4d3b47f204b7ae2017599ae5
SHA5125a078db4011db059acc29ba508eb7f70cfaad164d993f8b29c364e6e4ec2089ae48b1a8ddac88fac186846aaeac1149e7245dfeb2d0582151802de34b96bec52
-
\Users\Admin\AppData\Local\Temp\setup.exeFilesize
345KB
MD5074f4690e37f519e136a17d673fb023c
SHA16ae97f82fafb429df5c4af4e1f708fa72570cedb
SHA256b642e29066bc94c378a3de14ba7263ab2190aa4b7c140a667014e388b1fa1da8
SHA512b3f268cc367d21d5454c906c23a6830677631c0dc1deb6b1ee3d39fba9e9fec7f9b557f0714a75a0bfff1e72416db15bca7d6757f2089024d4ad55d47a3bc9b7
-
\Users\Admin\AppData\Local\Temp\setup.exeFilesize
345KB
MD5074f4690e37f519e136a17d673fb023c
SHA16ae97f82fafb429df5c4af4e1f708fa72570cedb
SHA256b642e29066bc94c378a3de14ba7263ab2190aa4b7c140a667014e388b1fa1da8
SHA512b3f268cc367d21d5454c906c23a6830677631c0dc1deb6b1ee3d39fba9e9fec7f9b557f0714a75a0bfff1e72416db15bca7d6757f2089024d4ad55d47a3bc9b7
-
memory/572-71-0x0000000000000000-mapping.dmp
-
memory/1032-77-0x0000000140000000-0x0000000140023000-memory.dmpFilesize
140KB
-
memory/1032-74-0x0000000140000000-0x0000000140023000-memory.dmpFilesize
140KB
-
memory/1032-89-0x0000000140000000-0x0000000140023000-memory.dmpFilesize
140KB
-
memory/1032-88-0x0000000140000000-0x0000000140023000-memory.dmpFilesize
140KB
-
memory/1032-86-0x0000000140003FEC-mapping.dmp
-
memory/1032-85-0x0000000140000000-0x0000000140023000-memory.dmpFilesize
140KB
-
memory/1032-75-0x0000000140000000-0x0000000140023000-memory.dmpFilesize
140KB
-
memory/1032-79-0x0000000140000000-0x0000000140023000-memory.dmpFilesize
140KB
-
memory/1032-80-0x0000000140000000-0x0000000140023000-memory.dmpFilesize
140KB
-
memory/1032-83-0x0000000140000000-0x0000000140023000-memory.dmpFilesize
140KB
-
memory/1032-84-0x0000000140000000-0x0000000140023000-memory.dmpFilesize
140KB
-
memory/1032-82-0x0000000140000000-0x0000000140023000-memory.dmpFilesize
140KB
-
memory/1044-54-0x00000000010A0000-0x0000000001262000-memory.dmpFilesize
1.8MB
-
memory/1044-57-0x0000000000FD0000-0x0000000001062000-memory.dmpFilesize
584KB
-
memory/1044-56-0x0000000075501000-0x0000000075503000-memory.dmpFilesize
8KB
-
memory/1044-55-0x0000000000C20000-0x0000000000CCE000-memory.dmpFilesize
696KB
-
memory/1628-58-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/1628-59-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/1628-61-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/1628-63-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/1628-62-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/1628-68-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/1628-66-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/1628-64-0x0000000000422176-mapping.dmp