Analysis
-
max time kernel
162s -
max time network
192s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
21-10-2022 18:01
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
355KB
-
MD5
2d497f4c12f1f0167fc10ecf35f723d4
-
SHA1
96a8d7fead7f50bcc39ff986b289e9cc240a8f20
-
SHA256
0d09a4ab3e8ceb83ed61d72f369dafe02bcfee6e57551b3a9077aee0a718aee8
-
SHA512
9efb947c9bab3a0e29f80b0697ab621728f92b1fd08e6bea4143bf421634397ffd7ad5020f3b7314aca2818df1355f8986e9389fa8b006e660c14ad4381564a3
-
SSDEEP
6144:K3e/3W0KIVKIV41+YlMQxQHyeNnCm0AO0MRll/UGk2YLJK2iRdh:KW3W0KIVKL+YlJFZtnpk2YLJmdh
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @mr_golds)
51.89.201.21:7161
-
auth_value
4b2de03af6b6ac513ac597c2e6c1ad51
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1916-54-0x0000000000270000-0x00000000002CC000-memory.dmp family_redline behavioral1/memory/2044-57-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral1/memory/2044-62-0x000000000042217A-mapping.dmp family_redline behavioral1/memory/2044-64-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral1/memory/2044-65-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral1/memory/1916-63-0x0000000000270000-0x00000000002CC000-memory.dmp family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
setu2p.exepid process 1064 setu2p.exe -
Loads dropped DLL 1 IoCs
Processes:
RegSvcs.exepid process 2044 RegSvcs.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
file.exesetu2p.exedescription pid process target process PID 1916 set thread context of 2044 1916 file.exe RegSvcs.exe PID 1064 set thread context of 1612 1064 setu2p.exe RegSvcs.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\bestrealprizes.life\Total = "16" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40aeb23e88e5d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "16" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\bestrealprizes.life\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e0f3d159765a7f43b6bf060b4b70c9a300000000020000000000106600000001000020000000cb386ba27b4766bef86eaee81863bcb1a3a7552ef1756f02a904b18973ae696d000000000e80000000020000200000000e4ee977e9291ca263111ed0e2a08c79cee452c8f4af7439887971f74466408a20000000092d7e35d2e16b9cab9a853de0f01f6bb2ddc0ef75cbb82898ac18c43f93b08840000000871ba0932197621b06c68d0048410c71ac3565781e15d7aed65bd964f67f4d73f0689a8946f63553c87c2199cfa1c89d51ebb78966bea6bee5fedb9368d1edc7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\bestrealprizes.life\ = "16" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "373147573" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{67586151-517B-11ED-8538-4A4A572A2DE9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\bestrealprizes.life IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\bestrealprizes.life\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\bestrealprizes.life\Total = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
RegSvcs.exepid process 2044 RegSvcs.exe 2044 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegSvcs.exedescription pid process Token: SeDebugPrivilege 2044 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1364 iexplore.exe 1364 iexplore.exe 1748 IEXPLORE.EXE 1748 IEXPLORE.EXE 1748 IEXPLORE.EXE 1748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
file.exeRegSvcs.exeiexplore.exesetu2p.exedescription pid process target process PID 1916 wrote to memory of 2044 1916 file.exe RegSvcs.exe PID 1916 wrote to memory of 2044 1916 file.exe RegSvcs.exe PID 1916 wrote to memory of 2044 1916 file.exe RegSvcs.exe PID 1916 wrote to memory of 2044 1916 file.exe RegSvcs.exe PID 1916 wrote to memory of 2044 1916 file.exe RegSvcs.exe PID 1916 wrote to memory of 2044 1916 file.exe RegSvcs.exe PID 1916 wrote to memory of 2044 1916 file.exe RegSvcs.exe PID 1916 wrote to memory of 2044 1916 file.exe RegSvcs.exe PID 1916 wrote to memory of 2044 1916 file.exe RegSvcs.exe PID 2044 wrote to memory of 1364 2044 RegSvcs.exe iexplore.exe PID 2044 wrote to memory of 1364 2044 RegSvcs.exe iexplore.exe PID 2044 wrote to memory of 1364 2044 RegSvcs.exe iexplore.exe PID 2044 wrote to memory of 1364 2044 RegSvcs.exe iexplore.exe PID 1364 wrote to memory of 1748 1364 iexplore.exe IEXPLORE.EXE PID 1364 wrote to memory of 1748 1364 iexplore.exe IEXPLORE.EXE PID 1364 wrote to memory of 1748 1364 iexplore.exe IEXPLORE.EXE PID 1364 wrote to memory of 1748 1364 iexplore.exe IEXPLORE.EXE PID 2044 wrote to memory of 1064 2044 RegSvcs.exe setu2p.exe PID 2044 wrote to memory of 1064 2044 RegSvcs.exe setu2p.exe PID 2044 wrote to memory of 1064 2044 RegSvcs.exe setu2p.exe PID 2044 wrote to memory of 1064 2044 RegSvcs.exe setu2p.exe PID 1064 wrote to memory of 1612 1064 setu2p.exe RegSvcs.exe PID 1064 wrote to memory of 1612 1064 setu2p.exe RegSvcs.exe PID 1064 wrote to memory of 1612 1064 setu2p.exe RegSvcs.exe PID 1064 wrote to memory of 1612 1064 setu2p.exe RegSvcs.exe PID 1064 wrote to memory of 1612 1064 setu2p.exe RegSvcs.exe PID 1064 wrote to memory of 1612 1064 setu2p.exe RegSvcs.exe PID 1064 wrote to memory of 1612 1064 setu2p.exe RegSvcs.exe PID 1064 wrote to memory of 1612 1064 setu2p.exe RegSvcs.exe PID 1064 wrote to memory of 1612 1064 setu2p.exe RegSvcs.exe PID 1064 wrote to memory of 1612 1064 setu2p.exe RegSvcs.exe PID 1064 wrote to memory of 1612 1064 setu2p.exe RegSvcs.exe PID 1064 wrote to memory of 1612 1064 setu2p.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://bestrealprizes.life/?u=lq1pd08&o=hdck0gl3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1364 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\setu2p.exe"C:\Users\Admin\AppData\Local\Temp\setu2p.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe4⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
60KB
MD5d15aaa7c9be910a9898260767e2490e1
SHA12090c53f8d9fc3fbdbafd3a1e4dc25520eb74388
SHA256f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e
SHA5127e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5a9732977535cab08f7aed04c09231b90
SHA1bae4367f80ad42fbf7da4683f24dfb2c5dd8e11a
SHA2560b7879561c33a4af8fa97937479e0abdf00d0ade4d25db96097f621e4fd96f0e
SHA512dac0cc0d93e8674946a524389815dca569860b80f2e0ffdb1238b9689543bd4dd491ce7d52a0eb7ed1be9b7934decadf94cf181d478edd6b844a80432b2dea0b
-
C:\Users\Admin\AppData\Local\Temp\setu2p.exeFilesize
344KB
MD5fcca5d8a8af3426aeb3adde55b63bd56
SHA1add2df1738a6400f80b25f2ba1c2d4b9df1b3c64
SHA256f1962300bb7fe971f5fa288a5ae9bf4c6c0ae848481d150eb23d9dccbb61847b
SHA512c367496d785aee0183b0a6aaa6bb4c99468ad5efe7be61ed06884607451093173909ee384f208e2379508c35a4e853b7505182cf4bd4919c9e86f374f14c5fd7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\18T9BPX2.txtFilesize
603B
MD5b56360687a06cbc1f23175ab66392966
SHA1d6de2465ad748758ace404e9541167817afe4495
SHA256a44b7ab6a211f3229acfd2fa8c9df41da27f65bcc640b526cc4653fd182d7d07
SHA512c1fbafc8638a224d47013d56660f764e87f8d4229b6a22febc23b041176305260507acb0203180bf4a92582fa56029f31b6d180d056c832899e28ffdd89a618f
-
\Users\Admin\AppData\Local\Temp\setu2p.exeFilesize
344KB
MD5fcca5d8a8af3426aeb3adde55b63bd56
SHA1add2df1738a6400f80b25f2ba1c2d4b9df1b3c64
SHA256f1962300bb7fe971f5fa288a5ae9bf4c6c0ae848481d150eb23d9dccbb61847b
SHA512c367496d785aee0183b0a6aaa6bb4c99468ad5efe7be61ed06884607451093173909ee384f208e2379508c35a4e853b7505182cf4bd4919c9e86f374f14c5fd7
-
memory/1064-68-0x0000000000000000-mapping.dmp
-
memory/1612-80-0x0000000140000000-0x0000000140022000-memory.dmpFilesize
136KB
-
memory/1612-76-0x0000000140000000-0x0000000140022000-memory.dmpFilesize
136KB
-
memory/1612-85-0x0000000140000000-0x0000000140022000-memory.dmpFilesize
136KB
-
memory/1612-84-0x0000000140000000-0x0000000140022000-memory.dmpFilesize
136KB
-
memory/1612-82-0x0000000140003E0C-mapping.dmp
-
memory/1612-70-0x0000000140000000-0x0000000140022000-memory.dmpFilesize
136KB
-
memory/1612-71-0x0000000140000000-0x0000000140022000-memory.dmpFilesize
136KB
-
memory/1612-73-0x0000000140000000-0x0000000140022000-memory.dmpFilesize
136KB
-
memory/1612-75-0x0000000140000000-0x0000000140022000-memory.dmpFilesize
136KB
-
memory/1612-81-0x0000000140000000-0x0000000140022000-memory.dmpFilesize
136KB
-
memory/1612-78-0x0000000140000000-0x0000000140022000-memory.dmpFilesize
136KB
-
memory/1612-79-0x0000000140000000-0x0000000140022000-memory.dmpFilesize
136KB
-
memory/1916-54-0x0000000000270000-0x00000000002CC000-memory.dmpFilesize
368KB
-
memory/1916-63-0x0000000000270000-0x00000000002CC000-memory.dmpFilesize
368KB
-
memory/2044-66-0x00000000753C1000-0x00000000753C3000-memory.dmpFilesize
8KB
-
memory/2044-64-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/2044-65-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/2044-62-0x000000000042217A-mapping.dmp
-
memory/2044-57-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/2044-55-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB