Analysis

  • max time kernel
    129s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-10-2022 17:22

General

  • Target

    SecuriteInfo.com.IL.Trojan.MSILZilla.23569.19997.15103.exe

  • Size

    7KB

  • MD5

    ea741cefe4cc499c682b9cea7d88c8af

  • SHA1

    06736c7eae5d9c6b0ef7185d42b3227591d9f382

  • SHA256

    ddd2832de9b42fc2b5b4ad51c9db65d979fec3312aaed4b1a31aa439b0598569

  • SHA512

    07bd47d2d5552cfc187e8ce7cdc46ebb133df1065c5402f0903b8b908d824549c29c5d13ca3ed7e10f46fb3f75cd5d7f91307c8b7d7dca3d83070b9fb16f8250

  • SSDEEP

    96:ayiUH8aVYVbJFfrabOk0L3ph+2zIIxOu61gy5jRqzNt:3iWWVtFf4OhL3phJIsOd1l5FM

Malware Config

Extracted

Family

redline

Botnet

sB9s5YLxvJ

C2

192.3.223.202:3652

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.IL.Trojan.MSILZilla.23569.19997.15103.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.IL.Trojan.MSILZilla.23569.19997.15103.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1800
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAwAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1568
    • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.IL.Trojan.MSILZilla.23569.19997.15103.exe
      C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.IL.Trojan.MSILZilla.23569.19997.15103.exe
      2⤵
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1368

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1368-64-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/1368-74-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/1368-72-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/1368-70-0x000000000041933E-mapping.dmp

  • memory/1368-68-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/1368-69-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/1368-67-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/1368-65-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/1568-63-0x000000006F5B0000-0x000000006FB5B000-memory.dmp

    Filesize

    5.7MB

  • memory/1568-62-0x000000006F5B0000-0x000000006FB5B000-memory.dmp

    Filesize

    5.7MB

  • memory/1568-61-0x000000006F5B0000-0x000000006FB5B000-memory.dmp

    Filesize

    5.7MB

  • memory/1568-59-0x0000000000000000-mapping.dmp

  • memory/1800-54-0x0000000000E50000-0x0000000000E58000-memory.dmp

    Filesize

    32KB

  • memory/1800-58-0x00000000054D0000-0x0000000005562000-memory.dmp

    Filesize

    584KB

  • memory/1800-57-0x0000000004320000-0x0000000004366000-memory.dmp

    Filesize

    280KB

  • memory/1800-56-0x00000000052C0000-0x000000000534E000-memory.dmp

    Filesize

    568KB

  • memory/1800-55-0x00000000758C1000-0x00000000758C3000-memory.dmp

    Filesize

    8KB