Resubmissions

29-10-2022 00:00

221029-aal9vacfh9 10

28-10-2022 23:02

221028-21clwabecj 8

Analysis

  • max time kernel
    48s
  • max time network
    50s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-10-2022 00:00

General

  • Target

    29a808de2d82612a27d0ffb5a6505a90e0884d8ea332a282847d7da04f52b5f1.exe

  • Size

    785KB

  • MD5

    d6e9e86e003086022805cd59d1a406bd

  • SHA1

    514a4aaa1d1a0577fb1f84ff5d36cba8ea9619ea

  • SHA256

    29a808de2d82612a27d0ffb5a6505a90e0884d8ea332a282847d7da04f52b5f1

  • SHA512

    bff9b88db4187f31f1aa4f405d676df909eacf5ad48a9f413278e2fdc656e735c0ab265f0f4cdc87b8885d15109ffc7cfca071faca9352988ec2a6f0afb36ac9

  • SSDEEP

    1536:Wrae78zjORCDGwfdCSog01313os5gP2DKPJY8rPf128M+ZtgTr2u92PUmqIf0O0Q:uahKyd2n31x5BuIZ7T9vGPr

Malware Config

Extracted

Family

redline

Botnet

bethoven

C2

185.215.113.46:8223

Attributes
  • auth_value

    42d21fccbcd8cb0441971e6ed0b0897a

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\29a808de2d82612a27d0ffb5a6505a90e0884d8ea332a282847d7da04f52b5f1.exe
    "C:\Users\Admin\AppData\Local\Temp\29a808de2d82612a27d0ffb5a6505a90e0884d8ea332a282847d7da04f52b5f1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1028
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1664
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA0AA==
        3⤵
          PID:4464
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE
          3⤵
            PID:444

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SETUP_~1.EXE.log

        Filesize

        1KB

        MD5

        e87e48b105757e1c7563d1c719059733

        SHA1

        28a3f2b2e0672da2b531f4757d2b20b53032dafc

        SHA256

        0aaf22dc84cc3fcfe53de7ccfed8e662247dfb7f1a9967032c88790d0c663461

        SHA512

        bf19c5743143aee914a453c41189c722c9b90a5b8bf299cecf3e1f97656d32cd209ecb74da8aebc89bb41c27d189f73aaaabbc64fe383410c95dc76ad4218968

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE

        Filesize

        726KB

        MD5

        dd57ae733e215009b10da274fe6e2a74

        SHA1

        75866cfededb670f58bfdc5e347b18238e446272

        SHA256

        53fddf2c1cb5061c839da962bb8f183e3728af195b0d8cbc2cbe1681571bd77a

        SHA512

        4af1d0098d8a1bd79ea08d7831011566df4f33776728803e5100ae56d5607cd6247f04d7c9d12862bdae0dcdfacb9e4ebd4ac95390590b00fecb78c137a96966

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE

        Filesize

        711KB

        MD5

        80f0a90bca43040464e291613a49b395

        SHA1

        6db8b20dfd0f2cee84f754a3f14f8861d7b5f79f

        SHA256

        95176c2998ff556bbdc069844f6ff3d5501f66ff2a8d1b0518cd92f663a2de52

        SHA512

        a83b89ac9cd376b4b2ecfd815265ba569a2c4a4eeed37a084dd7b8d4f52ff01cf0dee08da68f4af4550e98513a930a9d5241b0241bb838418834b9d4f6738d04

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE

        Filesize

        492KB

        MD5

        e1011c54f01c7f361dc00481faebf398

        SHA1

        33002cc1e1b65acb94ca533b720006872da21d5a

        SHA256

        dbcf4791b73b577c9117890ab51c1dc74e0906334a3ff2bf9007b93a6cce3a84

        SHA512

        51088598e513819e6df78f87bb75ee7d729d43f9b9868baab7d0164abc99a8d5b5aba77394d85d2219d4e461a02f1824c6a2147253c9e858a9e636fa656556cf

      • memory/444-149-0x00000000057D0000-0x0000000005DE8000-memory.dmp

        Filesize

        6.1MB

      • memory/444-152-0x00000000051F0000-0x000000000522C000-memory.dmp

        Filesize

        240KB

      • memory/444-151-0x0000000002B40000-0x0000000002B52000-memory.dmp

        Filesize

        72KB

      • memory/444-150-0x00000000052C0000-0x00000000053CA000-memory.dmp

        Filesize

        1.0MB

      • memory/444-146-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/1664-136-0x0000000004ED0000-0x0000000004EF2000-memory.dmp

        Filesize

        136KB

      • memory/1664-135-0x00000000006B0000-0x00000000006B8000-memory.dmp

        Filesize

        32KB

      • memory/4464-143-0x00000000077C0000-0x0000000007E3A000-memory.dmp

        Filesize

        6.5MB

      • memory/4464-144-0x0000000006540000-0x000000000655A000-memory.dmp

        Filesize

        104KB

      • memory/4464-142-0x0000000006150000-0x000000000616E000-memory.dmp

        Filesize

        120KB

      • memory/4464-141-0x0000000005A60000-0x0000000005AC6000-memory.dmp

        Filesize

        408KB

      • memory/4464-140-0x00000000059F0000-0x0000000005A56000-memory.dmp

        Filesize

        408KB

      • memory/4464-139-0x0000000005170000-0x0000000005798000-memory.dmp

        Filesize

        6.2MB

      • memory/4464-138-0x0000000004B00000-0x0000000004B36000-memory.dmp

        Filesize

        216KB