Analysis

  • max time kernel
    95s
  • max time network
    176s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24-11-2022 22:16

General

  • Target

    498f54450f4ecc7b85991ecfd6c400e2b879ae5209fffc5792e19f5ec8e4ef53.exe

  • Size

    1.4MB

  • MD5

    a0ca9d2e6856140493a42a9bfc5f98a2

  • SHA1

    be6e2cf57e66418d578fdad953dcd165967440fb

  • SHA256

    498f54450f4ecc7b85991ecfd6c400e2b879ae5209fffc5792e19f5ec8e4ef53

  • SHA512

    fb328a30e525e8ba533a90195c1f20ff30b3ae12b041f6383dfa3b9c385ec8cbcbd5bb8cd8faba4c38fe364375b582c11a270c9419965b4b482526bbf61f6ea3

  • SSDEEP

    24576:nuj0toZN802qWvVmGiDlM7FSaowP8FJJyPYYc4TuDXTMIFkot8erYMS3N:n2ZH2LdmGJFZoU8sFxSDnFkNesMWN

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • c:\windows\system32\taskhostw.exe
    taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
    1⤵
      PID:2980
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        2⤵
        • Looks for VirtualBox Guest Additions in registry
        • Executes dropped EXE
        • Looks for VMWare Tools registry key
        • Checks BIOS information in registry
        • Maps connected drives based on registry
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:5044
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4656
    • C:\Users\Admin\AppData\Local\Temp\498f54450f4ecc7b85991ecfd6c400e2b879ae5209fffc5792e19f5ec8e4ef53.exe
      "C:\Users\Admin\AppData\Local\Temp\498f54450f4ecc7b85991ecfd6c400e2b879ae5209fffc5792e19f5ec8e4ef53.exe"
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4036
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"
        2⤵
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of WriteProcessMemory
        PID:4252
        • C:\Windows\system32\rundll32.exe
          "C:\Users\Admin\AppData\Roaming\nsis_unse56a9d1.dll",PrintUIEntry |5CQkOhiAAAA|1TKr5GsMwYD|67sDqg8OAAl|xYmwxC0TNSO|1k8B3tZkgiyf2sAZQByAG4XAP9sADMAMgAuAOVkHwBs8|AtBXgARP8AOQBYAEEASe8ATgB6GwBrAGa|ADAARQBXLQJZ|0iD7CjoBAIA|wBIg8Qow8zM|8xMiUQkGEiJ|1QkEEiJTCQI|lkBSItEJDBIidsEJH0BOEhrAAhIb8dEJBAtAesOfQFfEEiDwAGLARB9AbdASDmSAHMlmwOL|wwkSAPISIvB10iLTKcBVHcAA9H|SIvKigmICOv9wWIFZUiLBCVg|vPwM8lIi1AYSP870XQ2SIPCIP9IiwJIO8J0Kv9mg3hIGHUaTP+LQFBmQYM4a7t0Bw0RS3UIDRB4|xAudAVIiwDrr9VIi0j5AMFmAED|U1VWV0FUQVXvQVZBV1kBZoE5|01aTYv4TIvyv0iL2Q+F|PPwTP9jSTxBgTwJUL9FAAAPherz8EHvi4QJiPPwhcBIv408AQ+E1mYRg3e8CYwtAQ+Ex|Pw|0SLZyBEi18c|4t3JESLTxhM|wPhTAPZSAPx|zPJRYXJD4Sk|vPwTYvEQYsQRf8z0kgD04oChP|AdB1BwcoND3u+wPYAAUQD0LsR|3XsQYH6qvwN|3x0DoPBAUmD|8AEQTvJc2nr|8aLwQ+3DE5F|4ssi0wD63RY+zPtphB0UUGLFP69ANMzyYoCTIvfwusPwcnEEQPI3uEQAUGKANEQ7TN|wDP2QTsMttwQ|qIAg8YBg|gIcv|u6wpIi8tB|3|VSYkE94PF4BB|xAQ7bxhyr2IB|0FfQV5BXUFc719eXVsvF0iB7PtgAWAAi+noZv7|||9IhcAPhJnWcSBMjasBiycQyDP3|+ibeSCNXwRM|41FQjPSi8v|91QkaHwgTIvgD+uEbHEgRaQQM8CLfdONIEiJfCQgoiD9cHwgSIvwD4RM|HEgoiBQSI1WCER|jUdASI2MJIERv0iL2Oh8|XogjatWSNogEN4hzPPw6P1n6yBEiwaNVwj0PSCiIFjGIYmEJIDagxLd8|CLDtYgWIljjCRtEQMwjSDoMesgv0yLXTqLrCkySPuLnBYyTIlkJDj|RI1nbEk77EjehiAwTIlcgAGEJE3cgxGGjuMh3yDwrBO|SIvT6Of8ATCK3ZxzMkiNhHMyQYD|8yFJi8xEMBj+oAKD6QF184G8|nMyIVJleHVKi3eEJPQeMZQk+PPw|wPCSDvocjVB|zvUdjBEjUlAP0kr1EG4AJQAoiA9QMYi+HQXRLQwvjHvSI1TbI0gTSvEu+hsgDBIi86iIHg|SIX|dBRMjDAXMX9IjUwkQLoD8|Cf|9dIgcRwIV0kAAEA
          3⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Accesses Microsoft Outlook profiles
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • outlook_office_path
          • outlook_win_path
          PID:4372
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 4372 -s 240
            4⤵
            • Program crash
            PID:4808

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      588KB

      MD5

      d49e448a724e46252a188f98c9a3a77d

      SHA1

      f8ceb531b7a3c3cf24ac1d0226958a558de52006

      SHA256

      29ea393b1332261816d4d474668796214647c9a4634d3fb5713f8f5612f0a3d6

      SHA512

      0c9c50a57b78daa4a07b57a671231e463bb02fdc226ac04807651ca56b0b6de72edf043e20b6257c1df92479cdae5ce72197e0294d187e7f87570dc630b097e7

    • C:\Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      588KB

      MD5

      d49e448a724e46252a188f98c9a3a77d

      SHA1

      f8ceb531b7a3c3cf24ac1d0226958a558de52006

      SHA256

      29ea393b1332261816d4d474668796214647c9a4634d3fb5713f8f5612f0a3d6

      SHA512

      0c9c50a57b78daa4a07b57a671231e463bb02fdc226ac04807651ca56b0b6de72edf043e20b6257c1df92479cdae5ce72197e0294d187e7f87570dc630b097e7

    • C:\Users\Admin\AppData\Roaming\nsis_unse56a9d1.dll

      Filesize

      58KB

      MD5

      664e46926466a2d4c9b87540f4853c39

      SHA1

      b172d1c2bde331770b0a944fcf6a9e2d75ded66b

      SHA256

      92a7c3296a561fb39798f821173e69d1feff44ff3a84caa4c6bb890945e79488

      SHA512

      1490ee65220c71a9f445df4b0f34d0c7bd3ece2e58253cfa3194d34e813843e0f71ea7bce0f0ae562a620334fdf3589262ca2f3209414936aa28a365db64ff03

    • \Users\Admin\AppData\Local\Temp\advapi32.dll

      Filesize

      182KB

      MD5

      17973bb96ee2ead17abcfcac36f8a8a3

      SHA1

      4963470c86f26d1dd9bca3507feba6bd9b917eab

      SHA256

      29e22083fb33e9e91f44e722877d69f261422f35e366971a2489d9f4d1005bb0

      SHA512

      ea1936fc9c774b1039ba6cf1811c807071c59c7946f4f6dd118af1e42a6e9d339bee89b325533e2b3beef86515d2c52d7787a5da0a5ca3709a57f55a943888a4

    • \Users\Admin\AppData\Roaming\nsis_unse56a9d1.dll

      Filesize

      58KB

      MD5

      664e46926466a2d4c9b87540f4853c39

      SHA1

      b172d1c2bde331770b0a944fcf6a9e2d75ded66b

      SHA256

      92a7c3296a561fb39798f821173e69d1feff44ff3a84caa4c6bb890945e79488

      SHA512

      1490ee65220c71a9f445df4b0f34d0c7bd3ece2e58253cfa3194d34e813843e0f71ea7bce0f0ae562a620334fdf3589262ca2f3209414936aa28a365db64ff03

    • memory/4036-166-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-213-0x0000000002A40000-0x0000000002FDD000-memory.dmp

      Filesize

      5.6MB

    • memory/4036-121-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-122-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-123-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-124-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-125-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-126-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-127-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-128-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-129-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-130-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-131-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-132-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-133-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-134-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-135-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-136-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-168-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-139-0x0000000002A40000-0x0000000002FDD000-memory.dmp

      Filesize

      5.6MB

    • memory/4036-141-0x0000000002870000-0x0000000002998000-memory.dmp

      Filesize

      1.2MB

    • memory/4036-142-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-143-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-144-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-145-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-146-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-147-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-148-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-149-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-150-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-152-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-151-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-153-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-154-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-155-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-156-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-157-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-158-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-159-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-160-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-161-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-162-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-163-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-164-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-165-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-119-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-116-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-137-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-120-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-170-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-171-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-172-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-173-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-174-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-175-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-176-0x00000000103A0000-0x000000001069A000-memory.dmp

      Filesize

      3.0MB

    • memory/4036-177-0x00000000103A0000-0x000000001069A000-memory.dmp

      Filesize

      3.0MB

    • memory/4036-169-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-221-0x0000000002870000-0x0000000002998000-memory.dmp

      Filesize

      1.2MB

    • memory/4036-227-0x00000000103A0000-0x000000001069A000-memory.dmp

      Filesize

      3.0MB

    • memory/4036-167-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-117-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4036-118-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4252-178-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4252-184-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4252-181-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4252-222-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4252-228-0x0000000000B40000-0x0000000000B5D000-memory.dmp

      Filesize

      116KB

    • memory/4252-243-0x0000000002B10000-0x0000000002D4D000-memory.dmp

      Filesize

      2.2MB

    • memory/4252-180-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4252-182-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4252-183-0x0000000077C20000-0x0000000077DAE000-memory.dmp

      Filesize

      1.6MB

    • memory/4252-251-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4252-252-0x0000000000B40000-0x0000000000B5D000-memory.dmp

      Filesize

      116KB

    • memory/4372-244-0x0000000000000000-mapping.dmp

    • memory/4372-256-0x00007FF61F060000-0x00007FF61F15A000-memory.dmp

      Filesize

      1000KB

    • memory/4372-271-0x00007FF61F060000-0x00007FF61F15A000-memory.dmp

      Filesize

      1000KB

    • memory/4372-272-0x0000000010000000-0x0000000010013000-memory.dmp

      Filesize

      76KB

    • memory/4372-250-0x00007FF61F060000-0x00007FF61F15A000-memory.dmp

      Filesize

      1000KB

    • memory/4372-249-0x000001B058AC0000-0x000001B058AC7000-memory.dmp

      Filesize

      28KB

    • memory/4656-369-0x0000000006D60000-0x0000000006DC6000-memory.dmp

      Filesize

      408KB

    • memory/4656-338-0x0000000005930000-0x0000000005942000-memory.dmp

      Filesize

      72KB

    • memory/4656-381-0x00000000080C0000-0x00000000085EC000-memory.dmp

      Filesize

      5.2MB

    • memory/4656-280-0x000000000044C25E-mapping.dmp

    • memory/4656-314-0x0000000000400000-0x0000000000452000-memory.dmp

      Filesize

      328KB

    • memory/4656-335-0x0000000005E70000-0x0000000006476000-memory.dmp

      Filesize

      6.0MB

    • memory/4656-336-0x0000000005A00000-0x0000000005B0A000-memory.dmp

      Filesize

      1.0MB

    • memory/4656-380-0x0000000007360000-0x0000000007522000-memory.dmp

      Filesize

      1.8MB

    • memory/4656-340-0x0000000005990000-0x00000000059CE000-memory.dmp

      Filesize

      248KB

    • memory/4656-342-0x0000000005B10000-0x0000000005B5B000-memory.dmp

      Filesize

      300KB

    • memory/4656-379-0x0000000007690000-0x0000000007B8E000-memory.dmp

      Filesize

      5.0MB

    • memory/4656-377-0x0000000006F80000-0x0000000007012000-memory.dmp

      Filesize

      584KB

    • memory/5044-273-0x0000000000000000-mapping.dmp

    • memory/5044-277-0x0000023EFDE00000-0x0000023EFDE96000-memory.dmp

      Filesize

      600KB

    • memory/5044-278-0x0000023E987C0000-0x0000023E9884E000-memory.dmp

      Filesize

      568KB