Analysis

  • max time kernel
    152s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/03/2023, 09:30

General

  • Target

    088741941219ea34940cc026a4ee3738.exe

  • Size

    4.7MB

  • MD5

    088741941219ea34940cc026a4ee3738

  • SHA1

    4b10ff754a208ba307fc41aa0970287c2a7ee58a

  • SHA256

    3d92beaabcabe3357af8aa6785bb05164aad01caf3d1e897a7972c5e2fa41916

  • SHA512

    a6283fd6982a45b6431f842776a49e70593b2e24d9bcb334027ee52e0136cb8313d5ddda7d5151a98e2092134713a984ab09b4f27ba1596926982279670c2338

  • SSDEEP

    49152:JAEknD2qbP62EXPZEujwoDy2NaK6BlICAJkOKhbciZC:OEg2qbP62EXPZEujS2NN0lI1k1bcw

Malware Config

Extracted

Family

redline

Botnet

FM

C2

91.193.43.63:81

Attributes
  • auth_value

    686ed4f5bce1c0303019c1940beddd78

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\088741941219ea34940cc026a4ee3738.exe
    "C:\Users\Admin\AppData\Local\Temp\088741941219ea34940cc026a4ee3738.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4604
    • C:\Users\Admin\AppData\Roaming\configurationValue\m2.exe
      "C:\Users\Admin\AppData\Roaming\configurationValue\m2.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3148
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
          PID:3860
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          3⤵
            PID:4612
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3148 -s 240
            3⤵
            • Program crash
            PID:2276
        • C:\Users\Admin\AppData\Roaming\configurationValue\t1.exe
          "C:\Users\Admin\AppData\Roaming\configurationValue\t1.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1292
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3672
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1292 -s 264
            3⤵
            • Program crash
            PID:3592
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "088741941219ea34940cc026a4ee3738.exe"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3856
          • C:\Windows\SysWOW64\choice.exe
            choice /C Y /N /D Y /T 3
            3⤵
              PID:1440
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1292 -ip 1292
          1⤵
            PID:4520
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3148 -ip 3148
            1⤵
              PID:3228

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Roaming\configurationValue\m2.exe

              Filesize

              3.5MB

              MD5

              2ed1def1f5dc78902379e135ca9fefd5

              SHA1

              32897b24c9723e446e97c97985e4b51fddd46880

              SHA256

              bb519a602d022358ac9166cadfda5ed749a50e18cd3c7b0edb580b6355bef45e

              SHA512

              dd71aec1a57c0ca93f1a92bb5c45da5eb4d992a18d08509be29f84b326bab58e32da90d0f76e735f173578566747f38e4235886e029d3822ce76d60198a6a984

            • C:\Users\Admin\AppData\Roaming\configurationValue\m2.exe

              Filesize

              3.5MB

              MD5

              2ed1def1f5dc78902379e135ca9fefd5

              SHA1

              32897b24c9723e446e97c97985e4b51fddd46880

              SHA256

              bb519a602d022358ac9166cadfda5ed749a50e18cd3c7b0edb580b6355bef45e

              SHA512

              dd71aec1a57c0ca93f1a92bb5c45da5eb4d992a18d08509be29f84b326bab58e32da90d0f76e735f173578566747f38e4235886e029d3822ce76d60198a6a984

            • C:\Users\Admin\AppData\Roaming\configurationValue\m2.exe

              Filesize

              3.5MB

              MD5

              2ed1def1f5dc78902379e135ca9fefd5

              SHA1

              32897b24c9723e446e97c97985e4b51fddd46880

              SHA256

              bb519a602d022358ac9166cadfda5ed749a50e18cd3c7b0edb580b6355bef45e

              SHA512

              dd71aec1a57c0ca93f1a92bb5c45da5eb4d992a18d08509be29f84b326bab58e32da90d0f76e735f173578566747f38e4235886e029d3822ce76d60198a6a984

            • C:\Users\Admin\AppData\Roaming\configurationValue\t1.exe

              Filesize

              1.2MB

              MD5

              6c5e639b6f2990ec3ca245fabe57f90e

              SHA1

              405341016cfdf326104fbbe7a8fe36e5ce6909a5

              SHA256

              aafcc581a22eeb53e99fe4a96df687d116afc713227d2b60b76e5e47bda8c2b7

              SHA512

              3a61fd6675c4e92bbcbaacb7955b093b8706a5f6759495d8313e4874cbeeff9f4d605e32ff86702c94d4f568dfa62a4f42812775183a24d34443892b7fde18b7

            • C:\Users\Admin\AppData\Roaming\configurationValue\t1.exe

              Filesize

              1.2MB

              MD5

              6c5e639b6f2990ec3ca245fabe57f90e

              SHA1

              405341016cfdf326104fbbe7a8fe36e5ce6909a5

              SHA256

              aafcc581a22eeb53e99fe4a96df687d116afc713227d2b60b76e5e47bda8c2b7

              SHA512

              3a61fd6675c4e92bbcbaacb7955b093b8706a5f6759495d8313e4874cbeeff9f4d605e32ff86702c94d4f568dfa62a4f42812775183a24d34443892b7fde18b7

            • C:\Users\Admin\AppData\Roaming\configurationValue\t1.exe

              Filesize

              1.2MB

              MD5

              6c5e639b6f2990ec3ca245fabe57f90e

              SHA1

              405341016cfdf326104fbbe7a8fe36e5ce6909a5

              SHA256

              aafcc581a22eeb53e99fe4a96df687d116afc713227d2b60b76e5e47bda8c2b7

              SHA512

              3a61fd6675c4e92bbcbaacb7955b093b8706a5f6759495d8313e4874cbeeff9f4d605e32ff86702c94d4f568dfa62a4f42812775183a24d34443892b7fde18b7

            • memory/3672-419-0x0000000006720000-0x0000000006CC4000-memory.dmp

              Filesize

              5.6MB

            • memory/3672-423-0x0000000006270000-0x0000000006302000-memory.dmp

              Filesize

              584KB

            • memory/3672-155-0x0000000005530000-0x0000000005B48000-memory.dmp

              Filesize

              6.1MB

            • memory/3672-156-0x00000000050B0000-0x00000000051BA000-memory.dmp

              Filesize

              1.0MB

            • memory/3672-157-0x0000000004FE0000-0x0000000004FF2000-memory.dmp

              Filesize

              72KB

            • memory/3672-158-0x0000000005060000-0x000000000509C000-memory.dmp

              Filesize

              240KB

            • memory/3672-582-0x0000000007350000-0x00000000073A0000-memory.dmp

              Filesize

              320KB

            • memory/3672-161-0x0000000005010000-0x0000000005020000-memory.dmp

              Filesize

              64KB

            • memory/3672-579-0x00000000072D0000-0x0000000007346000-memory.dmp

              Filesize

              472KB

            • memory/3672-511-0x0000000005010000-0x0000000005020000-memory.dmp

              Filesize

              64KB

            • memory/3672-471-0x00000000073D0000-0x00000000078FC000-memory.dmp

              Filesize

              5.2MB

            • memory/3672-464-0x0000000006CD0000-0x0000000006E92000-memory.dmp

              Filesize

              1.8MB

            • memory/3672-426-0x0000000006310000-0x0000000006376000-memory.dmp

              Filesize

              408KB

            • memory/3672-150-0x0000000000400000-0x0000000000432000-memory.dmp

              Filesize

              200KB

            • memory/4604-133-0x0000000000F50000-0x000000000140E000-memory.dmp

              Filesize

              4.7MB

            • memory/4612-183-0x0000000000400000-0x000000000056C000-memory.dmp

              Filesize

              1.4MB

            • memory/4612-181-0x0000000000400000-0x000000000056C000-memory.dmp

              Filesize

              1.4MB

            • memory/4612-180-0x0000000000400000-0x000000000056C000-memory.dmp

              Filesize

              1.4MB

            • memory/4612-179-0x0000000000400000-0x000000000056C000-memory.dmp

              Filesize

              1.4MB

            • memory/4612-159-0x0000000000400000-0x000000000056C000-memory.dmp

              Filesize

              1.4MB