Analysis

  • max time kernel
    78s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-03-2023 14:00

General

  • Target

    http://62.204.41.88/lend/world.exe

Malware Config

Extracted

Family

redline

Botnet

14

C2

45.12.253.144:40145

Attributes
  • auth_value

    6528d0f243ad9e530a68f2a487521a80

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://62.204.41.88/lend/world.exe
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:644
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:644 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2704
    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8OI4IV75\world.exe
      "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8OI4IV75\world.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4672

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\6K3GJRJ1\suggestions[1].en-US
    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\6K3GJRJ1\world[1].exe
    Filesize

    336KB

    MD5

    f8e0e6946af017037e8bb4d5455d4e99

    SHA1

    6691a0d551c3991fbe5f18147711e829616099bb

    SHA256

    4f8e88f1d2bf0817faa0627fa1c9b92715b13015bf7f38d7fcc6d27a4e511d6e

    SHA512

    f2fa94c86c400ae894abc3d9fa7316ad47cf1bf4b039dd162cab13c1e4c29c68646919c2076804b885863dd15e79053ef378bdf996b030c6764c144eb36c6e93

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8OI4IV75\world.exe
    Filesize

    336KB

    MD5

    f8e0e6946af017037e8bb4d5455d4e99

    SHA1

    6691a0d551c3991fbe5f18147711e829616099bb

    SHA256

    4f8e88f1d2bf0817faa0627fa1c9b92715b13015bf7f38d7fcc6d27a4e511d6e

    SHA512

    f2fa94c86c400ae894abc3d9fa7316ad47cf1bf4b039dd162cab13c1e4c29c68646919c2076804b885863dd15e79053ef378bdf996b030c6764c144eb36c6e93

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8OI4IV75\world.exe.pbxt1gm.partial
    Filesize

    336KB

    MD5

    f8e0e6946af017037e8bb4d5455d4e99

    SHA1

    6691a0d551c3991fbe5f18147711e829616099bb

    SHA256

    4f8e88f1d2bf0817faa0627fa1c9b92715b13015bf7f38d7fcc6d27a4e511d6e

    SHA512

    f2fa94c86c400ae894abc3d9fa7316ad47cf1bf4b039dd162cab13c1e4c29c68646919c2076804b885863dd15e79053ef378bdf996b030c6764c144eb36c6e93

  • memory/4672-148-0x0000000005580000-0x00000000055BC000-memory.dmp
    Filesize

    240KB

  • memory/4672-151-0x0000000005A50000-0x0000000005AB6000-memory.dmp
    Filesize

    408KB

  • memory/4672-146-0x0000000005610000-0x000000000571A000-memory.dmp
    Filesize

    1.0MB

  • memory/4672-147-0x0000000005520000-0x0000000005532000-memory.dmp
    Filesize

    72KB

  • memory/4672-144-0x00000000054F0000-0x0000000005500000-memory.dmp
    Filesize

    64KB

  • memory/4672-149-0x00000000059B0000-0x0000000005A42000-memory.dmp
    Filesize

    584KB

  • memory/4672-150-0x0000000006BE0000-0x0000000007184000-memory.dmp
    Filesize

    5.6MB

  • memory/4672-145-0x0000000005B20000-0x0000000006138000-memory.dmp
    Filesize

    6.1MB

  • memory/4672-152-0x0000000006900000-0x0000000006AC2000-memory.dmp
    Filesize

    1.8MB

  • memory/4672-153-0x0000000008DB0000-0x00000000092DC000-memory.dmp
    Filesize

    5.2MB

  • memory/4672-154-0x00000000054F0000-0x0000000005500000-memory.dmp
    Filesize

    64KB

  • memory/4672-155-0x0000000006AD0000-0x0000000006B46000-memory.dmp
    Filesize

    472KB

  • memory/4672-156-0x0000000006B50000-0x0000000006BA0000-memory.dmp
    Filesize

    320KB

  • memory/4672-143-0x00000000009E0000-0x0000000000A3A000-memory.dmp
    Filesize

    360KB