Analysis

  • max time kernel
    145s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    07-05-2023 05:43

General

  • Target

    AdobePDFReader7.msi

  • Size

    2.2MB

  • MD5

    fadc9824c68402143239f764c99bb82d

  • SHA1

    7eb72321c2c1e25b11c9d44229af22a179e27ce8

  • SHA256

    9890ae69f0a31a5656dbebce11384a70820ac49cabe9b244dfb8a5ed22617ff5

  • SHA512

    916b9b9836d5003193cf4f52c501a90ba16f18ca13a05325f9e11a6ee9d05b927013c09524757f33efd153c0e1d25648233e79f9a8eaa81fd69ed79282268ef6

  • SSDEEP

    49152:NMU9FgsN+TXYr+LrUcdEL9MklhGUWhe8u/g1PQNPEUI:6gFPgYrordG9t0lepg1P2XI

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 10 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\AdobePDFReader7.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1372
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\readerdc64.exe
      "C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\readerdc64.exe"
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Modifies system certificate store
      • Suspicious use of SetWindowsHookEx
      PID:316
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep bypass -file "C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\ad.ps1"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2020
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\b_6vwbze.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1596
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDC9B.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCDC8A.tmp"
          4⤵
            PID:1396
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1480
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000484" "00000000000005A4"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:592

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\6ccf82.rbs

      Filesize

      7KB

      MD5

      cd4667339ea8df43a9f9e62cf82dae57

      SHA1

      7a39caee9b64b850ea86bc80fba0187feb6db111

      SHA256

      6e1e50123c1c796c7228c7af7cd5e2dda599e213100e79b3b139f13bae6236f9

      SHA512

      7e8d7ccf1976d9ee51223bcae3f4910a313765c49e5ba40fe2404da10ee2dc9a83129710d256b6a29c2df1a6707952ac344edca1224a0b08d2530a27b5133794

    • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\ad.ps1

      Filesize

      2.2MB

      MD5

      4e0e85a590f4972732f1f0de81aa5507

      SHA1

      8e1bcab1ac25c59c1203d808f04b53b1db5fd7eb

      SHA256

      bde15453821fff0d2ed08a8c10885c9ab4ec1ccc6b4b23a41e9e324e4e80a195

      SHA512

      2b874cf59cdc7298b7fcf6712db3ec4013fcd87b7c7bb44400a789821b35bc57e3ff4e98ccfe93bc4cb420d25b2d3e6967eab2e98abf43bb16543f454cef8953

    • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\readerdc64.exe

      Filesize

      1.2MB

      MD5

      eb17c8572700a9b7bbfb6c1142ad443e

      SHA1

      74022bd63cf919ac44af0dcbe0e4c14756c34b2e

      SHA256

      302b598ae57ca91ba4b4b59e926f2e07a073ab9afcb98eccde02f5e84cdfef52

      SHA512

      e7660219d815bc40741fd6737c092c8f442ebbec4f18981fbf261a269c4e2e162dc0349f76eb7b03a78529021fdab9b84322de7683685ab5d512ac7b4a5a63b0

    • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\readerdc64.exe

      Filesize

      1.2MB

      MD5

      eb17c8572700a9b7bbfb6c1142ad443e

      SHA1

      74022bd63cf919ac44af0dcbe0e4c14756c34b2e

      SHA256

      302b598ae57ca91ba4b4b59e926f2e07a073ab9afcb98eccde02f5e84cdfef52

      SHA512

      e7660219d815bc40741fd6737c092c8f442ebbec4f18981fbf261a269c4e2e162dc0349f76eb7b03a78529021fdab9b84322de7683685ab5d512ac7b4a5a63b0

    • C:\Users\Admin\AppData\Local\Temp\RESDC9B.tmp

      Filesize

      1KB

      MD5

      a73053aba02bd4eb21cebd46df2a3f3a

      SHA1

      7eaa2f841206a4ace80593be0855761df5ca8fde

      SHA256

      02ccfd19a4d3ab44474c873eba0832da1b8dbe9d26fe4c0975d4c4c43e4ae511

      SHA512

      b7269dd6e81fb42f0b4adb636450578bab374f74bf54ac6567c3e526b4a993933755ee1c7ad1b0289a3497aff7fd5ad3016f177dcb585ad8111b2fea22d57676

    • C:\Users\Admin\AppData\Local\Temp\b_6vwbze.dll

      Filesize

      3KB

      MD5

      389412693aeb67965e0818f5eccc7d4a

      SHA1

      5cc7b1cf7e64461039d2afd3066cb1a1ebc9af26

      SHA256

      33c163e5610311e68da440b5113ebfc365b59547ee0a34e2a8b1efacdc2d5a36

      SHA512

      395e9a57569b64b508acb27c4ffe23bf0f7daecf2cba2f0a66cd14ff19957977ee0f66065b086b9b90e8a6d1cad115010e8a6ac000149027a6daed7fae49f953

    • C:\Users\Admin\AppData\Local\Temp\b_6vwbze.pdb

      Filesize

      7KB

      MD5

      9fbc1eca10bb3cb0767145cf608d5b58

      SHA1

      46dac8df5312f89bdc1aeec716f7d70421274316

      SHA256

      0966baf7695457d4ce2f52778127fc2311a8040ca6cc925a188ecfc5c7f668ff

      SHA512

      633d9e21199aec1e88ab1fb833af96ccdf8a8d20c29e28e2d0c8f41b3b6c1269bfc287fdf145e6b0bd38fb798557f80b1ecad8b5f978eb8b15d235185b5c7dff

    • C:\Windows\Installer\6ccf80.msi

      Filesize

      2.2MB

      MD5

      fadc9824c68402143239f764c99bb82d

      SHA1

      7eb72321c2c1e25b11c9d44229af22a179e27ce8

      SHA256

      9890ae69f0a31a5656dbebce11384a70820ac49cabe9b244dfb8a5ed22617ff5

      SHA512

      916b9b9836d5003193cf4f52c501a90ba16f18ca13a05325f9e11a6ee9d05b927013c09524757f33efd153c0e1d25648233e79f9a8eaa81fd69ed79282268ef6

    • \??\c:\Users\Admin\AppData\Local\Temp\CSCDC8A.tmp

      Filesize

      652B

      MD5

      da714543d9246d7e1fa1a0ff928692ba

      SHA1

      3b63077b279da84781248132bc1b2d6aed7c838a

      SHA256

      6d252b04d043b73a12782a676f6f1b4616f57508dfd2d0aae312019939ff50b3

      SHA512

      0af1e8e91fe2ed43ecccd781b5b35c9bd2fe64e3a5164bd6cc1830a3f226c6757cf84043d61415febc43e54d1c98cba46be3486b87e98578a55cff3df6e4d802

    • \??\c:\Users\Admin\AppData\Local\Temp\b_6vwbze.0.cs

      Filesize

      203B

      MD5

      b611be9282deb44eed731f72bcbb2b82

      SHA1

      cc1d606d853bbabd5fef87255356a0d54381c289

      SHA256

      ee09fdd61a05266e4e09f418fc6a452f1205d9f29afba6b8a1579333dc3ff3b6

      SHA512

      63b5ad7b65fd4866fb8841e4eee567e4f1e7888bb9fda8dd5c8dca3461d084d3f80ce920ae321609e4ff32ba13a55b7320282ce7201bb74a793d4700240360a4

    • \??\c:\Users\Admin\AppData\Local\Temp\b_6vwbze.cmdline

      Filesize

      309B

      MD5

      887d13814f793f2c66baf6865535caa0

      SHA1

      12eb062d84ef33bb2afdde8024b3fa0532db13e6

      SHA256

      10c1b0c8637e8e2439598da610b87c1ff12b32f2eed8e5e0649428e6f46f451d

      SHA512

      3f4dac5cd846169e803ba822b92a3a45c49455b9ba1468645104cfeb5175d801642ad8d63b5be208c433ec0f6723d2604aa988bacc7ce64bae972b6e9fa2fdfe

    • memory/316-175-0x0000000000E30000-0x0000000001269000-memory.dmp

      Filesize

      4.2MB

    • memory/316-97-0x0000000000E30000-0x0000000001269000-memory.dmp

      Filesize

      4.2MB

    • memory/316-98-0x00000000000C0000-0x00000000000C3000-memory.dmp

      Filesize

      12KB

    • memory/316-165-0x0000000000E30000-0x0000000001269000-memory.dmp

      Filesize

      4.2MB

    • memory/316-164-0x0000000000E30000-0x0000000001269000-memory.dmp

      Filesize

      4.2MB

    • memory/2020-101-0x00000000028B0000-0x0000000002930000-memory.dmp

      Filesize

      512KB

    • memory/2020-110-0x0000000002800000-0x0000000002808000-memory.dmp

      Filesize

      32KB

    • memory/2020-89-0x0000000002390000-0x0000000002398000-memory.dmp

      Filesize

      32KB

    • memory/2020-100-0x00000000028B0000-0x0000000002930000-memory.dmp

      Filesize

      512KB

    • memory/2020-99-0x00000000028B0000-0x0000000002930000-memory.dmp

      Filesize

      512KB

    • memory/2020-88-0x000000001B1F0000-0x000000001B4D2000-memory.dmp

      Filesize

      2.9MB