Analysis

  • max time kernel
    144s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    07-05-2023 08:46

General

  • Target

    fadc9824c68402143239f764c99bb82d.msi

  • Size

    2.2MB

  • MD5

    fadc9824c68402143239f764c99bb82d

  • SHA1

    7eb72321c2c1e25b11c9d44229af22a179e27ce8

  • SHA256

    9890ae69f0a31a5656dbebce11384a70820ac49cabe9b244dfb8a5ed22617ff5

  • SHA512

    916b9b9836d5003193cf4f52c501a90ba16f18ca13a05325f9e11a6ee9d05b927013c09524757f33efd153c0e1d25648233e79f9a8eaa81fd69ed79282268ef6

  • SSDEEP

    49152:NMU9FgsN+TXYr+LrUcdEL9MklhGUWhe8u/g1PQNPEUI:6gFPgYrordG9t0lepg1P2XI

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 10 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\fadc9824c68402143239f764c99bb82d.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1684
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1592
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep bypass -file "C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\ad.ps1"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1800
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\6eybcdc_.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1556
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC1EA.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCC1E9.tmp"
          4⤵
            PID:1992
      • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\readerdc64.exe
        "C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\readerdc64.exe"
        2⤵
        • Executes dropped EXE
        • Modifies Internet Explorer settings
        • Modifies system certificate store
        • Suspicious use of SetWindowsHookEx
        PID:1752
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1740
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003B8" "0000000000000334"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:608

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\6cb37a.rbs

      Filesize

      7KB

      MD5

      87c8eec751fd76dedeb7097596de4111

      SHA1

      8cea7c8052901327ca45d3ca96fe2d1ebc9ae4fe

      SHA256

      f23b1203d9f2dab1d74aefb0e9128059fbbe470b89ce661c18f2962a72d705ba

      SHA512

      551c03fa3a6e106943800e07b6a4746fcc73ae50b24757afd4c04b363b41a58ff2b5a19a38a51172cf60254741b1a240d394e1b46984a2967a87c1a10d1865d2

    • C:\Users\Admin\AppData\Local\Temp\6eybcdc_.dll

      Filesize

      3KB

      MD5

      13e8d83263229cf982c12a9be6ddf777

      SHA1

      03df9cd099bb04629a74eaa4d910130ec0210764

      SHA256

      ae0db6e61573f4d3c7fc366388a5583ca6ea00afef78c409603dd0343c37fd6c

      SHA512

      2e7fdf61dd981de0faaadbc7a0384227d6aada50c98d6e5cf842c91c720799deeed90e81500cb1ce5b893592af8dc3e34fe5cadc1343fe9bbc3aec58bb9d72eb

    • C:\Users\Admin\AppData\Local\Temp\6eybcdc_.pdb

      Filesize

      7KB

      MD5

      2d57e29d4593de235af4b269b7fbfcb1

      SHA1

      447506bd06ddb9fcf2e3aa42b62a9041c33d1526

      SHA256

      2865e3c33b2b864a14b8c01e7ba672f72de018702a34f6e094c1f71afa4dd3cc

      SHA512

      8b600829d6dacf00b48b5fb177cd40c28ec6b83e389878b0b3a8fe4615d047c00f83d38c36aac933b06d0bd49ad678a5326907172850f419e8df5a67ff4a0abc

    • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\ad.ps1

      Filesize

      2.2MB

      MD5

      4e0e85a590f4972732f1f0de81aa5507

      SHA1

      8e1bcab1ac25c59c1203d808f04b53b1db5fd7eb

      SHA256

      bde15453821fff0d2ed08a8c10885c9ab4ec1ccc6b4b23a41e9e324e4e80a195

      SHA512

      2b874cf59cdc7298b7fcf6712db3ec4013fcd87b7c7bb44400a789821b35bc57e3ff4e98ccfe93bc4cb420d25b2d3e6967eab2e98abf43bb16543f454cef8953

    • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\readerdc64.exe

      Filesize

      1.2MB

      MD5

      eb17c8572700a9b7bbfb6c1142ad443e

      SHA1

      74022bd63cf919ac44af0dcbe0e4c14756c34b2e

      SHA256

      302b598ae57ca91ba4b4b59e926f2e07a073ab9afcb98eccde02f5e84cdfef52

      SHA512

      e7660219d815bc40741fd6737c092c8f442ebbec4f18981fbf261a269c4e2e162dc0349f76eb7b03a78529021fdab9b84322de7683685ab5d512ac7b4a5a63b0

    • C:\Users\Admin\AppData\Local\Temp\Package Installation Dir\readerdc64.exe

      Filesize

      1.2MB

      MD5

      eb17c8572700a9b7bbfb6c1142ad443e

      SHA1

      74022bd63cf919ac44af0dcbe0e4c14756c34b2e

      SHA256

      302b598ae57ca91ba4b4b59e926f2e07a073ab9afcb98eccde02f5e84cdfef52

      SHA512

      e7660219d815bc40741fd6737c092c8f442ebbec4f18981fbf261a269c4e2e162dc0349f76eb7b03a78529021fdab9b84322de7683685ab5d512ac7b4a5a63b0

    • C:\Users\Admin\AppData\Local\Temp\RESC1EA.tmp

      Filesize

      1KB

      MD5

      96ac3f2614b2594ec8129a4d92d66ef8

      SHA1

      79e81a71c858ddecafd18624368241e1422d57ed

      SHA256

      5396203e02ea1d60acce354a810df56959a1f211149d274c32b3e22c656ed549

      SHA512

      9e2542aa53d729df660cdfe974eac12b06aa2c5aa1f96c83012486c058c5de5e15155d493111d8ec10051aa7770ab62290d2332d6b03f6ba1ba9a440a9e58171

    • C:\Windows\Installer\6cb378.msi

      Filesize

      2.2MB

      MD5

      fadc9824c68402143239f764c99bb82d

      SHA1

      7eb72321c2c1e25b11c9d44229af22a179e27ce8

      SHA256

      9890ae69f0a31a5656dbebce11384a70820ac49cabe9b244dfb8a5ed22617ff5

      SHA512

      916b9b9836d5003193cf4f52c501a90ba16f18ca13a05325f9e11a6ee9d05b927013c09524757f33efd153c0e1d25648233e79f9a8eaa81fd69ed79282268ef6

    • \??\c:\Users\Admin\AppData\Local\Temp\6eybcdc_.0.cs

      Filesize

      203B

      MD5

      b611be9282deb44eed731f72bcbb2b82

      SHA1

      cc1d606d853bbabd5fef87255356a0d54381c289

      SHA256

      ee09fdd61a05266e4e09f418fc6a452f1205d9f29afba6b8a1579333dc3ff3b6

      SHA512

      63b5ad7b65fd4866fb8841e4eee567e4f1e7888bb9fda8dd5c8dca3461d084d3f80ce920ae321609e4ff32ba13a55b7320282ce7201bb74a793d4700240360a4

    • \??\c:\Users\Admin\AppData\Local\Temp\6eybcdc_.cmdline

      Filesize

      309B

      MD5

      e3cea5fc93389676eca2d69b116a7a49

      SHA1

      dcf2ff392b1311f1556134fe251217e270aaab10

      SHA256

      5379020f7c08418cc660707feca66dc4661d4c637dbd366fa2b9eb058ccda21a

      SHA512

      c88bb709ec3761c8e722fccfa3c003952d0fdea81d4758e9de59f6868a76b461b49f85845578f2f8edde93e2f7c9e2d8d0fc8974b364141d4a9b0f7714be9795

    • \??\c:\Users\Admin\AppData\Local\Temp\CSCC1E9.tmp

      Filesize

      652B

      MD5

      f56ac4103dbd585b662348ab0e892c76

      SHA1

      bd3237c007c0156121a526f6a6e63c6aadb3225c

      SHA256

      cb217ff62a3148d34f53ec2c370bed00cdc74210b93f652ee25639a620d23f52

      SHA512

      b6056f2b045d0102d94421291912fc82abf7f23245f5aea6e9eb3e7f61cfdbd3ee49708601293c7cac99afad70c1e2186e5190e092e94a4a3894519b8d71a333

    • memory/1752-163-0x00000000002A0000-0x00000000006D9000-memory.dmp

      Filesize

      4.2MB

    • memory/1752-168-0x00000000002A0000-0x00000000006D9000-memory.dmp

      Filesize

      4.2MB

    • memory/1752-92-0x00000000000F0000-0x00000000000F3000-memory.dmp

      Filesize

      12KB

    • memory/1752-178-0x00000000002A0000-0x00000000006D9000-memory.dmp

      Filesize

      4.2MB

    • memory/1752-80-0x00000000002A0000-0x00000000006D9000-memory.dmp

      Filesize

      4.2MB

    • memory/1800-89-0x000000001B150000-0x000000001B432000-memory.dmp

      Filesize

      2.9MB

    • memory/1800-110-0x000000001B600000-0x000000001B608000-memory.dmp

      Filesize

      32KB

    • memory/1800-94-0x00000000026B0000-0x0000000002730000-memory.dmp

      Filesize

      512KB

    • memory/1800-95-0x00000000026B0000-0x0000000002730000-memory.dmp

      Filesize

      512KB

    • memory/1800-93-0x00000000026B0000-0x0000000002730000-memory.dmp

      Filesize

      512KB

    • memory/1800-90-0x0000000002650000-0x0000000002658000-memory.dmp

      Filesize

      32KB