Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    07/06/2023, 10:51

General

  • Target

    ec46fb043f2e7ee348cd68b7d3237f21.exe

  • Size

    377KB

  • MD5

    ec46fb043f2e7ee348cd68b7d3237f21

  • SHA1

    7e33dc696b2a598ef0a6347f700893e3b5f6a5e7

  • SHA256

    5a6efc81f1a3e1c8266cbacdeaf04ee400dfcc3bc5998c6df13e68ad6f51cdc7

  • SHA512

    7db3dc019f218400cf5541a06476a64d0d7e06b5d7a74b315db3bb325e971dab0699152766e126d7451420eb57e69a6f4aa3b143266a18ed5f08b4e16e7e37c1

  • SSDEEP

    6144:PlJY828QW4uSz6johYa9QXA0JMN1KvYikHODhD3+iXaKf:PdzWz6j6YGQX1GDKrkuFrpXJ

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

147.135.231.58:39396

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec46fb043f2e7ee348cd68b7d3237f21.exe
    "C:\Users\Admin\AppData\Local\Temp\ec46fb043f2e7ee348cd68b7d3237f21.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Users\Admin\AppData\Local\Temp\112.exe
      "C:\Users\Admin\AppData\Local\Temp\112.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1040
      • C:\Windows\Temp\cglwharps.exe
        "C:\Windows\Temp\cglwharps.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1328
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          4⤵
            PID:1600
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1328 -s 48
            4⤵
            • Loads dropped DLL
            • Program crash
            PID:612

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      62KB

      MD5

      3ac860860707baaf32469fa7cc7c0192

      SHA1

      c33c2acdaba0e6fa41fd2f00f186804722477639

      SHA256

      d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

      SHA512

      d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

    • C:\Users\Admin\AppData\Local\Temp\112.exe

      Filesize

      981KB

      MD5

      ba485dc2ff67d3439dcbc7bc2452b7b8

      SHA1

      4d87976a1e93bd57d50a4d39f4596912d2b16f5a

      SHA256

      642fb7de5f7e3d2b625c2b1fe905e9bb26445460d0ed3904eb0ca6d708edc7aa

      SHA512

      6d6a5a350314d354e5d2d9dc0ce09a06a0ee37a3a7d10a00d133f8f0b954c0535598056cb49492d0bc7d086421c2cf76a11413eb73760dcc8d4f68fd925cb466

    • C:\Users\Admin\AppData\Local\Temp\112.exe

      Filesize

      981KB

      MD5

      ba485dc2ff67d3439dcbc7bc2452b7b8

      SHA1

      4d87976a1e93bd57d50a4d39f4596912d2b16f5a

      SHA256

      642fb7de5f7e3d2b625c2b1fe905e9bb26445460d0ed3904eb0ca6d708edc7aa

      SHA512

      6d6a5a350314d354e5d2d9dc0ce09a06a0ee37a3a7d10a00d133f8f0b954c0535598056cb49492d0bc7d086421c2cf76a11413eb73760dcc8d4f68fd925cb466

    • C:\Users\Admin\AppData\Local\Temp\Tar7602.tmp

      Filesize

      164KB

      MD5

      4ff65ad929cd9a367680e0e5b1c08166

      SHA1

      c0af0d4396bd1f15c45f39d3b849ba444233b3a2

      SHA256

      c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

      SHA512

      f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

    • C:\Windows\Temp\cglwharps.exe

      Filesize

      2.0MB

      MD5

      3a687bf782b0844d6efcc1ba1086feee

      SHA1

      47803f1f08371fbe4963e7457b73404970c6538f

      SHA256

      29ffb708d7829f0b72243e9cd896a55c826240e415df338630b205f9f7962fba

      SHA512

      37b4bcb29637efa3897db1d6409149b6044f2295a1f80e92d7c00d46c09b68424bc356db94377540d86ac36e219b2ac62c3ed8b621434e86a2772138a1bccb5a

    • C:\Windows\Temp\cglwharps.exe

      Filesize

      2.0MB

      MD5

      3a687bf782b0844d6efcc1ba1086feee

      SHA1

      47803f1f08371fbe4963e7457b73404970c6538f

      SHA256

      29ffb708d7829f0b72243e9cd896a55c826240e415df338630b205f9f7962fba

      SHA512

      37b4bcb29637efa3897db1d6409149b6044f2295a1f80e92d7c00d46c09b68424bc356db94377540d86ac36e219b2ac62c3ed8b621434e86a2772138a1bccb5a

    • \Users\Admin\AppData\Local\Temp\112.exe

      Filesize

      981KB

      MD5

      ba485dc2ff67d3439dcbc7bc2452b7b8

      SHA1

      4d87976a1e93bd57d50a4d39f4596912d2b16f5a

      SHA256

      642fb7de5f7e3d2b625c2b1fe905e9bb26445460d0ed3904eb0ca6d708edc7aa

      SHA512

      6d6a5a350314d354e5d2d9dc0ce09a06a0ee37a3a7d10a00d133f8f0b954c0535598056cb49492d0bc7d086421c2cf76a11413eb73760dcc8d4f68fd925cb466

    • \Windows\Temp\cglwharps.exe

      Filesize

      2.0MB

      MD5

      3a687bf782b0844d6efcc1ba1086feee

      SHA1

      47803f1f08371fbe4963e7457b73404970c6538f

      SHA256

      29ffb708d7829f0b72243e9cd896a55c826240e415df338630b205f9f7962fba

      SHA512

      37b4bcb29637efa3897db1d6409149b6044f2295a1f80e92d7c00d46c09b68424bc356db94377540d86ac36e219b2ac62c3ed8b621434e86a2772138a1bccb5a

    • \Windows\Temp\cglwharps.exe

      Filesize

      2.0MB

      MD5

      3a687bf782b0844d6efcc1ba1086feee

      SHA1

      47803f1f08371fbe4963e7457b73404970c6538f

      SHA256

      29ffb708d7829f0b72243e9cd896a55c826240e415df338630b205f9f7962fba

      SHA512

      37b4bcb29637efa3897db1d6409149b6044f2295a1f80e92d7c00d46c09b68424bc356db94377540d86ac36e219b2ac62c3ed8b621434e86a2772138a1bccb5a

    • \Windows\Temp\cglwharps.exe

      Filesize

      2.0MB

      MD5

      3a687bf782b0844d6efcc1ba1086feee

      SHA1

      47803f1f08371fbe4963e7457b73404970c6538f

      SHA256

      29ffb708d7829f0b72243e9cd896a55c826240e415df338630b205f9f7962fba

      SHA512

      37b4bcb29637efa3897db1d6409149b6044f2295a1f80e92d7c00d46c09b68424bc356db94377540d86ac36e219b2ac62c3ed8b621434e86a2772138a1bccb5a

    • \Windows\Temp\cglwharps.exe

      Filesize

      2.0MB

      MD5

      3a687bf782b0844d6efcc1ba1086feee

      SHA1

      47803f1f08371fbe4963e7457b73404970c6538f

      SHA256

      29ffb708d7829f0b72243e9cd896a55c826240e415df338630b205f9f7962fba

      SHA512

      37b4bcb29637efa3897db1d6409149b6044f2295a1f80e92d7c00d46c09b68424bc356db94377540d86ac36e219b2ac62c3ed8b621434e86a2772138a1bccb5a

    • \Windows\Temp\cglwharps.exe

      Filesize

      2.0MB

      MD5

      3a687bf782b0844d6efcc1ba1086feee

      SHA1

      47803f1f08371fbe4963e7457b73404970c6538f

      SHA256

      29ffb708d7829f0b72243e9cd896a55c826240e415df338630b205f9f7962fba

      SHA512

      37b4bcb29637efa3897db1d6409149b6044f2295a1f80e92d7c00d46c09b68424bc356db94377540d86ac36e219b2ac62c3ed8b621434e86a2772138a1bccb5a

    • \Windows\Temp\cglwharps.exe

      Filesize

      2.0MB

      MD5

      3a687bf782b0844d6efcc1ba1086feee

      SHA1

      47803f1f08371fbe4963e7457b73404970c6538f

      SHA256

      29ffb708d7829f0b72243e9cd896a55c826240e415df338630b205f9f7962fba

      SHA512

      37b4bcb29637efa3897db1d6409149b6044f2295a1f80e92d7c00d46c09b68424bc356db94377540d86ac36e219b2ac62c3ed8b621434e86a2772138a1bccb5a

    • \Windows\Temp\cglwharps.exe

      Filesize

      2.0MB

      MD5

      3a687bf782b0844d6efcc1ba1086feee

      SHA1

      47803f1f08371fbe4963e7457b73404970c6538f

      SHA256

      29ffb708d7829f0b72243e9cd896a55c826240e415df338630b205f9f7962fba

      SHA512

      37b4bcb29637efa3897db1d6409149b6044f2295a1f80e92d7c00d46c09b68424bc356db94377540d86ac36e219b2ac62c3ed8b621434e86a2772138a1bccb5a

    • memory/1600-116-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-123-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-88-0x0000000000400000-0x0000000000527000-memory.dmp

      Filesize

      1.2MB

    • memory/1600-89-0x0000000000400000-0x0000000000527000-memory.dmp

      Filesize

      1.2MB

    • memory/1600-95-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/1600-97-0x0000000000400000-0x0000000000527000-memory.dmp

      Filesize

      1.2MB

    • memory/1600-98-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-99-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-101-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-100-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-102-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-150-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-149-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-105-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-106-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-107-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-108-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-109-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-110-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-111-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-112-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-113-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-114-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-115-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-148-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-117-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-118-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-119-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-120-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-121-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-122-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-147-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-124-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-125-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-126-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-127-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-128-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-129-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-130-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-131-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-132-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-133-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-134-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-135-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-136-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-137-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-138-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-139-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-140-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-141-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-142-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-143-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-144-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-145-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/1600-146-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

      Filesize

      64KB

    • memory/2040-61-0x0000000006AF0000-0x0000000006B30000-memory.dmp

      Filesize

      256KB

    • memory/2040-58-0x00000000002B0000-0x00000000002EF000-memory.dmp

      Filesize

      252KB

    • memory/2040-59-0x0000000006AF0000-0x0000000006B30000-memory.dmp

      Filesize

      256KB

    • memory/2040-60-0x0000000006AF0000-0x0000000006B30000-memory.dmp

      Filesize

      256KB

    • memory/2040-57-0x0000000004360000-0x0000000004366000-memory.dmp

      Filesize

      24KB

    • memory/2040-56-0x00000000042C0000-0x00000000042F4000-memory.dmp

      Filesize

      208KB

    • memory/2040-55-0x0000000004270000-0x00000000042A8000-memory.dmp

      Filesize

      224KB

    • memory/2040-62-0x0000000000400000-0x000000000258A000-memory.dmp

      Filesize

      33.5MB

    • memory/2040-71-0x0000000000400000-0x000000000258A000-memory.dmp

      Filesize

      33.5MB