Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-06-2023 12:01

General

  • Target

    71feef2d7c3a5b64d022f29b9e76799d.exe

  • Size

    1.8MB

  • MD5

    71feef2d7c3a5b64d022f29b9e76799d

  • SHA1

    4e166f8b0f35d3e654ab6a16793f17fc8f648b7c

  • SHA256

    b20a55927f7fa65653a758c3962622ffdb428ef6fe03f80493b4798fa12ba1db

  • SHA512

    61562206896ce0824f8f70af2e2e9a4ef98d3053a11d2e74f21cf5b780e99bd025a9dd3cc87fb1e779dd09402892a264fefa69496e1c6447da938d9fcaf0395e

  • SSDEEP

    49152:4HWOaUxJgoj1THQbUf3rVrCOFA70asTrm:8CYJgClHWUf3rFC30at

Malware Config

Extracted

Family

redline

Botnet

top

C2

83.97.73.124:53

Attributes
  • auth_value

    053e5ccc53982413753b68419138b23a

Extracted

Family

redline

Botnet

Lyla1606

C2

94.130.176.65:13400

Attributes
  • auth_value

    f39fff6907be2a845f1dd21f03a9f743

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Downloads MZ/PE file
  • .NET Reactor proctector 8 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Executes dropped EXE 4 IoCs
  • Unexpected DNS network traffic destination 15 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\71feef2d7c3a5b64d022f29b9e76799d.exe
    "C:\Users\Admin\AppData\Local\Temp\71feef2d7c3a5b64d022f29b9e76799d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:448
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
        PID:4920
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4760
        • C:\Users\Admin\AppData\Local\Temp\7CAIAAK0C0B7FKF.exe
          "C:\Users\Admin\AppData\Local\Temp\7CAIAAK0C0B7FKF.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4200
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3968
        • C:\Users\Admin\AppData\Local\Temp\9MK6CBJN5IQ4DKI.exe
          "C:\Users\Admin\AppData\Local\Temp\9MK6CBJN5IQ4DKI.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4620
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4812
        • C:\Users\Admin\AppData\Local\Temp\9MK6CBJN5IQ4DKI.exe
          "C:\Users\Admin\AppData\Local\Temp\9MK6CBJN5IQ4DKI.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:5000
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            4⤵
              PID:1112
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2280
          • C:\Users\Admin\AppData\Local\Temp\3QEH0N2G81B373E.exe
            https://iplogger.com/12qaJ4
            3⤵
            • Executes dropped EXE
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:3700

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      1
      T1112

      Credential Access

      Credentials in Files

      1
      T1081

      Discovery

      System Information Discovery

      1
      T1082

      Collection

      Data from Local System

      1
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\9MK6CBJN5IQ4DKI.exe.log
        Filesize

        522B

        MD5

        8334a471a4b492ece225b471b8ad2fc8

        SHA1

        1cb24640f32d23e8f7800bd0511b7b9c3011d992

        SHA256

        5612afe347d8549cc95a0c710602bcc7d7b224361b613c0a6ba362092300c169

        SHA512

        56ae2e83355c331b00d782797f5664c2f373eac240e811aab978732503ae05eb20b08730d2427ed90efa5a706d71b42b57153596a45a6b5592e3dd9128b81c36

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegSvcs.exe.log
        Filesize

        2KB

        MD5

        3fc2523d55e4e6cd0763b9032b89a8e2

        SHA1

        3b4723d742586ca1a31d6f5303327e125196acfc

        SHA256

        e1b9824cc199c1d08fecc69f54f7eddd90588d341ba80c4fdb639be3dae3b248

        SHA512

        e7c30dd930da10345d74de9ebc4e1b04b1c7ee6d1073b68f4a3c93cf4b8565e3a29216a01a33554fee0ffc332a97cb84e3164affcfd4d61a8690b7fed28af953

      • C:\Users\Admin\AppData\Local\Temp\1F33FMJKFAOHA3B.exe
        Filesize

        100KB

        MD5

        3bc1c82f269795b2c46a5b58e75c41fa

        SHA1

        f442720025a8359d6204c3b8f1c6953ba292bd33

        SHA256

        be7cfb37fdcfe8fee4c79cf94ec2c158f1fbe4b36634e7744a29d99b21cceb80

        SHA512

        9f7bedd1d6f5242600114e199cfba2faa028bf0d023dde456ee4ac71e126b9e291a3da3c1152f5f74e9e62c2916c4c3e7e7f6fbed8127867c49eb8e23b3b6af3

      • C:\Users\Admin\AppData\Local\Temp\3QEH0N2G81B373E.exe
        Filesize

        8KB

        MD5

        8719ce641e7c777ac1b0eaec7b5fa7c7

        SHA1

        c04de52cb511480cc7d00d67f1d9e17b02d6406b

        SHA256

        6283ac6ecbf4c4038cf44896dd221c7c11152bac77273709330409032c3e72ea

        SHA512

        7be5bd6d2342dd02818f1979e7e74a6376658711ac82a59b2af1a67207cfd3c7416b657af01216473b15132e4aa5c6675f0eb8ee6343192c7dfc4a5249ccaa97

      • C:\Users\Admin\AppData\Local\Temp\3QEH0N2G81B373E.exe
        Filesize

        8KB

        MD5

        8719ce641e7c777ac1b0eaec7b5fa7c7

        SHA1

        c04de52cb511480cc7d00d67f1d9e17b02d6406b

        SHA256

        6283ac6ecbf4c4038cf44896dd221c7c11152bac77273709330409032c3e72ea

        SHA512

        7be5bd6d2342dd02818f1979e7e74a6376658711ac82a59b2af1a67207cfd3c7416b657af01216473b15132e4aa5c6675f0eb8ee6343192c7dfc4a5249ccaa97

      • C:\Users\Admin\AppData\Local\Temp\7CAIAAK0C0B7FKF.exe
        Filesize

        1.4MB

        MD5

        217ba190f5ed42238e9b1c05f2eaf386

        SHA1

        6959f1f880603094edee516e977255aeb2873989

        SHA256

        9a86c98d91a1795bdd8abba614f47a7f5ccad05370231a74be952b12f3cca170

        SHA512

        36a8ac5e5c5851d83145e914af25c9dfba779004817bcb3971b675a0d758301f78757fb2791b03c6b933ade83574c0c0c4d0309dafc69b6b136a0bf397281ca4

      • C:\Users\Admin\AppData\Local\Temp\7CAIAAK0C0B7FKF.exe
        Filesize

        1.4MB

        MD5

        217ba190f5ed42238e9b1c05f2eaf386

        SHA1

        6959f1f880603094edee516e977255aeb2873989

        SHA256

        9a86c98d91a1795bdd8abba614f47a7f5ccad05370231a74be952b12f3cca170

        SHA512

        36a8ac5e5c5851d83145e914af25c9dfba779004817bcb3971b675a0d758301f78757fb2791b03c6b933ade83574c0c0c4d0309dafc69b6b136a0bf397281ca4

      • C:\Users\Admin\AppData\Local\Temp\9MK6CBJN5IQ4DKI.exe
        Filesize

        1.3MB

        MD5

        7feb03325f5b263e1142e03b93fe01c2

        SHA1

        868221436752fdbb61ba78b9983793986912694f

        SHA256

        3849c73450d6ca36851a5e0b8e2b5d34d2ca4972b7508378b5c809574e5fc6eb

        SHA512

        3e803250fc07321229743be33a329bb389e08ac285f172c55d63854fac87068c70861337b890da9f0f99de134d9e8ff574c56cfd78f071134eda622c8aa585fe

      • C:\Users\Admin\AppData\Local\Temp\9MK6CBJN5IQ4DKI.exe
        Filesize

        1.3MB

        MD5

        7feb03325f5b263e1142e03b93fe01c2

        SHA1

        868221436752fdbb61ba78b9983793986912694f

        SHA256

        3849c73450d6ca36851a5e0b8e2b5d34d2ca4972b7508378b5c809574e5fc6eb

        SHA512

        3e803250fc07321229743be33a329bb389e08ac285f172c55d63854fac87068c70861337b890da9f0f99de134d9e8ff574c56cfd78f071134eda622c8aa585fe

      • C:\Users\Admin\AppData\Local\Temp\9MK6CBJN5IQ4DKI.exe
        Filesize

        1.3MB

        MD5

        7feb03325f5b263e1142e03b93fe01c2

        SHA1

        868221436752fdbb61ba78b9983793986912694f

        SHA256

        3849c73450d6ca36851a5e0b8e2b5d34d2ca4972b7508378b5c809574e5fc6eb

        SHA512

        3e803250fc07321229743be33a329bb389e08ac285f172c55d63854fac87068c70861337b890da9f0f99de134d9e8ff574c56cfd78f071134eda622c8aa585fe

      • memory/448-157-0x0000000004E50000-0x0000000004E65000-memory.dmp
        Filesize

        84KB

      • memory/448-146-0x0000000004E50000-0x0000000004E65000-memory.dmp
        Filesize

        84KB

      • memory/448-153-0x0000000004E50000-0x0000000004E65000-memory.dmp
        Filesize

        84KB

      • memory/448-155-0x0000000004E50000-0x0000000004E65000-memory.dmp
        Filesize

        84KB

      • memory/448-133-0x00000000002A0000-0x0000000000470000-memory.dmp
        Filesize

        1.8MB

      • memory/448-159-0x0000000004E50000-0x0000000004E65000-memory.dmp
        Filesize

        84KB

      • memory/448-134-0x0000000004E80000-0x0000000004F1C000-memory.dmp
        Filesize

        624KB

      • memory/448-138-0x0000000004E50000-0x0000000004E65000-memory.dmp
        Filesize

        84KB

      • memory/448-140-0x0000000004E50000-0x0000000004E65000-memory.dmp
        Filesize

        84KB

      • memory/448-142-0x0000000004E50000-0x0000000004E65000-memory.dmp
        Filesize

        84KB

      • memory/448-150-0x0000000004FF0000-0x0000000005000000-memory.dmp
        Filesize

        64KB

      • memory/448-148-0x0000000004E50000-0x0000000004E65000-memory.dmp
        Filesize

        84KB

      • memory/448-135-0x0000000004E50000-0x0000000004E65000-memory.dmp
        Filesize

        84KB

      • memory/448-136-0x0000000004E50000-0x0000000004E65000-memory.dmp
        Filesize

        84KB

      • memory/448-144-0x0000000004E50000-0x0000000004E65000-memory.dmp
        Filesize

        84KB

      • memory/448-151-0x0000000004E50000-0x0000000004E65000-memory.dmp
        Filesize

        84KB

      • memory/2280-289-0x0000000004ED0000-0x0000000004EE0000-memory.dmp
        Filesize

        64KB

      • memory/2280-296-0x00000000075B0000-0x0000000007772000-memory.dmp
        Filesize

        1.8MB

      • memory/2280-297-0x0000000007CB0000-0x00000000081DC000-memory.dmp
        Filesize

        5.2MB

      • memory/3700-192-0x0000022A5DA70000-0x0000022A5DA80000-memory.dmp
        Filesize

        64KB

      • memory/3700-190-0x0000022A43500000-0x0000022A43506000-memory.dmp
        Filesize

        24KB

      • memory/3700-191-0x0000022A5DA70000-0x0000022A5DA80000-memory.dmp
        Filesize

        64KB

      • memory/3700-193-0x0000022A5DA70000-0x0000022A5DA80000-memory.dmp
        Filesize

        64KB

      • memory/3700-199-0x0000023260110000-0x00000232608B6000-memory.dmp
        Filesize

        7.6MB

      • memory/3968-269-0x00000000032D0000-0x00000000032E0000-memory.dmp
        Filesize

        64KB

      • memory/3968-300-0x00000000032D0000-0x00000000032E0000-memory.dmp
        Filesize

        64KB

      • memory/3968-227-0x0000000000400000-0x0000000000430000-memory.dmp
        Filesize

        192KB

      • memory/3968-229-0x000000000B210000-0x000000000B828000-memory.dmp
        Filesize

        6.1MB

      • memory/3968-230-0x000000000AD50000-0x000000000AE5A000-memory.dmp
        Filesize

        1.0MB

      • memory/3968-231-0x000000000AC90000-0x000000000ACA2000-memory.dmp
        Filesize

        72KB

      • memory/3968-241-0x000000000ACF0000-0x000000000AD2C000-memory.dmp
        Filesize

        240KB

      • memory/4200-169-0x0000000000590000-0x00000000006EE000-memory.dmp
        Filesize

        1.4MB

      • memory/4620-267-0x0000000005150000-0x0000000005160000-memory.dmp
        Filesize

        64KB

      • memory/4620-174-0x0000000000840000-0x0000000000992000-memory.dmp
        Filesize

        1.3MB

      • memory/4760-189-0x0000000000400000-0x0000000000492000-memory.dmp
        Filesize

        584KB

      • memory/4760-160-0x0000000000400000-0x0000000000492000-memory.dmp
        Filesize

        584KB

      • memory/4760-164-0x0000000000400000-0x0000000000492000-memory.dmp
        Filesize

        584KB

      • memory/4760-162-0x0000000000400000-0x0000000000492000-memory.dmp
        Filesize

        584KB

      • memory/4760-163-0x0000000000400000-0x0000000000492000-memory.dmp
        Filesize

        584KB

      • memory/4812-292-0x0000000006BB0000-0x0000000007154000-memory.dmp
        Filesize

        5.6MB

      • memory/4812-293-0x0000000007160000-0x00000000071D6000-memory.dmp
        Filesize

        472KB

      • memory/4812-294-0x00000000067F0000-0x000000000680E000-memory.dmp
        Filesize

        120KB

      • memory/4812-295-0x0000000007230000-0x0000000007280000-memory.dmp
        Filesize

        320KB

      • memory/4812-291-0x0000000006560000-0x00000000065F2000-memory.dmp
        Filesize

        584KB

      • memory/4812-290-0x0000000005970000-0x0000000005980000-memory.dmp
        Filesize

        64KB

      • memory/4812-288-0x00000000059F0000-0x0000000005A56000-memory.dmp
        Filesize

        408KB

      • memory/4812-266-0x0000000000400000-0x0000000000426000-memory.dmp
        Filesize

        152KB