Analysis

  • max time kernel
    147s
  • max time network
    99s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    08/07/2020, 10:11

General

  • Target

    f38d9b74c3608660961b92448d249323.exe

  • Size

    1.3MB

  • MD5

    f38d9b74c3608660961b92448d249323

  • SHA1

    2e48e08c75486a10eb463ee34826c9a2fc207e96

  • SHA256

    3ee692779441b3a14699edc0f9ad269c58281d5735c570a9468f077739db26dd

  • SHA512

    c7c076116ac62b89f8545247815c006d08b6a05112e39a1210956d4d48d97c33db38936dc19532244a715e26d2fa1b0cc6e8fc135f4150265a058f9a7dabaf0b

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Checks for installed software on the system 1 TTPs 30 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of WriteProcessMemory 31 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Kills process with taskkill 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f38d9b74c3608660961b92448d249323.exe
    "C:\Users\Admin\AppData\Local\Temp\f38d9b74c3608660961b92448d249323.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetThreadContext
    PID:1292
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "{path}"
      2⤵
        PID:1368
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "{path}"
        2⤵
        • Modifies system certificate store
        • Checks for installed software on the system
        • Suspicious use of WriteProcessMemory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1228
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /C taskkill /F /PID 1228 && choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1844
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /PID 1228
            4⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1584
          • C:\Windows\SysWOW64\choice.exe
            choice /C Y /N /D Y /T 3
            4⤵
              PID:1544

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1228-2-0x0000000000400000-0x000000000042C000-memory.dmp

        Filesize

        176KB

      • memory/1228-4-0x0000000000400000-0x000000000042C000-memory.dmp

        Filesize

        176KB

      • memory/1228-5-0x0000000000400000-0x000000000042C000-memory.dmp

        Filesize

        176KB