Analysis

  • max time kernel
    69s
  • max time network
    69s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    06-11-2020 00:55

General

  • Target

    027df404dc6098728eb2e89c9649eb25e17cdd867bd1a80a96cdcbe9cb4f196b.exe

  • Size

    571KB

  • MD5

    d79d1213a930b951d933adc1f33f4ca0

  • SHA1

    41b80eb754b3647e29381b7ed93ae4c7f0e6d036

  • SHA256

    027df404dc6098728eb2e89c9649eb25e17cdd867bd1a80a96cdcbe9cb4f196b

  • SHA512

    b8650a59aeb228984ec48a671e20de6668f203fee566afb3245a1770a7c19785b7d7bccf2d0ab41e73c226490abc5222e94653b70b6423aa61e1e29cd6119c97

Malware Config

Signatures

  • ElysiumStealer

    ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 4 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\027df404dc6098728eb2e89c9649eb25e17cdd867bd1a80a96cdcbe9cb4f196b.exe
    "C:\Users\Admin\AppData\Local\Temp\027df404dc6098728eb2e89c9649eb25e17cdd867bd1a80a96cdcbe9cb4f196b.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1584
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\ProgramData\827776.bat" "
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:568
      • C:\ProgramData\437406.exe
        C:\ProgramData\437406.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1700
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\ProgramData\299709.bat" "
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:820
      • C:\ProgramData\299709.exe
        C:\ProgramData\299709.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:300
        • C:\ProgramData\299709.exe
          "C:\ProgramData\299709.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1668
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /C ping 127.0.0.1 -n 3 > nul & del "C:\ProgramData\299709.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:956
            • C:\Windows\SysWOW64\PING.EXE
              ping 127.0.0.1 -n 3
              6⤵
              • Runs ping.exe
              PID:932

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Remote System Discovery

1
T1018

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\299709.bat
    MD5

    69160bf540a9a9e2049ea1d13cf2faf8

    SHA1

    4ca1e1ea01171ee710927284906054d8dc42f4f1

    SHA256

    42fb95a38d8bd58043f3ef01f6069d5a4f43f1a2fabcce55b74f350c8002a4a8

    SHA512

    09d8e2a5227bcfa23929f71042b5bcb3d89fc0dd3f76d3451c2d6abf1143532a6fffdde159bc772b5c4346a8732721d7a7f164f69fa1a8eefc0911b010216619

  • C:\ProgramData\299709.exe
    MD5

    bce824d270be37468b18f591a78f280f

    SHA1

    d55960603fa9d83c88bbe322e8c13cd4b94dbb9a

    SHA256

    5bbf0196747d0a66cfb41e53ec49d0a738537153ff6f5af47906c1591ef33a93

    SHA512

    40d1d2b6d367de438799039cc133adba7cf261afd4974f452624373db96add7f7d7be984de7290ba52199eb3dbe9339be1db1b214bd6f5e9c8d1d80c442df0e0

  • C:\ProgramData\299709.exe
    MD5

    bce824d270be37468b18f591a78f280f

    SHA1

    d55960603fa9d83c88bbe322e8c13cd4b94dbb9a

    SHA256

    5bbf0196747d0a66cfb41e53ec49d0a738537153ff6f5af47906c1591ef33a93

    SHA512

    40d1d2b6d367de438799039cc133adba7cf261afd4974f452624373db96add7f7d7be984de7290ba52199eb3dbe9339be1db1b214bd6f5e9c8d1d80c442df0e0

  • C:\ProgramData\299709.exe
    MD5

    bce824d270be37468b18f591a78f280f

    SHA1

    d55960603fa9d83c88bbe322e8c13cd4b94dbb9a

    SHA256

    5bbf0196747d0a66cfb41e53ec49d0a738537153ff6f5af47906c1591ef33a93

    SHA512

    40d1d2b6d367de438799039cc133adba7cf261afd4974f452624373db96add7f7d7be984de7290ba52199eb3dbe9339be1db1b214bd6f5e9c8d1d80c442df0e0

  • C:\ProgramData\437406.exe
    MD5

    79f346d5600586cf5a70f5f6f7aeb6ae

    SHA1

    51bd20e0ffa21eecf09e1528fd216c8a6be8a271

    SHA256

    2e9cac20edae9652a21e28e2930fe429fbda66aef0e55e0072e0a1fbfbe850fb

    SHA512

    2ada9bb782f05eedc42c75ce98fcbdfb41ca2effc332504c51fffdcf0a660105e6f30de43b89950d0a6547bc6c244128082a8282d130df565a633b388748b0ae

  • C:\ProgramData\437406.exe
    MD5

    79f346d5600586cf5a70f5f6f7aeb6ae

    SHA1

    51bd20e0ffa21eecf09e1528fd216c8a6be8a271

    SHA256

    2e9cac20edae9652a21e28e2930fe429fbda66aef0e55e0072e0a1fbfbe850fb

    SHA512

    2ada9bb782f05eedc42c75ce98fcbdfb41ca2effc332504c51fffdcf0a660105e6f30de43b89950d0a6547bc6c244128082a8282d130df565a633b388748b0ae

  • C:\ProgramData\827776.bat
    MD5

    7439d20003c0ee41be3bdaf320c0beea

    SHA1

    ee847192f70a531f40cce9927dfcd4064f7e0603

    SHA256

    c035e46907f68028f322211605e2cfe831e432dc5280d62dcd53c51b41baea7d

    SHA512

    3ee6b83a66aaf283686ed34e29b405b3b07af85f99c6966a9df0adc155e8644fd2dd424363bfbe6f6775f4abc3c6bc8587d7e3b5cdb552c43ebd6db254aa5a5c

  • \ProgramData\299709.exe
    MD5

    bce824d270be37468b18f591a78f280f

    SHA1

    d55960603fa9d83c88bbe322e8c13cd4b94dbb9a

    SHA256

    5bbf0196747d0a66cfb41e53ec49d0a738537153ff6f5af47906c1591ef33a93

    SHA512

    40d1d2b6d367de438799039cc133adba7cf261afd4974f452624373db96add7f7d7be984de7290ba52199eb3dbe9339be1db1b214bd6f5e9c8d1d80c442df0e0

  • \ProgramData\437406.exe
    MD5

    79f346d5600586cf5a70f5f6f7aeb6ae

    SHA1

    51bd20e0ffa21eecf09e1528fd216c8a6be8a271

    SHA256

    2e9cac20edae9652a21e28e2930fe429fbda66aef0e55e0072e0a1fbfbe850fb

    SHA512

    2ada9bb782f05eedc42c75ce98fcbdfb41ca2effc332504c51fffdcf0a660105e6f30de43b89950d0a6547bc6c244128082a8282d130df565a633b388748b0ae

  • memory/300-28-0x0000000000000000-mapping.dmp
  • memory/300-34-0x0000000000610000-0x0000000000626000-memory.dmp
    Filesize

    88KB

  • memory/300-30-0x0000000074590000-0x0000000074C7E000-memory.dmp
    Filesize

    6.9MB

  • memory/300-33-0x0000000000580000-0x00000000005C0000-memory.dmp
    Filesize

    256KB

  • memory/300-31-0x00000000013E0000-0x00000000013E1000-memory.dmp
    Filesize

    4KB

  • memory/568-14-0x0000000000000000-mapping.dmp
  • memory/820-24-0x0000000000000000-mapping.dmp
  • memory/932-44-0x0000000000000000-mapping.dmp
  • memory/956-43-0x0000000000000000-mapping.dmp
  • memory/1584-0-0x0000000074590000-0x0000000074C7E000-memory.dmp
    Filesize

    6.9MB

  • memory/1584-1-0x0000000000030000-0x0000000000031000-memory.dmp
    Filesize

    4KB

  • memory/1584-3-0x0000000000290000-0x0000000000291000-memory.dmp
    Filesize

    4KB

  • memory/1584-4-0x00000000041C0000-0x0000000004225000-memory.dmp
    Filesize

    404KB

  • memory/1584-5-0x00000000002A0000-0x00000000002A1000-memory.dmp
    Filesize

    4KB

  • memory/1668-36-0x0000000000420652-mapping.dmp
  • memory/1668-35-0x0000000000400000-0x0000000000426000-memory.dmp
    Filesize

    152KB

  • memory/1668-39-0x0000000000400000-0x0000000000426000-memory.dmp
    Filesize

    152KB

  • memory/1668-38-0x0000000000400000-0x0000000000426000-memory.dmp
    Filesize

    152KB

  • memory/1668-40-0x0000000073860000-0x0000000073F4E000-memory.dmp
    Filesize

    6.9MB

  • memory/1700-23-0x0000000000710000-0x0000000000734000-memory.dmp
    Filesize

    144KB

  • memory/1700-21-0x0000000000930000-0x0000000000931000-memory.dmp
    Filesize

    4KB

  • memory/1700-20-0x0000000074590000-0x0000000074C7E000-memory.dmp
    Filesize

    6.9MB

  • memory/1700-18-0x0000000000000000-mapping.dmp