Analysis

  • max time kernel
    150s
  • max time network
    112s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    17-11-2020 12:34

General

  • Target

    41d4bcdb9da7c94b1b5e6e88a8518390.exe

  • Size

    344KB

  • MD5

    f863b6b0881ef40a9919d966ea754c87

  • SHA1

    74f2013fc0df5a96d5edfcd77659fabe260c4a1d

  • SHA256

    1b189602123e4dba4522d442877fb0862a8fbbc4cc6d187954ba27039bea7d9c

  • SHA512

    1d3029129a596e9e049590164f04983c7f3cd94a2e94948a30f82279527e4a8b85f714b18b02d709ea42c3f119a1fefc627bd31b5077123b1a03db375224b735

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Executes dropped EXE 5 IoCs
  • VMProtect packed file 11 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Modifies file permissions 1 TTPs 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • themida 11 IoCs

    Detects Themida, Advanced Windows software protection system.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 5 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41d4bcdb9da7c94b1b5e6e88a8518390.exe
    "C:\Users\Admin\AppData\Local\Temp\41d4bcdb9da7c94b1b5e6e88a8518390.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:796
    • C:\Users\Admin\AppData\Local\Temp\setup_c.exe
      "C:\Users\Admin\AppData\Local\Temp\setup_c.exe"
      2⤵
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1408
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)" & icacls "C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)" & icacls "C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480" /inheritance:e /deny "Admin:(R,REA,RA,RD)"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2700
        • C:\Windows\SysWOW64\icacls.exe
          icacls "C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"
          4⤵
          • Modifies file permissions
          PID:2800
        • C:\Windows\SysWOW64\icacls.exe
          icacls "C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"
          4⤵
          • Modifies file permissions
          PID:996
        • C:\Windows\SysWOW64\icacls.exe
          icacls "C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480" /inheritance:e /deny "Admin:(R,REA,RA,RD)"
          4⤵
          • Modifies file permissions
          PID:3484
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C ping 127.0.0.1 -n 3 > nul & del ""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1336
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 3
        3⤵
        • Runs ping.exe
        PID:2428
  • C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480\keymgr.exe
    C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480\keymgr.exe
    1⤵
    • Executes dropped EXE
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:2736
  • C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480\keymgr.exe
    C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480\keymgr.exe
    1⤵
    • Executes dropped EXE
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:3824
  • C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480\keymgr.exe
    C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480\keymgr.exe
    1⤵
    • Executes dropped EXE
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:1444
  • C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480\keymgr.exe
    C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480\keymgr.exe
    1⤵
    • Executes dropped EXE
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:2740

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480\keymgr.exe

    MD5

    f31bf041b5744283c00e2b86900907f2

    SHA1

    0213d7bd3f6fe46e179f6c2dcddfa12bbbea481c

    SHA256

    f8a4b6fc661650e8b7c1f76df10524c687809d0b08684795eb0060326e15ac45

    SHA512

    4d290808a95a218afc864315c4c33232132654918a5a0d0efee9859c787edfd749c5d1576d76c6bad17d6e8b24e838eea283270645f68e7b1c8e77148abcfbe0

  • C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480\keymgr.exe

    MD5

    f31bf041b5744283c00e2b86900907f2

    SHA1

    0213d7bd3f6fe46e179f6c2dcddfa12bbbea481c

    SHA256

    f8a4b6fc661650e8b7c1f76df10524c687809d0b08684795eb0060326e15ac45

    SHA512

    4d290808a95a218afc864315c4c33232132654918a5a0d0efee9859c787edfd749c5d1576d76c6bad17d6e8b24e838eea283270645f68e7b1c8e77148abcfbe0

  • C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480\keymgr.exe

    MD5

    f31bf041b5744283c00e2b86900907f2

    SHA1

    0213d7bd3f6fe46e179f6c2dcddfa12bbbea481c

    SHA256

    f8a4b6fc661650e8b7c1f76df10524c687809d0b08684795eb0060326e15ac45

    SHA512

    4d290808a95a218afc864315c4c33232132654918a5a0d0efee9859c787edfd749c5d1576d76c6bad17d6e8b24e838eea283270645f68e7b1c8e77148abcfbe0

  • C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480\keymgr.exe

    MD5

    f31bf041b5744283c00e2b86900907f2

    SHA1

    0213d7bd3f6fe46e179f6c2dcddfa12bbbea481c

    SHA256

    f8a4b6fc661650e8b7c1f76df10524c687809d0b08684795eb0060326e15ac45

    SHA512

    4d290808a95a218afc864315c4c33232132654918a5a0d0efee9859c787edfd749c5d1576d76c6bad17d6e8b24e838eea283270645f68e7b1c8e77148abcfbe0

  • C:\Users\Admin\AppData\Local\Temp\setup_c.exe

    MD5

    f31bf041b5744283c00e2b86900907f2

    SHA1

    0213d7bd3f6fe46e179f6c2dcddfa12bbbea481c

    SHA256

    f8a4b6fc661650e8b7c1f76df10524c687809d0b08684795eb0060326e15ac45

    SHA512

    4d290808a95a218afc864315c4c33232132654918a5a0d0efee9859c787edfd749c5d1576d76c6bad17d6e8b24e838eea283270645f68e7b1c8e77148abcfbe0

  • C:\Users\Admin\AppData\Local\Temp\setup_c.exe

    MD5

    f31bf041b5744283c00e2b86900907f2

    SHA1

    0213d7bd3f6fe46e179f6c2dcddfa12bbbea481c

    SHA256

    f8a4b6fc661650e8b7c1f76df10524c687809d0b08684795eb0060326e15ac45

    SHA512

    4d290808a95a218afc864315c4c33232132654918a5a0d0efee9859c787edfd749c5d1576d76c6bad17d6e8b24e838eea283270645f68e7b1c8e77148abcfbe0

  • memory/796-18-0x00000000075E0000-0x00000000075E1000-memory.dmp

    Filesize

    4KB

  • memory/796-17-0x0000000007420000-0x0000000007421000-memory.dmp

    Filesize

    4KB

  • memory/796-8-0x0000000004D80000-0x0000000004D81000-memory.dmp

    Filesize

    4KB

  • memory/796-9-0x00000000028B0000-0x00000000028B1000-memory.dmp

    Filesize

    4KB

  • memory/796-10-0x0000000004DE0000-0x0000000004DE1000-memory.dmp

    Filesize

    4KB

  • memory/796-11-0x0000000005A80000-0x0000000005A81000-memory.dmp

    Filesize

    4KB

  • memory/796-12-0x0000000006770000-0x0000000006771000-memory.dmp

    Filesize

    4KB

  • memory/796-13-0x0000000006940000-0x0000000006941000-memory.dmp

    Filesize

    4KB

  • memory/796-14-0x0000000006F80000-0x0000000006F81000-memory.dmp

    Filesize

    4KB

  • memory/796-15-0x0000000007020000-0x0000000007021000-memory.dmp

    Filesize

    4KB

  • memory/796-16-0x00000000070B0000-0x00000000070B1000-memory.dmp

    Filesize

    4KB

  • memory/796-3-0x0000000073870000-0x0000000073F5E000-memory.dmp

    Filesize

    6.9MB

  • memory/796-0-0x000000000097A000-0x000000000097B000-memory.dmp

    Filesize

    4KB

  • memory/796-19-0x0000000007850000-0x0000000007851000-memory.dmp

    Filesize

    4KB

  • memory/796-6-0x00000000026E0000-0x0000000002702000-memory.dmp

    Filesize

    136KB

  • memory/796-7-0x0000000005380000-0x0000000005381000-memory.dmp

    Filesize

    4KB

  • memory/796-1-0x0000000002520000-0x0000000002521000-memory.dmp

    Filesize

    4KB

  • memory/796-5-0x0000000004E80000-0x0000000004E81000-memory.dmp

    Filesize

    4KB

  • memory/796-2-0x0000000002720000-0x0000000002721000-memory.dmp

    Filesize

    4KB

  • memory/796-4-0x00000000024B0000-0x00000000024D4000-memory.dmp

    Filesize

    144KB

  • memory/996-30-0x0000000000000000-mapping.dmp

  • memory/1336-31-0x0000000000000000-mapping.dmp

  • memory/1408-20-0x0000000000000000-mapping.dmp

  • memory/1408-22-0x0000000000EC0000-0x00000000017C7000-memory.dmp

    Filesize

    9.0MB

  • memory/1444-35-0x0000000000EC0000-0x00000000017C7000-memory.dmp

    Filesize

    9.0MB

  • memory/2428-33-0x0000000000000000-mapping.dmp

  • memory/2700-24-0x0000000000000000-mapping.dmp

  • memory/2736-27-0x0000000000EC0000-0x00000000017C7000-memory.dmp

    Filesize

    9.0MB

  • memory/2740-37-0x0000000000EC0000-0x00000000017C7000-memory.dmp

    Filesize

    9.0MB

  • memory/2800-29-0x0000000000000000-mapping.dmp

  • memory/3484-32-0x0000000000000000-mapping.dmp

  • memory/3824-28-0x0000000000EC0000-0x00000000017C7000-memory.dmp

    Filesize

    9.0MB