Analysis
-
max time kernel
150s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
17-11-2020 12:34
Static task
static1
Behavioral task
behavioral1
Sample
41d4bcdb9da7c94b1b5e6e88a8518390.exe
Resource
win7v20201028
General
-
Target
41d4bcdb9da7c94b1b5e6e88a8518390.exe
-
Size
344KB
-
MD5
f863b6b0881ef40a9919d966ea754c87
-
SHA1
74f2013fc0df5a96d5edfcd77659fabe260c4a1d
-
SHA256
1b189602123e4dba4522d442877fb0862a8fbbc4cc6d187954ba27039bea7d9c
-
SHA512
1d3029129a596e9e049590164f04983c7f3cd94a2e94948a30f82279527e4a8b85f714b18b02d709ea42c3f119a1fefc627bd31b5077123b1a03db375224b735
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/796-4-0x00000000024B0000-0x00000000024D4000-memory.dmp family_redline behavioral2/memory/796-6-0x00000000026E0000-0x0000000002702000-memory.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Executes dropped EXE 5 IoCs
Processes:
setup_c.exekeymgr.exekeymgr.exekeymgr.exekeymgr.exepid process 1408 setup_c.exe 2736 keymgr.exe 3824 keymgr.exe 1444 keymgr.exe 2740 keymgr.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\setup_c.exe vmprotect behavioral2/memory/1408-22-0x0000000000EC0000-0x00000000017C7000-memory.dmp vmprotect C:\Users\Admin\AppData\Local\Temp\setup_c.exe vmprotect C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480\keymgr.exe vmprotect C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480\keymgr.exe vmprotect behavioral2/memory/2736-27-0x0000000000EC0000-0x00000000017C7000-memory.dmp vmprotect behavioral2/memory/3824-28-0x0000000000EC0000-0x00000000017C7000-memory.dmp vmprotect C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480\keymgr.exe vmprotect behavioral2/memory/1444-35-0x0000000000EC0000-0x00000000017C7000-memory.dmp vmprotect C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480\keymgr.exe vmprotect behavioral2/memory/2740-37-0x0000000000EC0000-0x00000000017C7000-memory.dmp vmprotect -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
keymgr.exekeymgr.exekeymgr.exesetup_c.exekeymgr.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion keymgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion keymgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion keymgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion keymgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion keymgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion setup_c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion setup_c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion keymgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion keymgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion keymgr.exe -
Modifies file permissions 1 TTPs 3 IoCs
Processes:
icacls.exeicacls.exeicacls.exepid process 2800 icacls.exe 996 icacls.exe 3484 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\setup_c.exe themida behavioral2/memory/1408-22-0x0000000000EC0000-0x00000000017C7000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\setup_c.exe themida C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480\keymgr.exe themida C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480\keymgr.exe themida behavioral2/memory/2736-27-0x0000000000EC0000-0x00000000017C7000-memory.dmp themida behavioral2/memory/3824-28-0x0000000000EC0000-0x00000000017C7000-memory.dmp themida C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480\keymgr.exe themida behavioral2/memory/1444-35-0x0000000000EC0000-0x00000000017C7000-memory.dmp themida C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480\keymgr.exe themida behavioral2/memory/2740-37-0x0000000000EC0000-0x00000000017C7000-memory.dmp themida -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
setup_c.exekeymgr.exekeymgr.exekeymgr.exekeymgr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA setup_c.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA keymgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA keymgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA keymgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA keymgr.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 15 checkip.amazonaws.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
setup_c.exekeymgr.exekeymgr.exekeymgr.exekeymgr.exepid process 1408 setup_c.exe 2736 keymgr.exe 3824 keymgr.exe 1444 keymgr.exe 2740 keymgr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
41d4bcdb9da7c94b1b5e6e88a8518390.exesetup_c.exekeymgr.exekeymgr.exekeymgr.exekeymgr.exepid process 796 41d4bcdb9da7c94b1b5e6e88a8518390.exe 796 41d4bcdb9da7c94b1b5e6e88a8518390.exe 1408 setup_c.exe 1408 setup_c.exe 1408 setup_c.exe 1408 setup_c.exe 2736 keymgr.exe 2736 keymgr.exe 3824 keymgr.exe 3824 keymgr.exe 2736 keymgr.exe 2736 keymgr.exe 3824 keymgr.exe 3824 keymgr.exe 1444 keymgr.exe 1444 keymgr.exe 1444 keymgr.exe 1444 keymgr.exe 2740 keymgr.exe 2740 keymgr.exe 2740 keymgr.exe 2740 keymgr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
41d4bcdb9da7c94b1b5e6e88a8518390.exedescription pid process Token: SeDebugPrivilege 796 41d4bcdb9da7c94b1b5e6e88a8518390.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
41d4bcdb9da7c94b1b5e6e88a8518390.exesetup_c.execmd.execmd.exedescription pid process target process PID 796 wrote to memory of 1408 796 41d4bcdb9da7c94b1b5e6e88a8518390.exe setup_c.exe PID 796 wrote to memory of 1408 796 41d4bcdb9da7c94b1b5e6e88a8518390.exe setup_c.exe PID 796 wrote to memory of 1408 796 41d4bcdb9da7c94b1b5e6e88a8518390.exe setup_c.exe PID 1408 wrote to memory of 2700 1408 setup_c.exe cmd.exe PID 1408 wrote to memory of 2700 1408 setup_c.exe cmd.exe PID 1408 wrote to memory of 2700 1408 setup_c.exe cmd.exe PID 2700 wrote to memory of 2800 2700 cmd.exe icacls.exe PID 2700 wrote to memory of 2800 2700 cmd.exe icacls.exe PID 2700 wrote to memory of 2800 2700 cmd.exe icacls.exe PID 2700 wrote to memory of 996 2700 cmd.exe icacls.exe PID 2700 wrote to memory of 996 2700 cmd.exe icacls.exe PID 2700 wrote to memory of 996 2700 cmd.exe icacls.exe PID 796 wrote to memory of 1336 796 41d4bcdb9da7c94b1b5e6e88a8518390.exe cmd.exe PID 796 wrote to memory of 1336 796 41d4bcdb9da7c94b1b5e6e88a8518390.exe cmd.exe PID 796 wrote to memory of 1336 796 41d4bcdb9da7c94b1b5e6e88a8518390.exe cmd.exe PID 2700 wrote to memory of 3484 2700 cmd.exe icacls.exe PID 2700 wrote to memory of 3484 2700 cmd.exe icacls.exe PID 2700 wrote to memory of 3484 2700 cmd.exe icacls.exe PID 1336 wrote to memory of 2428 1336 cmd.exe PING.EXE PID 1336 wrote to memory of 2428 1336 cmd.exe PING.EXE PID 1336 wrote to memory of 2428 1336 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\41d4bcdb9da7c94b1b5e6e88a8518390.exe"C:\Users\Admin\AppData\Local\Temp\41d4bcdb9da7c94b1b5e6e88a8518390.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Users\Admin\AppData\Local\Temp\setup_c.exe"C:\Users\Admin\AppData\Local\Temp\setup_c.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)" & icacls "C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)" & icacls "C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480" /inheritance:e /deny "Admin:(R,REA,RA,RD)"3⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"4⤵
- Modifies file permissions
PID:2800 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"4⤵
- Modifies file permissions
PID:996 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480" /inheritance:e /deny "Admin:(R,REA,RA,RD)"4⤵
- Modifies file permissions
PID:3484 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ping 127.0.0.1 -n 3 > nul & del ""2⤵
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 33⤵
- Runs ping.exe
PID:2428
-
C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480\keymgr.exeC:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480\keymgr.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2736
-
C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480\keymgr.exeC:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480\keymgr.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3824
-
C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480\keymgr.exeC:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480\keymgr.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1444
-
C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480\keymgr.exeC:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480\keymgr.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2740
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480\keymgr.exe
MD5f31bf041b5744283c00e2b86900907f2
SHA10213d7bd3f6fe46e179f6c2dcddfa12bbbea481c
SHA256f8a4b6fc661650e8b7c1f76df10524c687809d0b08684795eb0060326e15ac45
SHA5124d290808a95a218afc864315c4c33232132654918a5a0d0efee9859c787edfd749c5d1576d76c6bad17d6e8b24e838eea283270645f68e7b1c8e77148abcfbe0
-
C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480\keymgr.exe
MD5f31bf041b5744283c00e2b86900907f2
SHA10213d7bd3f6fe46e179f6c2dcddfa12bbbea481c
SHA256f8a4b6fc661650e8b7c1f76df10524c687809d0b08684795eb0060326e15ac45
SHA5124d290808a95a218afc864315c4c33232132654918a5a0d0efee9859c787edfd749c5d1576d76c6bad17d6e8b24e838eea283270645f68e7b1c8e77148abcfbe0
-
C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480\keymgr.exe
MD5f31bf041b5744283c00e2b86900907f2
SHA10213d7bd3f6fe46e179f6c2dcddfa12bbbea481c
SHA256f8a4b6fc661650e8b7c1f76df10524c687809d0b08684795eb0060326e15ac45
SHA5124d290808a95a218afc864315c4c33232132654918a5a0d0efee9859c787edfd749c5d1576d76c6bad17d6e8b24e838eea283270645f68e7b1c8e77148abcfbe0
-
C:\ProgramData\amd64_microsoft-windows-wmi-stdprov-provider_31bf3856ad364e35_10.0.18362.1_none_10ebcf1c43c7c480\keymgr.exe
MD5f31bf041b5744283c00e2b86900907f2
SHA10213d7bd3f6fe46e179f6c2dcddfa12bbbea481c
SHA256f8a4b6fc661650e8b7c1f76df10524c687809d0b08684795eb0060326e15ac45
SHA5124d290808a95a218afc864315c4c33232132654918a5a0d0efee9859c787edfd749c5d1576d76c6bad17d6e8b24e838eea283270645f68e7b1c8e77148abcfbe0
-
MD5
f31bf041b5744283c00e2b86900907f2
SHA10213d7bd3f6fe46e179f6c2dcddfa12bbbea481c
SHA256f8a4b6fc661650e8b7c1f76df10524c687809d0b08684795eb0060326e15ac45
SHA5124d290808a95a218afc864315c4c33232132654918a5a0d0efee9859c787edfd749c5d1576d76c6bad17d6e8b24e838eea283270645f68e7b1c8e77148abcfbe0
-
MD5
f31bf041b5744283c00e2b86900907f2
SHA10213d7bd3f6fe46e179f6c2dcddfa12bbbea481c
SHA256f8a4b6fc661650e8b7c1f76df10524c687809d0b08684795eb0060326e15ac45
SHA5124d290808a95a218afc864315c4c33232132654918a5a0d0efee9859c787edfd749c5d1576d76c6bad17d6e8b24e838eea283270645f68e7b1c8e77148abcfbe0