Analysis

  • max time kernel
    19s
  • max time network
    70s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    05-01-2021 07:44

General

  • Target

    6c985e92abdaf13871578f0e147b6f23.exe

  • Size

    652KB

  • MD5

    6c985e92abdaf13871578f0e147b6f23

  • SHA1

    38b978b7bdb5c031fdc4508376007a155562223e

  • SHA256

    357155fa11754db1ffbba77378769739d9a1d665914b5706d6dfb6b046ba2c2b

  • SHA512

    b0d9fe01d3a12ac68529af766b17bcec3cfbb00c3f4ad0ddb57329e09f246d67d908d61ad55e29ffbd67573b93ac98afa2f6148d0e13fcc238c0fdbf35ce2b98

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c985e92abdaf13871578f0e147b6f23.exe
    "C:\Users\Admin\AppData\Local\Temp\6c985e92abdaf13871578f0e147b6f23.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:1144
    • C:\Users\Admin\AppData\Roaming\topprogs\topprogs.exe
      topprogs.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2284

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\topprogs\topprogs.exe

    MD5

    46c84e26e75238c5c743e1e4a7f51291

    SHA1

    53ab2be96f124d23706304c4109d03276d4ba58f

    SHA256

    c30d45a309b85b010bc04905b7f43d81926a60c7e8c5f387b659517425ce083b

    SHA512

    7692d16cdee5e490259c2b9d1f2415c28244ec5a0fd77c7ddd8075fd4bb147f9f6b7825e24d83c5baed008d50b7ff737cfb1447e32bd4e5003eaddc99dd3ab09

  • C:\Users\Admin\AppData\Roaming\topprogs\topprogs.exe

    MD5

    46c84e26e75238c5c743e1e4a7f51291

    SHA1

    53ab2be96f124d23706304c4109d03276d4ba58f

    SHA256

    c30d45a309b85b010bc04905b7f43d81926a60c7e8c5f387b659517425ce083b

    SHA512

    7692d16cdee5e490259c2b9d1f2415c28244ec5a0fd77c7ddd8075fd4bb147f9f6b7825e24d83c5baed008d50b7ff737cfb1447e32bd4e5003eaddc99dd3ab09

  • memory/1144-2-0x0000000004B60000-0x0000000004B61000-memory.dmp

    Filesize

    4KB

  • memory/2284-12-0x0000000009630000-0x0000000009631000-memory.dmp

    Filesize

    4KB

  • memory/2284-14-0x0000000008F90000-0x0000000008F91000-memory.dmp

    Filesize

    4KB

  • memory/2284-7-0x0000000006940000-0x0000000006941000-memory.dmp

    Filesize

    4KB

  • memory/2284-8-0x0000000072560000-0x0000000072C4E000-memory.dmp

    Filesize

    6.9MB

  • memory/2284-9-0x00000000068B0000-0x00000000068D3000-memory.dmp

    Filesize

    140KB

  • memory/2284-10-0x0000000009130000-0x0000000009131000-memory.dmp

    Filesize

    4KB

  • memory/2284-11-0x0000000006A50000-0x0000000006A72000-memory.dmp

    Filesize

    136KB

  • memory/2284-3-0x0000000000000000-mapping.dmp

  • memory/2284-13-0x0000000008F70000-0x0000000008F71000-memory.dmp

    Filesize

    4KB

  • memory/2284-6-0x0000000006770000-0x0000000006771000-memory.dmp

    Filesize

    4KB

  • memory/2284-15-0x0000000009000000-0x0000000009001000-memory.dmp

    Filesize

    4KB

  • memory/2284-16-0x0000000009CA0000-0x0000000009CA1000-memory.dmp

    Filesize

    4KB

  • memory/2284-17-0x000000000A990000-0x000000000A991000-memory.dmp

    Filesize

    4KB

  • memory/2284-18-0x000000000AB60000-0x000000000AB61000-memory.dmp

    Filesize

    4KB

  • memory/2284-19-0x000000000B180000-0x000000000B181000-memory.dmp

    Filesize

    4KB

  • memory/2284-20-0x000000000B240000-0x000000000B241000-memory.dmp

    Filesize

    4KB

  • memory/2284-21-0x000000000B2D0000-0x000000000B2D1000-memory.dmp

    Filesize

    4KB

  • memory/2284-22-0x000000000B8A0000-0x000000000B8A1000-memory.dmp

    Filesize

    4KB

  • memory/2284-23-0x000000000C770000-0x000000000C771000-memory.dmp

    Filesize

    4KB