Analysis
-
max time kernel
148s -
max time network
115s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
12-01-2021 22:27
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.FileRepMalware.28229.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
SecuriteInfo.com.FileRepMalware.28229.exe
Resource
win10v20201028
General
-
Target
SecuriteInfo.com.FileRepMalware.28229.exe
-
Size
883KB
-
MD5
64993cdc07881c3b1726f1bb8b15e6b2
-
SHA1
49d7bb6f1cc42e53be2968f04d6f320128ee28b8
-
SHA256
d43838212ddf94f2e613eeeaf305893081963706657e5588273a798e5ca5690d
-
SHA512
da8a14c38666a6d3490942591ee35391d5a96b1b737c462f2b1c8e73a525c633b1f3b2a12520437e948aee39b3b546f52efff976797bb9998047c28de5f783ad
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1592-23-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral2/memory/1592-24-0x000000000041F51A-mapping.dmp family_redline behavioral2/memory/564-64-0x000000000041F51A-mapping.dmp family_redline -
Executes dropped EXE 5 IoCs
Processes:
smgo.exeInstallUtil.exeexplorre.exeexplorre.exeInstallUtil.exepid process 4000 smgo.exe 1592 InstallUtil.exe 732 explorre.exe 2888 explorre.exe 564 InstallUtil.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\trsd = "C:\\Users\\Admin\\smgo.exe" reg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
smgo.exedescription pid process target process PID 4000 set thread context of 1592 4000 smgo.exe InstallUtil.exe PID 4000 set thread context of 564 4000 smgo.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
SecuriteInfo.com.FileRepMalware.28229.exesmgo.exeexplorre.exeexplorre.exeInstallUtil.exeInstallUtil.exepid process 4076 SecuriteInfo.com.FileRepMalware.28229.exe 4076 SecuriteInfo.com.FileRepMalware.28229.exe 4076 SecuriteInfo.com.FileRepMalware.28229.exe 4076 SecuriteInfo.com.FileRepMalware.28229.exe 4076 SecuriteInfo.com.FileRepMalware.28229.exe 4076 SecuriteInfo.com.FileRepMalware.28229.exe 4076 SecuriteInfo.com.FileRepMalware.28229.exe 4076 SecuriteInfo.com.FileRepMalware.28229.exe 4076 SecuriteInfo.com.FileRepMalware.28229.exe 4076 SecuriteInfo.com.FileRepMalware.28229.exe 4076 SecuriteInfo.com.FileRepMalware.28229.exe 4076 SecuriteInfo.com.FileRepMalware.28229.exe 4076 SecuriteInfo.com.FileRepMalware.28229.exe 4076 SecuriteInfo.com.FileRepMalware.28229.exe 4076 SecuriteInfo.com.FileRepMalware.28229.exe 4076 SecuriteInfo.com.FileRepMalware.28229.exe 4076 SecuriteInfo.com.FileRepMalware.28229.exe 4000 smgo.exe 4000 smgo.exe 4000 smgo.exe 4000 smgo.exe 732 explorre.exe 2888 explorre.exe 2888 explorre.exe 2888 explorre.exe 4000 smgo.exe 4000 smgo.exe 4000 smgo.exe 4000 smgo.exe 1592 InstallUtil.exe 1592 InstallUtil.exe 4000 smgo.exe 4000 smgo.exe 4000 smgo.exe 4000 smgo.exe 564 InstallUtil.exe 564 InstallUtil.exe 4000 smgo.exe 4000 smgo.exe 4000 smgo.exe 4000 smgo.exe 4000 smgo.exe 4000 smgo.exe 4000 smgo.exe 4000 smgo.exe 4000 smgo.exe 4000 smgo.exe 4000 smgo.exe 4000 smgo.exe 4000 smgo.exe 4000 smgo.exe 4000 smgo.exe 4000 smgo.exe 4000 smgo.exe 4000 smgo.exe 4000 smgo.exe 4000 smgo.exe 4000 smgo.exe 4000 smgo.exe 4000 smgo.exe 4000 smgo.exe 4000 smgo.exe 4000 smgo.exe 4000 smgo.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
SecuriteInfo.com.FileRepMalware.28229.exesmgo.exeexplorre.exeexplorre.exeInstallUtil.exeInstallUtil.exedescription pid process Token: SeDebugPrivilege 4076 SecuriteInfo.com.FileRepMalware.28229.exe Token: SeDebugPrivilege 4000 smgo.exe Token: SeDebugPrivilege 732 explorre.exe Token: SeDebugPrivilege 2888 explorre.exe Token: SeDebugPrivilege 1592 InstallUtil.exe Token: SeDebugPrivilege 564 InstallUtil.exe -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
SecuriteInfo.com.FileRepMalware.28229.execmd.exesmgo.exeexplorre.exedescription pid process target process PID 4076 wrote to memory of 3984 4076 SecuriteInfo.com.FileRepMalware.28229.exe cmd.exe PID 4076 wrote to memory of 3984 4076 SecuriteInfo.com.FileRepMalware.28229.exe cmd.exe PID 4076 wrote to memory of 3984 4076 SecuriteInfo.com.FileRepMalware.28229.exe cmd.exe PID 3984 wrote to memory of 3908 3984 cmd.exe reg.exe PID 3984 wrote to memory of 3908 3984 cmd.exe reg.exe PID 3984 wrote to memory of 3908 3984 cmd.exe reg.exe PID 4076 wrote to memory of 4000 4076 SecuriteInfo.com.FileRepMalware.28229.exe smgo.exe PID 4076 wrote to memory of 4000 4076 SecuriteInfo.com.FileRepMalware.28229.exe smgo.exe PID 4076 wrote to memory of 4000 4076 SecuriteInfo.com.FileRepMalware.28229.exe smgo.exe PID 4000 wrote to memory of 1592 4000 smgo.exe InstallUtil.exe PID 4000 wrote to memory of 1592 4000 smgo.exe InstallUtil.exe PID 4000 wrote to memory of 1592 4000 smgo.exe InstallUtil.exe PID 4000 wrote to memory of 1592 4000 smgo.exe InstallUtil.exe PID 4000 wrote to memory of 1592 4000 smgo.exe InstallUtil.exe PID 4000 wrote to memory of 1592 4000 smgo.exe InstallUtil.exe PID 4000 wrote to memory of 1592 4000 smgo.exe InstallUtil.exe PID 4000 wrote to memory of 1592 4000 smgo.exe InstallUtil.exe PID 4000 wrote to memory of 732 4000 smgo.exe explorre.exe PID 4000 wrote to memory of 732 4000 smgo.exe explorre.exe PID 4000 wrote to memory of 732 4000 smgo.exe explorre.exe PID 732 wrote to memory of 2888 732 explorre.exe explorre.exe PID 732 wrote to memory of 2888 732 explorre.exe explorre.exe PID 732 wrote to memory of 2888 732 explorre.exe explorre.exe PID 4000 wrote to memory of 564 4000 smgo.exe InstallUtil.exe PID 4000 wrote to memory of 564 4000 smgo.exe InstallUtil.exe PID 4000 wrote to memory of 564 4000 smgo.exe InstallUtil.exe PID 4000 wrote to memory of 564 4000 smgo.exe InstallUtil.exe PID 4000 wrote to memory of 564 4000 smgo.exe InstallUtil.exe PID 4000 wrote to memory of 564 4000 smgo.exe InstallUtil.exe PID 4000 wrote to memory of 564 4000 smgo.exe InstallUtil.exe PID 4000 wrote to memory of 564 4000 smgo.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.FileRepMalware.28229.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.FileRepMalware.28229.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "trsd" /t REG_SZ /d "C:\Users\Admin\smgo.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "trsd" /t REG_SZ /d "C:\Users\Admin\smgo.exe"3⤵
- Adds Run key to start application
PID:3908 -
C:\Users\Admin\smgo.exe"C:\Users\Admin\smgo.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\explorre.exe"C:\Users\Admin\AppData\Local\Temp\explorre.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Users\Admin\AppData\Local\Temp\explorre.exe"C:\Users\Admin\AppData\Local\Temp\explorre.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:564
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
41eeab75f5c7fadeefb84e8b56974146
SHA18f41e25c45976b488c0cbc2e927dacbcd8437c84
SHA256aa50288666e4334d2996bf6aa4ed127f4ead3b6fcc2f378ed2a69e6d515c349f
SHA51297d05e91a943e0e4c0fe7449b87ce0e681093fc151070082f2e5aaa20ad62167f716dfb70bfccc05c453cba15db632946898f3625d6f489be756952b24fedd8b
-
MD5
e555c48cb712a9597ecb55a60135d1f8
SHA12081c72d30c34ec3f61f9944545ecdaae11521f7
SHA256815c80df060afa8acf7640ca011735ef77c66666d03901e04a8767827d5da4e9
SHA51232129b5be15217e5400f1e7536270a703d62db60ebb06396b9d74703e6a0dcd2e78f7f42b2019093be1508a9310912f305b88de274a295c9135a4086cd8c8427
-
MD5
91c9ae9c9a17a9db5e08b120e668c74c
SHA150770954c1ceb0bb6f1d5d3f2de2a0a065773723
SHA256e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f
SHA512ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e
-
MD5
91c9ae9c9a17a9db5e08b120e668c74c
SHA150770954c1ceb0bb6f1d5d3f2de2a0a065773723
SHA256e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f
SHA512ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e
-
MD5
91c9ae9c9a17a9db5e08b120e668c74c
SHA150770954c1ceb0bb6f1d5d3f2de2a0a065773723
SHA256e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f
SHA512ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e
-
MD5
0e362e7005823d0bec3719b902ed6d62
SHA1590d860b909804349e0cdc2f1662b37bd62f7463
SHA2562d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad
SHA512518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3
-
MD5
0e362e7005823d0bec3719b902ed6d62
SHA1590d860b909804349e0cdc2f1662b37bd62f7463
SHA2562d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad
SHA512518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3
-
MD5
0e362e7005823d0bec3719b902ed6d62
SHA1590d860b909804349e0cdc2f1662b37bd62f7463
SHA2562d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad
SHA512518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3
-
MD5
a190d8b5df7c26864a3e142a763ccc90
SHA177659e162354968e601749a0a642864dc9f90597
SHA25645752791e92c0b162dcc2cefc72917b2016bb46568aecab62d62227819619277
SHA51201a33063a5ece3ad426ce8272e456617b2200c5941f42f297f40521c074acc935016f6712518a4a434e5699c6b597b35e083d746b080d7fad2a66a141ce481bd
-
MD5
61a2ebc655617a2c4998fc8d368eb20a
SHA1e75ffe158f6142dbcaabc01278869def5ce936b7
SHA256637994691189d1c64f8de22e4fee8b6e0518657af23199f181fcfed780a054e9
SHA512875b048a13a34f5b9f37f86e7fb66dfa26a30d5bb8d55c0a499b91a5b28c8f011bf98ce0254f8be17618377f4011d6f584a77f404dff01b7086040311e6b9d01
-
MD5
61a2ebc655617a2c4998fc8d368eb20a
SHA1e75ffe158f6142dbcaabc01278869def5ce936b7
SHA256637994691189d1c64f8de22e4fee8b6e0518657af23199f181fcfed780a054e9
SHA512875b048a13a34f5b9f37f86e7fb66dfa26a30d5bb8d55c0a499b91a5b28c8f011bf98ce0254f8be17618377f4011d6f584a77f404dff01b7086040311e6b9d01
-
MD5
64993cdc07881c3b1726f1bb8b15e6b2
SHA149d7bb6f1cc42e53be2968f04d6f320128ee28b8
SHA256d43838212ddf94f2e613eeeaf305893081963706657e5588273a798e5ca5690d
SHA512da8a14c38666a6d3490942591ee35391d5a96b1b737c462f2b1c8e73a525c633b1f3b2a12520437e948aee39b3b546f52efff976797bb9998047c28de5f783ad
-
MD5
64993cdc07881c3b1726f1bb8b15e6b2
SHA149d7bb6f1cc42e53be2968f04d6f320128ee28b8
SHA256d43838212ddf94f2e613eeeaf305893081963706657e5588273a798e5ca5690d
SHA512da8a14c38666a6d3490942591ee35391d5a96b1b737c462f2b1c8e73a525c633b1f3b2a12520437e948aee39b3b546f52efff976797bb9998047c28de5f783ad