Resubmissions

25-06-2021 19:45

210625-cmgf1aab1n 7

17-01-2021 17:30

210117-n4cz8adhsx 10

17-01-2021 11:33

210117-rz9rm26xk2 10

Analysis

  • max time kernel
    37s
  • max time network
    38s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    17-01-2021 17:30

General

  • Target

    sskiper.exe

  • Size

    1003KB

  • MD5

    e2fdc51a0bf265af0a167f894f59b09e

  • SHA1

    d0c01a7cca5210fa19e40d107c7affeb84846329

  • SHA256

    07011e03e6fe27ec91e1f45c308d1a63f35317ecd39ccd6438a216e5a5008eb9

  • SHA512

    d77708c8cc9d68cb93ad1da55a3dc8e344f8c931bdce7fc7801bf3ded57d7b365952da3fb5dfa998a52b59c1a8076208181d48e96774785f34e0be87807b37ad

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sskiper.exe
    "C:\Users\Admin\AppData\Local\Temp\sskiper.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:644
    • C:\Users\Admin\AppData\Local\Temp\1991317990.exe
      C:\Users\Admin\AppData\Local\Temp\1991317990.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:560
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1812
    • C:\Users\Admin\AppData\Local\Temp\1396727458.exe
      C:\Users\Admin\AppData\Local\Temp\1396727458.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:968
      • C:\Users\Admin\AppData\Local\Temp\1396727458.exe
        "C:\Users\Admin\AppData\Local\Temp\1396727458.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1532
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /k ping 0 & del C:\Users\Admin\AppData\Local\Temp\sskiper.exe & exit
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1204
      • C:\Windows\SysWOW64\PING.EXE
        ping 0
        3⤵
        • Runs ping.exe
        PID:1764

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1396727458.exe

    MD5

    4206df85492bba4ae3254db224b03d8a

    SHA1

    57dae0b4bcd74a40d876c8dac64c862a716dd5f3

    SHA256

    58e8728467ed5420632693fa522c38cabd674cec12f7f78e25b9f93792133309

    SHA512

    1375e65fdd5d9364251e00015c39786dacfa03579b9d91e06c8063b7c5f4f7fc9620be2cd2ee981366c8066df9097ebe27fde4740dc913ab2f9c884e99607cc8

  • C:\Users\Admin\AppData\Local\Temp\1396727458.exe

    MD5

    4206df85492bba4ae3254db224b03d8a

    SHA1

    57dae0b4bcd74a40d876c8dac64c862a716dd5f3

    SHA256

    58e8728467ed5420632693fa522c38cabd674cec12f7f78e25b9f93792133309

    SHA512

    1375e65fdd5d9364251e00015c39786dacfa03579b9d91e06c8063b7c5f4f7fc9620be2cd2ee981366c8066df9097ebe27fde4740dc913ab2f9c884e99607cc8

  • C:\Users\Admin\AppData\Local\Temp\1396727458.exe

    MD5

    4206df85492bba4ae3254db224b03d8a

    SHA1

    57dae0b4bcd74a40d876c8dac64c862a716dd5f3

    SHA256

    58e8728467ed5420632693fa522c38cabd674cec12f7f78e25b9f93792133309

    SHA512

    1375e65fdd5d9364251e00015c39786dacfa03579b9d91e06c8063b7c5f4f7fc9620be2cd2ee981366c8066df9097ebe27fde4740dc913ab2f9c884e99607cc8

  • C:\Users\Admin\AppData\Local\Temp\1991317990.exe

    MD5

    8b7d2dc21234706457c7051a3abc083f

    SHA1

    5dd384b4d52d143b77366baf0ad7040052197a93

    SHA256

    11fa0219ea5a6f97acfc6075ce69aa927da3da68f472d706434d957cf8f453f1

    SHA512

    3f4ceac619a9f279e961bcbfc506884af4ef835cea0efc0ced9c21f5703c5d2808afd1ebbd7a7f4ac36fdbecece6329ff3d039d2686e9431b0c515b3ffddd470

  • C:\Users\Admin\AppData\Local\Temp\1991317990.exe

    MD5

    8b7d2dc21234706457c7051a3abc083f

    SHA1

    5dd384b4d52d143b77366baf0ad7040052197a93

    SHA256

    11fa0219ea5a6f97acfc6075ce69aa927da3da68f472d706434d957cf8f453f1

    SHA512

    3f4ceac619a9f279e961bcbfc506884af4ef835cea0efc0ced9c21f5703c5d2808afd1ebbd7a7f4ac36fdbecece6329ff3d039d2686e9431b0c515b3ffddd470

  • \Users\Admin\AppData\Local\Temp\1396727458.exe

    MD5

    4206df85492bba4ae3254db224b03d8a

    SHA1

    57dae0b4bcd74a40d876c8dac64c862a716dd5f3

    SHA256

    58e8728467ed5420632693fa522c38cabd674cec12f7f78e25b9f93792133309

    SHA512

    1375e65fdd5d9364251e00015c39786dacfa03579b9d91e06c8063b7c5f4f7fc9620be2cd2ee981366c8066df9097ebe27fde4740dc913ab2f9c884e99607cc8

  • \Users\Admin\AppData\Local\Temp\1396727458.exe

    MD5

    4206df85492bba4ae3254db224b03d8a

    SHA1

    57dae0b4bcd74a40d876c8dac64c862a716dd5f3

    SHA256

    58e8728467ed5420632693fa522c38cabd674cec12f7f78e25b9f93792133309

    SHA512

    1375e65fdd5d9364251e00015c39786dacfa03579b9d91e06c8063b7c5f4f7fc9620be2cd2ee981366c8066df9097ebe27fde4740dc913ab2f9c884e99607cc8

  • \Users\Admin\AppData\Local\Temp\1991317990.exe

    MD5

    8b7d2dc21234706457c7051a3abc083f

    SHA1

    5dd384b4d52d143b77366baf0ad7040052197a93

    SHA256

    11fa0219ea5a6f97acfc6075ce69aa927da3da68f472d706434d957cf8f453f1

    SHA512

    3f4ceac619a9f279e961bcbfc506884af4ef835cea0efc0ced9c21f5703c5d2808afd1ebbd7a7f4ac36fdbecece6329ff3d039d2686e9431b0c515b3ffddd470

  • memory/560-12-0x0000000004BE0000-0x0000000004BE1000-memory.dmp

    Filesize

    4KB

  • memory/560-5-0x0000000000000000-mapping.dmp

  • memory/560-8-0x0000000073EF0000-0x00000000745DE000-memory.dmp

    Filesize

    6.9MB

  • memory/560-9-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/644-2-0x00000000765E1000-0x00000000765E3000-memory.dmp

    Filesize

    8KB

  • memory/968-27-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/968-30-0x0000000002090000-0x0000000002091000-memory.dmp

    Filesize

    4KB

  • memory/968-20-0x0000000000000000-mapping.dmp

  • memory/968-32-0x00000000043E1000-0x00000000043E2000-memory.dmp

    Filesize

    4KB

  • memory/968-29-0x0000000000770000-0x000000000077B000-memory.dmp

    Filesize

    44KB

  • memory/968-23-0x0000000073EF0000-0x00000000745DE000-memory.dmp

    Filesize

    6.9MB

  • memory/968-24-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/968-26-0x00000000003C0000-0x00000000003DE000-memory.dmp

    Filesize

    120KB

  • memory/968-28-0x00000000043E0000-0x00000000043E1000-memory.dmp

    Filesize

    4KB

  • memory/1204-39-0x0000000000000000-mapping.dmp

  • memory/1532-37-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/1532-33-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/1532-34-0x000000000041F436-mapping.dmp

  • memory/1532-36-0x0000000073EF0000-0x00000000745DE000-memory.dmp

    Filesize

    6.9MB

  • memory/1532-41-0x0000000004790000-0x0000000004791000-memory.dmp

    Filesize

    4KB

  • memory/1764-40-0x0000000000000000-mapping.dmp

  • memory/1812-18-0x0000000001150000-0x0000000001151000-memory.dmp

    Filesize

    4KB

  • memory/1812-14-0x00000000004461CE-mapping.dmp

  • memory/1812-16-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1812-13-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1812-15-0x0000000073EF0000-0x00000000745DE000-memory.dmp

    Filesize

    6.9MB

  • memory/2040-3-0x000007FEF6350000-0x000007FEF65CA000-memory.dmp

    Filesize

    2.5MB