Analysis

  • max time kernel
    34s
  • max time network
    36s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    11-02-2021 18:14

General

  • Target

    1ce039aea64adef141e569f8b0ac547da1e4ae0920b4060de9041cf8f16db818.exe

  • Size

    16KB

  • MD5

    ea28f02c1be43708f4a53152a022900b

  • SHA1

    515cec6125b3a21e5e9dc86661d75b8658835cf8

  • SHA256

    1ce039aea64adef141e569f8b0ac547da1e4ae0920b4060de9041cf8f16db818

  • SHA512

    45956effd7889e28f1239e1c230cff9c51dc894a0675baf8b72acc84a0eada6f95083afd4eaeeb69cd60f014c1175fbc8ef132bc4de0ce47fde5d081894d4fa5

Score
10/10

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 9 IoCs
  • Executes dropped EXE 3 IoCs
  • Deletes itself 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetThreadContext 3 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ce039aea64adef141e569f8b0ac547da1e4ae0920b4060de9041cf8f16db818.exe
    "C:\Users\Admin\AppData\Local\Temp\1ce039aea64adef141e569f8b0ac547da1e4ae0920b4060de9041cf8f16db818.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:776
    • C:\Users\Admin\AppData\Local\Temp\zaopon.exe
      "C:\Users\Admin\AppData\Local\Temp\zaopon.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1524
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
        3⤵
          PID:1480
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:808
      • C:\Users\Admin\AppData\Local\Temp\marfe.exe
        "C:\Users\Admin\AppData\Local\Temp\marfe.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:516
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1936
      • C:\Users\Admin\AppData\Local\Temp\userm.exe
        "C:\Users\Admin\AppData\Local\Temp\userm.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2016
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:668
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 1 & Del "1ce039aea64adef141e569f8b0ac547da1e4ae0920b4060de9041cf8f16db818.exe"
        2⤵
        • Deletes itself
        • Suspicious use of WriteProcessMemory
        PID:460
        • C:\Windows\system32\choice.exe
          choice /C Y /N /D Y /T 1
          3⤵
            PID:1440

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Install Root Certificate

      1
      T1130

      Modify Registry

      1
      T1112

      Discovery

      System Information Discovery

      1
      T1082

      Command and Control

      Web Service

      1
      T1102

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\marfe.exe
        MD5

        96e94bdf437ef558b61c1d9cb2b06113

        SHA1

        df0f25f65c94b6694028e84e94d7183e66bc2b2e

        SHA256

        851e68d08465ef9a37f39b5d59ec87fd245356726a449478f1a5f01db8da46fa

        SHA512

        a7168be62716f94e20ba8c7453e0295d2c5fe98af822455515133b25f22c874548590f417295ef42fbc1025edfddb714283827a42602682a44f227334d0365a7

      • C:\Users\Admin\AppData\Local\Temp\marfe.exe
        MD5

        96e94bdf437ef558b61c1d9cb2b06113

        SHA1

        df0f25f65c94b6694028e84e94d7183e66bc2b2e

        SHA256

        851e68d08465ef9a37f39b5d59ec87fd245356726a449478f1a5f01db8da46fa

        SHA512

        a7168be62716f94e20ba8c7453e0295d2c5fe98af822455515133b25f22c874548590f417295ef42fbc1025edfddb714283827a42602682a44f227334d0365a7

      • C:\Users\Admin\AppData\Local\Temp\userm.exe
        MD5

        64ef32d30b602f6c89ef4108fa27ac9f

        SHA1

        e2466274344cf1a919a4ed9715a3f8e9aae6d0c1

        SHA256

        3b95cf1f90f4225939c4715b66599b5ffd3363409b67e1fb5a6e035017bea652

        SHA512

        c6676076a714f5f514c3ecc079907a42967240266ab5c9de1842665ea6eaba003ba4544c2dea8f3411e0157d3c8599c3a4303ea6e42381b54cb5404e0545ef4b

      • C:\Users\Admin\AppData\Local\Temp\userm.exe
        MD5

        64ef32d30b602f6c89ef4108fa27ac9f

        SHA1

        e2466274344cf1a919a4ed9715a3f8e9aae6d0c1

        SHA256

        3b95cf1f90f4225939c4715b66599b5ffd3363409b67e1fb5a6e035017bea652

        SHA512

        c6676076a714f5f514c3ecc079907a42967240266ab5c9de1842665ea6eaba003ba4544c2dea8f3411e0157d3c8599c3a4303ea6e42381b54cb5404e0545ef4b

      • C:\Users\Admin\AppData\Local\Temp\zaopon.exe
        MD5

        99442aa7c203e47ccea232bd3eaf7d38

        SHA1

        155d05aef1fb4341df0c573cf9ff90c94ec53d28

        SHA256

        658134ceb037b17adbb6be720759f485d84acbbcad019fff86a9e7deec53fc0f

        SHA512

        6c84df5d6ba9cec6fd65864b3f9a893ee73304c80e5669857054acd7f1e2206c8843fb4e867ce57347cf824fe1f111293266e16659dbf8c9612314957e19fd66

      • C:\Users\Admin\AppData\Local\Temp\zaopon.exe
        MD5

        99442aa7c203e47ccea232bd3eaf7d38

        SHA1

        155d05aef1fb4341df0c573cf9ff90c94ec53d28

        SHA256

        658134ceb037b17adbb6be720759f485d84acbbcad019fff86a9e7deec53fc0f

        SHA512

        6c84df5d6ba9cec6fd65864b3f9a893ee73304c80e5669857054acd7f1e2206c8843fb4e867ce57347cf824fe1f111293266e16659dbf8c9612314957e19fd66

      • memory/460-47-0x0000000000000000-mapping.dmp
      • memory/516-25-0x00000000001F0000-0x00000000001F2000-memory.dmp
        Filesize

        8KB

      • memory/516-23-0x0000000000850000-0x0000000000851000-memory.dmp
        Filesize

        4KB

      • memory/516-22-0x0000000073F20000-0x000000007460E000-memory.dmp
        Filesize

        6.9MB

      • memory/516-19-0x0000000000000000-mapping.dmp
      • memory/516-27-0x00000000048F0000-0x00000000048F1000-memory.dmp
        Filesize

        4KB

      • memory/668-49-0x00000000009A0000-0x00000000009A1000-memory.dmp
        Filesize

        4KB

      • memory/668-42-0x0000000000400000-0x000000000042C000-memory.dmp
        Filesize

        176KB

      • memory/668-43-0x0000000000423F8A-mapping.dmp
      • memory/668-44-0x0000000073F20000-0x000000007460E000-memory.dmp
        Filesize

        6.9MB

      • memory/668-45-0x0000000000400000-0x000000000042C000-memory.dmp
        Filesize

        176KB

      • memory/776-2-0x000007FEF5810000-0x000007FEF61FC000-memory.dmp
        Filesize

        9.9MB

      • memory/776-5-0x000000001B230000-0x000000001B232000-memory.dmp
        Filesize

        8KB

      • memory/776-3-0x0000000000950000-0x0000000000951000-memory.dmp
        Filesize

        4KB

      • memory/808-26-0x0000000004B90000-0x0000000004B91000-memory.dmp
        Filesize

        4KB

      • memory/808-14-0x0000000000400000-0x0000000000428000-memory.dmp
        Filesize

        160KB

      • memory/808-17-0x0000000000400000-0x0000000000428000-memory.dmp
        Filesize

        160KB

      • memory/808-15-0x0000000000421E02-mapping.dmp
      • memory/808-16-0x0000000073F20000-0x000000007460E000-memory.dmp
        Filesize

        6.9MB

      • memory/1440-48-0x0000000000000000-mapping.dmp
      • memory/1524-10-0x00000000003B0000-0x00000000003B1000-memory.dmp
        Filesize

        4KB

      • memory/1524-6-0x0000000000000000-mapping.dmp
      • memory/1524-9-0x0000000073F20000-0x000000007460E000-memory.dmp
        Filesize

        6.9MB

      • memory/1524-13-0x0000000000690000-0x0000000000691000-memory.dmp
        Filesize

        4KB

      • memory/1524-12-0x0000000076071000-0x0000000076073000-memory.dmp
        Filesize

        8KB

      • memory/1936-33-0x0000000001210000-0x0000000001211000-memory.dmp
        Filesize

        4KB

      • memory/1936-30-0x0000000073F20000-0x000000007460E000-memory.dmp
        Filesize

        6.9MB

      • memory/1936-31-0x0000000000400000-0x000000000042C000-memory.dmp
        Filesize

        176KB

      • memory/1936-29-0x0000000000423FC2-mapping.dmp
      • memory/1936-28-0x0000000000400000-0x000000000042C000-memory.dmp
        Filesize

        176KB

      • memory/2016-34-0x0000000000000000-mapping.dmp
      • memory/2016-41-0x0000000004770000-0x0000000004771000-memory.dmp
        Filesize

        4KB

      • memory/2016-38-0x0000000001230000-0x0000000001231000-memory.dmp
        Filesize

        4KB

      • memory/2016-37-0x0000000073F20000-0x000000007460E000-memory.dmp
        Filesize

        6.9MB