Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    11-03-2021 04:43

General

  • Target

    SecuriteInfo.com.Trojan.PWS.Siggen2.62670.17922.27207.exe

  • Size

    256KB

  • MD5

    8ca675896f6c9ad9fe8deb1cc63bf8f5

  • SHA1

    59ce426a1d26cf3a5a8552da59263475bfded136

  • SHA256

    abf61356eb007bc0eb51c4208af46dd2ed3d8d94c10dffa7ff5a5c0a4a802a74

  • SHA512

    d9225a3903610408d8dfb7447f8ca37a4dec05b1b86ad56c4c99e4f22087ab75a2283e827032ebf03735276601ba87827b303a52ca06c04908314bc16872babc

Score
10/10

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 3 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PWS.Siggen2.62670.17922.27207.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PWS.Siggen2.62670.17922.27207.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Users\Admin\AppData\Local\Temp\2041131341.exe
      "C:\Users\Admin\AppData\Local\Temp\2041131341.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1272
    • C:\Users\Admin\AppData\Local\Temp\1090905469.exe
      "C:\Users\Admin\AppData\Local\Temp\1090905469.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1520
      • C:\Users\Admin\AppData\Local\Temp\RegAsm.exe
        "C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1320

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1090905469.exe
    MD5

    3ab5db8a82b6ca11f37100b4fa751c72

    SHA1

    a34ca15f4e9ce9364da1e3e2f12aac7ba45a12bc

    SHA256

    c0c68e99e32734375809943760576f5eb7f487360b58d311f1b4f7d6c8a0c6df

    SHA512

    c8d078a544353c7524877e8030dcb71f0e0ceb98daa9547ba592748731645e326a857b93f0d63571ace57ffcb9cd5216c88aba1651ff8d4ff01b62f0e535f9eb

  • C:\Users\Admin\AppData\Local\Temp\1090905469.exe
    MD5

    3ab5db8a82b6ca11f37100b4fa751c72

    SHA1

    a34ca15f4e9ce9364da1e3e2f12aac7ba45a12bc

    SHA256

    c0c68e99e32734375809943760576f5eb7f487360b58d311f1b4f7d6c8a0c6df

    SHA512

    c8d078a544353c7524877e8030dcb71f0e0ceb98daa9547ba592748731645e326a857b93f0d63571ace57ffcb9cd5216c88aba1651ff8d4ff01b62f0e535f9eb

  • C:\Users\Admin\AppData\Local\Temp\2041131341.exe
    MD5

    526489ddbfd0d84e845ccd132cae5555

    SHA1

    a6a2b7c7d8e15ebc3918b212ca6952818fe8cf3a

    SHA256

    93e07d6f564005880909df7a48a6775e409d50fd09f4ea55962003631fb7d81e

    SHA512

    fd4d0175487e06ac8ade388f5c7d43f80bc101cbfb2b2eeefb0b62be281e8eddc99a5a29124ca2bd0c4e25f649b9fe7b6154b7f86b392fadf3194d27651a7a64

  • C:\Users\Admin\AppData\Local\Temp\RegAsm.exe
    MD5

    b58b926c3574d28d5b7fdd2ca3ec30d5

    SHA1

    d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

    SHA256

    6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

    SHA512

    b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

  • C:\Users\Admin\AppData\Local\Temp\RegAsm.exe
    MD5

    b58b926c3574d28d5b7fdd2ca3ec30d5

    SHA1

    d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

    SHA256

    6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

    SHA512

    b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

  • \Users\Admin\AppData\Local\Temp\1090905469.exe
    MD5

    3ab5db8a82b6ca11f37100b4fa751c72

    SHA1

    a34ca15f4e9ce9364da1e3e2f12aac7ba45a12bc

    SHA256

    c0c68e99e32734375809943760576f5eb7f487360b58d311f1b4f7d6c8a0c6df

    SHA512

    c8d078a544353c7524877e8030dcb71f0e0ceb98daa9547ba592748731645e326a857b93f0d63571ace57ffcb9cd5216c88aba1651ff8d4ff01b62f0e535f9eb

  • \Users\Admin\AppData\Local\Temp\2041131341.exe
    MD5

    526489ddbfd0d84e845ccd132cae5555

    SHA1

    a6a2b7c7d8e15ebc3918b212ca6952818fe8cf3a

    SHA256

    93e07d6f564005880909df7a48a6775e409d50fd09f4ea55962003631fb7d81e

    SHA512

    fd4d0175487e06ac8ade388f5c7d43f80bc101cbfb2b2eeefb0b62be281e8eddc99a5a29124ca2bd0c4e25f649b9fe7b6154b7f86b392fadf3194d27651a7a64

  • \Users\Admin\AppData\Local\Temp\RegAsm.exe
    MD5

    b58b926c3574d28d5b7fdd2ca3ec30d5

    SHA1

    d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

    SHA256

    6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

    SHA512

    b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

  • \Users\Admin\AppData\Local\Temp\RegAsm.exe
    MD5

    b58b926c3574d28d5b7fdd2ca3ec30d5

    SHA1

    d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

    SHA256

    6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

    SHA512

    b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

  • memory/1272-23-0x0000000004862000-0x0000000004863000-memory.dmp
    Filesize

    4KB

  • memory/1272-11-0x0000000000000000-mapping.dmp
  • memory/1272-13-0x0000000001F20000-0x0000000001F31000-memory.dmp
    Filesize

    68KB

  • memory/1272-14-0x0000000074670000-0x0000000074D5E000-memory.dmp
    Filesize

    6.9MB

  • memory/1272-15-0x00000000003E0000-0x00000000003ED000-memory.dmp
    Filesize

    52KB

  • memory/1272-21-0x0000000001F00000-0x0000000001F0C000-memory.dmp
    Filesize

    48KB

  • memory/1272-22-0x0000000004861000-0x0000000004862000-memory.dmp
    Filesize

    4KB

  • memory/1272-24-0x0000000004863000-0x0000000004864000-memory.dmp
    Filesize

    4KB

  • memory/1272-25-0x0000000004864000-0x0000000004866000-memory.dmp
    Filesize

    8KB

  • memory/1320-41-0x0000000000400000-0x0000000000426000-memory.dmp
    Filesize

    152KB

  • memory/1320-42-0x000000000041E1AA-mapping.dmp
  • memory/1320-48-0x0000000000400000-0x0000000000426000-memory.dmp
    Filesize

    152KB

  • memory/1320-50-0x0000000000910000-0x0000000000911000-memory.dmp
    Filesize

    4KB

  • memory/1320-47-0x0000000074670000-0x0000000074D5E000-memory.dmp
    Filesize

    6.9MB

  • memory/1320-45-0x00000000756A1000-0x00000000756A3000-memory.dmp
    Filesize

    8KB

  • memory/1520-38-0x0000000000AF0000-0x0000000000AF1000-memory.dmp
    Filesize

    4KB

  • memory/1520-31-0x0000000001090000-0x0000000001091000-memory.dmp
    Filesize

    4KB

  • memory/1520-34-0x0000000000270000-0x0000000000271000-memory.dmp
    Filesize

    4KB

  • memory/1520-36-0x0000000005FF0000-0x000000000601F000-memory.dmp
    Filesize

    188KB

  • memory/1520-37-0x0000000000A90000-0x0000000000A9B000-memory.dmp
    Filesize

    44KB

  • memory/1520-33-0x0000000004A80000-0x0000000004A81000-memory.dmp
    Filesize

    4KB

  • memory/1520-30-0x0000000074670000-0x0000000074D5E000-memory.dmp
    Filesize

    6.9MB

  • memory/1520-40-0x0000000004A81000-0x0000000004A82000-memory.dmp
    Filesize

    4KB

  • memory/1520-27-0x0000000000000000-mapping.dmp
  • memory/1680-9-0x0000000002014000-0x0000000002016000-memory.dmp
    Filesize

    8KB

  • memory/1680-6-0x0000000002011000-0x0000000002012000-memory.dmp
    Filesize

    4KB

  • memory/1680-8-0x0000000002013000-0x0000000002014000-memory.dmp
    Filesize

    4KB

  • memory/1680-3-0x0000000074670000-0x0000000074D5E000-memory.dmp
    Filesize

    6.9MB

  • memory/1680-2-0x0000000001ED0000-0x0000000001EE1000-memory.dmp
    Filesize

    68KB

  • memory/1680-5-0x0000000001FC0000-0x0000000001FC9000-memory.dmp
    Filesize

    36KB

  • memory/1680-4-0x00000000004B0000-0x00000000004BA000-memory.dmp
    Filesize

    40KB

  • memory/1680-7-0x0000000002012000-0x0000000002013000-memory.dmp
    Filesize

    4KB