Analysis

  • max time kernel
    150s
  • max time network
    92s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    22-03-2021 17:05

General

  • Target

    clr3.exe

  • Size

    1.1MB

  • MD5

    b2c1396260a5bf7289fbd08cdb3cc96d

  • SHA1

    349ead630fb0f7f12fae208b573a255f12095ed1

  • SHA256

    1be887ab809f4d5f443d78ee02427954aaf63365be283fec335902ac48ba4445

  • SHA512

    23f9135d969bfae5ade2ac4eb1cc4597ad646fcaa814f737422eb6479ef030fc9e19591dc0595684c853104d7b7ada0f0460f8f69067f47e6f09c16e2a665c46

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\clr3.exe
    "C:\Users\Admin\AppData\Local\Temp\clr3.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Users\Admin\AppData\Local\Temp\clr3.exe
      "{path}"
      2⤵
      • Loads dropped DLL
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1552
      • C:\Users\Admin\AppData\Local\Temp\srvs.exe
        "C:\Users\Admin\AppData\Local\Temp\srvs.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1084
        • C:\Users\Admin\AppData\Local\Temp\is-16J1L.tmp\srvs.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-16J1L.tmp\srvs.tmp" /SL5="$40154,9285237,79360,C:\Users\Admin\AppData\Local\Temp\srvs.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:1620
          • C:\Windows\system32\cmd.exe
            "C:\Windows\system32\cmd.exe" /C ""C:\ProgramData\uacwev.bat""
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1748
            • C:\Windows\system32\timeout.exe
              TIMEOUT /T 8
              6⤵
              • Delays execution with timeout.exe
              PID:1828
      • C:\Users\Admin\AppData\Local\Temp\swnetwork.exe
        "C:\Users\Admin\AppData\Local\Temp\swnetwork.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:328

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\pass.exe

    MD5

    fe66a84c175bcd25b2a6221fa3c74976

    SHA1

    69745ac398f3cbbb61fa253625faff2c5e7defe0

    SHA256

    2984d41816d24e4f00f4aabead77f558d25134f70099d0da610adcefce82126c

    SHA512

    654842bb119f67163332887d9fe8e7f84ad24b1f3077acc49e830bec095b4fa7cac1d4d3168e626f5cadad3d6e5696cbac4d2700f7af2396a6c130e4c28f0c36

  • C:\ProgramData\uacwev.bat

    MD5

    ace1a6c2ea9446d1bd4b645d00bc2c46

    SHA1

    a9c41e189775db5a507785c1c527ff9fb7a07bd6

    SHA256

    2b875f4d5f0722425969fd5963fa0276a101ce63ddb91e5960f2860ab0aedbf4

    SHA512

    1fba8400d354a46fe3e1b19f8a4d817df1ef4c1289d42a8a2257af45838b6b468a0632b9f31239fc45de11771aa9d9fb0b803a6cda359b14c24fb05f71bddbb2

  • C:\ProgramData\uxtheme.dll

    MD5

    ab2dfff902a3396c2d829fc5f47d0f96

    SHA1

    8c89f1d3080419a23fc83d999d711923fd3d4c09

    SHA256

    7c7c1ab434c6d26365624712c833374ed1dee19f548b3386e64972bdda925694

    SHA512

    369ed24927506980e1c72d5476bcf98c8ec87b13d755fb301312ceb2d187993a06de8361dd6ed11dea34302f8703378815c94bd416448a1ce49bb3457ce2b0a7

  • C:\Users\Admin\AppData\Local\Temp\is-16J1L.tmp\srvs.tmp

    MD5

    025b645d99b2eed57b669c7287d24c9e

    SHA1

    6883b676e66a277f43cb4d2eca130c6c47cfed51

    SHA256

    3acef212e738893efc7451c2a7c321ab0f48352b76c46bd6a14b5aeb054453a0

    SHA512

    6db459efe993f1321264168c262fe47a6b91ac2567ab0e417af361ecf2d911e47955478790591846b1840f92013536b5538c0cc528cec99782164f49ee00ba5e

  • C:\Users\Admin\AppData\Local\Temp\srvs.exe

    MD5

    79143f8bb899f89ad0a244017e4934dd

    SHA1

    ac491a1e24185677ac59eb1d937b990941e4acd9

    SHA256

    c1fe973ec51d405df053a593909e50a2f6929e95966557e0b5188861ca983c56

    SHA512

    864972c955955114cf6df157c482bcb9a26b6b5179c549e4aebb25c41731b693a1eb9fb2f88b487ddf7a6421f31b7cfe80f516ca4f8db1d0655a6b587bae0b70

  • C:\Users\Admin\AppData\Local\Temp\srvs.exe

    MD5

    79143f8bb899f89ad0a244017e4934dd

    SHA1

    ac491a1e24185677ac59eb1d937b990941e4acd9

    SHA256

    c1fe973ec51d405df053a593909e50a2f6929e95966557e0b5188861ca983c56

    SHA512

    864972c955955114cf6df157c482bcb9a26b6b5179c549e4aebb25c41731b693a1eb9fb2f88b487ddf7a6421f31b7cfe80f516ca4f8db1d0655a6b587bae0b70

  • C:\Users\Admin\AppData\Local\Temp\swnetwork.exe

    MD5

    3a7d2f1815f84f8f678af316d2475e34

    SHA1

    f13b3cfee8d1f65583a9dd7fc98362e105f19d8e

    SHA256

    848d04f917e919caaf01ce7d1210a92c8516f1df5832d7a78d72f9c3b9aa4973

    SHA512

    df1cd6b0423594b5b0794e6505dc858cd77b66aa10b5a810d780c1ae16ad000aa85045171b464f4deef4e2783b8c824c48208ba000fa3b3d18f4b57030530eb2

  • \Users\Admin\AppData\Local\Temp\is-16J1L.tmp\srvs.tmp

    MD5

    025b645d99b2eed57b669c7287d24c9e

    SHA1

    6883b676e66a277f43cb4d2eca130c6c47cfed51

    SHA256

    3acef212e738893efc7451c2a7c321ab0f48352b76c46bd6a14b5aeb054453a0

    SHA512

    6db459efe993f1321264168c262fe47a6b91ac2567ab0e417af361ecf2d911e47955478790591846b1840f92013536b5538c0cc528cec99782164f49ee00ba5e

  • \Users\Admin\AppData\Local\Temp\srvs.exe

    MD5

    79143f8bb899f89ad0a244017e4934dd

    SHA1

    ac491a1e24185677ac59eb1d937b990941e4acd9

    SHA256

    c1fe973ec51d405df053a593909e50a2f6929e95966557e0b5188861ca983c56

    SHA512

    864972c955955114cf6df157c482bcb9a26b6b5179c549e4aebb25c41731b693a1eb9fb2f88b487ddf7a6421f31b7cfe80f516ca4f8db1d0655a6b587bae0b70

  • \Users\Admin\AppData\Local\Temp\swnetwork.exe

    MD5

    3a7d2f1815f84f8f678af316d2475e34

    SHA1

    f13b3cfee8d1f65583a9dd7fc98362e105f19d8e

    SHA256

    848d04f917e919caaf01ce7d1210a92c8516f1df5832d7a78d72f9c3b9aa4973

    SHA512

    df1cd6b0423594b5b0794e6505dc858cd77b66aa10b5a810d780c1ae16ad000aa85045171b464f4deef4e2783b8c824c48208ba000fa3b3d18f4b57030530eb2

  • memory/328-22-0x0000000000000000-mapping.dmp

  • memory/328-35-0x00000000046E3000-0x00000000046E4000-memory.dmp

    Filesize

    4KB

  • memory/328-41-0x00000000046E4000-0x00000000046E6000-memory.dmp

    Filesize

    8KB

  • memory/328-27-0x00000000742C0000-0x00000000749AE000-memory.dmp

    Filesize

    6.9MB

  • memory/328-30-0x0000000002120000-0x0000000002148000-memory.dmp

    Filesize

    160KB

  • memory/328-34-0x00000000046E2000-0x00000000046E3000-memory.dmp

    Filesize

    4KB

  • memory/328-31-0x0000000002150000-0x0000000002177000-memory.dmp

    Filesize

    156KB

  • memory/328-25-0x0000000001E40000-0x0000000001E51000-memory.dmp

    Filesize

    68KB

  • memory/328-33-0x00000000046E1000-0x00000000046E2000-memory.dmp

    Filesize

    4KB

  • memory/1084-16-0x0000000000000000-mapping.dmp

  • memory/1084-18-0x0000000075AE1000-0x0000000075AE3000-memory.dmp

    Filesize

    8KB

  • memory/1084-20-0x0000000000401000-0x000000000040E000-memory.dmp

    Filesize

    52KB

  • memory/1552-12-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/1552-9-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/1552-14-0x00000000049E0000-0x00000000049E1000-memory.dmp

    Filesize

    4KB

  • memory/1552-10-0x000000000041E89A-mapping.dmp

  • memory/1552-11-0x00000000742C0000-0x00000000749AE000-memory.dmp

    Filesize

    6.9MB

  • memory/1620-32-0x0000000074C91000-0x0000000074C93000-memory.dmp

    Filesize

    8KB

  • memory/1620-26-0x0000000000000000-mapping.dmp

  • memory/1620-36-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/1748-37-0x0000000000000000-mapping.dmp

  • memory/1828-40-0x0000000000000000-mapping.dmp

  • memory/1944-2-0x00000000742C0000-0x00000000749AE000-memory.dmp

    Filesize

    6.9MB

  • memory/1944-8-0x00000000048D0000-0x000000000492D000-memory.dmp

    Filesize

    372KB

  • memory/1944-7-0x0000000007F60000-0x0000000007FFB000-memory.dmp

    Filesize

    620KB

  • memory/1944-6-0x00000000003B0000-0x00000000003B5000-memory.dmp

    Filesize

    20KB

  • memory/1944-5-0x00000000044A0000-0x00000000044A1000-memory.dmp

    Filesize

    4KB

  • memory/1944-3-0x00000000000B0000-0x00000000000B1000-memory.dmp

    Filesize

    4KB