Analysis
-
max time kernel
116s -
max time network
117s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
18-04-2021 13:00
Static task
static1
Behavioral task
behavioral1
Sample
39e4619b1e3407f8f2351483282b5b5e.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
39e4619b1e3407f8f2351483282b5b5e.exe
Resource
win10v20210408
General
-
Target
39e4619b1e3407f8f2351483282b5b5e.exe
-
Size
165KB
-
MD5
39e4619b1e3407f8f2351483282b5b5e
-
SHA1
386a6a333c5dcf70b9e10401287ddb46583fa7f1
-
SHA256
3535884c0c8041b6f9e27e7e0cf4fbac9abb5f0ca89d793d29d3ffe01e677081
-
SHA512
43842fec4cab32ba5cafdb98d7ec40b40e7af037698f9934cd0d1d54aadf4dd84a1ae389c1268814aea29f042a360bf1c9eddbad762e332899700ef8418a0770
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
Processes:
6277213.exe8974475.exe3931934.exeWindows Host.exe3931934.exepid process 1536 6277213.exe 404 8974475.exe 384 3931934.exe 280 Windows Host.exe 1148 3931934.exe -
Loads dropped DLL 2 IoCs
Processes:
8974475.exepid process 404 8974475.exe 404 8974475.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
8974475.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Host = "C:\\ProgramData\\Windows Host\\Windows Host.exe" 8974475.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
3931934.exedescription pid process target process PID 384 set thread context of 1148 384 3931934.exe 3931934.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
6277213.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 6277213.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 6277213.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 1900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491d00000001000000100000002e0d6875874a44c820912e85e964cfdb140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b40b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f00000053000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e 6277213.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
6277213.exe3931934.exepid process 1536 6277213.exe 1536 6277213.exe 1148 3931934.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
39e4619b1e3407f8f2351483282b5b5e.exe6277213.exe3931934.exedescription pid process Token: SeDebugPrivilege 1088 39e4619b1e3407f8f2351483282b5b5e.exe Token: SeDebugPrivilege 1536 6277213.exe Token: SeDebugPrivilege 1148 3931934.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
39e4619b1e3407f8f2351483282b5b5e.exe8974475.exe3931934.exedescription pid process target process PID 1088 wrote to memory of 1536 1088 39e4619b1e3407f8f2351483282b5b5e.exe 6277213.exe PID 1088 wrote to memory of 1536 1088 39e4619b1e3407f8f2351483282b5b5e.exe 6277213.exe PID 1088 wrote to memory of 1536 1088 39e4619b1e3407f8f2351483282b5b5e.exe 6277213.exe PID 1088 wrote to memory of 1536 1088 39e4619b1e3407f8f2351483282b5b5e.exe 6277213.exe PID 1088 wrote to memory of 404 1088 39e4619b1e3407f8f2351483282b5b5e.exe 8974475.exe PID 1088 wrote to memory of 404 1088 39e4619b1e3407f8f2351483282b5b5e.exe 8974475.exe PID 1088 wrote to memory of 404 1088 39e4619b1e3407f8f2351483282b5b5e.exe 8974475.exe PID 1088 wrote to memory of 404 1088 39e4619b1e3407f8f2351483282b5b5e.exe 8974475.exe PID 1088 wrote to memory of 384 1088 39e4619b1e3407f8f2351483282b5b5e.exe 3931934.exe PID 1088 wrote to memory of 384 1088 39e4619b1e3407f8f2351483282b5b5e.exe 3931934.exe PID 1088 wrote to memory of 384 1088 39e4619b1e3407f8f2351483282b5b5e.exe 3931934.exe PID 1088 wrote to memory of 384 1088 39e4619b1e3407f8f2351483282b5b5e.exe 3931934.exe PID 404 wrote to memory of 280 404 8974475.exe Windows Host.exe PID 404 wrote to memory of 280 404 8974475.exe Windows Host.exe PID 404 wrote to memory of 280 404 8974475.exe Windows Host.exe PID 404 wrote to memory of 280 404 8974475.exe Windows Host.exe PID 384 wrote to memory of 1148 384 3931934.exe 3931934.exe PID 384 wrote to memory of 1148 384 3931934.exe 3931934.exe PID 384 wrote to memory of 1148 384 3931934.exe 3931934.exe PID 384 wrote to memory of 1148 384 3931934.exe 3931934.exe PID 384 wrote to memory of 1148 384 3931934.exe 3931934.exe PID 384 wrote to memory of 1148 384 3931934.exe 3931934.exe PID 384 wrote to memory of 1148 384 3931934.exe 3931934.exe PID 384 wrote to memory of 1148 384 3931934.exe 3931934.exe PID 384 wrote to memory of 1148 384 3931934.exe 3931934.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\39e4619b1e3407f8f2351483282b5b5e.exe"C:\Users\Admin\AppData\Local\Temp\39e4619b1e3407f8f2351483282b5b5e.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\6277213.exe"C:\ProgramData\6277213.exe"2⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\8974475.exe"C:\ProgramData\8974475.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\Windows Host\Windows Host.exe"C:\ProgramData\Windows Host\Windows Host.exe"3⤵
- Executes dropped EXE
-
C:\ProgramData\3931934.exe"C:\ProgramData\3931934.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\3931934.exe"{path}"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\3931934.exeMD5
4fc7251966abd315a977a5aaf8d2f555
SHA1c2dca39bc9bf7373ebcbed87e07d04a830082dd3
SHA2569c2f5c1550e1b229be3be5ba62760c24a03098feba2cee98d9aea2e42df980c8
SHA5126336aa28f844f0c10b7acf9b0b795e7e8036e22d7c79656e4ebe96b4add3aead3f8e7ca1103aef601da2af3c9999012caf738b4d156f264a1c22c481792d5c18
-
C:\ProgramData\3931934.exeMD5
4fc7251966abd315a977a5aaf8d2f555
SHA1c2dca39bc9bf7373ebcbed87e07d04a830082dd3
SHA2569c2f5c1550e1b229be3be5ba62760c24a03098feba2cee98d9aea2e42df980c8
SHA5126336aa28f844f0c10b7acf9b0b795e7e8036e22d7c79656e4ebe96b4add3aead3f8e7ca1103aef601da2af3c9999012caf738b4d156f264a1c22c481792d5c18
-
C:\ProgramData\3931934.exeMD5
4fc7251966abd315a977a5aaf8d2f555
SHA1c2dca39bc9bf7373ebcbed87e07d04a830082dd3
SHA2569c2f5c1550e1b229be3be5ba62760c24a03098feba2cee98d9aea2e42df980c8
SHA5126336aa28f844f0c10b7acf9b0b795e7e8036e22d7c79656e4ebe96b4add3aead3f8e7ca1103aef601da2af3c9999012caf738b4d156f264a1c22c481792d5c18
-
C:\ProgramData\6277213.exeMD5
661b5d791e22568a7f7e65147900df32
SHA164de85b584c546a1ad6b7713ad3f8936eac14adf
SHA256fb7f4dea7703d0908942f81d554b8f37e28bfc07f9fa2d9218ae9fb366d460dd
SHA512c546b5466891b054364880b81906c62bc521b20b4f6b73460f41ddb6b7ccb52ab6b1bb55ee62b6f367b684205b69805a630229f354ac1999fa83c3cedabeabfb
-
C:\ProgramData\6277213.exeMD5
661b5d791e22568a7f7e65147900df32
SHA164de85b584c546a1ad6b7713ad3f8936eac14adf
SHA256fb7f4dea7703d0908942f81d554b8f37e28bfc07f9fa2d9218ae9fb366d460dd
SHA512c546b5466891b054364880b81906c62bc521b20b4f6b73460f41ddb6b7ccb52ab6b1bb55ee62b6f367b684205b69805a630229f354ac1999fa83c3cedabeabfb
-
C:\ProgramData\8974475.exeMD5
afb7dc87e6208b5747af8e7ab95f28bf
SHA1af2e35b042efcc0c47d31e1747baca34e24a68c1
SHA256a58c95de92eefb42ccff366ae9381c638d425673bd2860256b8263ef7a5609f1
SHA5128448cbcdcc35ee0676a709e01ab0f87c6e11a1718b767f7f220ed559c0f30867b7cb8f82a9d0c3b3279cf00c35619189edac265e724d83811f49e2bea7daa1d0
-
C:\ProgramData\8974475.exeMD5
afb7dc87e6208b5747af8e7ab95f28bf
SHA1af2e35b042efcc0c47d31e1747baca34e24a68c1
SHA256a58c95de92eefb42ccff366ae9381c638d425673bd2860256b8263ef7a5609f1
SHA5128448cbcdcc35ee0676a709e01ab0f87c6e11a1718b767f7f220ed559c0f30867b7cb8f82a9d0c3b3279cf00c35619189edac265e724d83811f49e2bea7daa1d0
-
C:\ProgramData\Windows Host\Windows Host.exeMD5
afb7dc87e6208b5747af8e7ab95f28bf
SHA1af2e35b042efcc0c47d31e1747baca34e24a68c1
SHA256a58c95de92eefb42ccff366ae9381c638d425673bd2860256b8263ef7a5609f1
SHA5128448cbcdcc35ee0676a709e01ab0f87c6e11a1718b767f7f220ed559c0f30867b7cb8f82a9d0c3b3279cf00c35619189edac265e724d83811f49e2bea7daa1d0
-
C:\ProgramData\Windows Host\Windows Host.exeMD5
afb7dc87e6208b5747af8e7ab95f28bf
SHA1af2e35b042efcc0c47d31e1747baca34e24a68c1
SHA256a58c95de92eefb42ccff366ae9381c638d425673bd2860256b8263ef7a5609f1
SHA5128448cbcdcc35ee0676a709e01ab0f87c6e11a1718b767f7f220ed559c0f30867b7cb8f82a9d0c3b3279cf00c35619189edac265e724d83811f49e2bea7daa1d0
-
\ProgramData\Windows Host\Windows Host.exeMD5
afb7dc87e6208b5747af8e7ab95f28bf
SHA1af2e35b042efcc0c47d31e1747baca34e24a68c1
SHA256a58c95de92eefb42ccff366ae9381c638d425673bd2860256b8263ef7a5609f1
SHA5128448cbcdcc35ee0676a709e01ab0f87c6e11a1718b767f7f220ed559c0f30867b7cb8f82a9d0c3b3279cf00c35619189edac265e724d83811f49e2bea7daa1d0
-
\ProgramData\Windows Host\Windows Host.exeMD5
afb7dc87e6208b5747af8e7ab95f28bf
SHA1af2e35b042efcc0c47d31e1747baca34e24a68c1
SHA256a58c95de92eefb42ccff366ae9381c638d425673bd2860256b8263ef7a5609f1
SHA5128448cbcdcc35ee0676a709e01ab0f87c6e11a1718b767f7f220ed559c0f30867b7cb8f82a9d0c3b3279cf00c35619189edac265e724d83811f49e2bea7daa1d0
-
memory/280-100-0x0000000004770000-0x0000000004771000-memory.dmpFilesize
4KB
-
memory/280-95-0x0000000000F90000-0x0000000000F91000-memory.dmpFilesize
4KB
-
memory/280-92-0x0000000000000000-mapping.dmp
-
memory/384-85-0x0000000000E30000-0x0000000000E31000-memory.dmpFilesize
4KB
-
memory/384-103-0x0000000000C90000-0x0000000000CD2000-memory.dmpFilesize
264KB
-
memory/384-102-0x0000000005000000-0x000000000508D000-memory.dmpFilesize
564KB
-
memory/384-101-0x0000000000230000-0x0000000000235000-memory.dmpFilesize
20KB
-
memory/384-89-0x0000000004DE0000-0x0000000004DE1000-memory.dmpFilesize
4KB
-
memory/384-82-0x0000000000000000-mapping.dmp
-
memory/404-79-0x0000000000460000-0x0000000000472000-memory.dmpFilesize
72KB
-
memory/404-75-0x00000000010C0000-0x00000000010C1000-memory.dmpFilesize
4KB
-
memory/404-88-0x0000000000670000-0x0000000000671000-memory.dmpFilesize
4KB
-
memory/404-81-0x0000000000200000-0x0000000000201000-memory.dmpFilesize
4KB
-
memory/404-72-0x0000000000000000-mapping.dmp
-
memory/404-77-0x0000000000450000-0x0000000000451000-memory.dmpFilesize
4KB
-
memory/1088-64-0x00000000003B0000-0x00000000003B1000-memory.dmpFilesize
4KB
-
memory/1088-62-0x0000000000380000-0x0000000000381000-memory.dmpFilesize
4KB
-
memory/1088-63-0x0000000000390000-0x00000000003AD000-memory.dmpFilesize
116KB
-
memory/1088-65-0x0000000000480000-0x0000000000482000-memory.dmpFilesize
8KB
-
memory/1088-60-0x00000000000C0000-0x00000000000C1000-memory.dmpFilesize
4KB
-
memory/1148-104-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/1148-105-0x00000000004163CA-mapping.dmp
-
memory/1148-107-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/1148-109-0x0000000004C00000-0x0000000004C01000-memory.dmpFilesize
4KB
-
memory/1536-78-0x0000000000380000-0x00000000003B3000-memory.dmpFilesize
204KB
-
memory/1536-66-0x0000000000000000-mapping.dmp
-
memory/1536-69-0x0000000001390000-0x0000000001391000-memory.dmpFilesize
4KB
-
memory/1536-71-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/1536-80-0x0000000000420000-0x0000000000421000-memory.dmpFilesize
4KB
-
memory/1536-87-0x00000000049A0000-0x00000000049A1000-memory.dmpFilesize
4KB