Analysis

  • max time kernel
    116s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    18-04-2021 13:00

General

  • Target

    39e4619b1e3407f8f2351483282b5b5e.exe

  • Size

    165KB

  • MD5

    39e4619b1e3407f8f2351483282b5b5e

  • SHA1

    386a6a333c5dcf70b9e10401287ddb46583fa7f1

  • SHA256

    3535884c0c8041b6f9e27e7e0cf4fbac9abb5f0ca89d793d29d3ffe01e677081

  • SHA512

    43842fec4cab32ba5cafdb98d7ec40b40e7af037698f9934cd0d1d54aadf4dd84a1ae389c1268814aea29f042a360bf1c9eddbad762e332899700ef8418a0770

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\39e4619b1e3407f8f2351483282b5b5e.exe
    "C:\Users\Admin\AppData\Local\Temp\39e4619b1e3407f8f2351483282b5b5e.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1088
    • C:\ProgramData\6277213.exe
      "C:\ProgramData\6277213.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1536
    • C:\ProgramData\8974475.exe
      "C:\ProgramData\8974475.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:404
      • C:\ProgramData\Windows Host\Windows Host.exe
        "C:\ProgramData\Windows Host\Windows Host.exe"
        3⤵
        • Executes dropped EXE
        PID:280
    • C:\ProgramData\3931934.exe
      "C:\ProgramData\3931934.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:384
      • C:\ProgramData\3931934.exe
        "{path}"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1148

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\3931934.exe
    MD5

    4fc7251966abd315a977a5aaf8d2f555

    SHA1

    c2dca39bc9bf7373ebcbed87e07d04a830082dd3

    SHA256

    9c2f5c1550e1b229be3be5ba62760c24a03098feba2cee98d9aea2e42df980c8

    SHA512

    6336aa28f844f0c10b7acf9b0b795e7e8036e22d7c79656e4ebe96b4add3aead3f8e7ca1103aef601da2af3c9999012caf738b4d156f264a1c22c481792d5c18

  • C:\ProgramData\3931934.exe
    MD5

    4fc7251966abd315a977a5aaf8d2f555

    SHA1

    c2dca39bc9bf7373ebcbed87e07d04a830082dd3

    SHA256

    9c2f5c1550e1b229be3be5ba62760c24a03098feba2cee98d9aea2e42df980c8

    SHA512

    6336aa28f844f0c10b7acf9b0b795e7e8036e22d7c79656e4ebe96b4add3aead3f8e7ca1103aef601da2af3c9999012caf738b4d156f264a1c22c481792d5c18

  • C:\ProgramData\3931934.exe
    MD5

    4fc7251966abd315a977a5aaf8d2f555

    SHA1

    c2dca39bc9bf7373ebcbed87e07d04a830082dd3

    SHA256

    9c2f5c1550e1b229be3be5ba62760c24a03098feba2cee98d9aea2e42df980c8

    SHA512

    6336aa28f844f0c10b7acf9b0b795e7e8036e22d7c79656e4ebe96b4add3aead3f8e7ca1103aef601da2af3c9999012caf738b4d156f264a1c22c481792d5c18

  • C:\ProgramData\6277213.exe
    MD5

    661b5d791e22568a7f7e65147900df32

    SHA1

    64de85b584c546a1ad6b7713ad3f8936eac14adf

    SHA256

    fb7f4dea7703d0908942f81d554b8f37e28bfc07f9fa2d9218ae9fb366d460dd

    SHA512

    c546b5466891b054364880b81906c62bc521b20b4f6b73460f41ddb6b7ccb52ab6b1bb55ee62b6f367b684205b69805a630229f354ac1999fa83c3cedabeabfb

  • C:\ProgramData\6277213.exe
    MD5

    661b5d791e22568a7f7e65147900df32

    SHA1

    64de85b584c546a1ad6b7713ad3f8936eac14adf

    SHA256

    fb7f4dea7703d0908942f81d554b8f37e28bfc07f9fa2d9218ae9fb366d460dd

    SHA512

    c546b5466891b054364880b81906c62bc521b20b4f6b73460f41ddb6b7ccb52ab6b1bb55ee62b6f367b684205b69805a630229f354ac1999fa83c3cedabeabfb

  • C:\ProgramData\8974475.exe
    MD5

    afb7dc87e6208b5747af8e7ab95f28bf

    SHA1

    af2e35b042efcc0c47d31e1747baca34e24a68c1

    SHA256

    a58c95de92eefb42ccff366ae9381c638d425673bd2860256b8263ef7a5609f1

    SHA512

    8448cbcdcc35ee0676a709e01ab0f87c6e11a1718b767f7f220ed559c0f30867b7cb8f82a9d0c3b3279cf00c35619189edac265e724d83811f49e2bea7daa1d0

  • C:\ProgramData\8974475.exe
    MD5

    afb7dc87e6208b5747af8e7ab95f28bf

    SHA1

    af2e35b042efcc0c47d31e1747baca34e24a68c1

    SHA256

    a58c95de92eefb42ccff366ae9381c638d425673bd2860256b8263ef7a5609f1

    SHA512

    8448cbcdcc35ee0676a709e01ab0f87c6e11a1718b767f7f220ed559c0f30867b7cb8f82a9d0c3b3279cf00c35619189edac265e724d83811f49e2bea7daa1d0

  • C:\ProgramData\Windows Host\Windows Host.exe
    MD5

    afb7dc87e6208b5747af8e7ab95f28bf

    SHA1

    af2e35b042efcc0c47d31e1747baca34e24a68c1

    SHA256

    a58c95de92eefb42ccff366ae9381c638d425673bd2860256b8263ef7a5609f1

    SHA512

    8448cbcdcc35ee0676a709e01ab0f87c6e11a1718b767f7f220ed559c0f30867b7cb8f82a9d0c3b3279cf00c35619189edac265e724d83811f49e2bea7daa1d0

  • C:\ProgramData\Windows Host\Windows Host.exe
    MD5

    afb7dc87e6208b5747af8e7ab95f28bf

    SHA1

    af2e35b042efcc0c47d31e1747baca34e24a68c1

    SHA256

    a58c95de92eefb42ccff366ae9381c638d425673bd2860256b8263ef7a5609f1

    SHA512

    8448cbcdcc35ee0676a709e01ab0f87c6e11a1718b767f7f220ed559c0f30867b7cb8f82a9d0c3b3279cf00c35619189edac265e724d83811f49e2bea7daa1d0

  • \ProgramData\Windows Host\Windows Host.exe
    MD5

    afb7dc87e6208b5747af8e7ab95f28bf

    SHA1

    af2e35b042efcc0c47d31e1747baca34e24a68c1

    SHA256

    a58c95de92eefb42ccff366ae9381c638d425673bd2860256b8263ef7a5609f1

    SHA512

    8448cbcdcc35ee0676a709e01ab0f87c6e11a1718b767f7f220ed559c0f30867b7cb8f82a9d0c3b3279cf00c35619189edac265e724d83811f49e2bea7daa1d0

  • \ProgramData\Windows Host\Windows Host.exe
    MD5

    afb7dc87e6208b5747af8e7ab95f28bf

    SHA1

    af2e35b042efcc0c47d31e1747baca34e24a68c1

    SHA256

    a58c95de92eefb42ccff366ae9381c638d425673bd2860256b8263ef7a5609f1

    SHA512

    8448cbcdcc35ee0676a709e01ab0f87c6e11a1718b767f7f220ed559c0f30867b7cb8f82a9d0c3b3279cf00c35619189edac265e724d83811f49e2bea7daa1d0

  • memory/280-100-0x0000000004770000-0x0000000004771000-memory.dmp
    Filesize

    4KB

  • memory/280-95-0x0000000000F90000-0x0000000000F91000-memory.dmp
    Filesize

    4KB

  • memory/280-92-0x0000000000000000-mapping.dmp
  • memory/384-85-0x0000000000E30000-0x0000000000E31000-memory.dmp
    Filesize

    4KB

  • memory/384-103-0x0000000000C90000-0x0000000000CD2000-memory.dmp
    Filesize

    264KB

  • memory/384-102-0x0000000005000000-0x000000000508D000-memory.dmp
    Filesize

    564KB

  • memory/384-101-0x0000000000230000-0x0000000000235000-memory.dmp
    Filesize

    20KB

  • memory/384-89-0x0000000004DE0000-0x0000000004DE1000-memory.dmp
    Filesize

    4KB

  • memory/384-82-0x0000000000000000-mapping.dmp
  • memory/404-79-0x0000000000460000-0x0000000000472000-memory.dmp
    Filesize

    72KB

  • memory/404-75-0x00000000010C0000-0x00000000010C1000-memory.dmp
    Filesize

    4KB

  • memory/404-88-0x0000000000670000-0x0000000000671000-memory.dmp
    Filesize

    4KB

  • memory/404-81-0x0000000000200000-0x0000000000201000-memory.dmp
    Filesize

    4KB

  • memory/404-72-0x0000000000000000-mapping.dmp
  • memory/404-77-0x0000000000450000-0x0000000000451000-memory.dmp
    Filesize

    4KB

  • memory/1088-64-0x00000000003B0000-0x00000000003B1000-memory.dmp
    Filesize

    4KB

  • memory/1088-62-0x0000000000380000-0x0000000000381000-memory.dmp
    Filesize

    4KB

  • memory/1088-63-0x0000000000390000-0x00000000003AD000-memory.dmp
    Filesize

    116KB

  • memory/1088-65-0x0000000000480000-0x0000000000482000-memory.dmp
    Filesize

    8KB

  • memory/1088-60-0x00000000000C0000-0x00000000000C1000-memory.dmp
    Filesize

    4KB

  • memory/1148-104-0x0000000000400000-0x000000000041C000-memory.dmp
    Filesize

    112KB

  • memory/1148-105-0x00000000004163CA-mapping.dmp
  • memory/1148-107-0x0000000000400000-0x000000000041C000-memory.dmp
    Filesize

    112KB

  • memory/1148-109-0x0000000004C00000-0x0000000004C01000-memory.dmp
    Filesize

    4KB

  • memory/1536-78-0x0000000000380000-0x00000000003B3000-memory.dmp
    Filesize

    204KB

  • memory/1536-66-0x0000000000000000-mapping.dmp
  • memory/1536-69-0x0000000001390000-0x0000000001391000-memory.dmp
    Filesize

    4KB

  • memory/1536-71-0x00000000001F0000-0x00000000001F1000-memory.dmp
    Filesize

    4KB

  • memory/1536-80-0x0000000000420000-0x0000000000421000-memory.dmp
    Filesize

    4KB

  • memory/1536-87-0x00000000049A0000-0x00000000049A1000-memory.dmp
    Filesize

    4KB