Analysis

  • max time kernel
    138s
  • max time network
    140s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    18-04-2021 13:00

General

  • Target

    39e4619b1e3407f8f2351483282b5b5e.exe

  • Size

    165KB

  • MD5

    39e4619b1e3407f8f2351483282b5b5e

  • SHA1

    386a6a333c5dcf70b9e10401287ddb46583fa7f1

  • SHA256

    3535884c0c8041b6f9e27e7e0cf4fbac9abb5f0ca89d793d29d3ffe01e677081

  • SHA512

    43842fec4cab32ba5cafdb98d7ec40b40e7af037698f9934cd0d1d54aadf4dd84a1ae389c1268814aea29f042a360bf1c9eddbad762e332899700ef8418a0770

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\39e4619b1e3407f8f2351483282b5b5e.exe
    "C:\Users\Admin\AppData\Local\Temp\39e4619b1e3407f8f2351483282b5b5e.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:804
    • C:\ProgramData\3738316.exe
      "C:\ProgramData\3738316.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3692
    • C:\ProgramData\8878618.exe
      "C:\ProgramData\8878618.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:744
      • C:\ProgramData\Windows Host\Windows Host.exe
        "C:\ProgramData\Windows Host\Windows Host.exe"
        3⤵
        • Executes dropped EXE
        PID:2112
    • C:\ProgramData\5494707.exe
      "C:\ProgramData\5494707.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3736
      • C:\ProgramData\5494707.exe
        "{path}"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:912

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\3738316.exe
    MD5

    661b5d791e22568a7f7e65147900df32

    SHA1

    64de85b584c546a1ad6b7713ad3f8936eac14adf

    SHA256

    fb7f4dea7703d0908942f81d554b8f37e28bfc07f9fa2d9218ae9fb366d460dd

    SHA512

    c546b5466891b054364880b81906c62bc521b20b4f6b73460f41ddb6b7ccb52ab6b1bb55ee62b6f367b684205b69805a630229f354ac1999fa83c3cedabeabfb

  • C:\ProgramData\3738316.exe
    MD5

    661b5d791e22568a7f7e65147900df32

    SHA1

    64de85b584c546a1ad6b7713ad3f8936eac14adf

    SHA256

    fb7f4dea7703d0908942f81d554b8f37e28bfc07f9fa2d9218ae9fb366d460dd

    SHA512

    c546b5466891b054364880b81906c62bc521b20b4f6b73460f41ddb6b7ccb52ab6b1bb55ee62b6f367b684205b69805a630229f354ac1999fa83c3cedabeabfb

  • C:\ProgramData\5494707.exe
    MD5

    4fc7251966abd315a977a5aaf8d2f555

    SHA1

    c2dca39bc9bf7373ebcbed87e07d04a830082dd3

    SHA256

    9c2f5c1550e1b229be3be5ba62760c24a03098feba2cee98d9aea2e42df980c8

    SHA512

    6336aa28f844f0c10b7acf9b0b795e7e8036e22d7c79656e4ebe96b4add3aead3f8e7ca1103aef601da2af3c9999012caf738b4d156f264a1c22c481792d5c18

  • C:\ProgramData\5494707.exe
    MD5

    4fc7251966abd315a977a5aaf8d2f555

    SHA1

    c2dca39bc9bf7373ebcbed87e07d04a830082dd3

    SHA256

    9c2f5c1550e1b229be3be5ba62760c24a03098feba2cee98d9aea2e42df980c8

    SHA512

    6336aa28f844f0c10b7acf9b0b795e7e8036e22d7c79656e4ebe96b4add3aead3f8e7ca1103aef601da2af3c9999012caf738b4d156f264a1c22c481792d5c18

  • C:\ProgramData\5494707.exe
    MD5

    4fc7251966abd315a977a5aaf8d2f555

    SHA1

    c2dca39bc9bf7373ebcbed87e07d04a830082dd3

    SHA256

    9c2f5c1550e1b229be3be5ba62760c24a03098feba2cee98d9aea2e42df980c8

    SHA512

    6336aa28f844f0c10b7acf9b0b795e7e8036e22d7c79656e4ebe96b4add3aead3f8e7ca1103aef601da2af3c9999012caf738b4d156f264a1c22c481792d5c18

  • C:\ProgramData\8878618.exe
    MD5

    afb7dc87e6208b5747af8e7ab95f28bf

    SHA1

    af2e35b042efcc0c47d31e1747baca34e24a68c1

    SHA256

    a58c95de92eefb42ccff366ae9381c638d425673bd2860256b8263ef7a5609f1

    SHA512

    8448cbcdcc35ee0676a709e01ab0f87c6e11a1718b767f7f220ed559c0f30867b7cb8f82a9d0c3b3279cf00c35619189edac265e724d83811f49e2bea7daa1d0

  • C:\ProgramData\8878618.exe
    MD5

    afb7dc87e6208b5747af8e7ab95f28bf

    SHA1

    af2e35b042efcc0c47d31e1747baca34e24a68c1

    SHA256

    a58c95de92eefb42ccff366ae9381c638d425673bd2860256b8263ef7a5609f1

    SHA512

    8448cbcdcc35ee0676a709e01ab0f87c6e11a1718b767f7f220ed559c0f30867b7cb8f82a9d0c3b3279cf00c35619189edac265e724d83811f49e2bea7daa1d0

  • C:\ProgramData\Windows Host\Windows Host.exe
    MD5

    afb7dc87e6208b5747af8e7ab95f28bf

    SHA1

    af2e35b042efcc0c47d31e1747baca34e24a68c1

    SHA256

    a58c95de92eefb42ccff366ae9381c638d425673bd2860256b8263ef7a5609f1

    SHA512

    8448cbcdcc35ee0676a709e01ab0f87c6e11a1718b767f7f220ed559c0f30867b7cb8f82a9d0c3b3279cf00c35619189edac265e724d83811f49e2bea7daa1d0

  • C:\ProgramData\Windows Host\Windows Host.exe
    MD5

    afb7dc87e6208b5747af8e7ab95f28bf

    SHA1

    af2e35b042efcc0c47d31e1747baca34e24a68c1

    SHA256

    a58c95de92eefb42ccff366ae9381c638d425673bd2860256b8263ef7a5609f1

    SHA512

    8448cbcdcc35ee0676a709e01ab0f87c6e11a1718b767f7f220ed559c0f30867b7cb8f82a9d0c3b3279cf00c35619189edac265e724d83811f49e2bea7daa1d0

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\5494707.exe.log
    MD5

    0c2899d7c6746f42d5bbe088c777f94c

    SHA1

    622f66c5f7a3c91b28a9f43ce7c6cabadbf514f1

    SHA256

    5b0b99740cadaeff7b9891136644b396941547e20cc7eea646560d0dad5a5458

    SHA512

    ab7a3409ed4b6ca00358330a3aa4ef6de7d81eb21a5e24bb629ef6a7c7c4e2a70ca3accfbc989ed6e495fdb8eb6203a26d6f2a37b2a5809af4276af375b49078

  • memory/744-142-0x0000000004D40000-0x0000000004D41000-memory.dmp
    Filesize

    4KB

  • memory/744-136-0x0000000002760000-0x0000000002761000-memory.dmp
    Filesize

    4KB

  • memory/744-123-0x0000000000000000-mapping.dmp
  • memory/744-143-0x0000000002740000-0x0000000002741000-memory.dmp
    Filesize

    4KB

  • memory/744-139-0x0000000004830000-0x0000000004842000-memory.dmp
    Filesize

    72KB

  • memory/744-132-0x0000000000500000-0x0000000000501000-memory.dmp
    Filesize

    4KB

  • memory/804-119-0x000000001B600000-0x000000001B602000-memory.dmp
    Filesize

    8KB

  • memory/804-114-0x0000000000940000-0x0000000000941000-memory.dmp
    Filesize

    4KB

  • memory/804-116-0x0000000001050000-0x0000000001051000-memory.dmp
    Filesize

    4KB

  • memory/804-117-0x0000000001060000-0x000000000107D000-memory.dmp
    Filesize

    116KB

  • memory/804-118-0x0000000001090000-0x0000000001091000-memory.dmp
    Filesize

    4KB

  • memory/912-180-0x0000000005B00000-0x0000000005B01000-memory.dmp
    Filesize

    4KB

  • memory/912-184-0x0000000007AA0000-0x0000000007AA1000-memory.dmp
    Filesize

    4KB

  • memory/912-178-0x00000000057A0000-0x0000000005DA6000-memory.dmp
    Filesize

    6.0MB

  • memory/912-175-0x0000000005DB0000-0x0000000005DB1000-memory.dmp
    Filesize

    4KB

  • memory/912-183-0x00000000073A0000-0x00000000073A1000-memory.dmp
    Filesize

    4KB

  • memory/912-176-0x0000000005800000-0x0000000005801000-memory.dmp
    Filesize

    4KB

  • memory/912-170-0x00000000004163CA-mapping.dmp
  • memory/912-177-0x0000000005860000-0x0000000005861000-memory.dmp
    Filesize

    4KB

  • memory/912-179-0x00000000058A0000-0x00000000058A1000-memory.dmp
    Filesize

    4KB

  • memory/912-169-0x0000000000400000-0x000000000041C000-memory.dmp
    Filesize

    112KB

  • memory/2112-163-0x0000000000700000-0x00000000007AE000-memory.dmp
    Filesize

    696KB

  • memory/2112-150-0x0000000000000000-mapping.dmp
  • memory/3692-144-0x0000000005490000-0x0000000005491000-memory.dmp
    Filesize

    4KB

  • memory/3692-147-0x00000000014E0000-0x00000000014E1000-memory.dmp
    Filesize

    4KB

  • memory/3692-120-0x0000000000000000-mapping.dmp
  • memory/3692-129-0x0000000000C30000-0x0000000000C31000-memory.dmp
    Filesize

    4KB

  • memory/3692-137-0x0000000001450000-0x0000000001451000-memory.dmp
    Filesize

    4KB

  • memory/3692-161-0x0000000009840000-0x0000000009841000-memory.dmp
    Filesize

    4KB

  • memory/3692-145-0x0000000004ED0000-0x0000000004F03000-memory.dmp
    Filesize

    204KB

  • memory/3736-154-0x00000000055E0000-0x00000000055E5000-memory.dmp
    Filesize

    20KB

  • memory/3736-148-0x0000000005100000-0x00000000055FE000-memory.dmp
    Filesize

    5.0MB

  • memory/3736-149-0x0000000005110000-0x0000000005111000-memory.dmp
    Filesize

    4KB

  • memory/3736-138-0x00000000051A0000-0x00000000051A1000-memory.dmp
    Filesize

    4KB

  • memory/3736-168-0x0000000009D20000-0x0000000009D62000-memory.dmp
    Filesize

    264KB

  • memory/3736-135-0x0000000005600000-0x0000000005601000-memory.dmp
    Filesize

    4KB

  • memory/3736-131-0x00000000007B0000-0x00000000007B1000-memory.dmp
    Filesize

    4KB

  • memory/3736-167-0x00000000077B0000-0x000000000783D000-memory.dmp
    Filesize

    564KB

  • memory/3736-126-0x0000000000000000-mapping.dmp
  • memory/3736-156-0x0000000007500000-0x0000000007501000-memory.dmp
    Filesize

    4KB