Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
18-04-2021 13:00
Static task
static1
Behavioral task
behavioral1
Sample
39e4619b1e3407f8f2351483282b5b5e.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
39e4619b1e3407f8f2351483282b5b5e.exe
Resource
win10v20210408
General
-
Target
39e4619b1e3407f8f2351483282b5b5e.exe
-
Size
165KB
-
MD5
39e4619b1e3407f8f2351483282b5b5e
-
SHA1
386a6a333c5dcf70b9e10401287ddb46583fa7f1
-
SHA256
3535884c0c8041b6f9e27e7e0cf4fbac9abb5f0ca89d793d29d3ffe01e677081
-
SHA512
43842fec4cab32ba5cafdb98d7ec40b40e7af037698f9934cd0d1d54aadf4dd84a1ae389c1268814aea29f042a360bf1c9eddbad762e332899700ef8418a0770
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
Processes:
3738316.exe8878618.exe5494707.exeWindows Host.exe5494707.exepid process 3692 3738316.exe 744 8878618.exe 3736 5494707.exe 2112 Windows Host.exe 912 5494707.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
8878618.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Host = "C:\\ProgramData\\Windows Host\\Windows Host.exe" 8878618.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
5494707.exedescription pid process target process PID 3736 set thread context of 912 3736 5494707.exe 5494707.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
3738316.exe5494707.exepid process 3692 3738316.exe 3692 3738316.exe 912 5494707.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
39e4619b1e3407f8f2351483282b5b5e.exe3738316.exe5494707.exedescription pid process Token: SeDebugPrivilege 804 39e4619b1e3407f8f2351483282b5b5e.exe Token: SeDebugPrivilege 3692 3738316.exe Token: SeDebugPrivilege 912 5494707.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
39e4619b1e3407f8f2351483282b5b5e.exe8878618.exe5494707.exedescription pid process target process PID 804 wrote to memory of 3692 804 39e4619b1e3407f8f2351483282b5b5e.exe 3738316.exe PID 804 wrote to memory of 3692 804 39e4619b1e3407f8f2351483282b5b5e.exe 3738316.exe PID 804 wrote to memory of 3692 804 39e4619b1e3407f8f2351483282b5b5e.exe 3738316.exe PID 804 wrote to memory of 744 804 39e4619b1e3407f8f2351483282b5b5e.exe 8878618.exe PID 804 wrote to memory of 744 804 39e4619b1e3407f8f2351483282b5b5e.exe 8878618.exe PID 804 wrote to memory of 744 804 39e4619b1e3407f8f2351483282b5b5e.exe 8878618.exe PID 804 wrote to memory of 3736 804 39e4619b1e3407f8f2351483282b5b5e.exe 5494707.exe PID 804 wrote to memory of 3736 804 39e4619b1e3407f8f2351483282b5b5e.exe 5494707.exe PID 804 wrote to memory of 3736 804 39e4619b1e3407f8f2351483282b5b5e.exe 5494707.exe PID 744 wrote to memory of 2112 744 8878618.exe Windows Host.exe PID 744 wrote to memory of 2112 744 8878618.exe Windows Host.exe PID 744 wrote to memory of 2112 744 8878618.exe Windows Host.exe PID 3736 wrote to memory of 912 3736 5494707.exe 5494707.exe PID 3736 wrote to memory of 912 3736 5494707.exe 5494707.exe PID 3736 wrote to memory of 912 3736 5494707.exe 5494707.exe PID 3736 wrote to memory of 912 3736 5494707.exe 5494707.exe PID 3736 wrote to memory of 912 3736 5494707.exe 5494707.exe PID 3736 wrote to memory of 912 3736 5494707.exe 5494707.exe PID 3736 wrote to memory of 912 3736 5494707.exe 5494707.exe PID 3736 wrote to memory of 912 3736 5494707.exe 5494707.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\39e4619b1e3407f8f2351483282b5b5e.exe"C:\Users\Admin\AppData\Local\Temp\39e4619b1e3407f8f2351483282b5b5e.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\3738316.exe"C:\ProgramData\3738316.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\8878618.exe"C:\ProgramData\8878618.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\Windows Host\Windows Host.exe"C:\ProgramData\Windows Host\Windows Host.exe"3⤵
- Executes dropped EXE
-
C:\ProgramData\5494707.exe"C:\ProgramData\5494707.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\5494707.exe"{path}"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\3738316.exeMD5
661b5d791e22568a7f7e65147900df32
SHA164de85b584c546a1ad6b7713ad3f8936eac14adf
SHA256fb7f4dea7703d0908942f81d554b8f37e28bfc07f9fa2d9218ae9fb366d460dd
SHA512c546b5466891b054364880b81906c62bc521b20b4f6b73460f41ddb6b7ccb52ab6b1bb55ee62b6f367b684205b69805a630229f354ac1999fa83c3cedabeabfb
-
C:\ProgramData\3738316.exeMD5
661b5d791e22568a7f7e65147900df32
SHA164de85b584c546a1ad6b7713ad3f8936eac14adf
SHA256fb7f4dea7703d0908942f81d554b8f37e28bfc07f9fa2d9218ae9fb366d460dd
SHA512c546b5466891b054364880b81906c62bc521b20b4f6b73460f41ddb6b7ccb52ab6b1bb55ee62b6f367b684205b69805a630229f354ac1999fa83c3cedabeabfb
-
C:\ProgramData\5494707.exeMD5
4fc7251966abd315a977a5aaf8d2f555
SHA1c2dca39bc9bf7373ebcbed87e07d04a830082dd3
SHA2569c2f5c1550e1b229be3be5ba62760c24a03098feba2cee98d9aea2e42df980c8
SHA5126336aa28f844f0c10b7acf9b0b795e7e8036e22d7c79656e4ebe96b4add3aead3f8e7ca1103aef601da2af3c9999012caf738b4d156f264a1c22c481792d5c18
-
C:\ProgramData\5494707.exeMD5
4fc7251966abd315a977a5aaf8d2f555
SHA1c2dca39bc9bf7373ebcbed87e07d04a830082dd3
SHA2569c2f5c1550e1b229be3be5ba62760c24a03098feba2cee98d9aea2e42df980c8
SHA5126336aa28f844f0c10b7acf9b0b795e7e8036e22d7c79656e4ebe96b4add3aead3f8e7ca1103aef601da2af3c9999012caf738b4d156f264a1c22c481792d5c18
-
C:\ProgramData\5494707.exeMD5
4fc7251966abd315a977a5aaf8d2f555
SHA1c2dca39bc9bf7373ebcbed87e07d04a830082dd3
SHA2569c2f5c1550e1b229be3be5ba62760c24a03098feba2cee98d9aea2e42df980c8
SHA5126336aa28f844f0c10b7acf9b0b795e7e8036e22d7c79656e4ebe96b4add3aead3f8e7ca1103aef601da2af3c9999012caf738b4d156f264a1c22c481792d5c18
-
C:\ProgramData\8878618.exeMD5
afb7dc87e6208b5747af8e7ab95f28bf
SHA1af2e35b042efcc0c47d31e1747baca34e24a68c1
SHA256a58c95de92eefb42ccff366ae9381c638d425673bd2860256b8263ef7a5609f1
SHA5128448cbcdcc35ee0676a709e01ab0f87c6e11a1718b767f7f220ed559c0f30867b7cb8f82a9d0c3b3279cf00c35619189edac265e724d83811f49e2bea7daa1d0
-
C:\ProgramData\8878618.exeMD5
afb7dc87e6208b5747af8e7ab95f28bf
SHA1af2e35b042efcc0c47d31e1747baca34e24a68c1
SHA256a58c95de92eefb42ccff366ae9381c638d425673bd2860256b8263ef7a5609f1
SHA5128448cbcdcc35ee0676a709e01ab0f87c6e11a1718b767f7f220ed559c0f30867b7cb8f82a9d0c3b3279cf00c35619189edac265e724d83811f49e2bea7daa1d0
-
C:\ProgramData\Windows Host\Windows Host.exeMD5
afb7dc87e6208b5747af8e7ab95f28bf
SHA1af2e35b042efcc0c47d31e1747baca34e24a68c1
SHA256a58c95de92eefb42ccff366ae9381c638d425673bd2860256b8263ef7a5609f1
SHA5128448cbcdcc35ee0676a709e01ab0f87c6e11a1718b767f7f220ed559c0f30867b7cb8f82a9d0c3b3279cf00c35619189edac265e724d83811f49e2bea7daa1d0
-
C:\ProgramData\Windows Host\Windows Host.exeMD5
afb7dc87e6208b5747af8e7ab95f28bf
SHA1af2e35b042efcc0c47d31e1747baca34e24a68c1
SHA256a58c95de92eefb42ccff366ae9381c638d425673bd2860256b8263ef7a5609f1
SHA5128448cbcdcc35ee0676a709e01ab0f87c6e11a1718b767f7f220ed559c0f30867b7cb8f82a9d0c3b3279cf00c35619189edac265e724d83811f49e2bea7daa1d0
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\5494707.exe.logMD5
0c2899d7c6746f42d5bbe088c777f94c
SHA1622f66c5f7a3c91b28a9f43ce7c6cabadbf514f1
SHA2565b0b99740cadaeff7b9891136644b396941547e20cc7eea646560d0dad5a5458
SHA512ab7a3409ed4b6ca00358330a3aa4ef6de7d81eb21a5e24bb629ef6a7c7c4e2a70ca3accfbc989ed6e495fdb8eb6203a26d6f2a37b2a5809af4276af375b49078
-
memory/744-142-0x0000000004D40000-0x0000000004D41000-memory.dmpFilesize
4KB
-
memory/744-136-0x0000000002760000-0x0000000002761000-memory.dmpFilesize
4KB
-
memory/744-123-0x0000000000000000-mapping.dmp
-
memory/744-143-0x0000000002740000-0x0000000002741000-memory.dmpFilesize
4KB
-
memory/744-139-0x0000000004830000-0x0000000004842000-memory.dmpFilesize
72KB
-
memory/744-132-0x0000000000500000-0x0000000000501000-memory.dmpFilesize
4KB
-
memory/804-119-0x000000001B600000-0x000000001B602000-memory.dmpFilesize
8KB
-
memory/804-114-0x0000000000940000-0x0000000000941000-memory.dmpFilesize
4KB
-
memory/804-116-0x0000000001050000-0x0000000001051000-memory.dmpFilesize
4KB
-
memory/804-117-0x0000000001060000-0x000000000107D000-memory.dmpFilesize
116KB
-
memory/804-118-0x0000000001090000-0x0000000001091000-memory.dmpFilesize
4KB
-
memory/912-180-0x0000000005B00000-0x0000000005B01000-memory.dmpFilesize
4KB
-
memory/912-184-0x0000000007AA0000-0x0000000007AA1000-memory.dmpFilesize
4KB
-
memory/912-178-0x00000000057A0000-0x0000000005DA6000-memory.dmpFilesize
6.0MB
-
memory/912-175-0x0000000005DB0000-0x0000000005DB1000-memory.dmpFilesize
4KB
-
memory/912-183-0x00000000073A0000-0x00000000073A1000-memory.dmpFilesize
4KB
-
memory/912-176-0x0000000005800000-0x0000000005801000-memory.dmpFilesize
4KB
-
memory/912-170-0x00000000004163CA-mapping.dmp
-
memory/912-177-0x0000000005860000-0x0000000005861000-memory.dmpFilesize
4KB
-
memory/912-179-0x00000000058A0000-0x00000000058A1000-memory.dmpFilesize
4KB
-
memory/912-169-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/2112-163-0x0000000000700000-0x00000000007AE000-memory.dmpFilesize
696KB
-
memory/2112-150-0x0000000000000000-mapping.dmp
-
memory/3692-144-0x0000000005490000-0x0000000005491000-memory.dmpFilesize
4KB
-
memory/3692-147-0x00000000014E0000-0x00000000014E1000-memory.dmpFilesize
4KB
-
memory/3692-120-0x0000000000000000-mapping.dmp
-
memory/3692-129-0x0000000000C30000-0x0000000000C31000-memory.dmpFilesize
4KB
-
memory/3692-137-0x0000000001450000-0x0000000001451000-memory.dmpFilesize
4KB
-
memory/3692-161-0x0000000009840000-0x0000000009841000-memory.dmpFilesize
4KB
-
memory/3692-145-0x0000000004ED0000-0x0000000004F03000-memory.dmpFilesize
204KB
-
memory/3736-154-0x00000000055E0000-0x00000000055E5000-memory.dmpFilesize
20KB
-
memory/3736-148-0x0000000005100000-0x00000000055FE000-memory.dmpFilesize
5.0MB
-
memory/3736-149-0x0000000005110000-0x0000000005111000-memory.dmpFilesize
4KB
-
memory/3736-138-0x00000000051A0000-0x00000000051A1000-memory.dmpFilesize
4KB
-
memory/3736-168-0x0000000009D20000-0x0000000009D62000-memory.dmpFilesize
264KB
-
memory/3736-135-0x0000000005600000-0x0000000005601000-memory.dmpFilesize
4KB
-
memory/3736-131-0x00000000007B0000-0x00000000007B1000-memory.dmpFilesize
4KB
-
memory/3736-167-0x00000000077B0000-0x000000000783D000-memory.dmpFilesize
564KB
-
memory/3736-126-0x0000000000000000-mapping.dmp
-
memory/3736-156-0x0000000007500000-0x0000000007501000-memory.dmpFilesize
4KB