Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    18-04-2021 12:53

General

  • Target

    d2f9b038e689ac9fc99352bd766690e4.exe

  • Size

    190KB

  • MD5

    d2f9b038e689ac9fc99352bd766690e4

  • SHA1

    19380ac92419895626cc9b9d7b6ecdd183a81e30

  • SHA256

    8b6be03e0a14f193dd33c6dfdc1a1c27d3d59044ea246b3a12eb4a7d790dd4ed

  • SHA512

    0d9b801661eea6c0499b46e8acc929196bf8130d989bb4e5e8d94c19bef3412c4c43b9c232f462a4c28a90786c6af21bfd2d8d611e3b7820b5c7a01e668ce3eb

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d2f9b038e689ac9fc99352bd766690e4.exe
    "C:\Users\Admin\AppData\Local\Temp\d2f9b038e689ac9fc99352bd766690e4.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1268
    • C:\ProgramData\2728393.exe
      "C:\ProgramData\2728393.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:872
    • C:\ProgramData\2982614.exe
      "C:\ProgramData\2982614.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:980
      • C:\ProgramData\Windows Host\Windows Host.exe
        "C:\ProgramData\Windows Host\Windows Host.exe"
        3⤵
        • Executes dropped EXE
        PID:1080
    • C:\ProgramData\3924188.exe
      "C:\ProgramData\3924188.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1096
      • C:\ProgramData\3924188.exe
        "{path}"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1640

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\2728393.exe
    MD5

    4415e7e5111ee8cd91fe71f714448aa3

    SHA1

    d09c19848bc21c5b32ed2a1f5ed1a313ea6ba678

    SHA256

    2bf1bbcabe6c8a523f249ea5484b5b310bbfb1ed0e182fef49a4467045eb3154

    SHA512

    31558b727869e94eb41367016da087c6a9e187d78145b1e8152c5ae793c9786eb41444a93811747872070490dd9030d3231f1d318d05e39870c45f7c2860dd08

  • C:\ProgramData\2728393.exe
    MD5

    4415e7e5111ee8cd91fe71f714448aa3

    SHA1

    d09c19848bc21c5b32ed2a1f5ed1a313ea6ba678

    SHA256

    2bf1bbcabe6c8a523f249ea5484b5b310bbfb1ed0e182fef49a4467045eb3154

    SHA512

    31558b727869e94eb41367016da087c6a9e187d78145b1e8152c5ae793c9786eb41444a93811747872070490dd9030d3231f1d318d05e39870c45f7c2860dd08

  • C:\ProgramData\2982614.exe
    MD5

    afb7dc87e6208b5747af8e7ab95f28bf

    SHA1

    af2e35b042efcc0c47d31e1747baca34e24a68c1

    SHA256

    a58c95de92eefb42ccff366ae9381c638d425673bd2860256b8263ef7a5609f1

    SHA512

    8448cbcdcc35ee0676a709e01ab0f87c6e11a1718b767f7f220ed559c0f30867b7cb8f82a9d0c3b3279cf00c35619189edac265e724d83811f49e2bea7daa1d0

  • C:\ProgramData\2982614.exe
    MD5

    afb7dc87e6208b5747af8e7ab95f28bf

    SHA1

    af2e35b042efcc0c47d31e1747baca34e24a68c1

    SHA256

    a58c95de92eefb42ccff366ae9381c638d425673bd2860256b8263ef7a5609f1

    SHA512

    8448cbcdcc35ee0676a709e01ab0f87c6e11a1718b767f7f220ed559c0f30867b7cb8f82a9d0c3b3279cf00c35619189edac265e724d83811f49e2bea7daa1d0

  • C:\ProgramData\3924188.exe
    MD5

    4fc7251966abd315a977a5aaf8d2f555

    SHA1

    c2dca39bc9bf7373ebcbed87e07d04a830082dd3

    SHA256

    9c2f5c1550e1b229be3be5ba62760c24a03098feba2cee98d9aea2e42df980c8

    SHA512

    6336aa28f844f0c10b7acf9b0b795e7e8036e22d7c79656e4ebe96b4add3aead3f8e7ca1103aef601da2af3c9999012caf738b4d156f264a1c22c481792d5c18

  • C:\ProgramData\3924188.exe
    MD5

    4fc7251966abd315a977a5aaf8d2f555

    SHA1

    c2dca39bc9bf7373ebcbed87e07d04a830082dd3

    SHA256

    9c2f5c1550e1b229be3be5ba62760c24a03098feba2cee98d9aea2e42df980c8

    SHA512

    6336aa28f844f0c10b7acf9b0b795e7e8036e22d7c79656e4ebe96b4add3aead3f8e7ca1103aef601da2af3c9999012caf738b4d156f264a1c22c481792d5c18

  • C:\ProgramData\3924188.exe
    MD5

    4fc7251966abd315a977a5aaf8d2f555

    SHA1

    c2dca39bc9bf7373ebcbed87e07d04a830082dd3

    SHA256

    9c2f5c1550e1b229be3be5ba62760c24a03098feba2cee98d9aea2e42df980c8

    SHA512

    6336aa28f844f0c10b7acf9b0b795e7e8036e22d7c79656e4ebe96b4add3aead3f8e7ca1103aef601da2af3c9999012caf738b4d156f264a1c22c481792d5c18

  • C:\ProgramData\Windows Host\Windows Host.exe
    MD5

    afb7dc87e6208b5747af8e7ab95f28bf

    SHA1

    af2e35b042efcc0c47d31e1747baca34e24a68c1

    SHA256

    a58c95de92eefb42ccff366ae9381c638d425673bd2860256b8263ef7a5609f1

    SHA512

    8448cbcdcc35ee0676a709e01ab0f87c6e11a1718b767f7f220ed559c0f30867b7cb8f82a9d0c3b3279cf00c35619189edac265e724d83811f49e2bea7daa1d0

  • C:\ProgramData\Windows Host\Windows Host.exe
    MD5

    afb7dc87e6208b5747af8e7ab95f28bf

    SHA1

    af2e35b042efcc0c47d31e1747baca34e24a68c1

    SHA256

    a58c95de92eefb42ccff366ae9381c638d425673bd2860256b8263ef7a5609f1

    SHA512

    8448cbcdcc35ee0676a709e01ab0f87c6e11a1718b767f7f220ed559c0f30867b7cb8f82a9d0c3b3279cf00c35619189edac265e724d83811f49e2bea7daa1d0

  • \ProgramData\Windows Host\Windows Host.exe
    MD5

    afb7dc87e6208b5747af8e7ab95f28bf

    SHA1

    af2e35b042efcc0c47d31e1747baca34e24a68c1

    SHA256

    a58c95de92eefb42ccff366ae9381c638d425673bd2860256b8263ef7a5609f1

    SHA512

    8448cbcdcc35ee0676a709e01ab0f87c6e11a1718b767f7f220ed559c0f30867b7cb8f82a9d0c3b3279cf00c35619189edac265e724d83811f49e2bea7daa1d0

  • \ProgramData\Windows Host\Windows Host.exe
    MD5

    afb7dc87e6208b5747af8e7ab95f28bf

    SHA1

    af2e35b042efcc0c47d31e1747baca34e24a68c1

    SHA256

    a58c95de92eefb42ccff366ae9381c638d425673bd2860256b8263ef7a5609f1

    SHA512

    8448cbcdcc35ee0676a709e01ab0f87c6e11a1718b767f7f220ed559c0f30867b7cb8f82a9d0c3b3279cf00c35619189edac265e724d83811f49e2bea7daa1d0

  • memory/872-87-0x00000000020E0000-0x00000000020E1000-memory.dmp
    Filesize

    4KB

  • memory/872-71-0x0000000000270000-0x0000000000271000-memory.dmp
    Filesize

    4KB

  • memory/872-86-0x0000000000420000-0x0000000000421000-memory.dmp
    Filesize

    4KB

  • memory/872-69-0x0000000000A40000-0x0000000000A41000-memory.dmp
    Filesize

    4KB

  • memory/872-66-0x0000000000000000-mapping.dmp
  • memory/872-80-0x0000000000280000-0x00000000002B3000-memory.dmp
    Filesize

    204KB

  • memory/980-72-0x0000000000000000-mapping.dmp
  • memory/980-78-0x0000000000200000-0x0000000000212000-memory.dmp
    Filesize

    72KB

  • memory/980-77-0x00000000001F0000-0x00000000001F1000-memory.dmp
    Filesize

    4KB

  • memory/980-88-0x0000000000BE0000-0x0000000000BE1000-memory.dmp
    Filesize

    4KB

  • memory/980-85-0x0000000000230000-0x0000000000231000-memory.dmp
    Filesize

    4KB

  • memory/980-75-0x00000000011F0000-0x00000000011F1000-memory.dmp
    Filesize

    4KB

  • memory/1080-94-0x0000000001140000-0x0000000001141000-memory.dmp
    Filesize

    4KB

  • memory/1080-100-0x0000000004980000-0x0000000004981000-memory.dmp
    Filesize

    4KB

  • memory/1080-91-0x0000000000000000-mapping.dmp
  • memory/1096-79-0x0000000000000000-mapping.dmp
  • memory/1096-103-0x0000000004450000-0x0000000004492000-memory.dmp
    Filesize

    264KB

  • memory/1096-83-0x0000000000E40000-0x0000000000E41000-memory.dmp
    Filesize

    4KB

  • memory/1096-102-0x0000000004F00000-0x0000000004F8D000-memory.dmp
    Filesize

    564KB

  • memory/1096-101-0x0000000000590000-0x0000000000595000-memory.dmp
    Filesize

    20KB

  • memory/1096-99-0x0000000004410000-0x0000000004411000-memory.dmp
    Filesize

    4KB

  • memory/1268-64-0x00000000004D0000-0x00000000004D1000-memory.dmp
    Filesize

    4KB

  • memory/1268-60-0x0000000001330000-0x0000000001331000-memory.dmp
    Filesize

    4KB

  • memory/1268-63-0x00000000003C0000-0x00000000003DF000-memory.dmp
    Filesize

    124KB

  • memory/1268-65-0x000000001B100000-0x000000001B102000-memory.dmp
    Filesize

    8KB

  • memory/1268-62-0x0000000000330000-0x0000000000331000-memory.dmp
    Filesize

    4KB

  • memory/1640-104-0x0000000000400000-0x000000000041C000-memory.dmp
    Filesize

    112KB

  • memory/1640-105-0x00000000004163CA-mapping.dmp
  • memory/1640-107-0x0000000000400000-0x000000000041C000-memory.dmp
    Filesize

    112KB

  • memory/1640-109-0x0000000004B40000-0x0000000004B41000-memory.dmp
    Filesize

    4KB