Analysis

  • max time kernel
    56s
  • max time network
    111s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    18-04-2021 12:53

General

  • Target

    d2f9b038e689ac9fc99352bd766690e4.exe

  • Size

    190KB

  • MD5

    d2f9b038e689ac9fc99352bd766690e4

  • SHA1

    19380ac92419895626cc9b9d7b6ecdd183a81e30

  • SHA256

    8b6be03e0a14f193dd33c6dfdc1a1c27d3d59044ea246b3a12eb4a7d790dd4ed

  • SHA512

    0d9b801661eea6c0499b46e8acc929196bf8130d989bb4e5e8d94c19bef3412c4c43b9c232f462a4c28a90786c6af21bfd2d8d611e3b7820b5c7a01e668ce3eb

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d2f9b038e689ac9fc99352bd766690e4.exe
    "C:\Users\Admin\AppData\Local\Temp\d2f9b038e689ac9fc99352bd766690e4.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:908
    • C:\ProgramData\7016305.exe
      "C:\ProgramData\7016305.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3172
    • C:\ProgramData\2974741.exe
      "C:\ProgramData\2974741.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3992
      • C:\ProgramData\Windows Host\Windows Host.exe
        "C:\ProgramData\Windows Host\Windows Host.exe"
        3⤵
        • Executes dropped EXE
        PID:1136
    • C:\ProgramData\6329655.exe
      "C:\ProgramData\6329655.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:488
      • C:\ProgramData\6329655.exe
        "{path}"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3488

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\2974741.exe
    MD5

    afb7dc87e6208b5747af8e7ab95f28bf

    SHA1

    af2e35b042efcc0c47d31e1747baca34e24a68c1

    SHA256

    a58c95de92eefb42ccff366ae9381c638d425673bd2860256b8263ef7a5609f1

    SHA512

    8448cbcdcc35ee0676a709e01ab0f87c6e11a1718b767f7f220ed559c0f30867b7cb8f82a9d0c3b3279cf00c35619189edac265e724d83811f49e2bea7daa1d0

  • C:\ProgramData\2974741.exe
    MD5

    afb7dc87e6208b5747af8e7ab95f28bf

    SHA1

    af2e35b042efcc0c47d31e1747baca34e24a68c1

    SHA256

    a58c95de92eefb42ccff366ae9381c638d425673bd2860256b8263ef7a5609f1

    SHA512

    8448cbcdcc35ee0676a709e01ab0f87c6e11a1718b767f7f220ed559c0f30867b7cb8f82a9d0c3b3279cf00c35619189edac265e724d83811f49e2bea7daa1d0

  • C:\ProgramData\6329655.exe
    MD5

    4fc7251966abd315a977a5aaf8d2f555

    SHA1

    c2dca39bc9bf7373ebcbed87e07d04a830082dd3

    SHA256

    9c2f5c1550e1b229be3be5ba62760c24a03098feba2cee98d9aea2e42df980c8

    SHA512

    6336aa28f844f0c10b7acf9b0b795e7e8036e22d7c79656e4ebe96b4add3aead3f8e7ca1103aef601da2af3c9999012caf738b4d156f264a1c22c481792d5c18

  • C:\ProgramData\6329655.exe
    MD5

    4fc7251966abd315a977a5aaf8d2f555

    SHA1

    c2dca39bc9bf7373ebcbed87e07d04a830082dd3

    SHA256

    9c2f5c1550e1b229be3be5ba62760c24a03098feba2cee98d9aea2e42df980c8

    SHA512

    6336aa28f844f0c10b7acf9b0b795e7e8036e22d7c79656e4ebe96b4add3aead3f8e7ca1103aef601da2af3c9999012caf738b4d156f264a1c22c481792d5c18

  • C:\ProgramData\6329655.exe
    MD5

    4fc7251966abd315a977a5aaf8d2f555

    SHA1

    c2dca39bc9bf7373ebcbed87e07d04a830082dd3

    SHA256

    9c2f5c1550e1b229be3be5ba62760c24a03098feba2cee98d9aea2e42df980c8

    SHA512

    6336aa28f844f0c10b7acf9b0b795e7e8036e22d7c79656e4ebe96b4add3aead3f8e7ca1103aef601da2af3c9999012caf738b4d156f264a1c22c481792d5c18

  • C:\ProgramData\7016305.exe
    MD5

    4415e7e5111ee8cd91fe71f714448aa3

    SHA1

    d09c19848bc21c5b32ed2a1f5ed1a313ea6ba678

    SHA256

    2bf1bbcabe6c8a523f249ea5484b5b310bbfb1ed0e182fef49a4467045eb3154

    SHA512

    31558b727869e94eb41367016da087c6a9e187d78145b1e8152c5ae793c9786eb41444a93811747872070490dd9030d3231f1d318d05e39870c45f7c2860dd08

  • C:\ProgramData\7016305.exe
    MD5

    4415e7e5111ee8cd91fe71f714448aa3

    SHA1

    d09c19848bc21c5b32ed2a1f5ed1a313ea6ba678

    SHA256

    2bf1bbcabe6c8a523f249ea5484b5b310bbfb1ed0e182fef49a4467045eb3154

    SHA512

    31558b727869e94eb41367016da087c6a9e187d78145b1e8152c5ae793c9786eb41444a93811747872070490dd9030d3231f1d318d05e39870c45f7c2860dd08

  • C:\ProgramData\Windows Host\Windows Host.exe
    MD5

    afb7dc87e6208b5747af8e7ab95f28bf

    SHA1

    af2e35b042efcc0c47d31e1747baca34e24a68c1

    SHA256

    a58c95de92eefb42ccff366ae9381c638d425673bd2860256b8263ef7a5609f1

    SHA512

    8448cbcdcc35ee0676a709e01ab0f87c6e11a1718b767f7f220ed559c0f30867b7cb8f82a9d0c3b3279cf00c35619189edac265e724d83811f49e2bea7daa1d0

  • C:\ProgramData\Windows Host\Windows Host.exe
    MD5

    afb7dc87e6208b5747af8e7ab95f28bf

    SHA1

    af2e35b042efcc0c47d31e1747baca34e24a68c1

    SHA256

    a58c95de92eefb42ccff366ae9381c638d425673bd2860256b8263ef7a5609f1

    SHA512

    8448cbcdcc35ee0676a709e01ab0f87c6e11a1718b767f7f220ed559c0f30867b7cb8f82a9d0c3b3279cf00c35619189edac265e724d83811f49e2bea7daa1d0

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\6329655.exe.log
    MD5

    0c2899d7c6746f42d5bbe088c777f94c

    SHA1

    622f66c5f7a3c91b28a9f43ce7c6cabadbf514f1

    SHA256

    5b0b99740cadaeff7b9891136644b396941547e20cc7eea646560d0dad5a5458

    SHA512

    ab7a3409ed4b6ca00358330a3aa4ef6de7d81eb21a5e24bb629ef6a7c7c4e2a70ca3accfbc989ed6e495fdb8eb6203a26d6f2a37b2a5809af4276af375b49078

  • memory/488-167-0x0000000007320000-0x00000000073AD000-memory.dmp
    Filesize

    564KB

  • memory/488-164-0x0000000007060000-0x0000000007061000-memory.dmp
    Filesize

    4KB

  • memory/488-162-0x0000000004F30000-0x0000000004F35000-memory.dmp
    Filesize

    20KB

  • memory/488-149-0x0000000004DE0000-0x0000000004DE1000-memory.dmp
    Filesize

    4KB

  • memory/488-148-0x0000000004D00000-0x00000000051FE000-memory.dmp
    Filesize

    5.0MB

  • memory/488-130-0x0000000000320000-0x0000000000321000-memory.dmp
    Filesize

    4KB

  • memory/488-140-0x0000000004D00000-0x0000000004D01000-memory.dmp
    Filesize

    4KB

  • memory/488-135-0x0000000005200000-0x0000000005201000-memory.dmp
    Filesize

    4KB

  • memory/488-168-0x00000000098B0000-0x00000000098F2000-memory.dmp
    Filesize

    264KB

  • memory/488-126-0x0000000000000000-mapping.dmp
  • memory/908-117-0x0000000000EC0000-0x0000000000EDF000-memory.dmp
    Filesize

    124KB

  • memory/908-114-0x0000000000770000-0x0000000000771000-memory.dmp
    Filesize

    4KB

  • memory/908-116-0x0000000000CA0000-0x0000000000CA1000-memory.dmp
    Filesize

    4KB

  • memory/908-118-0x000000001B520000-0x000000001B522000-memory.dmp
    Filesize

    8KB

  • memory/908-119-0x0000000000CB0000-0x0000000000CB1000-memory.dmp
    Filesize

    4KB

  • memory/1136-150-0x0000000000000000-mapping.dmp
  • memory/1136-160-0x0000000005220000-0x0000000005221000-memory.dmp
    Filesize

    4KB

  • memory/3172-143-0x0000000006E50000-0x0000000006E83000-memory.dmp
    Filesize

    204KB

  • memory/3172-120-0x0000000000000000-mapping.dmp
  • memory/3172-129-0x00000000000D0000-0x00000000000D1000-memory.dmp
    Filesize

    4KB

  • memory/3172-163-0x0000000004A20000-0x0000000004A21000-memory.dmp
    Filesize

    4KB

  • memory/3172-147-0x0000000004880000-0x0000000004881000-memory.dmp
    Filesize

    4KB

  • memory/3172-145-0x0000000009FF0000-0x0000000009FF1000-memory.dmp
    Filesize

    4KB

  • memory/3172-137-0x0000000000940000-0x0000000000941000-memory.dmp
    Filesize

    4KB

  • memory/3488-169-0x0000000000400000-0x000000000041C000-memory.dmp
    Filesize

    112KB

  • memory/3488-177-0x0000000005700000-0x0000000005701000-memory.dmp
    Filesize

    4KB

  • memory/3488-184-0x0000000007B00000-0x0000000007B01000-memory.dmp
    Filesize

    4KB

  • memory/3488-183-0x0000000007400000-0x0000000007401000-memory.dmp
    Filesize

    4KB

  • memory/3488-180-0x0000000005990000-0x0000000005991000-memory.dmp
    Filesize

    4KB

  • memory/3488-178-0x00000000056C0000-0x0000000005CC6000-memory.dmp
    Filesize

    6.0MB

  • memory/3488-170-0x00000000004163CA-mapping.dmp
  • memory/3488-179-0x0000000005740000-0x0000000005741000-memory.dmp
    Filesize

    4KB

  • memory/3488-175-0x0000000005CD0000-0x0000000005CD1000-memory.dmp
    Filesize

    4KB

  • memory/3488-176-0x0000000003130000-0x0000000003131000-memory.dmp
    Filesize

    4KB

  • memory/3992-136-0x00000000029D0000-0x00000000029D1000-memory.dmp
    Filesize

    4KB

  • memory/3992-123-0x0000000000000000-mapping.dmp
  • memory/3992-131-0x0000000000840000-0x0000000000841000-memory.dmp
    Filesize

    4KB

  • memory/3992-146-0x00000000050C0000-0x00000000050C1000-memory.dmp
    Filesize

    4KB

  • memory/3992-138-0x00000000029E0000-0x00000000029F2000-memory.dmp
    Filesize

    72KB

  • memory/3992-142-0x0000000004B50000-0x0000000004B51000-memory.dmp
    Filesize

    4KB