Analysis
-
max time kernel
56s -
max time network
111s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
18-04-2021 12:53
Static task
static1
Behavioral task
behavioral1
Sample
d2f9b038e689ac9fc99352bd766690e4.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
d2f9b038e689ac9fc99352bd766690e4.exe
Resource
win10v20210408
General
-
Target
d2f9b038e689ac9fc99352bd766690e4.exe
-
Size
190KB
-
MD5
d2f9b038e689ac9fc99352bd766690e4
-
SHA1
19380ac92419895626cc9b9d7b6ecdd183a81e30
-
SHA256
8b6be03e0a14f193dd33c6dfdc1a1c27d3d59044ea246b3a12eb4a7d790dd4ed
-
SHA512
0d9b801661eea6c0499b46e8acc929196bf8130d989bb4e5e8d94c19bef3412c4c43b9c232f462a4c28a90786c6af21bfd2d8d611e3b7820b5c7a01e668ce3eb
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
Processes:
7016305.exe2974741.exe6329655.exeWindows Host.exe6329655.exepid process 3172 7016305.exe 3992 2974741.exe 488 6329655.exe 1136 Windows Host.exe 3488 6329655.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
2974741.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Host = "C:\\ProgramData\\Windows Host\\Windows Host.exe" 2974741.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
6329655.exedescription pid process target process PID 488 set thread context of 3488 488 6329655.exe 6329655.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
7016305.exe6329655.exepid process 3172 7016305.exe 3172 7016305.exe 3488 6329655.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
d2f9b038e689ac9fc99352bd766690e4.exe7016305.exe6329655.exedescription pid process Token: SeDebugPrivilege 908 d2f9b038e689ac9fc99352bd766690e4.exe Token: SeDebugPrivilege 3172 7016305.exe Token: SeDebugPrivilege 3488 6329655.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
d2f9b038e689ac9fc99352bd766690e4.exe2974741.exe6329655.exedescription pid process target process PID 908 wrote to memory of 3172 908 d2f9b038e689ac9fc99352bd766690e4.exe 7016305.exe PID 908 wrote to memory of 3172 908 d2f9b038e689ac9fc99352bd766690e4.exe 7016305.exe PID 908 wrote to memory of 3172 908 d2f9b038e689ac9fc99352bd766690e4.exe 7016305.exe PID 908 wrote to memory of 3992 908 d2f9b038e689ac9fc99352bd766690e4.exe 2974741.exe PID 908 wrote to memory of 3992 908 d2f9b038e689ac9fc99352bd766690e4.exe 2974741.exe PID 908 wrote to memory of 3992 908 d2f9b038e689ac9fc99352bd766690e4.exe 2974741.exe PID 908 wrote to memory of 488 908 d2f9b038e689ac9fc99352bd766690e4.exe 6329655.exe PID 908 wrote to memory of 488 908 d2f9b038e689ac9fc99352bd766690e4.exe 6329655.exe PID 908 wrote to memory of 488 908 d2f9b038e689ac9fc99352bd766690e4.exe 6329655.exe PID 3992 wrote to memory of 1136 3992 2974741.exe Windows Host.exe PID 3992 wrote to memory of 1136 3992 2974741.exe Windows Host.exe PID 3992 wrote to memory of 1136 3992 2974741.exe Windows Host.exe PID 488 wrote to memory of 3488 488 6329655.exe 6329655.exe PID 488 wrote to memory of 3488 488 6329655.exe 6329655.exe PID 488 wrote to memory of 3488 488 6329655.exe 6329655.exe PID 488 wrote to memory of 3488 488 6329655.exe 6329655.exe PID 488 wrote to memory of 3488 488 6329655.exe 6329655.exe PID 488 wrote to memory of 3488 488 6329655.exe 6329655.exe PID 488 wrote to memory of 3488 488 6329655.exe 6329655.exe PID 488 wrote to memory of 3488 488 6329655.exe 6329655.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2f9b038e689ac9fc99352bd766690e4.exe"C:\Users\Admin\AppData\Local\Temp\d2f9b038e689ac9fc99352bd766690e4.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\7016305.exe"C:\ProgramData\7016305.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\2974741.exe"C:\ProgramData\2974741.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\Windows Host\Windows Host.exe"C:\ProgramData\Windows Host\Windows Host.exe"3⤵
- Executes dropped EXE
-
C:\ProgramData\6329655.exe"C:\ProgramData\6329655.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\6329655.exe"{path}"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\2974741.exeMD5
afb7dc87e6208b5747af8e7ab95f28bf
SHA1af2e35b042efcc0c47d31e1747baca34e24a68c1
SHA256a58c95de92eefb42ccff366ae9381c638d425673bd2860256b8263ef7a5609f1
SHA5128448cbcdcc35ee0676a709e01ab0f87c6e11a1718b767f7f220ed559c0f30867b7cb8f82a9d0c3b3279cf00c35619189edac265e724d83811f49e2bea7daa1d0
-
C:\ProgramData\2974741.exeMD5
afb7dc87e6208b5747af8e7ab95f28bf
SHA1af2e35b042efcc0c47d31e1747baca34e24a68c1
SHA256a58c95de92eefb42ccff366ae9381c638d425673bd2860256b8263ef7a5609f1
SHA5128448cbcdcc35ee0676a709e01ab0f87c6e11a1718b767f7f220ed559c0f30867b7cb8f82a9d0c3b3279cf00c35619189edac265e724d83811f49e2bea7daa1d0
-
C:\ProgramData\6329655.exeMD5
4fc7251966abd315a977a5aaf8d2f555
SHA1c2dca39bc9bf7373ebcbed87e07d04a830082dd3
SHA2569c2f5c1550e1b229be3be5ba62760c24a03098feba2cee98d9aea2e42df980c8
SHA5126336aa28f844f0c10b7acf9b0b795e7e8036e22d7c79656e4ebe96b4add3aead3f8e7ca1103aef601da2af3c9999012caf738b4d156f264a1c22c481792d5c18
-
C:\ProgramData\6329655.exeMD5
4fc7251966abd315a977a5aaf8d2f555
SHA1c2dca39bc9bf7373ebcbed87e07d04a830082dd3
SHA2569c2f5c1550e1b229be3be5ba62760c24a03098feba2cee98d9aea2e42df980c8
SHA5126336aa28f844f0c10b7acf9b0b795e7e8036e22d7c79656e4ebe96b4add3aead3f8e7ca1103aef601da2af3c9999012caf738b4d156f264a1c22c481792d5c18
-
C:\ProgramData\6329655.exeMD5
4fc7251966abd315a977a5aaf8d2f555
SHA1c2dca39bc9bf7373ebcbed87e07d04a830082dd3
SHA2569c2f5c1550e1b229be3be5ba62760c24a03098feba2cee98d9aea2e42df980c8
SHA5126336aa28f844f0c10b7acf9b0b795e7e8036e22d7c79656e4ebe96b4add3aead3f8e7ca1103aef601da2af3c9999012caf738b4d156f264a1c22c481792d5c18
-
C:\ProgramData\7016305.exeMD5
4415e7e5111ee8cd91fe71f714448aa3
SHA1d09c19848bc21c5b32ed2a1f5ed1a313ea6ba678
SHA2562bf1bbcabe6c8a523f249ea5484b5b310bbfb1ed0e182fef49a4467045eb3154
SHA51231558b727869e94eb41367016da087c6a9e187d78145b1e8152c5ae793c9786eb41444a93811747872070490dd9030d3231f1d318d05e39870c45f7c2860dd08
-
C:\ProgramData\7016305.exeMD5
4415e7e5111ee8cd91fe71f714448aa3
SHA1d09c19848bc21c5b32ed2a1f5ed1a313ea6ba678
SHA2562bf1bbcabe6c8a523f249ea5484b5b310bbfb1ed0e182fef49a4467045eb3154
SHA51231558b727869e94eb41367016da087c6a9e187d78145b1e8152c5ae793c9786eb41444a93811747872070490dd9030d3231f1d318d05e39870c45f7c2860dd08
-
C:\ProgramData\Windows Host\Windows Host.exeMD5
afb7dc87e6208b5747af8e7ab95f28bf
SHA1af2e35b042efcc0c47d31e1747baca34e24a68c1
SHA256a58c95de92eefb42ccff366ae9381c638d425673bd2860256b8263ef7a5609f1
SHA5128448cbcdcc35ee0676a709e01ab0f87c6e11a1718b767f7f220ed559c0f30867b7cb8f82a9d0c3b3279cf00c35619189edac265e724d83811f49e2bea7daa1d0
-
C:\ProgramData\Windows Host\Windows Host.exeMD5
afb7dc87e6208b5747af8e7ab95f28bf
SHA1af2e35b042efcc0c47d31e1747baca34e24a68c1
SHA256a58c95de92eefb42ccff366ae9381c638d425673bd2860256b8263ef7a5609f1
SHA5128448cbcdcc35ee0676a709e01ab0f87c6e11a1718b767f7f220ed559c0f30867b7cb8f82a9d0c3b3279cf00c35619189edac265e724d83811f49e2bea7daa1d0
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\6329655.exe.logMD5
0c2899d7c6746f42d5bbe088c777f94c
SHA1622f66c5f7a3c91b28a9f43ce7c6cabadbf514f1
SHA2565b0b99740cadaeff7b9891136644b396941547e20cc7eea646560d0dad5a5458
SHA512ab7a3409ed4b6ca00358330a3aa4ef6de7d81eb21a5e24bb629ef6a7c7c4e2a70ca3accfbc989ed6e495fdb8eb6203a26d6f2a37b2a5809af4276af375b49078
-
memory/488-167-0x0000000007320000-0x00000000073AD000-memory.dmpFilesize
564KB
-
memory/488-164-0x0000000007060000-0x0000000007061000-memory.dmpFilesize
4KB
-
memory/488-162-0x0000000004F30000-0x0000000004F35000-memory.dmpFilesize
20KB
-
memory/488-149-0x0000000004DE0000-0x0000000004DE1000-memory.dmpFilesize
4KB
-
memory/488-148-0x0000000004D00000-0x00000000051FE000-memory.dmpFilesize
5.0MB
-
memory/488-130-0x0000000000320000-0x0000000000321000-memory.dmpFilesize
4KB
-
memory/488-140-0x0000000004D00000-0x0000000004D01000-memory.dmpFilesize
4KB
-
memory/488-135-0x0000000005200000-0x0000000005201000-memory.dmpFilesize
4KB
-
memory/488-168-0x00000000098B0000-0x00000000098F2000-memory.dmpFilesize
264KB
-
memory/488-126-0x0000000000000000-mapping.dmp
-
memory/908-117-0x0000000000EC0000-0x0000000000EDF000-memory.dmpFilesize
124KB
-
memory/908-114-0x0000000000770000-0x0000000000771000-memory.dmpFilesize
4KB
-
memory/908-116-0x0000000000CA0000-0x0000000000CA1000-memory.dmpFilesize
4KB
-
memory/908-118-0x000000001B520000-0x000000001B522000-memory.dmpFilesize
8KB
-
memory/908-119-0x0000000000CB0000-0x0000000000CB1000-memory.dmpFilesize
4KB
-
memory/1136-150-0x0000000000000000-mapping.dmp
-
memory/1136-160-0x0000000005220000-0x0000000005221000-memory.dmpFilesize
4KB
-
memory/3172-143-0x0000000006E50000-0x0000000006E83000-memory.dmpFilesize
204KB
-
memory/3172-120-0x0000000000000000-mapping.dmp
-
memory/3172-129-0x00000000000D0000-0x00000000000D1000-memory.dmpFilesize
4KB
-
memory/3172-163-0x0000000004A20000-0x0000000004A21000-memory.dmpFilesize
4KB
-
memory/3172-147-0x0000000004880000-0x0000000004881000-memory.dmpFilesize
4KB
-
memory/3172-145-0x0000000009FF0000-0x0000000009FF1000-memory.dmpFilesize
4KB
-
memory/3172-137-0x0000000000940000-0x0000000000941000-memory.dmpFilesize
4KB
-
memory/3488-169-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/3488-177-0x0000000005700000-0x0000000005701000-memory.dmpFilesize
4KB
-
memory/3488-184-0x0000000007B00000-0x0000000007B01000-memory.dmpFilesize
4KB
-
memory/3488-183-0x0000000007400000-0x0000000007401000-memory.dmpFilesize
4KB
-
memory/3488-180-0x0000000005990000-0x0000000005991000-memory.dmpFilesize
4KB
-
memory/3488-178-0x00000000056C0000-0x0000000005CC6000-memory.dmpFilesize
6.0MB
-
memory/3488-170-0x00000000004163CA-mapping.dmp
-
memory/3488-179-0x0000000005740000-0x0000000005741000-memory.dmpFilesize
4KB
-
memory/3488-175-0x0000000005CD0000-0x0000000005CD1000-memory.dmpFilesize
4KB
-
memory/3488-176-0x0000000003130000-0x0000000003131000-memory.dmpFilesize
4KB
-
memory/3992-136-0x00000000029D0000-0x00000000029D1000-memory.dmpFilesize
4KB
-
memory/3992-123-0x0000000000000000-mapping.dmp
-
memory/3992-131-0x0000000000840000-0x0000000000841000-memory.dmpFilesize
4KB
-
memory/3992-146-0x00000000050C0000-0x00000000050C1000-memory.dmpFilesize
4KB
-
memory/3992-138-0x00000000029E0000-0x00000000029F2000-memory.dmpFilesize
72KB
-
memory/3992-142-0x0000000004B50000-0x0000000004B51000-memory.dmpFilesize
4KB