Analysis
-
max time kernel
146s -
max time network
186s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
03-06-2021 22:03
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Win32.Save.a.6900.14762.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.Win32.Save.a.6900.14762.exe
Resource
win10v20210410
General
-
Target
SecuriteInfo.com.Trojan.Win32.Save.a.6900.14762.exe
-
Size
150KB
-
MD5
192157321ae17032b5edee8de07e0e86
-
SHA1
9252dbf16148b087129afb62a49dbbac278d19de
-
SHA256
445d39df326616cbfd206707370348697ee1ad8ffb5ce1edc330afe9bf49266e
-
SHA512
e995c6d0b1532d19dc2097adc1c18b61f0c547ba5db7be611957cabb9811dee779b250e339790bfae4af82366114416ac12533c3d929395a3b1fbcdf111e79ba
Malware Config
Extracted
redline
1
brershrowal.xyz:80
Extracted
redline
1.1
brershrowal.xyz:80
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 6 IoCs
resource yara_rule behavioral1/memory/1588-111-0x0000000000400000-0x000000000041C000-memory.dmp family_redline behavioral1/memory/1588-112-0x0000000000416422-mapping.dmp family_redline behavioral1/memory/1588-114-0x0000000000400000-0x000000000041C000-memory.dmp family_redline behavioral1/memory/1164-120-0x0000000000400000-0x000000000041C000-memory.dmp family_redline behavioral1/memory/1164-121-0x0000000000416996-mapping.dmp family_redline behavioral1/memory/1164-123-0x0000000000400000-0x000000000041C000-memory.dmp family_redline -
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral1/memory/1948-104-0x00000000003C0000-0x00000000003C5000-memory.dmp CustAttr -
Executes dropped EXE 9 IoCs
pid Process 892 6976403.exe 1104 4498257.exe 1948 7907844.exe 1744 3370263.exe 296 WinHoster.exe 720 3370263.exe 1152 3370263.exe 1588 3370263.exe 1164 7907844.exe -
Loads dropped DLL 1 IoCs
pid Process 1104 4498257.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 4498257.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1744 set thread context of 1588 1744 3370263.exe 37 PID 1948 set thread context of 1164 1948 7907844.exe 38 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 1900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa20f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349040000000100000010000000497904b0eb8719ac47b0bc11519b74d0200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e SecuriteInfo.com.Trojan.Win32.Save.a.6900.14762.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 SecuriteInfo.com.Trojan.Win32.Save.a.6900.14762.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 SecuriteInfo.com.Trojan.Win32.Save.a.6900.14762.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 040000000100000010000000497904b0eb8719ac47b0bc11519b74d0030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491d00000001000000100000002e0d6875874a44c820912e85e964cfdb140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b40b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f00000053000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e SecuriteInfo.com.Trojan.Win32.Save.a.6900.14762.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 892 6976403.exe 892 6976403.exe 1744 3370263.exe 1744 3370263.exe 1744 3370263.exe 1744 3370263.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1940 SecuriteInfo.com.Trojan.Win32.Save.a.6900.14762.exe Token: SeDebugPrivilege 1948 7907844.exe Token: SeDebugPrivilege 1744 3370263.exe Token: SeDebugPrivilege 892 6976403.exe Token: SeDebugPrivilege 1588 3370263.exe Token: SeDebugPrivilege 1164 7907844.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 1940 wrote to memory of 892 1940 SecuriteInfo.com.Trojan.Win32.Save.a.6900.14762.exe 29 PID 1940 wrote to memory of 892 1940 SecuriteInfo.com.Trojan.Win32.Save.a.6900.14762.exe 29 PID 1940 wrote to memory of 892 1940 SecuriteInfo.com.Trojan.Win32.Save.a.6900.14762.exe 29 PID 1940 wrote to memory of 892 1940 SecuriteInfo.com.Trojan.Win32.Save.a.6900.14762.exe 29 PID 1940 wrote to memory of 1104 1940 SecuriteInfo.com.Trojan.Win32.Save.a.6900.14762.exe 30 PID 1940 wrote to memory of 1104 1940 SecuriteInfo.com.Trojan.Win32.Save.a.6900.14762.exe 30 PID 1940 wrote to memory of 1104 1940 SecuriteInfo.com.Trojan.Win32.Save.a.6900.14762.exe 30 PID 1940 wrote to memory of 1104 1940 SecuriteInfo.com.Trojan.Win32.Save.a.6900.14762.exe 30 PID 1940 wrote to memory of 1948 1940 SecuriteInfo.com.Trojan.Win32.Save.a.6900.14762.exe 31 PID 1940 wrote to memory of 1948 1940 SecuriteInfo.com.Trojan.Win32.Save.a.6900.14762.exe 31 PID 1940 wrote to memory of 1948 1940 SecuriteInfo.com.Trojan.Win32.Save.a.6900.14762.exe 31 PID 1940 wrote to memory of 1948 1940 SecuriteInfo.com.Trojan.Win32.Save.a.6900.14762.exe 31 PID 1940 wrote to memory of 1744 1940 SecuriteInfo.com.Trojan.Win32.Save.a.6900.14762.exe 32 PID 1940 wrote to memory of 1744 1940 SecuriteInfo.com.Trojan.Win32.Save.a.6900.14762.exe 32 PID 1940 wrote to memory of 1744 1940 SecuriteInfo.com.Trojan.Win32.Save.a.6900.14762.exe 32 PID 1940 wrote to memory of 1744 1940 SecuriteInfo.com.Trojan.Win32.Save.a.6900.14762.exe 32 PID 1104 wrote to memory of 296 1104 4498257.exe 33 PID 1104 wrote to memory of 296 1104 4498257.exe 33 PID 1104 wrote to memory of 296 1104 4498257.exe 33 PID 1104 wrote to memory of 296 1104 4498257.exe 33 PID 1744 wrote to memory of 720 1744 3370263.exe 35 PID 1744 wrote to memory of 720 1744 3370263.exe 35 PID 1744 wrote to memory of 720 1744 3370263.exe 35 PID 1744 wrote to memory of 720 1744 3370263.exe 35 PID 1744 wrote to memory of 1152 1744 3370263.exe 36 PID 1744 wrote to memory of 1152 1744 3370263.exe 36 PID 1744 wrote to memory of 1152 1744 3370263.exe 36 PID 1744 wrote to memory of 1152 1744 3370263.exe 36 PID 1744 wrote to memory of 1588 1744 3370263.exe 37 PID 1744 wrote to memory of 1588 1744 3370263.exe 37 PID 1744 wrote to memory of 1588 1744 3370263.exe 37 PID 1744 wrote to memory of 1588 1744 3370263.exe 37 PID 1744 wrote to memory of 1588 1744 3370263.exe 37 PID 1744 wrote to memory of 1588 1744 3370263.exe 37 PID 1744 wrote to memory of 1588 1744 3370263.exe 37 PID 1744 wrote to memory of 1588 1744 3370263.exe 37 PID 1744 wrote to memory of 1588 1744 3370263.exe 37 PID 1948 wrote to memory of 1164 1948 7907844.exe 38 PID 1948 wrote to memory of 1164 1948 7907844.exe 38 PID 1948 wrote to memory of 1164 1948 7907844.exe 38 PID 1948 wrote to memory of 1164 1948 7907844.exe 38 PID 1948 wrote to memory of 1164 1948 7907844.exe 38 PID 1948 wrote to memory of 1164 1948 7907844.exe 38 PID 1948 wrote to memory of 1164 1948 7907844.exe 38 PID 1948 wrote to memory of 1164 1948 7907844.exe 38 PID 1948 wrote to memory of 1164 1948 7907844.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Win32.Save.a.6900.14762.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Win32.Save.a.6900.14762.exe"1⤵
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Roaming\6976403.exe"C:\Users\Admin\AppData\Roaming\6976403.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:892
-
-
C:\Users\Admin\AppData\Roaming\4498257.exe"C:\Users\Admin\AppData\Roaming\4498257.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"3⤵
- Executes dropped EXE
PID:296
-
-
-
C:\Users\Admin\AppData\Roaming\7907844.exe"C:\Users\Admin\AppData\Roaming\7907844.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Roaming\7907844.exe"C:\Users\Admin\AppData\Roaming\7907844.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1164
-
-
-
C:\Users\Admin\AppData\Roaming\3370263.exe"C:\Users\Admin\AppData\Roaming\3370263.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Roaming\3370263.exe"{path}"3⤵
- Executes dropped EXE
PID:720
-
-
C:\Users\Admin\AppData\Roaming\3370263.exe"{path}"3⤵
- Executes dropped EXE
PID:1152
-
-
C:\Users\Admin\AppData\Roaming\3370263.exe"{path}"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
-