Analysis

  • max time kernel
    146s
  • max time network
    186s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    03-06-2021 22:03

General

  • Target

    SecuriteInfo.com.Trojan.Win32.Save.a.6900.14762.exe

  • Size

    150KB

  • MD5

    192157321ae17032b5edee8de07e0e86

  • SHA1

    9252dbf16148b087129afb62a49dbbac278d19de

  • SHA256

    445d39df326616cbfd206707370348697ee1ad8ffb5ce1edc330afe9bf49266e

  • SHA512

    e995c6d0b1532d19dc2097adc1c18b61f0c547ba5db7be611957cabb9811dee779b250e339790bfae4af82366114416ac12533c3d929395a3b1fbcdf111e79ba

Malware Config

Extracted

Family

redline

Botnet

1

C2

brershrowal.xyz:80

Extracted

Family

redline

Botnet

1.1

C2

brershrowal.xyz:80

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 6 IoCs
  • CustAttr .NET packer 1 IoCs

    Detects CustAttr .NET packer in memory.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Win32.Save.a.6900.14762.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Win32.Save.a.6900.14762.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\Users\Admin\AppData\Roaming\6976403.exe
      "C:\Users\Admin\AppData\Roaming\6976403.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:892
    • C:\Users\Admin\AppData\Roaming\4498257.exe
      "C:\Users\Admin\AppData\Roaming\4498257.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1104
      • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
        "C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"
        3⤵
        • Executes dropped EXE
        PID:296
    • C:\Users\Admin\AppData\Roaming\7907844.exe
      "C:\Users\Admin\AppData\Roaming\7907844.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1948
      • C:\Users\Admin\AppData\Roaming\7907844.exe
        "C:\Users\Admin\AppData\Roaming\7907844.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1164
    • C:\Users\Admin\AppData\Roaming\3370263.exe
      "C:\Users\Admin\AppData\Roaming\3370263.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1744
      • C:\Users\Admin\AppData\Roaming\3370263.exe
        "{path}"
        3⤵
        • Executes dropped EXE
        PID:720
      • C:\Users\Admin\AppData\Roaming\3370263.exe
        "{path}"
        3⤵
        • Executes dropped EXE
        PID:1152
      • C:\Users\Admin\AppData\Roaming\3370263.exe
        "{path}"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1588

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\3370263.exe
    MD5

    46dac919dc4d566cb7615d597622bcbb

    SHA1

    0b2c188c380881d95a7da40b7b0f3c4406ec14b9

    SHA256

    354529ad250b9ecebc4f7f3519c9579ce0714975aaf344133ea44bb8ae3ca9c3

    SHA512

    bdd501723f5904f513b1bf732954e4975510b26ca132ba423bb89702680a4e5dab2b32ae7f39e45316ff0f4893a8807fd3c5c2e539babe92a11a7cf1ab2cb9d0

  • C:\Users\Admin\AppData\Roaming\3370263.exe
    MD5

    46dac919dc4d566cb7615d597622bcbb

    SHA1

    0b2c188c380881d95a7da40b7b0f3c4406ec14b9

    SHA256

    354529ad250b9ecebc4f7f3519c9579ce0714975aaf344133ea44bb8ae3ca9c3

    SHA512

    bdd501723f5904f513b1bf732954e4975510b26ca132ba423bb89702680a4e5dab2b32ae7f39e45316ff0f4893a8807fd3c5c2e539babe92a11a7cf1ab2cb9d0

  • C:\Users\Admin\AppData\Roaming\3370263.exe
    MD5

    46dac919dc4d566cb7615d597622bcbb

    SHA1

    0b2c188c380881d95a7da40b7b0f3c4406ec14b9

    SHA256

    354529ad250b9ecebc4f7f3519c9579ce0714975aaf344133ea44bb8ae3ca9c3

    SHA512

    bdd501723f5904f513b1bf732954e4975510b26ca132ba423bb89702680a4e5dab2b32ae7f39e45316ff0f4893a8807fd3c5c2e539babe92a11a7cf1ab2cb9d0

  • C:\Users\Admin\AppData\Roaming\3370263.exe
    MD5

    46dac919dc4d566cb7615d597622bcbb

    SHA1

    0b2c188c380881d95a7da40b7b0f3c4406ec14b9

    SHA256

    354529ad250b9ecebc4f7f3519c9579ce0714975aaf344133ea44bb8ae3ca9c3

    SHA512

    bdd501723f5904f513b1bf732954e4975510b26ca132ba423bb89702680a4e5dab2b32ae7f39e45316ff0f4893a8807fd3c5c2e539babe92a11a7cf1ab2cb9d0

  • C:\Users\Admin\AppData\Roaming\3370263.exe
    MD5

    46dac919dc4d566cb7615d597622bcbb

    SHA1

    0b2c188c380881d95a7da40b7b0f3c4406ec14b9

    SHA256

    354529ad250b9ecebc4f7f3519c9579ce0714975aaf344133ea44bb8ae3ca9c3

    SHA512

    bdd501723f5904f513b1bf732954e4975510b26ca132ba423bb89702680a4e5dab2b32ae7f39e45316ff0f4893a8807fd3c5c2e539babe92a11a7cf1ab2cb9d0

  • C:\Users\Admin\AppData\Roaming\4498257.exe
    MD5

    bcc25c08b993d97de75b279b19a8f644

    SHA1

    9ad3d93428e52022f3822d4bf86a0b49dd9c7b02

    SHA256

    6ed857fe106b8c6c34fd36f6db3c6da4ff587943486fe385a4738ee42d70812c

    SHA512

    f2e947de4269e08f1da57972e0c2face5167cf274d82098a516867528fe49aaa4cc890b9deb467ff09186aad2e56bea07e04049994860d31d9dca2fbac6bbd44

  • C:\Users\Admin\AppData\Roaming\4498257.exe
    MD5

    bcc25c08b993d97de75b279b19a8f644

    SHA1

    9ad3d93428e52022f3822d4bf86a0b49dd9c7b02

    SHA256

    6ed857fe106b8c6c34fd36f6db3c6da4ff587943486fe385a4738ee42d70812c

    SHA512

    f2e947de4269e08f1da57972e0c2face5167cf274d82098a516867528fe49aaa4cc890b9deb467ff09186aad2e56bea07e04049994860d31d9dca2fbac6bbd44

  • C:\Users\Admin\AppData\Roaming\6976403.exe
    MD5

    3f48e2eb59704784a319c07823a8fa0c

    SHA1

    ac0cbbc501690f8c63764c7b290a3bae547aecf0

    SHA256

    988873a7d802ad3f44108076fc0a884728c132a5d0b6a13b5ca8d38aa4ff9a5d

    SHA512

    06ccae0c54dc1ed31ed4dd36d419b52901bb53d6b69d514368c66ef4c0681c97f143013bcb53ae71c1cd2a377f3b60e53b7158e5ef0128db4d770b91615cef25

  • C:\Users\Admin\AppData\Roaming\6976403.exe
    MD5

    3f48e2eb59704784a319c07823a8fa0c

    SHA1

    ac0cbbc501690f8c63764c7b290a3bae547aecf0

    SHA256

    988873a7d802ad3f44108076fc0a884728c132a5d0b6a13b5ca8d38aa4ff9a5d

    SHA512

    06ccae0c54dc1ed31ed4dd36d419b52901bb53d6b69d514368c66ef4c0681c97f143013bcb53ae71c1cd2a377f3b60e53b7158e5ef0128db4d770b91615cef25

  • C:\Users\Admin\AppData\Roaming\7907844.exe
    MD5

    394ca690794c0f1c8c2ad66fe07ff363

    SHA1

    1479db2400737bd68f25b6c7bfc97e218bd9a0be

    SHA256

    17ec3826bdcea7183593f707c00bcb455820f28f5075b91ed45292e6a1a4acfa

    SHA512

    cadede8d4c24303f6f6623c4f8604b6740209ecd7522b8d118b111e2ebbee8a41a7a7e0ae267faacf8b2e782027a1714e74c1ff016674b708b66b9f322301108

  • C:\Users\Admin\AppData\Roaming\7907844.exe
    MD5

    394ca690794c0f1c8c2ad66fe07ff363

    SHA1

    1479db2400737bd68f25b6c7bfc97e218bd9a0be

    SHA256

    17ec3826bdcea7183593f707c00bcb455820f28f5075b91ed45292e6a1a4acfa

    SHA512

    cadede8d4c24303f6f6623c4f8604b6740209ecd7522b8d118b111e2ebbee8a41a7a7e0ae267faacf8b2e782027a1714e74c1ff016674b708b66b9f322301108

  • C:\Users\Admin\AppData\Roaming\7907844.exe
    MD5

    394ca690794c0f1c8c2ad66fe07ff363

    SHA1

    1479db2400737bd68f25b6c7bfc97e218bd9a0be

    SHA256

    17ec3826bdcea7183593f707c00bcb455820f28f5075b91ed45292e6a1a4acfa

    SHA512

    cadede8d4c24303f6f6623c4f8604b6740209ecd7522b8d118b111e2ebbee8a41a7a7e0ae267faacf8b2e782027a1714e74c1ff016674b708b66b9f322301108

  • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
    MD5

    bcc25c08b993d97de75b279b19a8f644

    SHA1

    9ad3d93428e52022f3822d4bf86a0b49dd9c7b02

    SHA256

    6ed857fe106b8c6c34fd36f6db3c6da4ff587943486fe385a4738ee42d70812c

    SHA512

    f2e947de4269e08f1da57972e0c2face5167cf274d82098a516867528fe49aaa4cc890b9deb467ff09186aad2e56bea07e04049994860d31d9dca2fbac6bbd44

  • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
    MD5

    bcc25c08b993d97de75b279b19a8f644

    SHA1

    9ad3d93428e52022f3822d4bf86a0b49dd9c7b02

    SHA256

    6ed857fe106b8c6c34fd36f6db3c6da4ff587943486fe385a4738ee42d70812c

    SHA512

    f2e947de4269e08f1da57972e0c2face5167cf274d82098a516867528fe49aaa4cc890b9deb467ff09186aad2e56bea07e04049994860d31d9dca2fbac6bbd44

  • \Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
    MD5

    bcc25c08b993d97de75b279b19a8f644

    SHA1

    9ad3d93428e52022f3822d4bf86a0b49dd9c7b02

    SHA256

    6ed857fe106b8c6c34fd36f6db3c6da4ff587943486fe385a4738ee42d70812c

    SHA512

    f2e947de4269e08f1da57972e0c2face5167cf274d82098a516867528fe49aaa4cc890b9deb467ff09186aad2e56bea07e04049994860d31d9dca2fbac6bbd44

  • memory/296-103-0x0000000004B00000-0x0000000004B01000-memory.dmp
    Filesize

    4KB

  • memory/296-94-0x00000000013A0000-0x00000000013A1000-memory.dmp
    Filesize

    4KB

  • memory/296-91-0x0000000000000000-mapping.dmp
  • memory/892-70-0x0000000001030000-0x0000000001031000-memory.dmp
    Filesize

    4KB

  • memory/892-81-0x0000000000390000-0x00000000003B0000-memory.dmp
    Filesize

    128KB

  • memory/892-63-0x0000000000000000-mapping.dmp
  • memory/892-84-0x00000000004C0000-0x00000000004C1000-memory.dmp
    Filesize

    4KB

  • memory/892-82-0x0000000000400000-0x0000000000401000-memory.dmp
    Filesize

    4KB

  • memory/892-73-0x0000000000380000-0x0000000000381000-memory.dmp
    Filesize

    4KB

  • memory/1104-80-0x0000000000310000-0x000000000031E000-memory.dmp
    Filesize

    56KB

  • memory/1104-69-0x0000000000A30000-0x0000000000A31000-memory.dmp
    Filesize

    4KB

  • memory/1104-74-0x00000000002A0000-0x00000000002A1000-memory.dmp
    Filesize

    4KB

  • memory/1104-83-0x0000000000460000-0x0000000000461000-memory.dmp
    Filesize

    4KB

  • memory/1104-66-0x0000000000000000-mapping.dmp
  • memory/1164-123-0x0000000000400000-0x000000000041C000-memory.dmp
    Filesize

    112KB

  • memory/1164-125-0x0000000000300000-0x0000000000301000-memory.dmp
    Filesize

    4KB

  • memory/1164-121-0x0000000000416996-mapping.dmp
  • memory/1164-120-0x0000000000400000-0x000000000041C000-memory.dmp
    Filesize

    112KB

  • memory/1588-116-0x0000000004E60000-0x0000000004E61000-memory.dmp
    Filesize

    4KB

  • memory/1588-114-0x0000000000400000-0x000000000041C000-memory.dmp
    Filesize

    112KB

  • memory/1588-112-0x0000000000416422-mapping.dmp
  • memory/1588-111-0x0000000000400000-0x000000000041C000-memory.dmp
    Filesize

    112KB

  • memory/1744-105-0x0000000000380000-0x0000000000382000-memory.dmp
    Filesize

    8KB

  • memory/1744-107-0x00000000051B0000-0x000000000521C000-memory.dmp
    Filesize

    432KB

  • memory/1744-108-0x0000000000D40000-0x0000000000D5E000-memory.dmp
    Filesize

    120KB

  • memory/1744-85-0x0000000000000000-mapping.dmp
  • memory/1744-101-0x00000000002D0000-0x00000000002D1000-memory.dmp
    Filesize

    4KB

  • memory/1744-88-0x0000000000120000-0x0000000000121000-memory.dmp
    Filesize

    4KB

  • memory/1744-106-0x0000000000AE0000-0x0000000000B25000-memory.dmp
    Filesize

    276KB

  • memory/1744-100-0x0000000004D60000-0x0000000004D61000-memory.dmp
    Filesize

    4KB

  • memory/1940-61-0x0000000000280000-0x000000000029B000-memory.dmp
    Filesize

    108KB

  • memory/1940-62-0x000000001B010000-0x000000001B012000-memory.dmp
    Filesize

    8KB

  • memory/1940-59-0x00000000000F0000-0x00000000000F1000-memory.dmp
    Filesize

    4KB

  • memory/1948-99-0x00000000011A0000-0x00000000011A1000-memory.dmp
    Filesize

    4KB

  • memory/1948-118-0x0000000005650000-0x00000000056E9000-memory.dmp
    Filesize

    612KB

  • memory/1948-119-0x0000000001140000-0x0000000001195000-memory.dmp
    Filesize

    340KB

  • memory/1948-117-0x00000000052A0000-0x0000000005334000-memory.dmp
    Filesize

    592KB

  • memory/1948-78-0x0000000001240000-0x0000000001241000-memory.dmp
    Filesize

    4KB

  • memory/1948-102-0x0000000000280000-0x0000000000281000-memory.dmp
    Filesize

    4KB

  • memory/1948-75-0x0000000000000000-mapping.dmp
  • memory/1948-104-0x00000000003C0000-0x00000000003C5000-memory.dmp
    Filesize

    20KB