Analysis

  • max time kernel
    22s
  • max time network
    23s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    21-07-2021 14:07

General

  • Target

    352ec1261178252b95d1d66145487203.exe

  • Size

    214KB

  • MD5

    352ec1261178252b95d1d66145487203

  • SHA1

    9d67151f841b85b410e7876db438c727076e5db1

  • SHA256

    c7399bc053ff61efe781e386a4c1fb2044307eb60bd28548477eadbb1e62c043

  • SHA512

    6a326ecdf564c8ba55976a910d76a4615ef4ee813c89ca3d1d463549d2753eb4b33d5165cd81d0d5e03c89342acaf20dff921e410471c6e8b2b1cb40b70fda59

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\352ec1261178252b95d1d66145487203.exe
    "C:\Users\Admin\AppData\Local\Temp\352ec1261178252b95d1d66145487203.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1612
    • C:\Users\Admin\AppData\Roaming\8713140.exe
      "C:\Users\Admin\AppData\Roaming\8713140.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1592
    • C:\Users\Admin\AppData\Roaming\8241598.exe
      "C:\Users\Admin\AppData\Roaming\8241598.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:756

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\8241598.exe

    MD5

    52be91bb8576b57551f38cf98bd984cc

    SHA1

    d4b25085ae85e7b4edc2db2f77e4108fd7345fc1

    SHA256

    2eff8b37b39a5384bf9a3732bd7395af3430bd36eafdad4ba5cec6f707cdd680

    SHA512

    f648be8d881ba47b87544327843add140cc4142ab7fac89cd87d3c79bed23524d7b40e35fd0c65a8c50a62c4e4f32d9a1681b3e043ea882bbfc46425891011b1

  • C:\Users\Admin\AppData\Roaming\8241598.exe

    MD5

    52be91bb8576b57551f38cf98bd984cc

    SHA1

    d4b25085ae85e7b4edc2db2f77e4108fd7345fc1

    SHA256

    2eff8b37b39a5384bf9a3732bd7395af3430bd36eafdad4ba5cec6f707cdd680

    SHA512

    f648be8d881ba47b87544327843add140cc4142ab7fac89cd87d3c79bed23524d7b40e35fd0c65a8c50a62c4e4f32d9a1681b3e043ea882bbfc46425891011b1

  • C:\Users\Admin\AppData\Roaming\8713140.exe

    MD5

    ba88580a36879f14dd7f8cb6c92aba20

    SHA1

    165a8f874827535341024dde1eefaae56dd2bf41

    SHA256

    ba8b44385f5766941b79ecf59740758dfdd3ba367fc8e001fe227e1dd3014117

    SHA512

    12f39dc0f21898c2357bb75c260b68583fb055118f0f375be819a5c9d256ead429a05db41c13bbe6aee9bd14a833353a4c8625d141307ec976a36aa334a050aa

  • C:\Users\Admin\AppData\Roaming\8713140.exe

    MD5

    ba88580a36879f14dd7f8cb6c92aba20

    SHA1

    165a8f874827535341024dde1eefaae56dd2bf41

    SHA256

    ba8b44385f5766941b79ecf59740758dfdd3ba367fc8e001fe227e1dd3014117

    SHA512

    12f39dc0f21898c2357bb75c260b68583fb055118f0f375be819a5c9d256ead429a05db41c13bbe6aee9bd14a833353a4c8625d141307ec976a36aa334a050aa

  • memory/756-80-0x0000000004C90000-0x0000000004C91000-memory.dmp

    Filesize

    4KB

  • memory/756-76-0x0000000000920000-0x0000000000952000-memory.dmp

    Filesize

    200KB

  • memory/756-71-0x0000000001390000-0x0000000001391000-memory.dmp

    Filesize

    4KB

  • memory/756-68-0x0000000000000000-mapping.dmp

  • memory/1592-72-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/1592-65-0x0000000000000000-mapping.dmp

  • memory/1592-75-0x00000000002F0000-0x00000000002F1000-memory.dmp

    Filesize

    4KB

  • memory/1592-77-0x0000000000300000-0x0000000000327000-memory.dmp

    Filesize

    156KB

  • memory/1592-78-0x0000000000430000-0x0000000000431000-memory.dmp

    Filesize

    4KB

  • memory/1592-79-0x0000000000330000-0x0000000000331000-memory.dmp

    Filesize

    4KB

  • memory/1612-64-0x0000000000C20000-0x0000000000C22000-memory.dmp

    Filesize

    8KB

  • memory/1612-63-0x0000000000BD0000-0x0000000000BD1000-memory.dmp

    Filesize

    4KB

  • memory/1612-59-0x0000000000EF0000-0x0000000000EF1000-memory.dmp

    Filesize

    4KB

  • memory/1612-62-0x0000000000270000-0x0000000000293000-memory.dmp

    Filesize

    140KB

  • memory/1612-61-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB