Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    21-07-2021 22:04

General

  • Target

    194D0361BDC50ABB8479B29934FCEDDE.exe

  • Size

    220KB

  • MD5

    194d0361bdc50abb8479b29934fcedde

  • SHA1

    5b8023acb941df513bd28c48e46b2fa4e8a7b7a5

  • SHA256

    29016d532a8c967c49aa06b8688541b08d984f0fe807f380742d187595681830

  • SHA512

    93705ce8e8afbb00bf88a1ef1409667652956d56738c52095973890b34ba6c02a4f5962079a2c68bb9950ab378987d9dfa907a121c06f75c5824b85ad62aade8

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\194D0361BDC50ABB8479B29934FCEDDE.exe
    "C:\Users\Admin\AppData\Local\Temp\194D0361BDC50ABB8479B29934FCEDDE.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1888
    • C:\Users\Admin\AppData\Roaming\4979675.exe
      "C:\Users\Admin\AppData\Roaming\4979675.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1068
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 1068 -s 1984
        3⤵
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        PID:1964
    • C:\Users\Admin\AppData\Roaming\8966467.exe
      "C:\Users\Admin\AppData\Roaming\8966467.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:968
      • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
        "C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"
        3⤵
        • Executes dropped EXE
        PID:916
    • C:\Users\Admin\AppData\Roaming\5205775.exe
      "C:\Users\Admin\AppData\Roaming\5205775.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1172

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\4979675.exe
    MD5

    9e19fdd75ef29ee192b244933d7bf7d5

    SHA1

    d3bce87a288abf410afc1aff18de6c300fa15c49

    SHA256

    7def442e8216e47cb8fd87b26f1e4fea0b8646f88dc0d08acc94dd9f1e11cdec

    SHA512

    4bde30274686f8a130c55086c256ce4c09504799d67bb61439c029f803ead32950028aae9fb9d7b59a42bc1ed01833e1a53dce00dd335bef5d4fb3f347e3a24f

  • C:\Users\Admin\AppData\Roaming\4979675.exe
    MD5

    9e19fdd75ef29ee192b244933d7bf7d5

    SHA1

    d3bce87a288abf410afc1aff18de6c300fa15c49

    SHA256

    7def442e8216e47cb8fd87b26f1e4fea0b8646f88dc0d08acc94dd9f1e11cdec

    SHA512

    4bde30274686f8a130c55086c256ce4c09504799d67bb61439c029f803ead32950028aae9fb9d7b59a42bc1ed01833e1a53dce00dd335bef5d4fb3f347e3a24f

  • C:\Users\Admin\AppData\Roaming\5205775.exe
    MD5

    52be91bb8576b57551f38cf98bd984cc

    SHA1

    d4b25085ae85e7b4edc2db2f77e4108fd7345fc1

    SHA256

    2eff8b37b39a5384bf9a3732bd7395af3430bd36eafdad4ba5cec6f707cdd680

    SHA512

    f648be8d881ba47b87544327843add140cc4142ab7fac89cd87d3c79bed23524d7b40e35fd0c65a8c50a62c4e4f32d9a1681b3e043ea882bbfc46425891011b1

  • C:\Users\Admin\AppData\Roaming\5205775.exe
    MD5

    52be91bb8576b57551f38cf98bd984cc

    SHA1

    d4b25085ae85e7b4edc2db2f77e4108fd7345fc1

    SHA256

    2eff8b37b39a5384bf9a3732bd7395af3430bd36eafdad4ba5cec6f707cdd680

    SHA512

    f648be8d881ba47b87544327843add140cc4142ab7fac89cd87d3c79bed23524d7b40e35fd0c65a8c50a62c4e4f32d9a1681b3e043ea882bbfc46425891011b1

  • C:\Users\Admin\AppData\Roaming\8966467.exe
    MD5

    0fe3680e0ce50557f4c272bb4872ec74

    SHA1

    5f2bbfa2ea1293524b72a2dbfe3954b6ba8f9f66

    SHA256

    f9d67121048756158858a6c926af3db190e88df9eb052e99d8d6d93d7fcf1fd7

    SHA512

    ffe63264322f1e9cad904d4d09069ca5d48e322a2a66e29fcdc6f53f4cd77000389e99f76ae6f86edc974a62f49243169c973be2f52cc33cdbe9a96d7dc5bcf7

  • C:\Users\Admin\AppData\Roaming\8966467.exe
    MD5

    0fe3680e0ce50557f4c272bb4872ec74

    SHA1

    5f2bbfa2ea1293524b72a2dbfe3954b6ba8f9f66

    SHA256

    f9d67121048756158858a6c926af3db190e88df9eb052e99d8d6d93d7fcf1fd7

    SHA512

    ffe63264322f1e9cad904d4d09069ca5d48e322a2a66e29fcdc6f53f4cd77000389e99f76ae6f86edc974a62f49243169c973be2f52cc33cdbe9a96d7dc5bcf7

  • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
    MD5

    0fe3680e0ce50557f4c272bb4872ec74

    SHA1

    5f2bbfa2ea1293524b72a2dbfe3954b6ba8f9f66

    SHA256

    f9d67121048756158858a6c926af3db190e88df9eb052e99d8d6d93d7fcf1fd7

    SHA512

    ffe63264322f1e9cad904d4d09069ca5d48e322a2a66e29fcdc6f53f4cd77000389e99f76ae6f86edc974a62f49243169c973be2f52cc33cdbe9a96d7dc5bcf7

  • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
    MD5

    0fe3680e0ce50557f4c272bb4872ec74

    SHA1

    5f2bbfa2ea1293524b72a2dbfe3954b6ba8f9f66

    SHA256

    f9d67121048756158858a6c926af3db190e88df9eb052e99d8d6d93d7fcf1fd7

    SHA512

    ffe63264322f1e9cad904d4d09069ca5d48e322a2a66e29fcdc6f53f4cd77000389e99f76ae6f86edc974a62f49243169c973be2f52cc33cdbe9a96d7dc5bcf7

  • \Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
    MD5

    0fe3680e0ce50557f4c272bb4872ec74

    SHA1

    5f2bbfa2ea1293524b72a2dbfe3954b6ba8f9f66

    SHA256

    f9d67121048756158858a6c926af3db190e88df9eb052e99d8d6d93d7fcf1fd7

    SHA512

    ffe63264322f1e9cad904d4d09069ca5d48e322a2a66e29fcdc6f53f4cd77000389e99f76ae6f86edc974a62f49243169c973be2f52cc33cdbe9a96d7dc5bcf7

  • memory/916-98-0x0000000004A40000-0x0000000004A41000-memory.dmp
    Filesize

    4KB

  • memory/916-92-0x00000000012F0000-0x00000000012F1000-memory.dmp
    Filesize

    4KB

  • memory/916-89-0x0000000000000000-mapping.dmp
  • memory/968-86-0x0000000000370000-0x0000000000371000-memory.dmp
    Filesize

    4KB

  • memory/968-83-0x00000000001E0000-0x00000000001E1000-memory.dmp
    Filesize

    4KB

  • memory/968-70-0x0000000000000000-mapping.dmp
  • memory/968-85-0x0000000000360000-0x000000000036B000-memory.dmp
    Filesize

    44KB

  • memory/968-78-0x0000000000170000-0x0000000000171000-memory.dmp
    Filesize

    4KB

  • memory/1068-87-0x000000001AE90000-0x000000001AE92000-memory.dmp
    Filesize

    8KB

  • memory/1068-71-0x0000000000350000-0x0000000000351000-memory.dmp
    Filesize

    4KB

  • memory/1068-82-0x0000000000410000-0x0000000000411000-memory.dmp
    Filesize

    4KB

  • memory/1068-65-0x0000000000000000-mapping.dmp
  • memory/1068-68-0x00000000003B0000-0x00000000003B1000-memory.dmp
    Filesize

    4KB

  • memory/1068-79-0x0000000000360000-0x00000000003B0000-memory.dmp
    Filesize

    320KB

  • memory/1172-74-0x0000000000000000-mapping.dmp
  • memory/1172-84-0x00000000003D0000-0x0000000000402000-memory.dmp
    Filesize

    200KB

  • memory/1172-77-0x0000000001260000-0x0000000001261000-memory.dmp
    Filesize

    4KB

  • memory/1172-97-0x0000000000520000-0x0000000000521000-memory.dmp
    Filesize

    4KB

  • memory/1888-59-0x0000000000200000-0x0000000000201000-memory.dmp
    Filesize

    4KB

  • memory/1888-64-0x000000001A6A0000-0x000000001A6A2000-memory.dmp
    Filesize

    8KB

  • memory/1888-63-0x00000000002C0000-0x00000000002C1000-memory.dmp
    Filesize

    4KB

  • memory/1888-62-0x0000000000290000-0x00000000002B3000-memory.dmp
    Filesize

    140KB

  • memory/1888-61-0x0000000000280000-0x0000000000281000-memory.dmp
    Filesize

    4KB

  • memory/1964-99-0x0000000000000000-mapping.dmp
  • memory/1964-100-0x000007FEFB571000-0x000007FEFB573000-memory.dmp
    Filesize

    8KB

  • memory/1964-101-0x0000000002370000-0x0000000002371000-memory.dmp
    Filesize

    4KB