Analysis

  • max time kernel
    149s
  • max time network
    159s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    26-07-2021 04:46

General

  • Target

    8ED81EFA02F6F7699BB91E256E58E13B.exe

  • Size

    1.2MB

  • MD5

    8ed81efa02f6f7699bb91e256e58e13b

  • SHA1

    3f90a6ae77c7270beb54c2040c73a2541ba07b3d

  • SHA256

    482321570b1fc0a7bfb77d4cf59efc3762b79033956cb146e345b07dca1549d1

  • SHA512

    5d5d22a1bee9d4778d3e4eec6c011548765c18265a98cc842afdb276b84c6ce78110a7ecd715e5af00aa937692871c5ed658f0a9ec0c117f5e24ade7e54b458c

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • suricata: ET MALWARE Arechclient2 Backdoor CnC Init
  • suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
  • suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ED81EFA02F6F7699BB91E256E58E13B.exe
    "C:\Users\Admin\AppData\Local\Temp\8ED81EFA02F6F7699BB91E256E58E13B.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:656
    • C:\Users\Admin\AppData\Roaming\12.exe
      "C:\Users\Admin\AppData\Roaming\12.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2100
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c cmd < Confronto.vsd
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2164
        • C:\Windows\SysWOW64\cmd.exe
          cmd
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3868
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V /R "^pbfZHNwzsXALugVPsbikcLGmlTQMSJGkUUtRoHQkZmHLQyLLuVpnCdInRQPNWfBIsgQkprGKGWkWrUJtiyFXm$" Che.vsd
            5⤵
              PID:3160
            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Rivederla.exe.com
              Rivederla.exe.com S
              5⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:3940
              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Rivederla.exe.com
                C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Rivederla.exe.com S
                6⤵
                • Executes dropped EXE
                • Drops startup file
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:3192
                • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\RegAsm.exe
                  C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\RegAsm.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2876
            • C:\Windows\SysWOW64\PING.EXE
              ping GFBFPSXA -n 30
              5⤵
              • Runs ping.exe
              PID:3696

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Install Root Certificate

    1
    T1130

    Modify Registry

    1
    T1112

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Remote System Discovery

    1
    T1018

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Che.vsd
      MD5

      1cc15dc0f10be8f9c1019678cfe58ebb

      SHA1

      eeac8320a492e9302fe246159f928dee68db0b15

      SHA256

      84e3b67deb5814bea6305b23e5952e140121baff05ddd93b87cb0972f0108cd1

      SHA512

      dc8348d2d56c30d8918f9abc486cee3b93007caebaf83e0231b2c7b1e78df3f9f5888d61b7b84529808b95a874fc546e64dd1487707c18ddb92eddff3d2ef569

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Confronto.vsd
      MD5

      8a8199e06079a33dd1f3c0259fe71d76

      SHA1

      6d23cae8227d950e269429a8d5e12901c7d1da1d

      SHA256

      cb6193f55e4de1a0f8443e1c7de0a69252e049d9079c2d855f07f7e8339fb32b

      SHA512

      46e3342f966a2526e5a6cc57069985bef67d1ef24f9186e364391c68e272362e371fde8d023780bc4686c48a8c7da08e69814afe3be81d62c3bddadee2ca803f

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Notti.vsd
      MD5

      d15472af485ec34a53e545087309e3bc

      SHA1

      784dc820ec8a1b3ef7d88fa04b219b6547fb05ec

      SHA256

      fb87d07290f22affbeb86a3d14fe5aa7872800c1283e74bec9da4ca773ee71dd

      SHA512

      8157f155fac02b1c18856501db270cc68844f78a2778a486fa0cd53b3a9468d10b9c5cabea00b0f1eb680a0cbe99bec4ee948ded8a552ca974c151247ba3ff58

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\RegAsm.exe
      MD5

      b58b926c3574d28d5b7fdd2ca3ec30d5

      SHA1

      d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

      SHA256

      6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

      SHA512

      b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\RegAsm.exe
      MD5

      b58b926c3574d28d5b7fdd2ca3ec30d5

      SHA1

      d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

      SHA256

      6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

      SHA512

      b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Rivederla.exe.com
      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Rivederla.exe.com
      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Rivederla.exe.com
      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\S
      MD5

      d15472af485ec34a53e545087309e3bc

      SHA1

      784dc820ec8a1b3ef7d88fa04b219b6547fb05ec

      SHA256

      fb87d07290f22affbeb86a3d14fe5aa7872800c1283e74bec9da4ca773ee71dd

      SHA512

      8157f155fac02b1c18856501db270cc68844f78a2778a486fa0cd53b3a9468d10b9c5cabea00b0f1eb680a0cbe99bec4ee948ded8a552ca974c151247ba3ff58

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sorso.vsd
      MD5

      13760385c6d84eee20294e0047648bde

      SHA1

      8978908c4984e09eb1b06f8b3d01b66a25b4f9c7

      SHA256

      2a605dda9586ce3160e7ef23d868c50eac335ad4063a95a158958532371163f3

      SHA512

      03d8cea762283fefe01c825635c41b8097531c139fa60821db9b6731c54c4299c66e9c883659ea93c5bde4f5684dc9e501fafc4737a7d22c4444f5a1b5c9140d

    • C:\Users\Admin\AppData\Roaming\12.exe
      MD5

      c9588707e932fda32e44f8e29b734dea

      SHA1

      bd7408fbef064d7e1061f84671386a6636539a9f

      SHA256

      31ba03119048784beebb64a986f999b27463d97ef800eb59aa8eb98fd7054b4f

      SHA512

      ca4b7d6b916707c8e151537502ca3cc8a7bdb5e382d5df338e34b04409e8d852edccda5ba66fefddc66a58bbeb3cde2c1314dd3a1fd179f082c8670095c81655

    • C:\Users\Admin\AppData\Roaming\12.exe
      MD5

      c9588707e932fda32e44f8e29b734dea

      SHA1

      bd7408fbef064d7e1061f84671386a6636539a9f

      SHA256

      31ba03119048784beebb64a986f999b27463d97ef800eb59aa8eb98fd7054b4f

      SHA512

      ca4b7d6b916707c8e151537502ca3cc8a7bdb5e382d5df338e34b04409e8d852edccda5ba66fefddc66a58bbeb3cde2c1314dd3a1fd179f082c8670095c81655

    • memory/656-125-0x00000000085C0000-0x00000000085C1000-memory.dmp
      Filesize

      4KB

    • memory/656-120-0x00000000031A0000-0x00000000031A1000-memory.dmp
      Filesize

      4KB

    • memory/656-127-0x0000000007F00000-0x0000000007F01000-memory.dmp
      Filesize

      4KB

    • memory/656-126-0x0000000007870000-0x0000000007871000-memory.dmp
      Filesize

      4KB

    • memory/656-115-0x0000000001250000-0x0000000001252000-memory.dmp
      Filesize

      8KB

    • memory/656-114-0x0000000001250000-0x0000000001252000-memory.dmp
      Filesize

      8KB

    • memory/656-117-0x00000000065B0000-0x00000000065B1000-memory.dmp
      Filesize

      4KB

    • memory/656-118-0x0000000000DD0000-0x0000000000DD1000-memory.dmp
      Filesize

      4KB

    • memory/656-124-0x0000000008090000-0x0000000008091000-memory.dmp
      Filesize

      4KB

    • memory/656-123-0x0000000007990000-0x0000000007991000-memory.dmp
      Filesize

      4KB

    • memory/656-119-0x00000000039D0000-0x00000000039D1000-memory.dmp
      Filesize

      4KB

    • memory/656-122-0x0000000006190000-0x0000000006191000-memory.dmp
      Filesize

      4KB

    • memory/656-121-0x0000000005FA0000-0x00000000065A6000-memory.dmp
      Filesize

      6.0MB

    • memory/2100-128-0x0000000000000000-mapping.dmp
    • memory/2164-131-0x0000000000000000-mapping.dmp
    • memory/2876-158-0x0000000005A10000-0x0000000005A11000-memory.dmp
      Filesize

      4KB

    • memory/2876-154-0x0000000004D40000-0x0000000004D41000-memory.dmp
      Filesize

      4KB

    • memory/2876-162-0x00000000063A0000-0x00000000063A1000-memory.dmp
      Filesize

      4KB

    • memory/2876-160-0x0000000006010000-0x0000000006011000-memory.dmp
      Filesize

      4KB

    • memory/2876-146-0x0000000000700000-0x0000000000794000-memory.dmp
      Filesize

      592KB

    • memory/2876-159-0x0000000005FE0000-0x0000000005FE1000-memory.dmp
      Filesize

      4KB

    • memory/2876-157-0x0000000005940000-0x0000000005941000-memory.dmp
      Filesize

      4KB

    • memory/2876-155-0x0000000004D40000-0x000000000523E000-memory.dmp
      Filesize

      5.0MB

    • memory/3160-134-0x0000000000000000-mapping.dmp
    • memory/3192-141-0x0000000000000000-mapping.dmp
    • memory/3192-145-0x0000000001100000-0x00000000011AE000-memory.dmp
      Filesize

      696KB

    • memory/3696-139-0x0000000000000000-mapping.dmp
    • memory/3868-133-0x0000000000000000-mapping.dmp
    • memory/3940-137-0x0000000000000000-mapping.dmp