Analysis

  • max time kernel
    44s
  • max time network
    90s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    23-10-2021 09:42

General

  • Target

    a02438d946903f95bd9f706ad0776c86.exe

  • Size

    72KB

  • MD5

    a02438d946903f95bd9f706ad0776c86

  • SHA1

    d4b9470f0d24d94e3d327a456cb98fddd8fe61b4

  • SHA256

    d24b5d75e56e99a246697efda3cf47ff9f1b841aaabb06f987804c02e83f5e0a

  • SHA512

    b4301d4ea11f58bb8d6aae4326838ecbb558b485973e6d52553902a1d2a64217f69956a61470a7956513db904ffd2b1fc8ee55386cc02a4895e758d978ce52b4

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a02438d946903f95bd9f706ad0776c86.exe
    "C:\Users\Admin\AppData\Local\Temp\a02438d946903f95bd9f706ad0776c86.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1112
    • C:\Users\Admin\AppData\Roaming\697743.exe
      "C:\Users\Admin\AppData\Roaming\697743.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:968
    • C:\Users\Admin\AppData\Roaming\4364241.exe
      "C:\Users\Admin\AppData\Roaming\4364241.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:664
    • C:\Users\Admin\AppData\Roaming\6589478.exe
      "C:\Users\Admin\AppData\Roaming\6589478.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1712
    • C:\Users\Admin\AppData\Roaming\5088847.exe
      "C:\Users\Admin\AppData\Roaming\5088847.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1824
      • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
        "C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"
        3⤵
        • Executes dropped EXE
        PID:1560
    • C:\Users\Admin\AppData\Roaming\3304451.exe
      "C:\Users\Admin\AppData\Roaming\3304451.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1052

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\3304451.exe
    MD5

    d4afd6e583d54a75f39bf4934b99c684

    SHA1

    c9262e240a4a503d426b47b90c7b6fe6ed8bed9e

    SHA256

    0dca699c7d1729954372be2fe70f5da34521de4aa0e5b504a0f6a1c27b12c3f9

    SHA512

    87a29ea404583acf4eef5b4fe2feab8f16483af0cbe8cdfbc3e96ee41836f48e2e9456d54db734c150e6003d42596f8760e3500ec7ffefb50015b44c854a528f

  • C:\Users\Admin\AppData\Roaming\3304451.exe
    MD5

    d4afd6e583d54a75f39bf4934b99c684

    SHA1

    c9262e240a4a503d426b47b90c7b6fe6ed8bed9e

    SHA256

    0dca699c7d1729954372be2fe70f5da34521de4aa0e5b504a0f6a1c27b12c3f9

    SHA512

    87a29ea404583acf4eef5b4fe2feab8f16483af0cbe8cdfbc3e96ee41836f48e2e9456d54db734c150e6003d42596f8760e3500ec7ffefb50015b44c854a528f

  • C:\Users\Admin\AppData\Roaming\4364241.exe
    MD5

    0ed73d92959581b98c0f9175f60b3aad

    SHA1

    df04d64dad2b964098363f8ccb8768f4ac2976c0

    SHA256

    859f9669f87290f96d60fd6fa99fbc0c0a4071a121d1591d2e29949a4c7deb87

    SHA512

    aa5d1a3574eb4e5fd7307449657c993324717d9b364d6dcd43a721c6f73721c11dc3f587c962fd883256d0cf06125ba2bf5fb079f08b6963cf8fe254a34c02b5

  • C:\Users\Admin\AppData\Roaming\4364241.exe
    MD5

    0ed73d92959581b98c0f9175f60b3aad

    SHA1

    df04d64dad2b964098363f8ccb8768f4ac2976c0

    SHA256

    859f9669f87290f96d60fd6fa99fbc0c0a4071a121d1591d2e29949a4c7deb87

    SHA512

    aa5d1a3574eb4e5fd7307449657c993324717d9b364d6dcd43a721c6f73721c11dc3f587c962fd883256d0cf06125ba2bf5fb079f08b6963cf8fe254a34c02b5

  • C:\Users\Admin\AppData\Roaming\5088847.exe
    MD5

    a20e32791806c7b29070b95226b0e480

    SHA1

    8f2bac75ffabbe45770076047ded99f243622e5f

    SHA256

    df24005d51e393ed322bbf354c31485dab121ae0a445a754e08bb7912d9cd146

    SHA512

    6cf6b6aa3d4d82e7f202c5a0d3fd9a1085e05dd136e0532702e61de6e9a09b76eb5ec2add7f3a3e926e304aab928bbc639661cf6380133c8e00c387d4e9f2ca0

  • C:\Users\Admin\AppData\Roaming\5088847.exe
    MD5

    a20e32791806c7b29070b95226b0e480

    SHA1

    8f2bac75ffabbe45770076047ded99f243622e5f

    SHA256

    df24005d51e393ed322bbf354c31485dab121ae0a445a754e08bb7912d9cd146

    SHA512

    6cf6b6aa3d4d82e7f202c5a0d3fd9a1085e05dd136e0532702e61de6e9a09b76eb5ec2add7f3a3e926e304aab928bbc639661cf6380133c8e00c387d4e9f2ca0

  • C:\Users\Admin\AppData\Roaming\6589478.exe
    MD5

    f28365f2937760c6fd966c23449a707f

    SHA1

    4bfa3d246249e5fc0acce338a35389bae8a58956

    SHA256

    b42b391f5d87b6726ac2ba8b1f01416daa04908a993ba731129b0d5c9b2ca32f

    SHA512

    f7cb7d8d5922a1c3aecfbbf20a6f7e7e000d00e240c6bede92500b672a1d66ca33c4fa52325d7ae7a79dfe09034d8199dda0ad1561d41871ed5afabca6d6bbee

  • C:\Users\Admin\AppData\Roaming\6589478.exe
    MD5

    f28365f2937760c6fd966c23449a707f

    SHA1

    4bfa3d246249e5fc0acce338a35389bae8a58956

    SHA256

    b42b391f5d87b6726ac2ba8b1f01416daa04908a993ba731129b0d5c9b2ca32f

    SHA512

    f7cb7d8d5922a1c3aecfbbf20a6f7e7e000d00e240c6bede92500b672a1d66ca33c4fa52325d7ae7a79dfe09034d8199dda0ad1561d41871ed5afabca6d6bbee

  • C:\Users\Admin\AppData\Roaming\697743.exe
    MD5

    ed4dfa563a88597f38e062bc4dc2a036

    SHA1

    ae99199406f0893f0d26ab6c8f03e1fab348afc0

    SHA256

    3ea02603bd6c910bb91df1b652cb7ff39db1553a4aefb1d016b7c39c31e2c0b1

    SHA512

    8d595cf21f5128713747da963bed1cbf99a2f28c635fe050f4a3ab9c30d34f6615269b01e9acd63efff4c3ea99c7158c6c53c18c1fd07e2c6307aa4b39073ba3

  • C:\Users\Admin\AppData\Roaming\697743.exe
    MD5

    ed4dfa563a88597f38e062bc4dc2a036

    SHA1

    ae99199406f0893f0d26ab6c8f03e1fab348afc0

    SHA256

    3ea02603bd6c910bb91df1b652cb7ff39db1553a4aefb1d016b7c39c31e2c0b1

    SHA512

    8d595cf21f5128713747da963bed1cbf99a2f28c635fe050f4a3ab9c30d34f6615269b01e9acd63efff4c3ea99c7158c6c53c18c1fd07e2c6307aa4b39073ba3

  • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
    MD5

    a20e32791806c7b29070b95226b0e480

    SHA1

    8f2bac75ffabbe45770076047ded99f243622e5f

    SHA256

    df24005d51e393ed322bbf354c31485dab121ae0a445a754e08bb7912d9cd146

    SHA512

    6cf6b6aa3d4d82e7f202c5a0d3fd9a1085e05dd136e0532702e61de6e9a09b76eb5ec2add7f3a3e926e304aab928bbc639661cf6380133c8e00c387d4e9f2ca0

  • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
    MD5

    a20e32791806c7b29070b95226b0e480

    SHA1

    8f2bac75ffabbe45770076047ded99f243622e5f

    SHA256

    df24005d51e393ed322bbf354c31485dab121ae0a445a754e08bb7912d9cd146

    SHA512

    6cf6b6aa3d4d82e7f202c5a0d3fd9a1085e05dd136e0532702e61de6e9a09b76eb5ec2add7f3a3e926e304aab928bbc639661cf6380133c8e00c387d4e9f2ca0

  • \Users\Admin\AppData\Roaming\3304451.exe
    MD5

    d4afd6e583d54a75f39bf4934b99c684

    SHA1

    c9262e240a4a503d426b47b90c7b6fe6ed8bed9e

    SHA256

    0dca699c7d1729954372be2fe70f5da34521de4aa0e5b504a0f6a1c27b12c3f9

    SHA512

    87a29ea404583acf4eef5b4fe2feab8f16483af0cbe8cdfbc3e96ee41836f48e2e9456d54db734c150e6003d42596f8760e3500ec7ffefb50015b44c854a528f

  • \Users\Admin\AppData\Roaming\4364241.exe
    MD5

    0ed73d92959581b98c0f9175f60b3aad

    SHA1

    df04d64dad2b964098363f8ccb8768f4ac2976c0

    SHA256

    859f9669f87290f96d60fd6fa99fbc0c0a4071a121d1591d2e29949a4c7deb87

    SHA512

    aa5d1a3574eb4e5fd7307449657c993324717d9b364d6dcd43a721c6f73721c11dc3f587c962fd883256d0cf06125ba2bf5fb079f08b6963cf8fe254a34c02b5

  • \Users\Admin\AppData\Roaming\5088847.exe
    MD5

    a20e32791806c7b29070b95226b0e480

    SHA1

    8f2bac75ffabbe45770076047ded99f243622e5f

    SHA256

    df24005d51e393ed322bbf354c31485dab121ae0a445a754e08bb7912d9cd146

    SHA512

    6cf6b6aa3d4d82e7f202c5a0d3fd9a1085e05dd136e0532702e61de6e9a09b76eb5ec2add7f3a3e926e304aab928bbc639661cf6380133c8e00c387d4e9f2ca0

  • \Users\Admin\AppData\Roaming\6589478.exe
    MD5

    f28365f2937760c6fd966c23449a707f

    SHA1

    4bfa3d246249e5fc0acce338a35389bae8a58956

    SHA256

    b42b391f5d87b6726ac2ba8b1f01416daa04908a993ba731129b0d5c9b2ca32f

    SHA512

    f7cb7d8d5922a1c3aecfbbf20a6f7e7e000d00e240c6bede92500b672a1d66ca33c4fa52325d7ae7a79dfe09034d8199dda0ad1561d41871ed5afabca6d6bbee

  • \Users\Admin\AppData\Roaming\697743.exe
    MD5

    ed4dfa563a88597f38e062bc4dc2a036

    SHA1

    ae99199406f0893f0d26ab6c8f03e1fab348afc0

    SHA256

    3ea02603bd6c910bb91df1b652cb7ff39db1553a4aefb1d016b7c39c31e2c0b1

    SHA512

    8d595cf21f5128713747da963bed1cbf99a2f28c635fe050f4a3ab9c30d34f6615269b01e9acd63efff4c3ea99c7158c6c53c18c1fd07e2c6307aa4b39073ba3

  • \Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
    MD5

    a20e32791806c7b29070b95226b0e480

    SHA1

    8f2bac75ffabbe45770076047ded99f243622e5f

    SHA256

    df24005d51e393ed322bbf354c31485dab121ae0a445a754e08bb7912d9cd146

    SHA512

    6cf6b6aa3d4d82e7f202c5a0d3fd9a1085e05dd136e0532702e61de6e9a09b76eb5ec2add7f3a3e926e304aab928bbc639661cf6380133c8e00c387d4e9f2ca0

  • memory/664-66-0x0000000000000000-mapping.dmp
  • memory/664-69-0x0000000000BB0000-0x0000000000BB1000-memory.dmp
    Filesize

    4KB

  • memory/664-72-0x0000000000570000-0x0000000000594000-memory.dmp
    Filesize

    144KB

  • memory/664-98-0x0000000004B10000-0x0000000004B11000-memory.dmp
    Filesize

    4KB

  • memory/968-70-0x00000000003B0000-0x00000000003B1000-memory.dmp
    Filesize

    4KB

  • memory/968-96-0x0000000000340000-0x0000000000341000-memory.dmp
    Filesize

    4KB

  • memory/968-64-0x0000000000620000-0x0000000000669000-memory.dmp
    Filesize

    292KB

  • memory/968-63-0x0000000000390000-0x0000000000391000-memory.dmp
    Filesize

    4KB

  • memory/968-61-0x0000000001180000-0x0000000001181000-memory.dmp
    Filesize

    4KB

  • memory/968-58-0x0000000000000000-mapping.dmp
  • memory/1052-95-0x00000000005B0000-0x00000000005B1000-memory.dmp
    Filesize

    4KB

  • memory/1052-100-0x0000000000570000-0x0000000000571000-memory.dmp
    Filesize

    4KB

  • memory/1052-88-0x0000000000000000-mapping.dmp
  • memory/1052-91-0x0000000000110000-0x0000000000111000-memory.dmp
    Filesize

    4KB

  • memory/1052-93-0x0000000000550000-0x0000000000551000-memory.dmp
    Filesize

    4KB

  • memory/1052-94-0x0000000000630000-0x0000000000678000-memory.dmp
    Filesize

    288KB

  • memory/1112-55-0x0000000000380000-0x0000000000381000-memory.dmp
    Filesize

    4KB

  • memory/1112-56-0x0000000004A00000-0x0000000004A01000-memory.dmp
    Filesize

    4KB

  • memory/1112-53-0x00000000003D0000-0x00000000003D1000-memory.dmp
    Filesize

    4KB

  • memory/1560-103-0x0000000000000000-mapping.dmp
  • memory/1560-106-0x0000000000A30000-0x0000000000A31000-memory.dmp
    Filesize

    4KB

  • memory/1560-109-0x00000000046F0000-0x00000000046F1000-memory.dmp
    Filesize

    4KB

  • memory/1712-79-0x0000000000380000-0x00000000003B3000-memory.dmp
    Filesize

    204KB

  • memory/1712-97-0x0000000004A10000-0x0000000004A11000-memory.dmp
    Filesize

    4KB

  • memory/1712-77-0x0000000000FF0000-0x0000000000FF1000-memory.dmp
    Filesize

    4KB

  • memory/1712-74-0x0000000000000000-mapping.dmp
  • memory/1824-99-0x0000000004990000-0x0000000004991000-memory.dmp
    Filesize

    4KB

  • memory/1824-101-0x00000000751A1000-0x00000000751A3000-memory.dmp
    Filesize

    8KB

  • memory/1824-86-0x0000000000270000-0x0000000000271000-memory.dmp
    Filesize

    4KB

  • memory/1824-81-0x0000000000000000-mapping.dmp
  • memory/1824-84-0x00000000009D0000-0x00000000009D1000-memory.dmp
    Filesize

    4KB