Analysis

  • max time kernel
    116s
  • max time network
    122s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    24-10-2021 23:01

General

  • Target

    f00425341d6f6a335323df24e5b0a16abceb38f01a882e610560ec51e8a11b72.exe

  • Size

    705KB

  • MD5

    e596d3106cb8ecec35bc6af419a5d259

  • SHA1

    f4ab5924c3105f0497a33e35f1530f4bfe08b33f

  • SHA256

    f00425341d6f6a335323df24e5b0a16abceb38f01a882e610560ec51e8a11b72

  • SHA512

    c6ef7bcb1f8152333a89702c0459ff25daa763e8dc53df39c37a6bd9a2e5f439452d45c55749581f31045cd64cf83ae364086a837d498e182ba1c9f70ca55661

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f00425341d6f6a335323df24e5b0a16abceb38f01a882e610560ec51e8a11b72.exe
    "C:\Users\Admin\AppData\Local\Temp\f00425341d6f6a335323df24e5b0a16abceb38f01a882e610560ec51e8a11b72.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:3748
    • C:\Users\Admin\AppData\Roaming\wowsfree\ipstersh.exe
      ipstersh.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1280

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\wowsfree\ipstersh.exe
    MD5

    a67648a5bb88c3bfb10e76a764efef44

    SHA1

    27b7ccf7e4559fcbb3a0e83b600f54f1b602bf7d

    SHA256

    fcbae6e5add0cd76ec5a91761d8f17396dcac7a5ca41f6d9dd7401b4c0b2ce94

    SHA512

    418ca5c8e5f43b94dcd702be7742488f053db1e0d6ee6e34ada4337cedf1832e7a8a4449724f2348abecd8eeee7d6bd5b81378781cf8dfafe6beb4f74a18ddfe

  • C:\Users\Admin\AppData\Roaming\wowsfree\ipstersh.exe
    MD5

    a67648a5bb88c3bfb10e76a764efef44

    SHA1

    27b7ccf7e4559fcbb3a0e83b600f54f1b602bf7d

    SHA256

    fcbae6e5add0cd76ec5a91761d8f17396dcac7a5ca41f6d9dd7401b4c0b2ce94

    SHA512

    418ca5c8e5f43b94dcd702be7742488f053db1e0d6ee6e34ada4337cedf1832e7a8a4449724f2348abecd8eeee7d6bd5b81378781cf8dfafe6beb4f74a18ddfe

  • memory/1280-127-0x0000000002E50000-0x0000000002E6B000-memory.dmp
    Filesize

    108KB

  • memory/1280-121-0x0000000001361000-0x0000000001384000-memory.dmp
    Filesize

    140KB

  • memory/1280-129-0x0000000003120000-0x0000000003121000-memory.dmp
    Filesize

    4KB

  • memory/1280-141-0x00000000071A0000-0x00000000071A1000-memory.dmp
    Filesize

    4KB

  • memory/1280-130-0x0000000005702000-0x0000000005703000-memory.dmp
    Filesize

    4KB

  • memory/1280-123-0x0000000000400000-0x0000000001037000-memory.dmp
    Filesize

    12.2MB

  • memory/1280-122-0x00000000001C0000-0x00000000001F0000-memory.dmp
    Filesize

    192KB

  • memory/1280-131-0x0000000005703000-0x0000000005704000-memory.dmp
    Filesize

    4KB

  • memory/1280-124-0x0000000002DB0000-0x0000000002DCC000-memory.dmp
    Filesize

    112KB

  • memory/1280-126-0x0000000005710000-0x0000000005711000-memory.dmp
    Filesize

    4KB

  • memory/1280-140-0x0000000006FC0000-0x0000000006FC1000-memory.dmp
    Filesize

    4KB

  • memory/1280-128-0x0000000005C10000-0x0000000005C11000-memory.dmp
    Filesize

    4KB

  • memory/1280-139-0x0000000006DF0000-0x0000000006DF1000-memory.dmp
    Filesize

    4KB

  • memory/1280-118-0x0000000000000000-mapping.dmp
  • memory/1280-125-0x0000000005700000-0x0000000005701000-memory.dmp
    Filesize

    4KB

  • memory/1280-132-0x0000000006220000-0x0000000006221000-memory.dmp
    Filesize

    4KB

  • memory/1280-133-0x0000000005640000-0x0000000005641000-memory.dmp
    Filesize

    4KB

  • memory/1280-134-0x0000000005704000-0x0000000005706000-memory.dmp
    Filesize

    8KB

  • memory/1280-135-0x0000000006330000-0x0000000006331000-memory.dmp
    Filesize

    4KB

  • memory/1280-136-0x0000000006580000-0x0000000006581000-memory.dmp
    Filesize

    4KB

  • memory/1280-137-0x0000000006C90000-0x0000000006C91000-memory.dmp
    Filesize

    4KB

  • memory/1280-138-0x0000000006D10000-0x0000000006D11000-memory.dmp
    Filesize

    4KB

  • memory/3748-117-0x0000000000400000-0x0000000001081000-memory.dmp
    Filesize

    12.5MB

  • memory/3748-115-0x00000000012A4000-0x0000000001310000-memory.dmp
    Filesize

    432KB

  • memory/3748-116-0x00000000013A0000-0x000000000146F000-memory.dmp
    Filesize

    828KB