Analysis

  • max time kernel
    19s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    24-10-2021 03:19

General

  • Target

    DownFlSetup999.exe

  • Size

    68KB

  • MD5

    ca9086de3f408d228e80d70078b92daa

  • SHA1

    efb3169c11d03008d928e8b0b337a0f586abeaca

  • SHA256

    92f6a6f2bac6d00837a05c422753c4bbf525842bbb30b4e5a1878f58e4752ac9

  • SHA512

    95e675cb0aac1087e930904000c88f2214c79f765ccfe8831b2af572a8ce0282d1d15b677fc6892ae6e6f8604db78d13833e2357d896f969a0af43c6935927e8

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DownFlSetup999.exe
    "C:\Users\Admin\AppData\Local\Temp\DownFlSetup999.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Users\Admin\AppData\Roaming\6790856.exe
      "C:\Users\Admin\AppData\Roaming\6790856.exe"
      2⤵
      • Executes dropped EXE
      PID:1404
    • C:\Users\Admin\AppData\Roaming\1937880.exe
      "C:\Users\Admin\AppData\Roaming\1937880.exe"
      2⤵
      • Executes dropped EXE
      PID:1904
    • C:\Users\Admin\AppData\Roaming\5888142.exe
      "C:\Users\Admin\AppData\Roaming\5888142.exe"
      2⤵
      • Executes dropped EXE
      PID:1572
      • C:\Users\Admin\AppData\Roaming\5888142.exe
        "C:\Users\Admin\AppData\Roaming\5888142.exe"
        3⤵
          PID:364
      • C:\Users\Admin\AppData\Roaming\8113379.exe
        "C:\Users\Admin\AppData\Roaming\8113379.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        PID:1096
        • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
          "C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"
          3⤵
            PID:1944
        • C:\Users\Admin\AppData\Roaming\848405.exe
          "C:\Users\Admin\AppData\Roaming\848405.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1936

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      2
      T1112

      Install Root Certificate

      1
      T1130

      Discovery

      System Information Discovery

      1
      T1082

      Command and Control

      Web Service

      1
      T1102

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        MD5

        b84b45e0ec1e63a8bacb1c7036fd6df8

        SHA1

        b9ecc574ccceeb4debd7ec02faad18c515ea3215

        SHA256

        1748047a158c5f745917a0e6a3602075fefa3de5a9ef93b028075c488e3aecaf

        SHA512

        8f4de72a90b1fb39115de4cd8a0ea2df12206b5623294c33fe1aeec1dde5a2df66b0c03791562497409c008230b85dc8be2fdbf0d45780ca69a24bf414057f90

      • C:\Users\Admin\AppData\Roaming\1937880.exe
        MD5

        5962d92df09f3a2c500af24357e15f68

        SHA1

        4c751b1a844e8e09de5f73b6cca20a15e10cdd8f

        SHA256

        6dc0458faebacdaa695d3a0a78a8b07b71141c8c2fcc0a7909acfe5975ef284e

        SHA512

        bbe2674bbd7d8d6fb3f04e77249db34b3ec458c13594d5508adedd73d87090184a1aee75c8c83c7c30c582253f4a4b53af9360b3704d1156639c2b0eb19a4ca9

      • C:\Users\Admin\AppData\Roaming\1937880.exe
        MD5

        5962d92df09f3a2c500af24357e15f68

        SHA1

        4c751b1a844e8e09de5f73b6cca20a15e10cdd8f

        SHA256

        6dc0458faebacdaa695d3a0a78a8b07b71141c8c2fcc0a7909acfe5975ef284e

        SHA512

        bbe2674bbd7d8d6fb3f04e77249db34b3ec458c13594d5508adedd73d87090184a1aee75c8c83c7c30c582253f4a4b53af9360b3704d1156639c2b0eb19a4ca9

      • C:\Users\Admin\AppData\Roaming\5888142.exe
        MD5

        8879caf333449f63c98ce2088d8da325

        SHA1

        df5cf527ffd8037fba9a5e6b9a0b968164c48fa8

        SHA256

        b4440fa80040d4001973a1be8cba985b306fb8aeaa1ababbed9bd19197beb864

        SHA512

        514dee4105715a309eaf60421f7ab63c433c2c73355b1b40b6251db5180b46f4dc9afdfc4817091297dc82e3cb48d424d488fc2f49f1714368faebf04fa51ad0

      • C:\Users\Admin\AppData\Roaming\5888142.exe
        MD5

        f50e41bbe3484ac879b5a7646d0086df

        SHA1

        1ea0eadfb2791ba3c2bfe7f2e61951e769ccc0e8

        SHA256

        ec9a5087c5d52277f50dcd3a7383cfc38b6c793adcc6cfd685fe5ae38b8ae7aa

        SHA512

        4c55d8c4be76dc1e9d5f615a2d141319519eaca916e4954dc9e4947a92c2463db3c492947bf19b852fbe3fbd54285a0ab05644e2cc86b988462c1c35d3ab9c33

      • C:\Users\Admin\AppData\Roaming\5888142.exe
        MD5

        f50e41bbe3484ac879b5a7646d0086df

        SHA1

        1ea0eadfb2791ba3c2bfe7f2e61951e769ccc0e8

        SHA256

        ec9a5087c5d52277f50dcd3a7383cfc38b6c793adcc6cfd685fe5ae38b8ae7aa

        SHA512

        4c55d8c4be76dc1e9d5f615a2d141319519eaca916e4954dc9e4947a92c2463db3c492947bf19b852fbe3fbd54285a0ab05644e2cc86b988462c1c35d3ab9c33

      • C:\Users\Admin\AppData\Roaming\6790856.exe
        MD5

        665db314ea52d4331c8f0dd49cc0c9e5

        SHA1

        65fc408b35d057bad6c55ea7d06edbd5001bdcc1

        SHA256

        dd43e6de713f9b199855a8d101069560121223bd5c5cea999a80a96bd84f4b4a

        SHA512

        6b1d41db7e50c32f01c2b4d5b3851adc37816fcf8d8b3cbcb0f2602d3a10652a82a9376379bb437439d29292d6a48e6c0ae785a7fda93d2b604c84d3293068fc

      • C:\Users\Admin\AppData\Roaming\6790856.exe
        MD5

        665db314ea52d4331c8f0dd49cc0c9e5

        SHA1

        65fc408b35d057bad6c55ea7d06edbd5001bdcc1

        SHA256

        dd43e6de713f9b199855a8d101069560121223bd5c5cea999a80a96bd84f4b4a

        SHA512

        6b1d41db7e50c32f01c2b4d5b3851adc37816fcf8d8b3cbcb0f2602d3a10652a82a9376379bb437439d29292d6a48e6c0ae785a7fda93d2b604c84d3293068fc

      • C:\Users\Admin\AppData\Roaming\8113379.exe
        MD5

        a20e32791806c7b29070b95226b0e480

        SHA1

        8f2bac75ffabbe45770076047ded99f243622e5f

        SHA256

        df24005d51e393ed322bbf354c31485dab121ae0a445a754e08bb7912d9cd146

        SHA512

        6cf6b6aa3d4d82e7f202c5a0d3fd9a1085e05dd136e0532702e61de6e9a09b76eb5ec2add7f3a3e926e304aab928bbc639661cf6380133c8e00c387d4e9f2ca0

      • C:\Users\Admin\AppData\Roaming\8113379.exe
        MD5

        a20e32791806c7b29070b95226b0e480

        SHA1

        8f2bac75ffabbe45770076047ded99f243622e5f

        SHA256

        df24005d51e393ed322bbf354c31485dab121ae0a445a754e08bb7912d9cd146

        SHA512

        6cf6b6aa3d4d82e7f202c5a0d3fd9a1085e05dd136e0532702e61de6e9a09b76eb5ec2add7f3a3e926e304aab928bbc639661cf6380133c8e00c387d4e9f2ca0

      • C:\Users\Admin\AppData\Roaming\848405.exe
        MD5

        d4afd6e583d54a75f39bf4934b99c684

        SHA1

        c9262e240a4a503d426b47b90c7b6fe6ed8bed9e

        SHA256

        0dca699c7d1729954372be2fe70f5da34521de4aa0e5b504a0f6a1c27b12c3f9

        SHA512

        87a29ea404583acf4eef5b4fe2feab8f16483af0cbe8cdfbc3e96ee41836f48e2e9456d54db734c150e6003d42596f8760e3500ec7ffefb50015b44c854a528f

      • C:\Users\Admin\AppData\Roaming\848405.exe
        MD5

        d4afd6e583d54a75f39bf4934b99c684

        SHA1

        c9262e240a4a503d426b47b90c7b6fe6ed8bed9e

        SHA256

        0dca699c7d1729954372be2fe70f5da34521de4aa0e5b504a0f6a1c27b12c3f9

        SHA512

        87a29ea404583acf4eef5b4fe2feab8f16483af0cbe8cdfbc3e96ee41836f48e2e9456d54db734c150e6003d42596f8760e3500ec7ffefb50015b44c854a528f

      • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
        MD5

        a20e32791806c7b29070b95226b0e480

        SHA1

        8f2bac75ffabbe45770076047ded99f243622e5f

        SHA256

        df24005d51e393ed322bbf354c31485dab121ae0a445a754e08bb7912d9cd146

        SHA512

        6cf6b6aa3d4d82e7f202c5a0d3fd9a1085e05dd136e0532702e61de6e9a09b76eb5ec2add7f3a3e926e304aab928bbc639661cf6380133c8e00c387d4e9f2ca0

      • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
        MD5

        a20e32791806c7b29070b95226b0e480

        SHA1

        8f2bac75ffabbe45770076047ded99f243622e5f

        SHA256

        df24005d51e393ed322bbf354c31485dab121ae0a445a754e08bb7912d9cd146

        SHA512

        6cf6b6aa3d4d82e7f202c5a0d3fd9a1085e05dd136e0532702e61de6e9a09b76eb5ec2add7f3a3e926e304aab928bbc639661cf6380133c8e00c387d4e9f2ca0

      • \Users\Admin\AppData\Roaming\5888142.exe
        MD5

        8e78df0c7605d47962b371f4f84401e7

        SHA1

        f4450e049565889722c338ac0f0713ecbb343125

        SHA256

        79a42e701d84977786ab7d5689259636e09b25d1c01d326b0d2c20e3bb76ea32

        SHA512

        f4ba8551a836b9885ac0fadb011fb7811325aa9a698460d6955cd9d32f3de6cf98cb794b13cdb9472d69c3d574a5793aef8d7d1857ba49553857cf43e133dba7

      • \Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
        MD5

        a20e32791806c7b29070b95226b0e480

        SHA1

        8f2bac75ffabbe45770076047ded99f243622e5f

        SHA256

        df24005d51e393ed322bbf354c31485dab121ae0a445a754e08bb7912d9cd146

        SHA512

        6cf6b6aa3d4d82e7f202c5a0d3fd9a1085e05dd136e0532702e61de6e9a09b76eb5ec2add7f3a3e926e304aab928bbc639661cf6380133c8e00c387d4e9f2ca0

      • memory/364-106-0x0000000000400000-0x0000000000447000-memory.dmp
        Filesize

        284KB

      • memory/364-104-0x0000000000400000-0x0000000000447000-memory.dmp
        Filesize

        284KB

      • memory/364-107-0x0000000000400000-0x0000000000447000-memory.dmp
        Filesize

        284KB

      • memory/364-111-0x0000000000400000-0x0000000000447000-memory.dmp
        Filesize

        284KB

      • memory/364-105-0x0000000000400000-0x0000000000447000-memory.dmp
        Filesize

        284KB

      • memory/364-113-0x0000000004B92000-0x0000000004B93000-memory.dmp
        Filesize

        4KB

      • memory/364-114-0x0000000000990000-0x00000000009BB000-memory.dmp
        Filesize

        172KB

      • memory/364-108-0x000000000040CD2F-mapping.dmp
      • memory/364-103-0x0000000000400000-0x0000000000447000-memory.dmp
        Filesize

        284KB

      • memory/364-115-0x0000000004B93000-0x0000000004B94000-memory.dmp
        Filesize

        4KB

      • memory/364-102-0x0000000000400000-0x0000000000447000-memory.dmp
        Filesize

        284KB

      • memory/364-116-0x0000000004B94000-0x0000000004B96000-memory.dmp
        Filesize

        8KB

      • memory/364-110-0x00000000004C0000-0x00000000004ED000-memory.dmp
        Filesize

        180KB

      • memory/364-112-0x0000000004B91000-0x0000000004B92000-memory.dmp
        Filesize

        4KB

      • memory/1096-72-0x0000000000000000-mapping.dmp
      • memory/1096-84-0x00000000003D0000-0x00000000003D1000-memory.dmp
        Filesize

        4KB

      • memory/1096-87-0x0000000004950000-0x0000000004951000-memory.dmp
        Filesize

        4KB

      • memory/1096-76-0x0000000000AE0000-0x0000000000AE1000-memory.dmp
        Filesize

        4KB

      • memory/1404-59-0x0000000000000000-mapping.dmp
      • memory/1404-67-0x0000000000900000-0x0000000000901000-memory.dmp
        Filesize

        4KB

      • memory/1572-99-0x0000000000730000-0x0000000000731000-memory.dmp
        Filesize

        4KB

      • memory/1572-100-0x00000000004F1000-0x00000000004F2000-memory.dmp
        Filesize

        4KB

      • memory/1572-65-0x0000000000000000-mapping.dmp
      • memory/1572-80-0x00000000004F0000-0x00000000004F1000-memory.dmp
        Filesize

        4KB

      • memory/1640-55-0x0000000001300000-0x0000000001301000-memory.dmp
        Filesize

        4KB

      • memory/1640-57-0x00000000003D0000-0x00000000003D1000-memory.dmp
        Filesize

        4KB

      • memory/1640-58-0x000000001AF60000-0x000000001AF62000-memory.dmp
        Filesize

        8KB

      • memory/1904-62-0x0000000000000000-mapping.dmp
      • memory/1904-69-0x0000000075F41000-0x0000000075F43000-memory.dmp
        Filesize

        8KB

      • memory/1904-78-0x0000000002200000-0x0000000002201000-memory.dmp
        Filesize

        4KB

      • memory/1936-85-0x0000000000310000-0x0000000000311000-memory.dmp
        Filesize

        4KB

      • memory/1936-75-0x0000000000000000-mapping.dmp
      • memory/1936-88-0x0000000000520000-0x0000000000521000-memory.dmp
        Filesize

        4KB

      • memory/1936-82-0x0000000000330000-0x0000000000331000-memory.dmp
        Filesize

        4KB

      • memory/1936-89-0x00000000048A0000-0x00000000048A1000-memory.dmp
        Filesize

        4KB

      • memory/1936-86-0x0000000000910000-0x0000000000958000-memory.dmp
        Filesize

        288KB

      • memory/1944-95-0x00000000000C0000-0x00000000000C1000-memory.dmp
        Filesize

        4KB

      • memory/1944-92-0x0000000000000000-mapping.dmp
      • memory/1944-98-0x0000000004A90000-0x0000000004A91000-memory.dmp
        Filesize

        4KB