Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    25-10-2021 05:50

General

  • Target

    67ccd36395c427e6f5ef5a3b7e58967d.exe

  • Size

    164KB

  • MD5

    67ccd36395c427e6f5ef5a3b7e58967d

  • SHA1

    2f67f612f17c57b40aa3c86d5b204a4736ab0fcc

  • SHA256

    90d35407fa3bb7d954c934de5e624cecca0998e9f3ed87823a9f6c127e0a3e37

  • SHA512

    d00fa491d9abf7bf4d9cf678e901ed4ceb4fd343776603f1f35842e9a856405dcdead67f95958335bad3a5f898f87d55a26f62972064e31584566731b6eb515d

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 11 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\67ccd36395c427e6f5ef5a3b7e58967d.exe
    "C:\Users\Admin\AppData\Local\Temp\67ccd36395c427e6f5ef5a3b7e58967d.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3604
    • C:\Users\Admin\AppData\Roaming\6938080.exe
      "C:\Users\Admin\AppData\Roaming\6938080.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4240
    • C:\Users\Admin\AppData\Roaming\4780865.exe
      "C:\Users\Admin\AppData\Roaming\4780865.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4432
      • C:\Users\Admin\AppData\Roaming\4780865.exe
        "C:\Users\Admin\AppData\Roaming\4780865.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4836
    • C:\Users\Admin\AppData\Roaming\7693073.exe
      "C:\Users\Admin\AppData\Roaming\7693073.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4504
      • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
        "C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"
        3⤵
        • Executes dropped EXE
        PID:424
    • C:\Users\Admin\AppData\Roaming\7349940.exe
      "C:\Users\Admin\AppData\Roaming\7349940.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3140

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\4780865.exe

    MD5

    f50e41bbe3484ac879b5a7646d0086df

    SHA1

    1ea0eadfb2791ba3c2bfe7f2e61951e769ccc0e8

    SHA256

    ec9a5087c5d52277f50dcd3a7383cfc38b6c793adcc6cfd685fe5ae38b8ae7aa

    SHA512

    4c55d8c4be76dc1e9d5f615a2d141319519eaca916e4954dc9e4947a92c2463db3c492947bf19b852fbe3fbd54285a0ab05644e2cc86b988462c1c35d3ab9c33

  • C:\Users\Admin\AppData\Roaming\4780865.exe

    MD5

    f50e41bbe3484ac879b5a7646d0086df

    SHA1

    1ea0eadfb2791ba3c2bfe7f2e61951e769ccc0e8

    SHA256

    ec9a5087c5d52277f50dcd3a7383cfc38b6c793adcc6cfd685fe5ae38b8ae7aa

    SHA512

    4c55d8c4be76dc1e9d5f615a2d141319519eaca916e4954dc9e4947a92c2463db3c492947bf19b852fbe3fbd54285a0ab05644e2cc86b988462c1c35d3ab9c33

  • C:\Users\Admin\AppData\Roaming\4780865.exe

    MD5

    f50e41bbe3484ac879b5a7646d0086df

    SHA1

    1ea0eadfb2791ba3c2bfe7f2e61951e769ccc0e8

    SHA256

    ec9a5087c5d52277f50dcd3a7383cfc38b6c793adcc6cfd685fe5ae38b8ae7aa

    SHA512

    4c55d8c4be76dc1e9d5f615a2d141319519eaca916e4954dc9e4947a92c2463db3c492947bf19b852fbe3fbd54285a0ab05644e2cc86b988462c1c35d3ab9c33

  • C:\Users\Admin\AppData\Roaming\6938080.exe

    MD5

    0207c7928477e2c228fec203f84994aa

    SHA1

    10a7d436b26b8d5829d290184b4b79619d44655a

    SHA256

    2994f3ca3249c90cf5ab58f4d8ab844d7d4c0e08480e98349d34877af95d9c8e

    SHA512

    ee58284c7b5de5805296a7493e240c364f809cf6ef97e79c2e0c8f01cdac84419f5ae9d306d1cc567c6c0f64a055db48b672ada608d7af6f66ad4177aec0a612

  • C:\Users\Admin\AppData\Roaming\6938080.exe

    MD5

    0207c7928477e2c228fec203f84994aa

    SHA1

    10a7d436b26b8d5829d290184b4b79619d44655a

    SHA256

    2994f3ca3249c90cf5ab58f4d8ab844d7d4c0e08480e98349d34877af95d9c8e

    SHA512

    ee58284c7b5de5805296a7493e240c364f809cf6ef97e79c2e0c8f01cdac84419f5ae9d306d1cc567c6c0f64a055db48b672ada608d7af6f66ad4177aec0a612

  • C:\Users\Admin\AppData\Roaming\7349940.exe

    MD5

    90f3928bd5180926ce93a4e3e569bf1d

    SHA1

    3478f1b23478685f29b086ca852dd548e347bcd6

    SHA256

    9393d74240e56e3c75024f8a1489ea7e9020e42f95b91fa978c8c052a7c89bf9

    SHA512

    b76bd2073150eaab731cafeaf651d78c43524d26ca470b07963e95f610ebe4b6e29ff48e03703ca3a86623dec28eda29a71b33f9802dcb6eed5b2a6875a785bd

  • C:\Users\Admin\AppData\Roaming\7349940.exe

    MD5

    90f3928bd5180926ce93a4e3e569bf1d

    SHA1

    3478f1b23478685f29b086ca852dd548e347bcd6

    SHA256

    9393d74240e56e3c75024f8a1489ea7e9020e42f95b91fa978c8c052a7c89bf9

    SHA512

    b76bd2073150eaab731cafeaf651d78c43524d26ca470b07963e95f610ebe4b6e29ff48e03703ca3a86623dec28eda29a71b33f9802dcb6eed5b2a6875a785bd

  • C:\Users\Admin\AppData\Roaming\7693073.exe

    MD5

    a20e32791806c7b29070b95226b0e480

    SHA1

    8f2bac75ffabbe45770076047ded99f243622e5f

    SHA256

    df24005d51e393ed322bbf354c31485dab121ae0a445a754e08bb7912d9cd146

    SHA512

    6cf6b6aa3d4d82e7f202c5a0d3fd9a1085e05dd136e0532702e61de6e9a09b76eb5ec2add7f3a3e926e304aab928bbc639661cf6380133c8e00c387d4e9f2ca0

  • C:\Users\Admin\AppData\Roaming\7693073.exe

    MD5

    a20e32791806c7b29070b95226b0e480

    SHA1

    8f2bac75ffabbe45770076047ded99f243622e5f

    SHA256

    df24005d51e393ed322bbf354c31485dab121ae0a445a754e08bb7912d9cd146

    SHA512

    6cf6b6aa3d4d82e7f202c5a0d3fd9a1085e05dd136e0532702e61de6e9a09b76eb5ec2add7f3a3e926e304aab928bbc639661cf6380133c8e00c387d4e9f2ca0

  • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe

    MD5

    a20e32791806c7b29070b95226b0e480

    SHA1

    8f2bac75ffabbe45770076047ded99f243622e5f

    SHA256

    df24005d51e393ed322bbf354c31485dab121ae0a445a754e08bb7912d9cd146

    SHA512

    6cf6b6aa3d4d82e7f202c5a0d3fd9a1085e05dd136e0532702e61de6e9a09b76eb5ec2add7f3a3e926e304aab928bbc639661cf6380133c8e00c387d4e9f2ca0

  • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe

    MD5

    a20e32791806c7b29070b95226b0e480

    SHA1

    8f2bac75ffabbe45770076047ded99f243622e5f

    SHA256

    df24005d51e393ed322bbf354c31485dab121ae0a445a754e08bb7912d9cd146

    SHA512

    6cf6b6aa3d4d82e7f202c5a0d3fd9a1085e05dd136e0532702e61de6e9a09b76eb5ec2add7f3a3e926e304aab928bbc639661cf6380133c8e00c387d4e9f2ca0

  • memory/424-151-0x0000000000000000-mapping.dmp

  • memory/424-165-0x0000000005080000-0x0000000005081000-memory.dmp

    Filesize

    4KB

  • memory/424-166-0x0000000004AC0000-0x0000000004AC1000-memory.dmp

    Filesize

    4KB

  • memory/3140-144-0x00000000009C0000-0x00000000009C1000-memory.dmp

    Filesize

    4KB

  • memory/3140-146-0x0000000005280000-0x00000000052A5000-memory.dmp

    Filesize

    148KB

  • memory/3140-138-0x0000000000000000-mapping.dmp

  • memory/3140-162-0x00000000052C0000-0x00000000052C1000-memory.dmp

    Filesize

    4KB

  • memory/3604-115-0x0000000000BB0000-0x0000000000BB1000-memory.dmp

    Filesize

    4KB

  • memory/3604-118-0x0000000005500000-0x0000000005501000-memory.dmp

    Filesize

    4KB

  • memory/3604-117-0x0000000001670000-0x0000000001671000-memory.dmp

    Filesize

    4KB

  • memory/4240-152-0x0000000007470000-0x0000000007471000-memory.dmp

    Filesize

    4KB

  • memory/4240-130-0x0000000004B00000-0x0000000004B01000-memory.dmp

    Filesize

    4KB

  • memory/4240-129-0x0000000007760000-0x0000000007761000-memory.dmp

    Filesize

    4KB

  • memory/4240-125-0x0000000007060000-0x0000000007061000-memory.dmp

    Filesize

    4KB

  • memory/4240-141-0x00000000073D0000-0x00000000073D1000-memory.dmp

    Filesize

    4KB

  • memory/4240-157-0x0000000007510000-0x0000000007511000-memory.dmp

    Filesize

    4KB

  • memory/4240-124-0x0000000002480000-0x00000000024A5000-memory.dmp

    Filesize

    148KB

  • memory/4240-122-0x0000000000170000-0x0000000000171000-memory.dmp

    Filesize

    4KB

  • memory/4240-119-0x0000000000000000-mapping.dmp

  • memory/4432-131-0x0000000002A20000-0x0000000002A21000-memory.dmp

    Filesize

    4KB

  • memory/4432-126-0x0000000000000000-mapping.dmp

  • memory/4432-167-0x0000000005980000-0x0000000005981000-memory.dmp

    Filesize

    4KB

  • memory/4432-168-0x0000000002A21000-0x0000000002A22000-memory.dmp

    Filesize

    4KB

  • memory/4504-142-0x000000000AF30000-0x000000000AF31000-memory.dmp

    Filesize

    4KB

  • memory/4504-137-0x00000000015D0000-0x00000000015D1000-memory.dmp

    Filesize

    4KB

  • memory/4504-135-0x0000000000A50000-0x0000000000A51000-memory.dmp

    Filesize

    4KB

  • memory/4504-132-0x0000000000000000-mapping.dmp

  • memory/4504-143-0x00000000055D0000-0x00000000055D1000-memory.dmp

    Filesize

    4KB

  • memory/4836-175-0x0000000006740000-0x0000000006741000-memory.dmp

    Filesize

    4KB

  • memory/4836-181-0x0000000005720000-0x0000000005721000-memory.dmp

    Filesize

    4KB

  • memory/4836-172-0x0000000002EE0000-0x0000000002F0D000-memory.dmp

    Filesize

    180KB

  • memory/4836-174-0x00000000030A0000-0x00000000030CB000-memory.dmp

    Filesize

    172KB

  • memory/4836-169-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/4836-176-0x00000000055D0000-0x00000000055D1000-memory.dmp

    Filesize

    4KB

  • memory/4836-177-0x0000000005730000-0x0000000005731000-memory.dmp

    Filesize

    4KB

  • memory/4836-178-0x0000000005630000-0x0000000005631000-memory.dmp

    Filesize

    4KB

  • memory/4836-179-0x0000000005670000-0x0000000005671000-memory.dmp

    Filesize

    4KB

  • memory/4836-170-0x000000000040CD2F-mapping.dmp

  • memory/4836-182-0x0000000005722000-0x0000000005723000-memory.dmp

    Filesize

    4KB

  • memory/4836-180-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/4836-183-0x0000000005723000-0x0000000005724000-memory.dmp

    Filesize

    4KB

  • memory/4836-184-0x0000000005724000-0x0000000005726000-memory.dmp

    Filesize

    8KB

  • memory/4836-186-0x0000000006580000-0x0000000006581000-memory.dmp

    Filesize

    4KB

  • memory/4836-188-0x0000000006600000-0x0000000006601000-memory.dmp

    Filesize

    4KB

  • memory/4836-189-0x00000000070E0000-0x00000000070E1000-memory.dmp

    Filesize

    4KB