Analysis

  • max time kernel
    122s
  • max time network
    162s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    20-01-2022 18:11

General

  • Target

    7zS850A099E/61e7502c4cff3_Tue232cba58c.exe

  • Size

    666KB

  • MD5

    81d975ad4ca267db5d3c50ea5875a563

  • SHA1

    be11fb5a16735249000a48279cd1bd7aa8b06d90

  • SHA256

    c724232309617b23a487c1713f4c90680354928f1d5f67200cdbe15e1421e43a

  • SHA512

    ab822f7a07bbc124ea000afcd27c7c9981ce82d032e80369ba65959c5f83f28e15bec33cd9d5b740b41511bb7c7b15133739ace59f46cc13489d66d9e8e16df3

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 4 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7502c4cff3_Tue232cba58c.exe
    "C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7502c4cff3_Tue232cba58c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1548
    • C:\Users\Admin\AppData\Local\Temp\99b1bd18-5f1d-4336-84fa-5a4c03757821.exe
      "C:\Users\Admin\AppData\Local\Temp\99b1bd18-5f1d-4336-84fa-5a4c03757821.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:628
    • C:\Users\Admin\AppData\Local\Temp\bfbbf4dd-cd92-41eb-ab13-ae43b89718bb.exe
      "C:\Users\Admin\AppData\Local\Temp\bfbbf4dd-cd92-41eb-ab13-ae43b89718bb.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:744
    • C:\Users\Admin\AppData\Local\Temp\3fb73d1a-86d8-4555-a491-87e72fb5f8be.exe
      "C:\Users\Admin\AppData\Local\Temp\3fb73d1a-86d8-4555-a491-87e72fb5f8be.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1836
    • C:\Users\Admin\AppData\Local\Temp\e4875590-ecbe-4599-a4d9-33f5206d9515.exe
      "C:\Users\Admin\AppData\Local\Temp\e4875590-ecbe-4599-a4d9-33f5206d9515.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1100

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    616b56d49a12d933dfdac15b39ff9490

    SHA1

    8f3527efdbe510d2ba8431e7f3c3eefcf64ed2af

    SHA256

    9e54af64c1264acd896546dc61c369779bf79ba2cbc05b49fa454a5bfeeb1d66

    SHA512

    184f6f01ae598134ca10d90e39dbe86d400e50bc05844db437c467fc92af35608b72a36872f73cd181887d68a04b216a80c65e29bae56dbc13e7389a4a3b705d

  • C:\Users\Admin\AppData\Local\Temp\3fb73d1a-86d8-4555-a491-87e72fb5f8be.exe
    MD5

    05ac091d7e7ee00971873a1ef70c0148

    SHA1

    fe8f6ca2b7790b0b2070572d816c20561b2b3a85

    SHA256

    6c46e60e4a2e2d1455e6e95948c50cf3d7a4ecf09409192178c027938d246293

    SHA512

    8500d7201f56c3932feec697f3ada768a7198c5197f8c2f791492837dcc15fcdc45b47b267481aee3cb7944620ac8f6c4930ee4435bb4d037636d31dcb79b2d9

  • C:\Users\Admin\AppData\Local\Temp\3fb73d1a-86d8-4555-a491-87e72fb5f8be.exe
    MD5

    05ac091d7e7ee00971873a1ef70c0148

    SHA1

    fe8f6ca2b7790b0b2070572d816c20561b2b3a85

    SHA256

    6c46e60e4a2e2d1455e6e95948c50cf3d7a4ecf09409192178c027938d246293

    SHA512

    8500d7201f56c3932feec697f3ada768a7198c5197f8c2f791492837dcc15fcdc45b47b267481aee3cb7944620ac8f6c4930ee4435bb4d037636d31dcb79b2d9

  • C:\Users\Admin\AppData\Local\Temp\99b1bd18-5f1d-4336-84fa-5a4c03757821.exe
    MD5

    b3c8754bee93dba921fa2f740c9f829b

    SHA1

    34ffbf33fb7823240eab07f5e9d4cf821580a5f6

    SHA256

    45482e570ff25986a2f965c6ed2948845715f39b74a66ece01807d08b57980f8

    SHA512

    498d3f65cb7b778ee59caa25f40172cb594a95e74e88f9225a10664e9c2a3bf533b456297376ee878484d91ec61c9c04586a4c1001ed1e967374be903cc5ee08

  • C:\Users\Admin\AppData\Local\Temp\99b1bd18-5f1d-4336-84fa-5a4c03757821.exe
    MD5

    b3c8754bee93dba921fa2f740c9f829b

    SHA1

    34ffbf33fb7823240eab07f5e9d4cf821580a5f6

    SHA256

    45482e570ff25986a2f965c6ed2948845715f39b74a66ece01807d08b57980f8

    SHA512

    498d3f65cb7b778ee59caa25f40172cb594a95e74e88f9225a10664e9c2a3bf533b456297376ee878484d91ec61c9c04586a4c1001ed1e967374be903cc5ee08

  • C:\Users\Admin\AppData\Local\Temp\bfbbf4dd-cd92-41eb-ab13-ae43b89718bb.exe
    MD5

    efe893163bea0748af2e5af8622df32f

    SHA1

    a3e6a5ac317efd11b5a849d43c2c9ce0b64b79fd

    SHA256

    45fb8a1da94ed0b80a9eed23981a70d0d68e4e5cd1303c9b32a5504a589cb717

    SHA512

    b0f8930dcd2b561bbbc660a18861530d4905f6a43e52962045421bd3eece79aa7c2194a557e6086c7258be6fc6233c061ff55a613ebeda73552df6309871ef41

  • C:\Users\Admin\AppData\Local\Temp\bfbbf4dd-cd92-41eb-ab13-ae43b89718bb.exe
    MD5

    efe893163bea0748af2e5af8622df32f

    SHA1

    a3e6a5ac317efd11b5a849d43c2c9ce0b64b79fd

    SHA256

    45fb8a1da94ed0b80a9eed23981a70d0d68e4e5cd1303c9b32a5504a589cb717

    SHA512

    b0f8930dcd2b561bbbc660a18861530d4905f6a43e52962045421bd3eece79aa7c2194a557e6086c7258be6fc6233c061ff55a613ebeda73552df6309871ef41

  • C:\Users\Admin\AppData\Local\Temp\e4875590-ecbe-4599-a4d9-33f5206d9515.exe
    MD5

    c3456f710b2c66d8b2025377e0833f1c

    SHA1

    6f43800f5e6b50fa08d8d4d446b936a93f12c930

    SHA256

    879b59047e01efd7a5505519f6761d23bafd33ab8f3d0b6c626b6447582cc577

    SHA512

    a795bbcabdbd36b39063c53398c0dcb600795b4d771ecb54921cc1beb1abd6bad578304bbf674f6ad4dbe22a33ffbdb8bae8998ec4fb1f9c738b1a1ca0aeb211

  • C:\Users\Admin\AppData\Local\Temp\e4875590-ecbe-4599-a4d9-33f5206d9515.exe
    MD5

    c3456f710b2c66d8b2025377e0833f1c

    SHA1

    6f43800f5e6b50fa08d8d4d446b936a93f12c930

    SHA256

    879b59047e01efd7a5505519f6761d23bafd33ab8f3d0b6c626b6447582cc577

    SHA512

    a795bbcabdbd36b39063c53398c0dcb600795b4d771ecb54921cc1beb1abd6bad578304bbf674f6ad4dbe22a33ffbdb8bae8998ec4fb1f9c738b1a1ca0aeb211

  • \Users\Admin\AppData\Local\Temp\3fb73d1a-86d8-4555-a491-87e72fb5f8be.exe
    MD5

    05ac091d7e7ee00971873a1ef70c0148

    SHA1

    fe8f6ca2b7790b0b2070572d816c20561b2b3a85

    SHA256

    6c46e60e4a2e2d1455e6e95948c50cf3d7a4ecf09409192178c027938d246293

    SHA512

    8500d7201f56c3932feec697f3ada768a7198c5197f8c2f791492837dcc15fcdc45b47b267481aee3cb7944620ac8f6c4930ee4435bb4d037636d31dcb79b2d9

  • \Users\Admin\AppData\Local\Temp\99b1bd18-5f1d-4336-84fa-5a4c03757821.exe
    MD5

    b3c8754bee93dba921fa2f740c9f829b

    SHA1

    34ffbf33fb7823240eab07f5e9d4cf821580a5f6

    SHA256

    45482e570ff25986a2f965c6ed2948845715f39b74a66ece01807d08b57980f8

    SHA512

    498d3f65cb7b778ee59caa25f40172cb594a95e74e88f9225a10664e9c2a3bf533b456297376ee878484d91ec61c9c04586a4c1001ed1e967374be903cc5ee08

  • \Users\Admin\AppData\Local\Temp\bfbbf4dd-cd92-41eb-ab13-ae43b89718bb.exe
    MD5

    efe893163bea0748af2e5af8622df32f

    SHA1

    a3e6a5ac317efd11b5a849d43c2c9ce0b64b79fd

    SHA256

    45fb8a1da94ed0b80a9eed23981a70d0d68e4e5cd1303c9b32a5504a589cb717

    SHA512

    b0f8930dcd2b561bbbc660a18861530d4905f6a43e52962045421bd3eece79aa7c2194a557e6086c7258be6fc6233c061ff55a613ebeda73552df6309871ef41

  • \Users\Admin\AppData\Local\Temp\e4875590-ecbe-4599-a4d9-33f5206d9515.exe
    MD5

    c3456f710b2c66d8b2025377e0833f1c

    SHA1

    6f43800f5e6b50fa08d8d4d446b936a93f12c930

    SHA256

    879b59047e01efd7a5505519f6761d23bafd33ab8f3d0b6c626b6447582cc577

    SHA512

    a795bbcabdbd36b39063c53398c0dcb600795b4d771ecb54921cc1beb1abd6bad578304bbf674f6ad4dbe22a33ffbdb8bae8998ec4fb1f9c738b1a1ca0aeb211

  • memory/628-73-0x0000000074BF0000-0x0000000074C3A000-memory.dmp
    Filesize

    296KB

  • memory/628-84-0x0000000000370000-0x00000000003B4000-memory.dmp
    Filesize

    272KB

  • memory/628-91-0x0000000075760000-0x00000000757A7000-memory.dmp
    Filesize

    284KB

  • memory/628-115-0x0000000075D40000-0x0000000075E9C000-memory.dmp
    Filesize

    1.4MB

  • memory/628-125-0x00000000000A0000-0x0000000000111000-memory.dmp
    Filesize

    452KB

  • memory/628-75-0x0000000000080000-0x0000000000081000-memory.dmp
    Filesize

    4KB

  • memory/628-129-0x00000000770F0000-0x000000007717F000-memory.dmp
    Filesize

    572KB

  • memory/628-74-0x00000000000A0000-0x0000000000111000-memory.dmp
    Filesize

    452KB

  • memory/628-136-0x00000000742E0000-0x0000000074360000-memory.dmp
    Filesize

    512KB

  • memory/628-138-0x0000000002A70000-0x0000000002A71000-memory.dmp
    Filesize

    4KB

  • memory/628-154-0x00000000762C0000-0x0000000076F0A000-memory.dmp
    Filesize

    12.3MB

  • memory/628-94-0x0000000075BE0000-0x0000000075C37000-memory.dmp
    Filesize

    348KB

  • memory/628-81-0x0000000075AA0000-0x0000000075B4C000-memory.dmp
    Filesize

    688KB

  • memory/628-157-0x0000000074D70000-0x0000000074D87000-memory.dmp
    Filesize

    92KB

  • memory/744-83-0x00000000001C0000-0x00000000001C1000-memory.dmp
    Filesize

    4KB

  • memory/744-128-0x00000000770F0000-0x000000007717F000-memory.dmp
    Filesize

    572KB

  • memory/744-158-0x0000000071320000-0x000000007135D000-memory.dmp
    Filesize

    244KB

  • memory/744-153-0x00000000741A0000-0x00000000741E4000-memory.dmp
    Filesize

    272KB

  • memory/744-152-0x00000000028D0000-0x00000000028D1000-memory.dmp
    Filesize

    4KB

  • memory/744-151-0x00000000757B0000-0x00000000757D7000-memory.dmp
    Filesize

    156KB

  • memory/744-150-0x0000000074C50000-0x0000000074C6C000-memory.dmp
    Filesize

    112KB

  • memory/744-86-0x0000000075AA0000-0x0000000075B4C000-memory.dmp
    Filesize

    688KB

  • memory/744-148-0x0000000074FA0000-0x0000000074FAC000-memory.dmp
    Filesize

    48KB

  • memory/744-95-0x0000000075BE0000-0x0000000075C37000-memory.dmp
    Filesize

    348KB

  • memory/744-87-0x0000000000130000-0x0000000000174000-memory.dmp
    Filesize

    272KB

  • memory/744-147-0x0000000074280000-0x00000000742D8000-memory.dmp
    Filesize

    352KB

  • memory/744-146-0x0000000074230000-0x000000007427F000-memory.dmp
    Filesize

    316KB

  • memory/744-82-0x0000000074BF0000-0x0000000074C3A000-memory.dmp
    Filesize

    296KB

  • memory/744-92-0x0000000075760000-0x00000000757A7000-memory.dmp
    Filesize

    284KB

  • memory/744-145-0x0000000075EB0000-0x0000000075EC9000-memory.dmp
    Filesize

    100KB

  • memory/744-143-0x0000000076000000-0x0000000076035000-memory.dmp
    Filesize

    212KB

  • memory/744-144-0x0000000074CE0000-0x0000000074CED000-memory.dmp
    Filesize

    52KB

  • memory/744-142-0x0000000074D10000-0x0000000074D62000-memory.dmp
    Filesize

    328KB

  • memory/744-141-0x0000000074CF0000-0x0000000074D05000-memory.dmp
    Filesize

    84KB

  • memory/744-137-0x00000000762C0000-0x0000000076F0A000-memory.dmp
    Filesize

    12.3MB

  • memory/744-140-0x0000000074D70000-0x0000000074D87000-memory.dmp
    Filesize

    92KB

  • memory/744-126-0x0000000000980000-0x00000000009C4000-memory.dmp
    Filesize

    272KB

  • memory/744-114-0x0000000075D40000-0x0000000075E9C000-memory.dmp
    Filesize

    1.4MB

  • memory/744-134-0x00000000742E0000-0x0000000074360000-memory.dmp
    Filesize

    512KB

  • memory/1100-112-0x0000000000330000-0x0000000000371000-memory.dmp
    Filesize

    260KB

  • memory/1100-108-0x0000000000400000-0x000000000051C000-memory.dmp
    Filesize

    1.1MB

  • memory/1100-132-0x0000000001E60000-0x0000000001EA0000-memory.dmp
    Filesize

    256KB

  • memory/1100-116-0x00000000008F0000-0x000000000094C000-memory.dmp
    Filesize

    368KB

  • memory/1100-130-0x0000000001E60000-0x0000000001EA0000-memory.dmp
    Filesize

    256KB

  • memory/1100-120-0x0000000000330000-0x0000000000370000-memory.dmp
    Filesize

    256KB

  • memory/1100-123-0x0000000000390000-0x0000000000391000-memory.dmp
    Filesize

    4KB

  • memory/1100-124-0x0000000000260000-0x0000000000280000-memory.dmp
    Filesize

    128KB

  • memory/1100-131-0x0000000001E60000-0x0000000001EA0000-memory.dmp
    Filesize

    256KB

  • memory/1548-64-0x00000000003C0000-0x00000000003FB000-memory.dmp
    Filesize

    236KB

  • memory/1548-58-0x0000000000380000-0x0000000000398000-memory.dmp
    Filesize

    96KB

  • memory/1548-55-0x00000000762C1000-0x00000000762C3000-memory.dmp
    Filesize

    8KB

  • memory/1548-66-0x00000000005D1000-0x00000000005D2000-memory.dmp
    Filesize

    4KB

  • memory/1548-68-0x00000000005D4000-0x00000000005D5000-memory.dmp
    Filesize

    4KB

  • memory/1548-65-0x00000000003A0000-0x00000000003AA000-memory.dmp
    Filesize

    40KB

  • memory/1548-57-0x0000000000330000-0x0000000000331000-memory.dmp
    Filesize

    4KB

  • memory/1548-67-0x00000000005D2000-0x00000000005D3000-memory.dmp
    Filesize

    4KB

  • memory/1548-56-0x0000000000400000-0x00000000004F4000-memory.dmp
    Filesize

    976KB

  • memory/1836-113-0x0000000075D40000-0x0000000075E9C000-memory.dmp
    Filesize

    1.4MB

  • memory/1836-127-0x0000000000B20000-0x0000000000B98000-memory.dmp
    Filesize

    480KB

  • memory/1836-103-0x0000000075BE0000-0x0000000075C37000-memory.dmp
    Filesize

    348KB

  • memory/1836-102-0x0000000075760000-0x00000000757A7000-memory.dmp
    Filesize

    284KB

  • memory/1836-100-0x0000000075AA0000-0x0000000075B4C000-memory.dmp
    Filesize

    688KB

  • memory/1836-101-0x00000000001B0000-0x00000000001F4000-memory.dmp
    Filesize

    272KB

  • memory/1836-97-0x0000000000B20000-0x0000000000B98000-memory.dmp
    Filesize

    480KB

  • memory/1836-155-0x00000000762C0000-0x0000000076F0A000-memory.dmp
    Filesize

    12.3MB

  • memory/1836-139-0x0000000002250000-0x0000000002251000-memory.dmp
    Filesize

    4KB

  • memory/1836-156-0x0000000074D70000-0x0000000074D87000-memory.dmp
    Filesize

    92KB

  • memory/1836-135-0x00000000742E0000-0x0000000074360000-memory.dmp
    Filesize

    512KB

  • memory/1836-96-0x0000000074BF0000-0x0000000074C3A000-memory.dmp
    Filesize

    296KB

  • memory/1836-133-0x00000000770F0000-0x000000007717F000-memory.dmp
    Filesize

    572KB