Analysis

  • max time kernel
    96s
  • max time network
    146s
  • platform
    windows10_x64
  • resource
    win10-20220414-en
  • submitted
    05-07-2022 16:59

General

  • Target

    ca3e3737fe4408b3a4b5362a12ffb59c96f7c8e722d047196b559d7f1bd0debb.exe

  • Size

    2.4MB

  • MD5

    6fd9f3590d136a30f43079ffedcc7913

  • SHA1

    ef43a3dcc0664994ccbb4574606a2b783972d744

  • SHA256

    ca3e3737fe4408b3a4b5362a12ffb59c96f7c8e722d047196b559d7f1bd0debb

  • SHA512

    508185655378eec8d1d34fa23dce970907467cee530bb8f6100bbe871320ea2471e24a85f1e001b04301a9a5dbeb7bfad19050d6d3efa4cb2bfb35ef6cc89e4c

Malware Config

Extracted

Family

redline

C2

141.95.140.173:33470

Attributes
  • auth_value

    6d9508e5573e656e0dc3c4c5f8526d8e

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ca3e3737fe4408b3a4b5362a12ffb59c96f7c8e722d047196b559d7f1bd0debb.exe
    "C:\Users\Admin\AppData\Local\Temp\ca3e3737fe4408b3a4b5362a12ffb59c96f7c8e722d047196b559d7f1bd0debb.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3480
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:214952
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:215008
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:215028
        • C:\Users\Admin\AppData\Local\Temp\crypton.exe
          "C:\Users\Admin\AppData\Local\Temp\crypton.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4596
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
              PID:8664
          • C:\Users\Admin\AppData\Local\Temp\updator.exe
            "C:\Users\Admin\AppData\Local\Temp\updator.exe"
            4⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:104040
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 1 /tn "CompPkgSrv" /tr C:\Users\Admin\AppData\Roaming\WindowsFolder\winlogon.exe /f
              5⤵
              • Creates scheduled task(s)
              PID:9096
    • C:\Users\Admin\AppData\Roaming\WindowsFolder\winlogon.exe
      C:\Users\Admin\AppData\Roaming\WindowsFolder\winlogon.exe
      1⤵
      • Executes dropped EXE
      PID:9484
    • C:\Users\Admin\AppData\Roaming\WindowsFolder\winlogon.exe
      C:\Users\Admin\AppData\Roaming\WindowsFolder\winlogon.exe
      1⤵
      • Executes dropped EXE
      PID:9648

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Defense Evasion

    Modify Registry

    1
    T1112

    Credential Access

    Credentials in Files

    1
    T1081

    Discovery

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    1
    T1005

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log
      Filesize

      847B

      MD5

      808e884c00533a9eb0e13e64960d9c3a

      SHA1

      279d05181fc6179a12df1a669ff5d8b64c1380ae

      SHA256

      2f6a0aab99b1c228a6642f44f8992646ce84c5a2b3b9941b6cf1f2badf67bdd6

      SHA512

      9489bdb2ffdfeef3c52edcfe9b34c6688eba53eb86075e0564df1cd474723c86b5b5aedc12df1ff5fc12cf97bd1e3cf9701ff61dc4ce90155d70e9ccfd0fc299

    • C:\Users\Admin\AppData\Local\Temp\crypton.exe
      Filesize

      3.3MB

      MD5

      4fddb0fb46c2d951db20eca9a3b1c296

      SHA1

      22b17e95712be0586272e742acb183d3a28d2e05

      SHA256

      8350c0a227f79ef1a94da8e8bf95a4bc7cd3b590d0dcf78cc6da7236a5cdd1c5

      SHA512

      ce471181a1dfd9195c2afc49b844ca5b8e809bae64d1715cf85d2f5e1050b6838cc0274d053bc27b9fd30e4ee9558a2aa1297b322d07f41ee1c5d6475020a168

    • C:\Users\Admin\AppData\Local\Temp\crypton.exe
      Filesize

      3.3MB

      MD5

      4fddb0fb46c2d951db20eca9a3b1c296

      SHA1

      22b17e95712be0586272e742acb183d3a28d2e05

      SHA256

      8350c0a227f79ef1a94da8e8bf95a4bc7cd3b590d0dcf78cc6da7236a5cdd1c5

      SHA512

      ce471181a1dfd9195c2afc49b844ca5b8e809bae64d1715cf85d2f5e1050b6838cc0274d053bc27b9fd30e4ee9558a2aa1297b322d07f41ee1c5d6475020a168

    • C:\Users\Admin\AppData\Local\Temp\updator.exe
      Filesize

      96KB

      MD5

      d217c2a5f59c25ae90f29a54d13b21f2

      SHA1

      cda28aca60ae2aafb132b7e66b9de310a22604ee

      SHA256

      5f5ddb7f5934fc851903768ea0911a87b6278e0927169974f8442db9b0d1ca9a

      SHA512

      94c9e81934b9b2f3c98e267bcdd288d5fd81a1b2d155d1496fc5e9a8cff7e4c44871eb01963af653b62b605df89b7a0e6a3d71360c95cd1c60455a6819c5b352

    • C:\Users\Admin\AppData\Local\Temp\updator.exe
      Filesize

      96KB

      MD5

      d217c2a5f59c25ae90f29a54d13b21f2

      SHA1

      cda28aca60ae2aafb132b7e66b9de310a22604ee

      SHA256

      5f5ddb7f5934fc851903768ea0911a87b6278e0927169974f8442db9b0d1ca9a

      SHA512

      94c9e81934b9b2f3c98e267bcdd288d5fd81a1b2d155d1496fc5e9a8cff7e4c44871eb01963af653b62b605df89b7a0e6a3d71360c95cd1c60455a6819c5b352

    • C:\Users\Admin\AppData\Roaming\WindowsFolder\winlogon.exe
      Filesize

      96KB

      MD5

      d217c2a5f59c25ae90f29a54d13b21f2

      SHA1

      cda28aca60ae2aafb132b7e66b9de310a22604ee

      SHA256

      5f5ddb7f5934fc851903768ea0911a87b6278e0927169974f8442db9b0d1ca9a

      SHA512

      94c9e81934b9b2f3c98e267bcdd288d5fd81a1b2d155d1496fc5e9a8cff7e4c44871eb01963af653b62b605df89b7a0e6a3d71360c95cd1c60455a6819c5b352

    • C:\Users\Admin\AppData\Roaming\WindowsFolder\winlogon.exe
      Filesize

      96KB

      MD5

      d217c2a5f59c25ae90f29a54d13b21f2

      SHA1

      cda28aca60ae2aafb132b7e66b9de310a22604ee

      SHA256

      5f5ddb7f5934fc851903768ea0911a87b6278e0927169974f8442db9b0d1ca9a

      SHA512

      94c9e81934b9b2f3c98e267bcdd288d5fd81a1b2d155d1496fc5e9a8cff7e4c44871eb01963af653b62b605df89b7a0e6a3d71360c95cd1c60455a6819c5b352

    • C:\Users\Admin\AppData\Roaming\WindowsFolder\winlogon.exe
      Filesize

      96KB

      MD5

      d217c2a5f59c25ae90f29a54d13b21f2

      SHA1

      cda28aca60ae2aafb132b7e66b9de310a22604ee

      SHA256

      5f5ddb7f5934fc851903768ea0911a87b6278e0927169974f8442db9b0d1ca9a

      SHA512

      94c9e81934b9b2f3c98e267bcdd288d5fd81a1b2d155d1496fc5e9a8cff7e4c44871eb01963af653b62b605df89b7a0e6a3d71360c95cd1c60455a6819c5b352

    • memory/3480-121-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/3480-123-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/3480-122-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/3480-120-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/3480-119-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/3480-118-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/3480-117-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/3480-116-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/4596-477-0x0000000000000000-mapping.dmp
    • memory/8664-568-0x0000000000429223-mapping.dmp
    • memory/9096-648-0x0000000000000000-mapping.dmp
    • memory/9484-762-0x0000000000CC0000-0x0000000000CF9000-memory.dmp
      Filesize

      228KB

    • memory/9648-784-0x0000000000CC0000-0x0000000000CF9000-memory.dmp
      Filesize

      228KB

    • memory/9648-796-0x0000000000CC0000-0x0000000000CF9000-memory.dmp
      Filesize

      228KB

    • memory/104040-547-0x0000000000AA0000-0x0000000000AD9000-memory.dmp
      Filesize

      228KB

    • memory/104040-520-0x0000000000000000-mapping.dmp
    • memory/104040-729-0x0000000000AA0000-0x0000000000AD9000-memory.dmp
      Filesize

      228KB

    • memory/214952-135-0x0000000000400000-0x000000000041C000-memory.dmp
      Filesize

      112KB

    • memory/214952-134-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/214952-131-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/214952-133-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/214952-132-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/214952-130-0x00000000004011D4-mapping.dmp
    • memory/214952-124-0x0000000000400000-0x000000000041C000-memory.dmp
      Filesize

      112KB

    • memory/215008-164-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215008-136-0x0000000000400000-0x000000000041C000-memory.dmp
      Filesize

      112KB

    • memory/215008-160-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215008-162-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215008-151-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215008-165-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215008-149-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215008-169-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215008-172-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215008-145-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215008-553-0x000000000B330000-0x000000000B85C000-memory.dmp
      Filesize

      5.2MB

    • memory/215008-167-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215008-550-0x000000000AC30000-0x000000000ADF2000-memory.dmp
      Filesize

      1.8MB

    • memory/215008-143-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215008-141-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215008-139-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215008-528-0x000000000A260000-0x000000000A2B0000-memory.dmp
      Filesize

      320KB

    • memory/215008-138-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215008-137-0x000000000041789E-mapping.dmp
    • memory/215008-157-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215008-180-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215008-182-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215008-184-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215008-186-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215008-185-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215008-183-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215008-181-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215008-178-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215008-176-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215008-174-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215008-240-0x00000000095D0000-0x0000000009BD6000-memory.dmp
      Filesize

      6.0MB

    • memory/215008-241-0x0000000006B10000-0x0000000006B22000-memory.dmp
      Filesize

      72KB

    • memory/215008-244-0x00000000090D0000-0x00000000091DA000-memory.dmp
      Filesize

      1.0MB

    • memory/215008-250-0x0000000009000000-0x000000000903E000-memory.dmp
      Filesize

      248KB

    • memory/215008-267-0x0000000009040000-0x000000000908B000-memory.dmp
      Filesize

      300KB

    • memory/215008-290-0x0000000009320000-0x0000000009386000-memory.dmp
      Filesize

      408KB

    • memory/215008-298-0x0000000009E60000-0x0000000009ED6000-memory.dmp
      Filesize

      472KB

    • memory/215008-299-0x0000000009FC0000-0x000000000A052000-memory.dmp
      Filesize

      584KB

    • memory/215008-300-0x000000000A560000-0x000000000AA5E000-memory.dmp
      Filesize

      5.0MB

    • memory/215008-305-0x0000000009FA0000-0x0000000009FBE000-memory.dmp
      Filesize

      120KB

    • memory/215028-144-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215028-179-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215028-177-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215028-175-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215028-173-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215028-159-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215028-161-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215028-163-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215028-166-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215028-170-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215028-171-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215028-168-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215028-156-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215028-155-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215028-150-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215028-152-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215028-148-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215028-142-0x0000000000402CCE-mapping.dmp
    • memory/215028-146-0x0000000077CD0000-0x0000000077E5E000-memory.dmp
      Filesize

      1.6MB

    • memory/215028-140-0x0000000000400000-0x0000000000408000-memory.dmp
      Filesize

      32KB