Analysis
-
max time kernel
39s -
max time network
45s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
12-03-2021 16:45
Static task
static1
Behavioral task
behavioral1
Sample
qZ0RXW.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
qZ0RXW.exe
Resource
win10v20201028
General
-
Target
qZ0RXW.exe
-
Size
912KB
-
MD5
8c03063314b0aa3d6a7d26c1f6db60b4
-
SHA1
6955952347314e7e19895778af232b14a15c736d
-
SHA256
8378458c45be220207b12b7dbeeee4fcd9a4c4f51973d828834b418ded6e781f
-
SHA512
d55407a63928afa38612e58fef7253452cc799f8659c4a78e93ba94b2d07feb7a2e47e1294b79879b440fe5bc8ad0d8c7563a6d4e1a0e2d31aa9424c009f9839
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/984-12-0x0000000000400000-0x0000000000426000-memory.dmp family_redline behavioral1/memory/984-13-0x000000000041F39E-mapping.dmp family_redline behavioral1/memory/984-15-0x0000000000400000-0x0000000000426000-memory.dmp family_redline behavioral1/memory/736-27-0x0000000000400000-0x0000000000426000-memory.dmp family_redline behavioral1/memory/736-28-0x000000000041F38A-mapping.dmp family_redline behavioral1/memory/736-30-0x0000000000400000-0x0000000000426000-memory.dmp family_redline -
Executes dropped EXE 2 IoCs
Processes:
513661514.exe1433407376.exepid process 1608 513661514.exe 788 1433407376.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1376 cmd.exe -
Loads dropped DLL 3 IoCs
Processes:
qZ0RXW.exepid process 1856 qZ0RXW.exe 1856 qZ0RXW.exe 1856 qZ0RXW.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
513661514.exe1433407376.exedescription pid process target process PID 1608 set thread context of 984 1608 513661514.exe AddInProcess32.exe PID 788 set thread context of 736 788 1433407376.exe AddInProcess32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
qZ0RXW.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 qZ0RXW.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 qZ0RXW.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 qZ0RXW.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 qZ0RXW.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 040000000100000010000000410352dc0ff7501b16f0028eba6f45c50f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d0b000000010000001e000000440053005400200052006f006f0074002000430041002000580033000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589101d00000001000000100000004558d512eecb27464920897de7b66053030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131900000001000000100000006cf252fec3e8f20996de5d4dd9aef42420000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 qZ0RXW.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AddInProcess32.exeAddInProcess32.exepid process 984 AddInProcess32.exe 736 AddInProcess32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
513661514.exe1433407376.exeAddInProcess32.exeAddInProcess32.exedescription pid process Token: SeDebugPrivilege 1608 513661514.exe Token: SeDebugPrivilege 788 1433407376.exe Token: SeDebugPrivilege 984 AddInProcess32.exe Token: SeDebugPrivilege 736 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
qZ0RXW.exe513661514.exe1433407376.execmd.exedescription pid process target process PID 1856 wrote to memory of 1608 1856 qZ0RXW.exe 513661514.exe PID 1856 wrote to memory of 1608 1856 qZ0RXW.exe 513661514.exe PID 1856 wrote to memory of 1608 1856 qZ0RXW.exe 513661514.exe PID 1856 wrote to memory of 1608 1856 qZ0RXW.exe 513661514.exe PID 1608 wrote to memory of 984 1608 513661514.exe AddInProcess32.exe PID 1608 wrote to memory of 984 1608 513661514.exe AddInProcess32.exe PID 1608 wrote to memory of 984 1608 513661514.exe AddInProcess32.exe PID 1608 wrote to memory of 984 1608 513661514.exe AddInProcess32.exe PID 1608 wrote to memory of 984 1608 513661514.exe AddInProcess32.exe PID 1608 wrote to memory of 984 1608 513661514.exe AddInProcess32.exe PID 1608 wrote to memory of 984 1608 513661514.exe AddInProcess32.exe PID 1608 wrote to memory of 984 1608 513661514.exe AddInProcess32.exe PID 1608 wrote to memory of 984 1608 513661514.exe AddInProcess32.exe PID 1856 wrote to memory of 788 1856 qZ0RXW.exe 1433407376.exe PID 1856 wrote to memory of 788 1856 qZ0RXW.exe 1433407376.exe PID 1856 wrote to memory of 788 1856 qZ0RXW.exe 1433407376.exe PID 1856 wrote to memory of 788 1856 qZ0RXW.exe 1433407376.exe PID 788 wrote to memory of 736 788 1433407376.exe AddInProcess32.exe PID 788 wrote to memory of 736 788 1433407376.exe AddInProcess32.exe PID 788 wrote to memory of 736 788 1433407376.exe AddInProcess32.exe PID 788 wrote to memory of 736 788 1433407376.exe AddInProcess32.exe PID 788 wrote to memory of 736 788 1433407376.exe AddInProcess32.exe PID 788 wrote to memory of 736 788 1433407376.exe AddInProcess32.exe PID 788 wrote to memory of 736 788 1433407376.exe AddInProcess32.exe PID 788 wrote to memory of 736 788 1433407376.exe AddInProcess32.exe PID 788 wrote to memory of 736 788 1433407376.exe AddInProcess32.exe PID 1856 wrote to memory of 1376 1856 qZ0RXW.exe cmd.exe PID 1856 wrote to memory of 1376 1856 qZ0RXW.exe cmd.exe PID 1856 wrote to memory of 1376 1856 qZ0RXW.exe cmd.exe PID 1856 wrote to memory of 1376 1856 qZ0RXW.exe cmd.exe PID 1376 wrote to memory of 936 1376 cmd.exe PING.EXE PID 1376 wrote to memory of 936 1376 cmd.exe PING.EXE PID 1376 wrote to memory of 936 1376 cmd.exe PING.EXE PID 1376 wrote to memory of 936 1376 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\qZ0RXW.exe"C:\Users\Admin\AppData\Local\Temp\qZ0RXW.exe"1⤵
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\513661514.exeC:\Users\Admin\AppData\Local\Temp\513661514.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:984 -
C:\Users\Admin\AppData\Local\Temp\1433407376.exeC:\Users\Admin\AppData\Local\Temp\1433407376.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:736 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /k ping 0 & del C:\Users\Admin\AppData\Local\Temp\qZ0RXW.exe & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\PING.EXEping 03⤵
- Runs ping.exe
PID:936
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1433407376.exeMD5
8a71134b5eec8d2bbf849a291b63246d
SHA1bef03f05daad824da570594d183e233193d07bca
SHA25636872a3b93b4173cbd71fe1955ae787a62e3e8dfc46a035cf406c06b8bcc66cf
SHA512408cc8d88afd45e7e0bd52f46560f5ef721dafe703007c140b0fa696615a480e1155726e479ca829023f2d076b7d1401fd99008bbf11c13d3922d1c633218831
-
C:\Users\Admin\AppData\Local\Temp\1433407376.exeMD5
8a71134b5eec8d2bbf849a291b63246d
SHA1bef03f05daad824da570594d183e233193d07bca
SHA25636872a3b93b4173cbd71fe1955ae787a62e3e8dfc46a035cf406c06b8bcc66cf
SHA512408cc8d88afd45e7e0bd52f46560f5ef721dafe703007c140b0fa696615a480e1155726e479ca829023f2d076b7d1401fd99008bbf11c13d3922d1c633218831
-
C:\Users\Admin\AppData\Local\Temp\513661514.exeMD5
8f42d6ac2ff0bd507f77fc6f2077ecae
SHA13f6eb11f4dc112aed5aac9fe3feb78f77e068c93
SHA256cb1c124f7c5ee7ff7e260a15a4c8dcbce9dc4d3c3f4a1bbc54fda408970d045f
SHA5122de3ab74384d24ccc5ae083dda82956d722f87e5d0b06ee183a42b92c8a881758940b773e2aa19ecb0a0b22c0b5522e60700604011f12cb2e72c06722864daa7
-
C:\Users\Admin\AppData\Local\Temp\513661514.exeMD5
8f42d6ac2ff0bd507f77fc6f2077ecae
SHA13f6eb11f4dc112aed5aac9fe3feb78f77e068c93
SHA256cb1c124f7c5ee7ff7e260a15a4c8dcbce9dc4d3c3f4a1bbc54fda408970d045f
SHA5122de3ab74384d24ccc5ae083dda82956d722f87e5d0b06ee183a42b92c8a881758940b773e2aa19ecb0a0b22c0b5522e60700604011f12cb2e72c06722864daa7
-
\Users\Admin\AppData\Local\Temp\1433407376.exeMD5
8a71134b5eec8d2bbf849a291b63246d
SHA1bef03f05daad824da570594d183e233193d07bca
SHA25636872a3b93b4173cbd71fe1955ae787a62e3e8dfc46a035cf406c06b8bcc66cf
SHA512408cc8d88afd45e7e0bd52f46560f5ef721dafe703007c140b0fa696615a480e1155726e479ca829023f2d076b7d1401fd99008bbf11c13d3922d1c633218831
-
\Users\Admin\AppData\Local\Temp\1433407376.exeMD5
8a71134b5eec8d2bbf849a291b63246d
SHA1bef03f05daad824da570594d183e233193d07bca
SHA25636872a3b93b4173cbd71fe1955ae787a62e3e8dfc46a035cf406c06b8bcc66cf
SHA512408cc8d88afd45e7e0bd52f46560f5ef721dafe703007c140b0fa696615a480e1155726e479ca829023f2d076b7d1401fd99008bbf11c13d3922d1c633218831
-
\Users\Admin\AppData\Local\Temp\513661514.exeMD5
8f42d6ac2ff0bd507f77fc6f2077ecae
SHA13f6eb11f4dc112aed5aac9fe3feb78f77e068c93
SHA256cb1c124f7c5ee7ff7e260a15a4c8dcbce9dc4d3c3f4a1bbc54fda408970d045f
SHA5122de3ab74384d24ccc5ae083dda82956d722f87e5d0b06ee183a42b92c8a881758940b773e2aa19ecb0a0b22c0b5522e60700604011f12cb2e72c06722864daa7
-
memory/736-35-0x0000000000BB0000-0x0000000000BB1000-memory.dmpFilesize
4KB
-
memory/736-30-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/736-29-0x00000000743C0000-0x0000000074AAE000-memory.dmpFilesize
6.9MB
-
memory/736-28-0x000000000041F38A-mapping.dmp
-
memory/736-27-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/788-19-0x0000000000000000-mapping.dmp
-
memory/788-22-0x00000000743C0000-0x0000000074AAE000-memory.dmpFilesize
6.9MB
-
memory/788-23-0x0000000000180000-0x0000000000181000-memory.dmpFilesize
4KB
-
memory/788-26-0x0000000004B80000-0x0000000004B81000-memory.dmpFilesize
4KB
-
memory/936-33-0x0000000000000000-mapping.dmp
-
memory/984-15-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/984-14-0x00000000743C0000-0x0000000074AAE000-memory.dmpFilesize
6.9MB
-
memory/984-13-0x000000000041F39E-mapping.dmp
-
memory/984-12-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/984-34-0x00000000049F0000-0x00000000049F1000-memory.dmpFilesize
4KB
-
memory/1276-3-0x000007FEF67C0000-0x000007FEF6A3A000-memory.dmpFilesize
2.5MB
-
memory/1376-32-0x0000000000000000-mapping.dmp
-
memory/1608-5-0x0000000000000000-mapping.dmp
-
memory/1608-8-0x00000000743C0000-0x0000000074AAE000-memory.dmpFilesize
6.9MB
-
memory/1608-9-0x0000000000B20000-0x0000000000B21000-memory.dmpFilesize
4KB
-
memory/1608-11-0x0000000004500000-0x0000000004501000-memory.dmpFilesize
4KB
-
memory/1856-2-0x00000000767E1000-0x00000000767E3000-memory.dmpFilesize
8KB