Analysis
-
max time kernel
150s -
max time network
194s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
22-06-2021 10:06
Static task
static1
Behavioral task
behavioral1
Sample
a8d8fc71f6f9802c725fd8930b0964d1.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
a8d8fc71f6f9802c725fd8930b0964d1.exe
Resource
win10v20210408
General
-
Target
a8d8fc71f6f9802c725fd8930b0964d1.exe
-
Size
3.3MB
-
MD5
a8d8fc71f6f9802c725fd8930b0964d1
-
SHA1
f4f79dde85e23bf7a6e0708d665ef38ba0ac6568
-
SHA256
36b7419eb850d06e31f8323dfbd6460240d09ec99e34fb5280279d9dc297d1ba
-
SHA512
720bbb90a50e77ace5a409618fde663ac76e7db41ca6b55d27124edb9f87e9a85aa8e67cbda01c9dbb6a7a36cf0d8caa9f5f399441fc555f0b48212ed0cb1c83
Malware Config
Extracted
redline
Ani
yaklalau.xyz:80
Extracted
redline
22_6_r
qitoshalan.xyz:80
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 5 IoCs
resource yara_rule behavioral1/memory/1996-163-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2656-220-0x0000000000417F22-mapping.dmp family_redline behavioral1/memory/2656-219-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2656-222-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2416-243-0x0000000000417F1A-mapping.dmp family_redline -
resource yara_rule behavioral1/files/0x00030000000130c6-61.dat aspack_v212_v242 behavioral1/files/0x00030000000130c6-62.dat aspack_v212_v242 behavioral1/files/0x00030000000130c6-63.dat aspack_v212_v242 behavioral1/files/0x00030000000130c6-65.dat aspack_v212_v242 behavioral1/files/0x00030000000130c2-67.dat aspack_v212_v242 behavioral1/files/0x00030000000130c2-66.dat aspack_v212_v242 behavioral1/files/0x00030000000130c1-68.dat aspack_v212_v242 behavioral1/files/0x00030000000130c1-69.dat aspack_v212_v242 behavioral1/files/0x00030000000130c4-74.dat aspack_v212_v242 behavioral1/files/0x00030000000130c4-75.dat aspack_v212_v242 behavioral1/files/0x00030000000130c6-79.dat aspack_v212_v242 behavioral1/files/0x00030000000130c6-78.dat aspack_v212_v242 behavioral1/files/0x00030000000130c6-80.dat aspack_v212_v242 behavioral1/files/0x00030000000130c6-77.dat aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 2020 setup_install.exe 1988 arnatic_3.exe 364 arnatic_1.exe -
Loads dropped DLL 22 IoCs
pid Process 1696 a8d8fc71f6f9802c725fd8930b0964d1.exe 1696 a8d8fc71f6f9802c725fd8930b0964d1.exe 1696 a8d8fc71f6f9802c725fd8930b0964d1.exe 2020 setup_install.exe 2020 setup_install.exe 2020 setup_install.exe 2020 setup_install.exe 2020 setup_install.exe 2020 setup_install.exe 2020 setup_install.exe 2020 setup_install.exe 568 cmd.exe 568 cmd.exe 1836 DllHost.exe 364 arnatic_1.exe 364 arnatic_1.exe 1988 arnatic_3.exe 1988 arnatic_3.exe 300 cmd.exe 956 cmd.exe 1312 cmd.exe 1312 cmd.exe -
resource yara_rule behavioral1/memory/2288-215-0x0000000000320000-0x0000000000321000-memory.dmp themida -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 103 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 2968 2580 WerFault.exe 67 2560 2176 WerFault.exe 79 1600 364 WerFault.exe 33 -
Kills process with taskkill 2 IoCs
pid Process 2908 taskkill.exe 3056 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1696 wrote to memory of 2020 1696 a8d8fc71f6f9802c725fd8930b0964d1.exe 27 PID 1696 wrote to memory of 2020 1696 a8d8fc71f6f9802c725fd8930b0964d1.exe 27 PID 1696 wrote to memory of 2020 1696 a8d8fc71f6f9802c725fd8930b0964d1.exe 27 PID 1696 wrote to memory of 2020 1696 a8d8fc71f6f9802c725fd8930b0964d1.exe 27 PID 1696 wrote to memory of 2020 1696 a8d8fc71f6f9802c725fd8930b0964d1.exe 27 PID 1696 wrote to memory of 2020 1696 a8d8fc71f6f9802c725fd8930b0964d1.exe 27 PID 1696 wrote to memory of 2020 1696 a8d8fc71f6f9802c725fd8930b0964d1.exe 27 PID 2020 wrote to memory of 568 2020 setup_install.exe 30 PID 2020 wrote to memory of 568 2020 setup_install.exe 30 PID 2020 wrote to memory of 568 2020 setup_install.exe 30 PID 2020 wrote to memory of 568 2020 setup_install.exe 30 PID 2020 wrote to memory of 568 2020 setup_install.exe 30 PID 2020 wrote to memory of 568 2020 setup_install.exe 30 PID 2020 wrote to memory of 568 2020 setup_install.exe 30 PID 2020 wrote to memory of 1424 2020 setup_install.exe 31 PID 2020 wrote to memory of 1424 2020 setup_install.exe 31 PID 2020 wrote to memory of 1424 2020 setup_install.exe 31 PID 2020 wrote to memory of 1424 2020 setup_install.exe 31 PID 2020 wrote to memory of 1424 2020 setup_install.exe 31 PID 2020 wrote to memory of 1424 2020 setup_install.exe 31 PID 2020 wrote to memory of 1424 2020 setup_install.exe 31 PID 2020 wrote to memory of 1836 2020 setup_install.exe 48 PID 2020 wrote to memory of 1836 2020 setup_install.exe 48 PID 2020 wrote to memory of 1836 2020 setup_install.exe 48 PID 2020 wrote to memory of 1836 2020 setup_install.exe 48 PID 2020 wrote to memory of 1836 2020 setup_install.exe 48 PID 2020 wrote to memory of 1836 2020 setup_install.exe 48 PID 2020 wrote to memory of 1836 2020 setup_install.exe 48 PID 2020 wrote to memory of 324 2020 setup_install.exe 47 PID 2020 wrote to memory of 324 2020 setup_install.exe 47 PID 2020 wrote to memory of 324 2020 setup_install.exe 47 PID 2020 wrote to memory of 324 2020 setup_install.exe 47 PID 2020 wrote to memory of 324 2020 setup_install.exe 47 PID 2020 wrote to memory of 324 2020 setup_install.exe 47 PID 2020 wrote to memory of 324 2020 setup_install.exe 47 PID 568 wrote to memory of 364 568 cmd.exe 33 PID 568 wrote to memory of 364 568 cmd.exe 33 PID 568 wrote to memory of 364 568 cmd.exe 33 PID 568 wrote to memory of 364 568 cmd.exe 33 PID 568 wrote to memory of 364 568 cmd.exe 33 PID 568 wrote to memory of 364 568 cmd.exe 33 PID 568 wrote to memory of 364 568 cmd.exe 33 PID 2020 wrote to memory of 300 2020 setup_install.exe 46 PID 2020 wrote to memory of 300 2020 setup_install.exe 46 PID 2020 wrote to memory of 300 2020 setup_install.exe 46 PID 2020 wrote to memory of 300 2020 setup_install.exe 46 PID 2020 wrote to memory of 300 2020 setup_install.exe 46 PID 2020 wrote to memory of 300 2020 setup_install.exe 46 PID 2020 wrote to memory of 300 2020 setup_install.exe 46 PID 1836 wrote to memory of 1988 1836 DllHost.exe 34 PID 1836 wrote to memory of 1988 1836 DllHost.exe 34 PID 1836 wrote to memory of 1988 1836 DllHost.exe 34 PID 1836 wrote to memory of 1988 1836 DllHost.exe 34 PID 1836 wrote to memory of 1988 1836 DllHost.exe 34 PID 1836 wrote to memory of 1988 1836 DllHost.exe 34 PID 1836 wrote to memory of 1988 1836 DllHost.exe 34 PID 2020 wrote to memory of 956 2020 setup_install.exe 44 PID 2020 wrote to memory of 956 2020 setup_install.exe 44 PID 2020 wrote to memory of 956 2020 setup_install.exe 44 PID 2020 wrote to memory of 956 2020 setup_install.exe 44 PID 2020 wrote to memory of 956 2020 setup_install.exe 44 PID 2020 wrote to memory of 956 2020 setup_install.exe 44 PID 2020 wrote to memory of 956 2020 setup_install.exe 44 PID 2020 wrote to memory of 1312 2020 setup_install.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8d8fc71f6f9802c725fd8930b0964d1.exe"C:\Users\Admin\AppData\Local\Temp\a8d8fc71f6f9802c725fd8930b0964d1.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\7zS0A6350F4\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS0A6350F4\setup_install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_1.exe3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Users\Admin\AppData\Local\Temp\7zS0A6350F4\arnatic_1.exearnatic_1.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 364 -s 9685⤵
- Program crash
PID:1600
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_2.exe3⤵PID:1424
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_3.exe3⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\7zS0A6350F4\arnatic_3.exearnatic_3.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1988 -
C:\Windows\SysWOW64\rUNdlL32.eXe"C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\axhub.dll",axhub5⤵PID:1452
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_8.exe3⤵PID:296
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_7.exe3⤵
- Loads dropped DLL
PID:1312
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_6.exe3⤵
- Loads dropped DLL
PID:956
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_5.exe3⤵
- Loads dropped DLL
PID:300
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_4.exe3⤵PID:324
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0A6350F4\arnatic_5.exearnatic_5.exe1⤵PID:900
-
C:\Users\Admin\AppData\Roaming\1822378.exe"C:\Users\Admin\AppData\Roaming\1822378.exe"2⤵PID:2580
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2580 -s 5243⤵
- Program crash
PID:2968
-
-
-
C:\Users\Admin\AppData\Roaming\3749735.exe"C:\Users\Admin\AppData\Roaming\3749735.exe"2⤵PID:2624
-
-
C:\Users\Admin\AppData\Roaming\2361525.exe"C:\Users\Admin\AppData\Roaming\2361525.exe"2⤵PID:2664
-
-
C:\Users\Admin\AppData\Roaming\6242654.exe"C:\Users\Admin\AppData\Roaming\6242654.exe"2⤵PID:2704
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0A6350F4\arnatic_7.exearnatic_7.exe1⤵PID:680
-
C:\Users\Admin\AppData\Local\Temp\7zS0A6350F4\arnatic_7.exeC:\Users\Admin\AppData\Local\Temp\7zS0A6350F4\arnatic_7.exe2⤵PID:1996
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0A6350F4\arnatic_8.exearnatic_8.exe1⤵PID:784
-
C:\Users\Admin\AppData\Local\Temp\7zS0A6350F4\arnatic_6.exearnatic_6.exe1⤵PID:1388
-
C:\Users\Admin\Documents\BvIPT99aEAIm2TxeQXe4jP9I.exe"C:\Users\Admin\Documents\BvIPT99aEAIm2TxeQXe4jP9I.exe"2⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\03250045-7786-4d2a-aa42-00cc0538b4dc\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\03250045-7786-4d2a-aa42-00cc0538b4dc\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\03250045-7786-4d2a-aa42-00cc0538b4dc\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run3⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\03250045-7786-4d2a-aa42-00cc0538b4dc\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\03250045-7786-4d2a-aa42-00cc0538b4dc\AdvancedRun.exe" /SpecialRun 4101d8 30164⤵PID:2392
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\Documents\BvIPT99aEAIm2TxeQXe4jP9I.exe" -Force3⤵PID:2180
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 13⤵PID:1232
-
-
-
C:\Users\Admin\Documents\Vb6mYvH3lrttGWwKVevXVxhc.exe"C:\Users\Admin\Documents\Vb6mYvH3lrttGWwKVevXVxhc.exe"2⤵PID:2324
-
-
C:\Users\Admin\Documents\8dNZoicPsyGV78NV2QvJOKxE.exe"C:\Users\Admin\Documents\8dNZoicPsyGV78NV2QvJOKxE.exe"2⤵PID:2312
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 8dNZoicPsyGV78NV2QvJOKxE.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\8dNZoicPsyGV78NV2QvJOKxE.exe" & del C:\ProgramData\*.dll & exit3⤵PID:2940
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im 8dNZoicPsyGV78NV2QvJOKxE.exe /f4⤵
- Kills process with taskkill
PID:3056
-
-
-
-
C:\Users\Admin\Documents\N4yxJzlb9RzVdOsXzM7UPdhs.exe"C:\Users\Admin\Documents\N4yxJzlb9RzVdOsXzM7UPdhs.exe"2⤵PID:2300
-
-
C:\Users\Admin\Documents\gSVXgTUjR2k3SwbhxjVdYyeB.exe"C:\Users\Admin\Documents\gSVXgTUjR2k3SwbhxjVdYyeB.exe"2⤵PID:2288
-
-
C:\Users\Admin\Documents\iPAgey1yYqs5_hBizVJWcOcG.exe"C:\Users\Admin\Documents\iPAgey1yYqs5_hBizVJWcOcG.exe"2⤵PID:2276
-
-
C:\Users\Admin\Documents\fZpH4IpRtAVb3Jv3zQOmGnWO.exe"C:\Users\Admin\Documents\fZpH4IpRtAVb3Jv3zQOmGnWO.exe"2⤵PID:2264
-
-
C:\Users\Admin\Documents\UyVyRPG5sjCQnB1IshGj_jjx.exe"C:\Users\Admin\Documents\UyVyRPG5sjCQnB1IshGj_jjx.exe"2⤵PID:2252
-
-
C:\Users\Admin\Documents\efK3MfcSzodMQQEm42sB9rFM.exe"C:\Users\Admin\Documents\efK3MfcSzodMQQEm42sB9rFM.exe"2⤵PID:2224
-
-
C:\Users\Admin\Documents\LT2Q4I0K9HVBT0cuQUPnSIFh.exe"C:\Users\Admin\Documents\LT2Q4I0K9HVBT0cuQUPnSIFh.exe"2⤵PID:2232
-
-
C:\Users\Admin\Documents\5IPQUYZ0a6AgHk4dt5HGiOid.exe"C:\Users\Admin\Documents\5IPQUYZ0a6AgHk4dt5HGiOid.exe"2⤵PID:2200
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "5IPQUYZ0a6AgHk4dt5HGiOid.exe" /f & erase "C:\Users\Admin\Documents\5IPQUYZ0a6AgHk4dt5HGiOid.exe" & exit3⤵PID:2844
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "5IPQUYZ0a6AgHk4dt5HGiOid.exe" /f4⤵
- Kills process with taskkill
PID:2908
-
-
-
-
C:\Users\Admin\Documents\BiHMY8VKkhDEMq4NiOezC_Ow.exe"C:\Users\Admin\Documents\BiHMY8VKkhDEMq4NiOezC_Ow.exe"2⤵PID:2188
-
C:\Program Files (x86)\Company\NewProduct\jooyu.exe"C:\Program Files (x86)\Company\NewProduct\jooyu.exe"3⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:2640
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:3028
-
-
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"3⤵PID:2176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2176 -s 2924⤵
- Program crash
PID:2560
-
-
-
C:\Program Files (x86)\Company\NewProduct\jingzhang.exe"C:\Program Files (x86)\Company\NewProduct\jingzhang.exe"3⤵PID:1300
-
C:\Windows\SysWOW64\rUNdlL32.eXe"C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\install.dll",shl4⤵PID:2840
-
-
-
C:\Program Files (x86)\Company\NewProduct\file4.exe"C:\Program Files (x86)\Company\NewProduct\file4.exe"3⤵PID:3068
-
-
-
C:\Users\Admin\Documents\YIWxXA1sPOEv8YzAo0zTk8Km.exe"C:\Users\Admin\Documents\YIWxXA1sPOEv8YzAo0zTk8Km.exe"2⤵PID:2168
-
C:\Users\Admin\Documents\YIWxXA1sPOEv8YzAo0zTk8Km.exeC:\Users\Admin\Documents\YIWxXA1sPOEv8YzAo0zTk8Km.exe3⤵PID:2656
-
-
-
C:\Users\Admin\Documents\84PjhIm_0RthLxZKRC0MIqPs.exe"C:\Users\Admin\Documents\84PjhIm_0RthLxZKRC0MIqPs.exe"2⤵PID:2392
-
C:\Windows\SysWOW64\rUNdlL32.eXe"C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\axhub.dll",axhub3⤵PID:3040
-
-
-
C:\Users\Admin\Documents\x_Q8AIOH2UzwfaGoOCqxrZip.exe"C:\Users\Admin\Documents\x_Q8AIOH2UzwfaGoOCqxrZip.exe"2⤵PID:2408
-
C:\Users\Admin\Documents\x_Q8AIOH2UzwfaGoOCqxrZip.exeC:\Users\Admin\Documents\x_Q8AIOH2UzwfaGoOCqxrZip.exe3⤵PID:2416
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:1800
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1836