Analysis
-
max time kernel
39s -
max time network
134s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
11-08-2021 18:21
Static task
static1
General
-
Target
3760fafd1e5ee645aaef604ff52ffa90b563bc13bfbc18e9b3af523b3ebf20b5.exe
-
Size
796KB
-
MD5
a974c0caddd12b9920902ef72ffdad0c
-
SHA1
bf559198597d137f81eb52e1071389de96514ab4
-
SHA256
3760fafd1e5ee645aaef604ff52ffa90b563bc13bfbc18e9b3af523b3ebf20b5
-
SHA512
8d3e5d97380919592ce4123cbc7e0a25665aa5d0f0fd55a3b1553b341689d441278f46898f72e1faedce1a8b84dd7a35d6a9c32399e74df967b5d3e9d80bb729
Malware Config
Extracted
redline
RUZ
sandedean.xyz:80
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3812-141-0x0000000002300000-0x000000000231D000-memory.dmp family_redline behavioral1/memory/3812-143-0x00000000023B0000-0x00000000023CB000-memory.dmp family_redline -
Executes dropped EXE 3 IoCs
Processes:
trust_cert.comledarx.exeledarx.exepid process 2188 trust_cert.com 496 ledarx.exe 3812 ledarx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
ledarx.exedescription pid process target process PID 496 set thread context of 3812 496 ledarx.exe ledarx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 5 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 1096 timeout.exe 3448 timeout.exe 2712 timeout.exe 2284 timeout.exe 3832 timeout.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 412 taskkill.exe 1816 taskkill.exe -
Modifies registry class 2 IoCs
Processes:
cmd.exe3760fafd1e5ee645aaef604ff52ffa90b563bc13bfbc18e9b3af523b3ebf20b5.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings 3760fafd1e5ee645aaef604ff52ffa90b563bc13bfbc18e9b3af523b3ebf20b5.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
ledarx.exepid process 3812 ledarx.exe 3812 ledarx.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
taskkill.exetaskkill.exeledarx.exedescription pid process Token: SeDebugPrivilege 412 taskkill.exe Token: SeDebugPrivilege 1816 taskkill.exe Token: SeDebugPrivilege 3812 ledarx.exe -
Suspicious use of WriteProcessMemory 50 IoCs
Processes:
3760fafd1e5ee645aaef604ff52ffa90b563bc13bfbc18e9b3af523b3ebf20b5.exeWScript.execmd.exeWScript.execmd.exeledarx.exedescription pid process target process PID 1440 wrote to memory of 2712 1440 3760fafd1e5ee645aaef604ff52ffa90b563bc13bfbc18e9b3af523b3ebf20b5.exe WScript.exe PID 1440 wrote to memory of 2712 1440 3760fafd1e5ee645aaef604ff52ffa90b563bc13bfbc18e9b3af523b3ebf20b5.exe WScript.exe PID 1440 wrote to memory of 2712 1440 3760fafd1e5ee645aaef604ff52ffa90b563bc13bfbc18e9b3af523b3ebf20b5.exe WScript.exe PID 2712 wrote to memory of 2368 2712 WScript.exe cmd.exe PID 2712 wrote to memory of 2368 2712 WScript.exe cmd.exe PID 2712 wrote to memory of 2368 2712 WScript.exe cmd.exe PID 2368 wrote to memory of 3832 2368 cmd.exe timeout.exe PID 2368 wrote to memory of 3832 2368 cmd.exe timeout.exe PID 2368 wrote to memory of 3832 2368 cmd.exe timeout.exe PID 2368 wrote to memory of 2188 2368 cmd.exe trust_cert.com PID 2368 wrote to memory of 2188 2368 cmd.exe trust_cert.com PID 2368 wrote to memory of 2188 2368 cmd.exe trust_cert.com PID 2368 wrote to memory of 1096 2368 cmd.exe timeout.exe PID 2368 wrote to memory of 1096 2368 cmd.exe timeout.exe PID 2368 wrote to memory of 1096 2368 cmd.exe timeout.exe PID 2368 wrote to memory of 3900 2368 cmd.exe WScript.exe PID 2368 wrote to memory of 3900 2368 cmd.exe WScript.exe PID 2368 wrote to memory of 3900 2368 cmd.exe WScript.exe PID 2368 wrote to memory of 3448 2368 cmd.exe timeout.exe PID 2368 wrote to memory of 3448 2368 cmd.exe timeout.exe PID 2368 wrote to memory of 3448 2368 cmd.exe timeout.exe PID 3900 wrote to memory of 2992 3900 WScript.exe cmd.exe PID 3900 wrote to memory of 2992 3900 WScript.exe cmd.exe PID 3900 wrote to memory of 2992 3900 WScript.exe cmd.exe PID 2992 wrote to memory of 3296 2992 cmd.exe attrib.exe PID 2992 wrote to memory of 3296 2992 cmd.exe attrib.exe PID 2992 wrote to memory of 3296 2992 cmd.exe attrib.exe PID 2992 wrote to memory of 2712 2992 cmd.exe timeout.exe PID 2992 wrote to memory of 2712 2992 cmd.exe timeout.exe PID 2992 wrote to memory of 2712 2992 cmd.exe timeout.exe PID 2992 wrote to memory of 496 2992 cmd.exe ledarx.exe PID 2992 wrote to memory of 496 2992 cmd.exe ledarx.exe PID 2992 wrote to memory of 496 2992 cmd.exe ledarx.exe PID 496 wrote to memory of 3812 496 ledarx.exe ledarx.exe PID 496 wrote to memory of 3812 496 ledarx.exe ledarx.exe PID 496 wrote to memory of 3812 496 ledarx.exe ledarx.exe PID 496 wrote to memory of 3812 496 ledarx.exe ledarx.exe PID 496 wrote to memory of 3812 496 ledarx.exe ledarx.exe PID 2992 wrote to memory of 412 2992 cmd.exe taskkill.exe PID 2992 wrote to memory of 412 2992 cmd.exe taskkill.exe PID 2992 wrote to memory of 412 2992 cmd.exe taskkill.exe PID 2992 wrote to memory of 1816 2992 cmd.exe taskkill.exe PID 2992 wrote to memory of 1816 2992 cmd.exe taskkill.exe PID 2992 wrote to memory of 1816 2992 cmd.exe taskkill.exe PID 2992 wrote to memory of 2288 2992 cmd.exe attrib.exe PID 2992 wrote to memory of 2288 2992 cmd.exe attrib.exe PID 2992 wrote to memory of 2288 2992 cmd.exe attrib.exe PID 2992 wrote to memory of 2284 2992 cmd.exe timeout.exe PID 2992 wrote to memory of 2284 2992 cmd.exe timeout.exe PID 2992 wrote to memory of 2284 2992 cmd.exe timeout.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 3296 attrib.exe 2288 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3760fafd1e5ee645aaef604ff52ffa90b563bc13bfbc18e9b3af523b3ebf20b5.exe"C:\Users\Admin\AppData\Local\Temp\3760fafd1e5ee645aaef604ff52ffa90b563bc13bfbc18e9b3af523b3ebf20b5.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Soft\trusted\trusr.vbs" /f=CREATE_NO_WINDOW install.cmd2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Soft\trusted\1at.bat" "3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 74⤵
- Delays execution with timeout.exe
-
C:\Soft\trusted\trust_cert.com"trust_cert.com" e -pEkZAp8pHr6Mqaq9SQ xr.rar4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\timeout.exetimeout 64⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Soft\trusted\9l.vbs"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Soft\trusted\xx54.bat" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Soft"6⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\timeout.exetimeout 26⤵
- Delays execution with timeout.exe
-
C:\Soft\trusted\ledarx.exeledarx.exe /start6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Soft\trusted\ledarx.exeledarx.exe /start7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im trust_cert.com6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im trust_cert.com6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h "C:\Soft\trusted"6⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\timeout.exetimeout 46⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\timeout.exetimeout 84⤵
- Delays execution with timeout.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Soft\trusted\1at.batMD5
9621e9b2dda4f5d9e98394e7083e9acc
SHA1b41457492caaa084e04eea368ddfdce7b4ff47f8
SHA25668db4992619b59abe6db43501028272e95124dbb10e94dd72f9c66ce47b6373a
SHA512e060d37aba786f1c725a3e2ce9954220a0d53bb97880036156ae51360bc6e72707187b4685a35371107b2916cdf5854dfc9def56d2d2f258ad272b99277b2168
-
C:\Soft\trusted\9l.vbsMD5
43e78a35d4d3ec90d7e760caa8dad51c
SHA1d9d379ae55ae8daa9aa9aa28a3567efaeb63eebe
SHA256869d7ba49888533eaf5b8d571c867bf3dae406fdd44318b8ae7bb03af2a84d6f
SHA51234e2cf9d6dfd41c24e468206bffebb2b5f1e491b987b2f797e6bf5e83ad3fe063ece9cfeebb401617ae4f8f0ae370a3f0f364bd7a88759812771159a0e94806f
-
C:\Soft\trusted\dump.sslMD5
2e58e3545c24c2955b0c361cd55c30e1
SHA1f8b07f9043c86a5ab3ba2518fb30ca4607e473c4
SHA2563743472aa6d2c8bd148575df3a0cb2dbc78137f219f442044a68f3b4278e1e1f
SHA5121ea632a4726d1d2e193d3cbdcb43f83a709c3744df17441155875e6ee3e3f09418ef4a9807a5b16cbdefa4bac760a114c539e889209d8d45dfc714c49986e13c
-
C:\Soft\trusted\ledarx.exeMD5
1f331d518d0e425ab7642ccd638ec795
SHA171be2eec586f3a1dfb6971845a784ceeb049a838
SHA25663fd6bf15b0991d449174bc48825a2ccf0056e9cff75b407cbe9755241ef6a35
SHA512b449ca3c6410e035dfd7d45f5a37cbcdc8e4e97a8318ab36e513d7044115bcf7f23eb9dd8321f04ee04f93ff8cd626b1ec6b3913c0cd1d34eb5d0e0f80422b80
-
C:\Soft\trusted\ledarx.exeMD5
1f331d518d0e425ab7642ccd638ec795
SHA171be2eec586f3a1dfb6971845a784ceeb049a838
SHA25663fd6bf15b0991d449174bc48825a2ccf0056e9cff75b407cbe9755241ef6a35
SHA512b449ca3c6410e035dfd7d45f5a37cbcdc8e4e97a8318ab36e513d7044115bcf7f23eb9dd8321f04ee04f93ff8cd626b1ec6b3913c0cd1d34eb5d0e0f80422b80
-
C:\Soft\trusted\ledarx.exeMD5
1f331d518d0e425ab7642ccd638ec795
SHA171be2eec586f3a1dfb6971845a784ceeb049a838
SHA25663fd6bf15b0991d449174bc48825a2ccf0056e9cff75b407cbe9755241ef6a35
SHA512b449ca3c6410e035dfd7d45f5a37cbcdc8e4e97a8318ab36e513d7044115bcf7f23eb9dd8321f04ee04f93ff8cd626b1ec6b3913c0cd1d34eb5d0e0f80422b80
-
C:\Soft\trusted\trusr.vbsMD5
e4bc20a44789d26859352df31041bd1f
SHA149e3fdc0385299007b4617bc84759f0b4225fdb4
SHA25613ce6cfecb26ca72699dd624cdd20e07453cc39f24452642edcf91ad724da99a
SHA51237f0441f915948485032047c9fcb2842b9699fc118dec8c961eb815f7fb489a391640ceff9bc9bc58da34e54a48a9f9a81f5509008d89dbeb1478367a34e2102
-
C:\Soft\trusted\trust_cert.comMD5
061f64173293969577916832be29b90d
SHA1b05b80385de20463a80b6c9c39bd1d53123aab9b
SHA25634dfe4869b0a524c63cc4696fafe30c83a22dc5fe4b994b9fe777f2c986733ce
SHA51266e284f7c7e40af988ab09ff48cc786d287ac906368042d98d313be764058f01ecb5c3a7ab8d4336ee6494ea4a1347e73f0f2b4f3baec25ca6bcec1d888bd3da
-
C:\Soft\trusted\trust_cert.comMD5
061f64173293969577916832be29b90d
SHA1b05b80385de20463a80b6c9c39bd1d53123aab9b
SHA25634dfe4869b0a524c63cc4696fafe30c83a22dc5fe4b994b9fe777f2c986733ce
SHA51266e284f7c7e40af988ab09ff48cc786d287ac906368042d98d313be764058f01ecb5c3a7ab8d4336ee6494ea4a1347e73f0f2b4f3baec25ca6bcec1d888bd3da
-
C:\Soft\trusted\xx54.batMD5
b44f70202d320f439facb9d67726e445
SHA1c1d8c5f0677acc788ab7072e10dca15153fa60ba
SHA2566ec5f540671441cdae8bc4f7c9aaf5d6901624fb772243acd01cfd171c9fac77
SHA5120561ef4b7b1fa4dce7ea9bf0ba7bf3bc6623945885719621f39aeaf71f90ea91d5868617948ab316e692890225186f7724183451d27c8ded5a12c5a51d2b5a70
-
memory/412-136-0x0000000000000000-mapping.dmp
-
memory/496-130-0x0000000000000000-mapping.dmp
-
memory/1096-122-0x0000000000000000-mapping.dmp
-
memory/1816-137-0x0000000000000000-mapping.dmp
-
memory/2188-120-0x0000000000000000-mapping.dmp
-
memory/2284-139-0x0000000000000000-mapping.dmp
-
memory/2288-138-0x0000000000000000-mapping.dmp
-
memory/2368-117-0x0000000000000000-mapping.dmp
-
memory/2712-114-0x0000000000000000-mapping.dmp
-
memory/2712-129-0x0000000000000000-mapping.dmp
-
memory/2992-127-0x0000000000000000-mapping.dmp
-
memory/3296-128-0x0000000000000000-mapping.dmp
-
memory/3448-125-0x0000000000000000-mapping.dmp
-
memory/3812-147-0x0000000004BA3000-0x0000000004BA4000-memory.dmpFilesize
4KB
-
memory/3812-159-0x0000000007070000-0x0000000007071000-memory.dmpFilesize
4KB
-
memory/3812-134-0x000000000040CD2F-mapping.dmp
-
memory/3812-140-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/3812-141-0x0000000002300000-0x000000000231D000-memory.dmpFilesize
116KB
-
memory/3812-142-0x0000000004BB0000-0x0000000004BB1000-memory.dmpFilesize
4KB
-
memory/3812-143-0x00000000023B0000-0x00000000023CB000-memory.dmpFilesize
108KB
-
memory/3812-144-0x00000000050B0000-0x00000000050B1000-memory.dmpFilesize
4KB
-
memory/3812-146-0x0000000004BA2000-0x0000000004BA3000-memory.dmpFilesize
4KB
-
memory/3812-149-0x00000000025A0000-0x00000000025A1000-memory.dmpFilesize
4KB
-
memory/3812-148-0x0000000002580000-0x0000000002581000-memory.dmpFilesize
4KB
-
memory/3812-133-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/3812-145-0x0000000004BA0000-0x0000000004BA1000-memory.dmpFilesize
4KB
-
memory/3812-150-0x0000000004BA4000-0x0000000004BA6000-memory.dmpFilesize
8KB
-
memory/3812-151-0x0000000004A80000-0x0000000004A81000-memory.dmpFilesize
4KB
-
memory/3812-152-0x0000000005700000-0x0000000005701000-memory.dmpFilesize
4KB
-
memory/3812-158-0x00000000070A0000-0x00000000070A1000-memory.dmpFilesize
4KB
-
memory/3812-154-0x00000000063E0000-0x00000000063E1000-memory.dmpFilesize
4KB
-
memory/3812-155-0x00000000065B0000-0x00000000065B1000-memory.dmpFilesize
4KB
-
memory/3812-156-0x0000000006BE0000-0x0000000006BE1000-memory.dmpFilesize
4KB
-
memory/3812-157-0x0000000006F50000-0x0000000006F51000-memory.dmpFilesize
4KB
-
memory/3832-118-0x0000000000000000-mapping.dmp
-
memory/3900-124-0x0000000000000000-mapping.dmp