Overview
overview
10Static
static
028d53f522...fa.exe
windows7_x64
10028d53f522...fa.exe
windows11_x64
10028d53f522...fa.exe
windows10_x64
10Bot_Checker.exe
windows7_x64
3Bot_Checker.exe
windows11_x64
10Bot_Checker.exe
windows10_x64
10Uninstall.exe
windows7_x64
3Uninstall.exe
windows11_x64
6Uninstall.exe
windows10_x64
3Versium.exe
windows7_x64
9Versium.exe
windows11_x64
10Versium.exe
windows10_x64
10VersiumRes...it.exe
windows7_x64
10VersiumRes...it.exe
windows11_x64
10VersiumRes...it.exe
windows10_x64
10VersiumRes...it.exe
windows7_x64
8VersiumRes...it.exe
windows11_x64
8VersiumRes...it.exe
windows10_x64
8Versiumresearch.exe
windows7_x64
10Versiumresearch.exe
windows11_x64
Versiumresearch.exe
windows10_x64
10Analysis
-
max time kernel
719s -
max time network
1445s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
12-08-2021 20:38
Static task
static1
Behavioral task
behavioral1
Sample
028d53f5224f9cc8c60bd953504f1efa.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
028d53f5224f9cc8c60bd953504f1efa.exe
Resource
win11
Behavioral task
behavioral3
Sample
028d53f5224f9cc8c60bd953504f1efa.exe
Resource
win10v20210408
Behavioral task
behavioral4
Sample
Bot_Checker.exe
Resource
win7v20210410
Behavioral task
behavioral5
Sample
Bot_Checker.exe
Resource
win11
Behavioral task
behavioral6
Sample
Bot_Checker.exe
Resource
win10v20210408
Behavioral task
behavioral7
Sample
Uninstall.exe
Resource
win7v20210408
Behavioral task
behavioral8
Sample
Uninstall.exe
Resource
win11
Behavioral task
behavioral9
Sample
Uninstall.exe
Resource
win10v20210410
Behavioral task
behavioral10
Sample
Versium.exe
Resource
win7v20210408
Behavioral task
behavioral11
Sample
Versium.exe
Resource
win11
Behavioral task
behavioral12
Sample
Versium.exe
Resource
win10v20210408
Behavioral task
behavioral13
Sample
VersiumResearch32bit.exe
Resource
win7v20210410
Behavioral task
behavioral14
Sample
VersiumResearch32bit.exe
Resource
win11
Behavioral task
behavioral15
Sample
VersiumResearch32bit.exe
Resource
win10v20210408
Behavioral task
behavioral16
Sample
VersiumResearch64bit.exe
Resource
win7v20210408
Behavioral task
behavioral17
Sample
VersiumResearch64bit.exe
Resource
win11
Behavioral task
behavioral18
Sample
VersiumResearch64bit.exe
Resource
win10v20210410
Behavioral task
behavioral19
Sample
Versiumresearch.exe
Resource
win7v20210410
Behavioral task
behavioral20
Sample
Versiumresearch.exe
Resource
win11
Behavioral task
behavioral21
Sample
Versiumresearch.exe
Resource
win10v20210410
General
-
Target
Versiumresearch.exe
-
Size
163KB
-
MD5
b1dbc3b027105d8032541bc0c5e71abb
-
SHA1
1ef1950ecb44e6bd8d0a3849868ec9a0ceaa1130
-
SHA256
b0eb54f46e5919460cb8d21fdcd695e3356b6311ab0547f18dc3d84a66a14bc4
-
SHA512
3f7fd0aa71e6fae5eeaf16cc47a1ac43cdd1f643c1e7e439eb068685558929cf3c74552ad70fbf2d6cad94cc11bb8ea9c099ef1401b868947f1a9e5e44b34f7b
Malware Config
Extracted
redline
7new
sytareliar.xyz:80
yabelesatg.xyz:80
ceneimarck.xyz:80
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule behavioral21/memory/2824-142-0x00000000047A0000-0x00000000047D2000-memory.dmp family_redline -
suricata: ET MALWARE Observed Elysium Stealer Variant CnC Domain (all-brain-company .xyz in TLS SNI)
suricata: ET MALWARE Observed Elysium Stealer Variant CnC Domain (all-brain-company .xyz in TLS SNI)
-
Executes dropped EXE 5 IoCs
Processes:
4841775.exe5260485.exe4981553.exe8270704.exeWinHoster.exepid process 2396 4841775.exe 2704 5260485.exe 2824 4981553.exe 4072 8270704.exe 3116 WinHoster.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
5260485.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 5260485.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Windows directory 1 IoCs
Processes:
WerFault.exedescription ioc process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3616 2396 WerFault.exe 4841775.exe 1172 4072 WerFault.exe 8270704.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
Processes:
4841775.exeWerFault.exe8270704.exeWerFault.exe4981553.exepid process 2396 4841775.exe 3616 WerFault.exe 3616 WerFault.exe 3616 WerFault.exe 3616 WerFault.exe 3616 WerFault.exe 3616 WerFault.exe 3616 WerFault.exe 3616 WerFault.exe 3616 WerFault.exe 3616 WerFault.exe 3616 WerFault.exe 3616 WerFault.exe 3616 WerFault.exe 3616 WerFault.exe 3616 WerFault.exe 4072 8270704.exe 1172 WerFault.exe 1172 WerFault.exe 1172 WerFault.exe 1172 WerFault.exe 1172 WerFault.exe 1172 WerFault.exe 1172 WerFault.exe 1172 WerFault.exe 1172 WerFault.exe 1172 WerFault.exe 1172 WerFault.exe 1172 WerFault.exe 1172 WerFault.exe 1172 WerFault.exe 1172 WerFault.exe 2824 4981553.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
Versiumresearch.exe4841775.exe8270704.exe4981553.exeWerFault.exeWerFault.exedescription pid process Token: SeDebugPrivilege 1828 Versiumresearch.exe Token: SeDebugPrivilege 2396 4841775.exe Token: SeDebugPrivilege 4072 8270704.exe Token: SeDebugPrivilege 2824 4981553.exe Token: SeDebugPrivilege 3616 WerFault.exe Token: SeRestorePrivilege 1172 WerFault.exe Token: SeBackupPrivilege 1172 WerFault.exe Token: SeBackupPrivilege 1172 WerFault.exe Token: SeDebugPrivilege 1172 WerFault.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
Versiumresearch.exe5260485.exedescription pid process target process PID 1828 wrote to memory of 2396 1828 Versiumresearch.exe 4841775.exe PID 1828 wrote to memory of 2396 1828 Versiumresearch.exe 4841775.exe PID 1828 wrote to memory of 2704 1828 Versiumresearch.exe 5260485.exe PID 1828 wrote to memory of 2704 1828 Versiumresearch.exe 5260485.exe PID 1828 wrote to memory of 2704 1828 Versiumresearch.exe 5260485.exe PID 1828 wrote to memory of 2824 1828 Versiumresearch.exe 4981553.exe PID 1828 wrote to memory of 2824 1828 Versiumresearch.exe 4981553.exe PID 1828 wrote to memory of 2824 1828 Versiumresearch.exe 4981553.exe PID 1828 wrote to memory of 4072 1828 Versiumresearch.exe 8270704.exe PID 1828 wrote to memory of 4072 1828 Versiumresearch.exe 8270704.exe PID 1828 wrote to memory of 4072 1828 Versiumresearch.exe 8270704.exe PID 2704 wrote to memory of 3116 2704 5260485.exe WinHoster.exe PID 2704 wrote to memory of 3116 2704 5260485.exe WinHoster.exe PID 2704 wrote to memory of 3116 2704 5260485.exe WinHoster.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Versiumresearch.exe"C:\Users\Admin\AppData\Local\Temp\Versiumresearch.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Roaming\4841775.exe"C:\Users\Admin\AppData\Roaming\4841775.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2396 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2396 -s 20283⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3616
-
-
-
C:\Users\Admin\AppData\Roaming\5260485.exe"C:\Users\Admin\AppData\Roaming\5260485.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"3⤵
- Executes dropped EXE
PID:3116
-
-
-
C:\Users\Admin\AppData\Roaming\4981553.exe"C:\Users\Admin\AppData\Roaming\4981553.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Users\Admin\AppData\Roaming\8270704.exe"C:\Users\Admin\AppData\Roaming\8270704.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4072 -s 22243⤵
- Drops file in Windows directory
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1172
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
b6b7f896ec6c87db2a811a44abc0c5b5
SHA1b17eac180c2139947d2f8fdc87ff8a2a615cbcbf
SHA25602ca78fdf706e494a923c01179c6f2bcc2fd59e55d79039ac7a20a51453670c6
SHA51227150b8bced3845b834be55e40cc31882a0d5290a0363fbc8e0f20244dc6e3f022c2cb5dc7e8a18b9b140994d85995e7e6ee4270ed37bfbc9535cb97ee313c63
-
MD5
b6b7f896ec6c87db2a811a44abc0c5b5
SHA1b17eac180c2139947d2f8fdc87ff8a2a615cbcbf
SHA25602ca78fdf706e494a923c01179c6f2bcc2fd59e55d79039ac7a20a51453670c6
SHA51227150b8bced3845b834be55e40cc31882a0d5290a0363fbc8e0f20244dc6e3f022c2cb5dc7e8a18b9b140994d85995e7e6ee4270ed37bfbc9535cb97ee313c63
-
MD5
7dfa7a1ec7a798b241d0a3521a0c593a
SHA123fa15493fd3f2e782488d341331aaf914eeba03
SHA256a64f106b863dec9b842e6fd952995a7ad8dd3b272324a1265dfcb513cd986d17
SHA5123817b7a711e354c5111e5354704b3a7fa07cce8801cc46f8c6ca9bf9d893cdfe1d03c7b9faefb135d193bc937a3403de84e2c8ee4a296ca0f397dca73b1acd7b
-
MD5
7dfa7a1ec7a798b241d0a3521a0c593a
SHA123fa15493fd3f2e782488d341331aaf914eeba03
SHA256a64f106b863dec9b842e6fd952995a7ad8dd3b272324a1265dfcb513cd986d17
SHA5123817b7a711e354c5111e5354704b3a7fa07cce8801cc46f8c6ca9bf9d893cdfe1d03c7b9faefb135d193bc937a3403de84e2c8ee4a296ca0f397dca73b1acd7b
-
MD5
1d095bc417db73c6bc6e4c4e7b43106f
SHA1db7e49df1fb5a0a665976f98ff7128aeba40c5f3
SHA256b529e11f2a855b7e7bca65ac994be9dc81191c7fe1b720addb90b98da33e7fee
SHA5123d255ee420aa7eb0f5f28e060d968bf4369f4be3fc8f07bd32c5482fea055e8103347440d41d17d847c5b2b2d3fb2e3a40356db1a33911c0b25828739a88a097
-
MD5
1d095bc417db73c6bc6e4c4e7b43106f
SHA1db7e49df1fb5a0a665976f98ff7128aeba40c5f3
SHA256b529e11f2a855b7e7bca65ac994be9dc81191c7fe1b720addb90b98da33e7fee
SHA5123d255ee420aa7eb0f5f28e060d968bf4369f4be3fc8f07bd32c5482fea055e8103347440d41d17d847c5b2b2d3fb2e3a40356db1a33911c0b25828739a88a097
-
MD5
36acd7e8f309426cb30aeda6c58234a6
SHA1e111555e3324dcb03fda2b03fd4f765dec10ee75
SHA256d17fbe43bc63006f1f11be7948fc385457eb4e830567f5f564cc3d3316ce6a3d
SHA51262449c4e2d9c5faae15164e5751901d2e8e978aa52a7e156e7001b44bb61ed0cc14ee2230458a239ab7a85198826fe704246043ae800ee9c55951b7182b2ea6c
-
MD5
36acd7e8f309426cb30aeda6c58234a6
SHA1e111555e3324dcb03fda2b03fd4f765dec10ee75
SHA256d17fbe43bc63006f1f11be7948fc385457eb4e830567f5f564cc3d3316ce6a3d
SHA51262449c4e2d9c5faae15164e5751901d2e8e978aa52a7e156e7001b44bb61ed0cc14ee2230458a239ab7a85198826fe704246043ae800ee9c55951b7182b2ea6c
-
MD5
1d095bc417db73c6bc6e4c4e7b43106f
SHA1db7e49df1fb5a0a665976f98ff7128aeba40c5f3
SHA256b529e11f2a855b7e7bca65ac994be9dc81191c7fe1b720addb90b98da33e7fee
SHA5123d255ee420aa7eb0f5f28e060d968bf4369f4be3fc8f07bd32c5482fea055e8103347440d41d17d847c5b2b2d3fb2e3a40356db1a33911c0b25828739a88a097
-
MD5
1d095bc417db73c6bc6e4c4e7b43106f
SHA1db7e49df1fb5a0a665976f98ff7128aeba40c5f3
SHA256b529e11f2a855b7e7bca65ac994be9dc81191c7fe1b720addb90b98da33e7fee
SHA5123d255ee420aa7eb0f5f28e060d968bf4369f4be3fc8f07bd32c5482fea055e8103347440d41d17d847c5b2b2d3fb2e3a40356db1a33911c0b25828739a88a097