Overview
overview
10Static
static
10Mr4X5srRQR...AN.exe
windows10_x64
10OEmxRS9Uai...jI.exe
windows10_x64
10OvVYhhgvd6...oB.exe
windows10_x64
9QKvpJeDIaP...YY.exe
windows10_x64
9QwnNK2SHck...xe.xml
windows10_x64
1QxZsdXOO8X...jN.exe
windows10_x64
10QzUu4XgUxQ...C3.exe
windows10_x64
10SHSPDO6BYD...j9.exe
windows10_x64
10SqCuVl85T1...Di.exe
windows10_x64
10T8Ulrjj8F6..._x.exe
windows10_x64
10Trj0QcTNVE...S9.exe
windows10_x64
10Uwc7l02Hzj...tU.exe
windows10_x64
6VoTrXaqIJ3...LW.exe
windows10_x64
10Wp77te7Dqj...Hr.exe
windows10_x64
9XOCYAkm_Nn...Q3.exe
windows10_x64
9Xd_XnNqsZT...Ai.exe
windows10_x64
10Xr9ca9oQNQ...Z9.exe
windows10_x64
9XukfUfK8HA...FI.exe
windows10_x64
8YPTXDeqMC1...ns.exe
windows10_x64
8ma_5nZD3yo...xT.exe
windows10_x64
10pnDF_dk604...fi.exe
windows10_x64
10q_TzaanAkp...91.exe
windows10_x64
9rgVakr0Eru...xw.exe
windows10_x64
10t1fkwFYUEZ...r4.exe
windows10_x64
10tC6gdsFTgl...3x.exe
windows10_x64
10tGeiUalbSc...xe.xml
windows10_x64
1uMWmES83od...kJ.exe
windows10_x64
10v5n1HuUxta...Iu.exe
windows10_x64
10wTzxLyAQL7...bA.exe
windows10_x64
6xiGD01oEkh...VJ.exe
windows10_x64
10yBqNUgvOW6...Fb.exe
windows10_x64
10Analysis
-
max time kernel
300s -
max time network
329s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
23-08-2021 20:55
Behavioral task
behavioral1
Sample
Mr4X5srRQR20TfuVZShfsrAN.exe
Resource
win10v20210410
Behavioral task
behavioral2
Sample
OEmxRS9UaiMPqIKXPz6Ef8jI.exe
Resource
win10v20210410
Behavioral task
behavioral3
Sample
OvVYhhgvd6ZhUony5cRMqVoB.exe
Resource
win10v20210410
Behavioral task
behavioral4
Sample
QKvpJeDIaPtXDcwKwH_WmAYY.exe
Resource
win10v20210410
Behavioral task
behavioral5
Sample
QwnNK2SHckcc_GsoTwi8hDi5.exe.xml
Resource
win10v20210410
Behavioral task
behavioral6
Sample
QxZsdXOO8Xn2bW7iW8ff3gjN.exe
Resource
win10v20210408
Behavioral task
behavioral7
Sample
QzUu4XgUxQuvhFNx7Nf5D6C3.exe
Resource
win10v20210410
Behavioral task
behavioral8
Sample
SHSPDO6BYDV7xlwsZDJxsLj9.exe
Resource
win10v20210410
Behavioral task
behavioral9
Sample
SqCuVl85T1P8OuH3gpVMKnDi.exe
Resource
win10v20210410
Behavioral task
behavioral10
Sample
T8Ulrjj8F65YXJ2qZEm11v_x.exe
Resource
win10v20210408
Behavioral task
behavioral11
Sample
Trj0QcTNVE3l8SBp_3LNLFS9.exe
Resource
win10v20210408
Behavioral task
behavioral12
Sample
Uwc7l02HzjEVLDdBFF3ZKItU.exe
Resource
win10v20210408
Behavioral task
behavioral13
Sample
VoTrXaqIJ3vc2GnUIU6Wi5LW.exe
Resource
win10v20210408
Behavioral task
behavioral14
Sample
Wp77te7DqjxTjTIGMDSB0RHr.exe
Resource
win10v20210410
Behavioral task
behavioral15
Sample
XOCYAkm_NnnfPmgVDNgu9MQ3.exe
Resource
win10v20210410
Behavioral task
behavioral16
Sample
Xd_XnNqsZTJJf8dCq4s_mlAi.exe
Resource
win10v20210410
Behavioral task
behavioral17
Sample
Xr9ca9oQNQWbUwEgChRmX6Z9.exe
Resource
win10v20210408
Behavioral task
behavioral18
Sample
XukfUfK8HAbjc5wMknHwOhFI.exe
Resource
win10v20210408
Behavioral task
behavioral19
Sample
YPTXDeqMC118ip3zHbyxwlns.exe
Resource
win10v20210410
Behavioral task
behavioral20
Sample
ma_5nZD3yos0uV8jzHnJSVxT.exe
Resource
win10v20210408
Behavioral task
behavioral21
Sample
pnDF_dk604_fxVsUaLPL1Vfi.exe
Resource
win10v20210410
Behavioral task
behavioral22
Sample
q_TzaanAkp60Doa2Vt025l91.exe
Resource
win10v20210410
Behavioral task
behavioral23
Sample
rgVakr0EruC2FtauFmrgXkxw.exe
Resource
win10v20210408
Behavioral task
behavioral24
Sample
t1fkwFYUEZVXvf_7oFFpVnr4.exe
Resource
win10v20210410
Behavioral task
behavioral25
Sample
tC6gdsFTgl9CBMrK_2QhZX3x.exe
Resource
win10v20210410
Behavioral task
behavioral26
Sample
tGeiUalbScQ8sPK2KKmKZNga.exe.xml
Resource
win10v20210410
Behavioral task
behavioral27
Sample
uMWmES83oduRUCtOU5jzfQkJ.exe
Resource
win10v20210410
Behavioral task
behavioral28
Sample
v5n1HuUxtaYNHT7sRlXCCwIu.exe
Resource
win10v20210408
Behavioral task
behavioral29
Sample
wTzxLyAQL7H5FI0GIaor5FbA.exe
Resource
win10v20210410
Behavioral task
behavioral30
Sample
xiGD01oEkhh5s50F0Mw8lPVJ.exe
Resource
win10v20210410
Behavioral task
behavioral31
Sample
yBqNUgvOW6iDky2dKdBCi5Fb.exe
Resource
win10v20210410
General
-
Target
ma_5nZD3yos0uV8jzHnJSVxT.exe
-
Size
163KB
-
MD5
ec3921304077e2ac56d2f5060adab3d5
-
SHA1
923cf378ec34c6d660f88c7916c083bedb9378aa
-
SHA256
b8f88d0b48fbf8c1eac3d72272ddc48c723cbf8ba0527fdf42ad20cc5724ab9f
-
SHA512
3796aab3dd9822ba41b57ef009166e4f99adab87cf279f9d86d4d7f227128da8faf2da7290e84ebffc11f1e8d17dfd0d8db9c2691e7fc08a93a02f748e293d28
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule behavioral20/memory/3192-141-0x0000000005750000-0x0000000005782000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
Processes:
2185864.exe6704730.exe5728157.exe3695137.exeWinHoster.exepid process 2764 2185864.exe 3476 6704730.exe 3192 5728157.exe 2580 3695137.exe 3908 WinHoster.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
6704730.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 6704730.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 1 IoCs
Processes:
WerFault.exedescription ioc process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3820 2764 WerFault.exe 2185864.exe 1336 2580 WerFault.exe 3695137.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
Processes:
2185864.exe3695137.exeWerFault.exeWerFault.exe5728157.exepid process 2764 2185864.exe 2580 3695137.exe 3820 WerFault.exe 3820 WerFault.exe 3820 WerFault.exe 3820 WerFault.exe 3820 WerFault.exe 3820 WerFault.exe 3820 WerFault.exe 3820 WerFault.exe 3820 WerFault.exe 3820 WerFault.exe 3820 WerFault.exe 3820 WerFault.exe 3820 WerFault.exe 3820 WerFault.exe 3820 WerFault.exe 1336 WerFault.exe 1336 WerFault.exe 1336 WerFault.exe 1336 WerFault.exe 1336 WerFault.exe 1336 WerFault.exe 1336 WerFault.exe 1336 WerFault.exe 1336 WerFault.exe 1336 WerFault.exe 1336 WerFault.exe 1336 WerFault.exe 1336 WerFault.exe 1336 WerFault.exe 1336 WerFault.exe 3192 5728157.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
ma_5nZD3yos0uV8jzHnJSVxT.exe2185864.exe3695137.exe5728157.exeWerFault.exeWerFault.exedescription pid process Token: SeDebugPrivilege 2988 ma_5nZD3yos0uV8jzHnJSVxT.exe Token: SeDebugPrivilege 2764 2185864.exe Token: SeDebugPrivilege 2580 3695137.exe Token: SeDebugPrivilege 3192 5728157.exe Token: SeDebugPrivilege 3820 WerFault.exe Token: SeRestorePrivilege 1336 WerFault.exe Token: SeBackupPrivilege 1336 WerFault.exe Token: SeBackupPrivilege 1336 WerFault.exe Token: SeDebugPrivilege 1336 WerFault.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
ma_5nZD3yos0uV8jzHnJSVxT.exe6704730.exedescription pid process target process PID 2988 wrote to memory of 2764 2988 ma_5nZD3yos0uV8jzHnJSVxT.exe 2185864.exe PID 2988 wrote to memory of 2764 2988 ma_5nZD3yos0uV8jzHnJSVxT.exe 2185864.exe PID 2988 wrote to memory of 3476 2988 ma_5nZD3yos0uV8jzHnJSVxT.exe 6704730.exe PID 2988 wrote to memory of 3476 2988 ma_5nZD3yos0uV8jzHnJSVxT.exe 6704730.exe PID 2988 wrote to memory of 3476 2988 ma_5nZD3yos0uV8jzHnJSVxT.exe 6704730.exe PID 2988 wrote to memory of 3192 2988 ma_5nZD3yos0uV8jzHnJSVxT.exe 5728157.exe PID 2988 wrote to memory of 3192 2988 ma_5nZD3yos0uV8jzHnJSVxT.exe 5728157.exe PID 2988 wrote to memory of 3192 2988 ma_5nZD3yos0uV8jzHnJSVxT.exe 5728157.exe PID 2988 wrote to memory of 2580 2988 ma_5nZD3yos0uV8jzHnJSVxT.exe 3695137.exe PID 2988 wrote to memory of 2580 2988 ma_5nZD3yos0uV8jzHnJSVxT.exe 3695137.exe PID 2988 wrote to memory of 2580 2988 ma_5nZD3yos0uV8jzHnJSVxT.exe 3695137.exe PID 3476 wrote to memory of 3908 3476 6704730.exe WinHoster.exe PID 3476 wrote to memory of 3908 3476 6704730.exe WinHoster.exe PID 3476 wrote to memory of 3908 3476 6704730.exe WinHoster.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ma_5nZD3yos0uV8jzHnJSVxT.exe"C:\Users\Admin\AppData\Local\Temp\ma_5nZD3yos0uV8jzHnJSVxT.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\2185864.exe"C:\Users\Admin\AppData\Roaming\2185864.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2764 -s 21163⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\6704730.exe"C:\Users\Admin\AppData\Roaming\6704730.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\5728157.exe"C:\Users\Admin\AppData\Roaming\5728157.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\3695137.exe"C:\Users\Admin\AppData\Roaming\3695137.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 21803⤵
- Drops file in Windows directory
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\2185864.exeMD5
724252e8cc86d50db3dd965a744188c0
SHA14f96e366267aa778d2f6b11bc35e5aca518a6c30
SHA256786bcc1e15c4c6c7a37ac4908c5991d5589b6d04c74070c0f083287fc74782ff
SHA5123443a8230f77555e1c101a6b9a91d6695a45ff1cc5a503cb14ba0b87cefc8a58ab7e3d96df344f2df043fd285bc235e81dae51a8c6317d9262c519f945dd7a91
-
C:\Users\Admin\AppData\Roaming\2185864.exeMD5
724252e8cc86d50db3dd965a744188c0
SHA14f96e366267aa778d2f6b11bc35e5aca518a6c30
SHA256786bcc1e15c4c6c7a37ac4908c5991d5589b6d04c74070c0f083287fc74782ff
SHA5123443a8230f77555e1c101a6b9a91d6695a45ff1cc5a503cb14ba0b87cefc8a58ab7e3d96df344f2df043fd285bc235e81dae51a8c6317d9262c519f945dd7a91
-
C:\Users\Admin\AppData\Roaming\3695137.exeMD5
f194d7ae32b3bb8d9cb2e568ea60e962
SHA12e96571159c632c6782c4af0c598d838e856ae0b
SHA25688184a929722705ecf5fd0631703e8b11f20a7a3145d2d94c18401cdb63d4221
SHA512fbdc1c143d84f2fbbe688a3b26cf3258e127f99a56632f995e8e435c0143b71cfb8b45fd272ba8d40363908fb7b547fad55a289f449fc0bd568fc0c021044691
-
C:\Users\Admin\AppData\Roaming\3695137.exeMD5
f194d7ae32b3bb8d9cb2e568ea60e962
SHA12e96571159c632c6782c4af0c598d838e856ae0b
SHA25688184a929722705ecf5fd0631703e8b11f20a7a3145d2d94c18401cdb63d4221
SHA512fbdc1c143d84f2fbbe688a3b26cf3258e127f99a56632f995e8e435c0143b71cfb8b45fd272ba8d40363908fb7b547fad55a289f449fc0bd568fc0c021044691
-
C:\Users\Admin\AppData\Roaming\5728157.exeMD5
820b27e48dac554a246970c5dfefd5ce
SHA102c7a5d427d043f063e706933cfd993258a58c9c
SHA25601e36e0ee266f5726c5e7d2eb01537cce145836e115c3629b7ca1f61fd2ee709
SHA5120c0fafb33829db45737ef0b552c3326bc11f199fdf789f528f3990ff8b61a55d83a8658689a30f3422cf02ffa488feea8252ca6a169a7d5f9a27e119846cff04
-
C:\Users\Admin\AppData\Roaming\5728157.exeMD5
820b27e48dac554a246970c5dfefd5ce
SHA102c7a5d427d043f063e706933cfd993258a58c9c
SHA25601e36e0ee266f5726c5e7d2eb01537cce145836e115c3629b7ca1f61fd2ee709
SHA5120c0fafb33829db45737ef0b552c3326bc11f199fdf789f528f3990ff8b61a55d83a8658689a30f3422cf02ffa488feea8252ca6a169a7d5f9a27e119846cff04
-
C:\Users\Admin\AppData\Roaming\6704730.exeMD5
3598180fddc06dbd304b76627143b01d
SHA11d39b0dd8425359ed94e606cb04f9c5e49ed1899
SHA25644a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda
SHA5128f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d
-
C:\Users\Admin\AppData\Roaming\6704730.exeMD5
3598180fddc06dbd304b76627143b01d
SHA11d39b0dd8425359ed94e606cb04f9c5e49ed1899
SHA25644a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda
SHA5128f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exeMD5
3598180fddc06dbd304b76627143b01d
SHA11d39b0dd8425359ed94e606cb04f9c5e49ed1899
SHA25644a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda
SHA5128f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exeMD5
3598180fddc06dbd304b76627143b01d
SHA11d39b0dd8425359ed94e606cb04f9c5e49ed1899
SHA25644a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda
SHA5128f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d
-
memory/2580-169-0x0000000005730000-0x0000000005731000-memory.dmpFilesize
4KB
-
memory/2580-162-0x0000000004F50000-0x0000000004F51000-memory.dmpFilesize
4KB
-
memory/2580-134-0x0000000000590000-0x0000000000591000-memory.dmpFilesize
4KB
-
memory/2580-145-0x000000000A240000-0x000000000A26D000-memory.dmpFilesize
180KB
-
memory/2580-129-0x0000000000000000-mapping.dmp
-
memory/2580-151-0x00000000028E0000-0x00000000028E1000-memory.dmpFilesize
4KB
-
memory/2580-140-0x0000000000FC0000-0x0000000000FC1000-memory.dmpFilesize
4KB
-
memory/2580-148-0x00000000028F0000-0x00000000028F1000-memory.dmpFilesize
4KB
-
memory/2764-121-0x0000000000D00000-0x0000000000D01000-memory.dmpFilesize
4KB
-
memory/2764-128-0x0000000002F70000-0x0000000002FBA000-memory.dmpFilesize
296KB
-
memory/2764-125-0x0000000001550000-0x0000000001552000-memory.dmpFilesize
8KB
-
memory/2764-118-0x0000000000000000-mapping.dmp
-
memory/2988-114-0x0000000000F10000-0x0000000000F11000-memory.dmpFilesize
4KB
-
memory/2988-117-0x0000000001640000-0x0000000001642000-memory.dmpFilesize
8KB
-
memory/2988-116-0x0000000001650000-0x000000000166C000-memory.dmpFilesize
112KB
-
memory/3192-141-0x0000000005750000-0x0000000005782000-memory.dmpFilesize
200KB
-
memory/3192-167-0x00000000091C0000-0x00000000091C1000-memory.dmpFilesize
4KB
-
memory/3192-146-0x00000000080D0000-0x00000000080D1000-memory.dmpFilesize
4KB
-
memory/3192-147-0x0000000007B00000-0x0000000007B01000-memory.dmpFilesize
4KB
-
memory/3192-174-0x0000000009E80000-0x0000000009E81000-memory.dmpFilesize
4KB
-
memory/3192-149-0x0000000007B60000-0x0000000007B61000-memory.dmpFilesize
4KB
-
memory/3192-150-0x0000000007BA0000-0x0000000007BA1000-memory.dmpFilesize
4KB
-
memory/3192-172-0x0000000009DF0000-0x0000000009DF1000-memory.dmpFilesize
4KB
-
memory/3192-152-0x00000000057F0000-0x00000000057F1000-memory.dmpFilesize
4KB
-
memory/3192-153-0x0000000007D50000-0x0000000007D51000-memory.dmpFilesize
4KB
-
memory/3192-168-0x00000000098C0000-0x00000000098C1000-memory.dmpFilesize
4KB
-
memory/3192-126-0x0000000000000000-mapping.dmp
-
memory/3192-136-0x0000000000D40000-0x0000000000D41000-memory.dmpFilesize
4KB
-
memory/3476-135-0x0000000000730000-0x0000000000731000-memory.dmpFilesize
4KB
-
memory/3476-144-0x0000000007500000-0x0000000007501000-memory.dmpFilesize
4KB
-
memory/3476-123-0x0000000000000000-mapping.dmp
-
memory/3476-142-0x0000000001090000-0x0000000001096000-memory.dmpFilesize
24KB
-
memory/3476-143-0x0000000007960000-0x0000000007961000-memory.dmpFilesize
4KB
-
memory/3908-163-0x0000000007A50000-0x0000000007A51000-memory.dmpFilesize
4KB
-
memory/3908-164-0x0000000005180000-0x0000000005181000-memory.dmpFilesize
4KB
-
memory/3908-154-0x0000000000000000-mapping.dmp