Analysis
-
max time kernel
126s -
max time network
107s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
25-08-2021 05:29
Static task
static1
Behavioral task
behavioral1
Sample
33e4d906579d1842adbddc6e3be27b5b.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
33e4d906579d1842adbddc6e3be27b5b.exe
Resource
win10v20210410
General
-
Target
33e4d906579d1842adbddc6e3be27b5b.exe
-
Size
184KB
-
MD5
33e4d906579d1842adbddc6e3be27b5b
-
SHA1
9cc464b63f810e929cbb383de751bcac70d22020
-
SHA256
b9025aef29f9f9d3126d390e66df8c55a9c9f7c15520f9a59a963932ee86b815
-
SHA512
4c34f247d5e5ebbad752d7b28ce2c86b122eb82c789a05416f786ef0b265da92826530ee5003848c68f71b7dd3f20389f627ca18bf7981e1582837272ba9f798
Malware Config
Extracted
redline
3
deyrolorme.xyz:80
xariebelal.xyz:80
anihelardd.xyz:80
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1112-87-0x0000000000540000-0x0000000000572000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
Processes:
7403993.exe8075219.exe3364370.exe1331350.exeWinHoster.exepid process 484 7403993.exe 852 8075219.exe 1112 3364370.exe 944 1331350.exe 1672 WinHoster.exe -
Loads dropped DLL 6 IoCs
Processes:
8075219.exeWerFault.exepid process 852 8075219.exe 1936 WerFault.exe 1936 WerFault.exe 1936 WerFault.exe 1936 WerFault.exe 1936 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
8075219.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 8075219.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1332 484 WerFault.exe 7403993.exe 1936 944 WerFault.exe 1331350.exe -
Processes:
33e4d906579d1842adbddc6e3be27b5b.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 33e4d906579d1842adbddc6e3be27b5b.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 33e4d906579d1842adbddc6e3be27b5b.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
Processes:
7403993.exeWerFault.exe1331350.exeWerFault.exe3364370.exepid process 484 7403993.exe 1332 WerFault.exe 1332 WerFault.exe 1332 WerFault.exe 1332 WerFault.exe 1332 WerFault.exe 1332 WerFault.exe 944 1331350.exe 1936 WerFault.exe 1936 WerFault.exe 1936 WerFault.exe 1936 WerFault.exe 1936 WerFault.exe 1936 WerFault.exe 1112 3364370.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
WerFault.exeWerFault.exepid process 1332 WerFault.exe 1936 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
33e4d906579d1842adbddc6e3be27b5b.exe7403993.exe1331350.exe3364370.exeWerFault.exeWerFault.exedescription pid process Token: SeDebugPrivilege 2028 33e4d906579d1842adbddc6e3be27b5b.exe Token: SeDebugPrivilege 484 7403993.exe Token: SeDebugPrivilege 944 1331350.exe Token: SeDebugPrivilege 1112 3364370.exe Token: SeDebugPrivilege 1332 WerFault.exe Token: SeDebugPrivilege 1936 WerFault.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
33e4d906579d1842adbddc6e3be27b5b.exe8075219.exe7403993.exe1331350.exedescription pid process target process PID 2028 wrote to memory of 484 2028 33e4d906579d1842adbddc6e3be27b5b.exe 7403993.exe PID 2028 wrote to memory of 484 2028 33e4d906579d1842adbddc6e3be27b5b.exe 7403993.exe PID 2028 wrote to memory of 484 2028 33e4d906579d1842adbddc6e3be27b5b.exe 7403993.exe PID 2028 wrote to memory of 852 2028 33e4d906579d1842adbddc6e3be27b5b.exe 8075219.exe PID 2028 wrote to memory of 852 2028 33e4d906579d1842adbddc6e3be27b5b.exe 8075219.exe PID 2028 wrote to memory of 852 2028 33e4d906579d1842adbddc6e3be27b5b.exe 8075219.exe PID 2028 wrote to memory of 852 2028 33e4d906579d1842adbddc6e3be27b5b.exe 8075219.exe PID 2028 wrote to memory of 1112 2028 33e4d906579d1842adbddc6e3be27b5b.exe 3364370.exe PID 2028 wrote to memory of 1112 2028 33e4d906579d1842adbddc6e3be27b5b.exe 3364370.exe PID 2028 wrote to memory of 1112 2028 33e4d906579d1842adbddc6e3be27b5b.exe 3364370.exe PID 2028 wrote to memory of 1112 2028 33e4d906579d1842adbddc6e3be27b5b.exe 3364370.exe PID 2028 wrote to memory of 944 2028 33e4d906579d1842adbddc6e3be27b5b.exe 1331350.exe PID 2028 wrote to memory of 944 2028 33e4d906579d1842adbddc6e3be27b5b.exe 1331350.exe PID 2028 wrote to memory of 944 2028 33e4d906579d1842adbddc6e3be27b5b.exe 1331350.exe PID 2028 wrote to memory of 944 2028 33e4d906579d1842adbddc6e3be27b5b.exe 1331350.exe PID 852 wrote to memory of 1672 852 8075219.exe WinHoster.exe PID 852 wrote to memory of 1672 852 8075219.exe WinHoster.exe PID 852 wrote to memory of 1672 852 8075219.exe WinHoster.exe PID 852 wrote to memory of 1672 852 8075219.exe WinHoster.exe PID 484 wrote to memory of 1332 484 7403993.exe WerFault.exe PID 484 wrote to memory of 1332 484 7403993.exe WerFault.exe PID 484 wrote to memory of 1332 484 7403993.exe WerFault.exe PID 944 wrote to memory of 1936 944 1331350.exe WerFault.exe PID 944 wrote to memory of 1936 944 1331350.exe WerFault.exe PID 944 wrote to memory of 1936 944 1331350.exe WerFault.exe PID 944 wrote to memory of 1936 944 1331350.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\33e4d906579d1842adbddc6e3be27b5b.exe"C:\Users\Admin\AppData\Local\Temp\33e4d906579d1842adbddc6e3be27b5b.exe"1⤵
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\7403993.exe"C:\Users\Admin\AppData\Roaming\7403993.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 484 -s 19323⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\8075219.exe"C:\Users\Admin\AppData\Roaming\8075219.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\3364370.exe"C:\Users\Admin\AppData\Roaming\3364370.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\1331350.exe"C:\Users\Admin\AppData\Roaming\1331350.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 944 -s 19203⤵
- Loads dropped DLL
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\1331350.exeMD5
7758440f5f314ea55143cfb56dabf434
SHA182fe15c964ce358b37115ffb5148d976965c6ef5
SHA2561206f705128ee12694a8fb0b16fc1c1de4703089ea138ba0b2ba80f5c0f7c46b
SHA51217b3e7790952d38311c9d5380f627eced775f38755b2374f6b81e088811706fec14c0d56e01b1aaac2d7030278161c8eb3d0ff6651d14f9e31bbefc9329620bf
-
C:\Users\Admin\AppData\Roaming\1331350.exeMD5
7758440f5f314ea55143cfb56dabf434
SHA182fe15c964ce358b37115ffb5148d976965c6ef5
SHA2561206f705128ee12694a8fb0b16fc1c1de4703089ea138ba0b2ba80f5c0f7c46b
SHA51217b3e7790952d38311c9d5380f627eced775f38755b2374f6b81e088811706fec14c0d56e01b1aaac2d7030278161c8eb3d0ff6651d14f9e31bbefc9329620bf
-
C:\Users\Admin\AppData\Roaming\3364370.exeMD5
883fe31989c8dfc8f2e22a94ae2d369a
SHA12933d6fafbebe84c12c0e226bf182e708d3bd32e
SHA2567781a758350e3fba94c86661171371a7fd19f0801bf4cc82c5c94169fed3b9b4
SHA512c9d4ee4ba7e34c4641b25837295a8d7ea6c04f5d25facd9948bb19698e75a833e16f530d6be59fe6cb9d2c5771a1e7e10266adbb121ce1822e1048530e67e313
-
C:\Users\Admin\AppData\Roaming\3364370.exeMD5
883fe31989c8dfc8f2e22a94ae2d369a
SHA12933d6fafbebe84c12c0e226bf182e708d3bd32e
SHA2567781a758350e3fba94c86661171371a7fd19f0801bf4cc82c5c94169fed3b9b4
SHA512c9d4ee4ba7e34c4641b25837295a8d7ea6c04f5d25facd9948bb19698e75a833e16f530d6be59fe6cb9d2c5771a1e7e10266adbb121ce1822e1048530e67e313
-
C:\Users\Admin\AppData\Roaming\7403993.exeMD5
724252e8cc86d50db3dd965a744188c0
SHA14f96e366267aa778d2f6b11bc35e5aca518a6c30
SHA256786bcc1e15c4c6c7a37ac4908c5991d5589b6d04c74070c0f083287fc74782ff
SHA5123443a8230f77555e1c101a6b9a91d6695a45ff1cc5a503cb14ba0b87cefc8a58ab7e3d96df344f2df043fd285bc235e81dae51a8c6317d9262c519f945dd7a91
-
C:\Users\Admin\AppData\Roaming\7403993.exeMD5
724252e8cc86d50db3dd965a744188c0
SHA14f96e366267aa778d2f6b11bc35e5aca518a6c30
SHA256786bcc1e15c4c6c7a37ac4908c5991d5589b6d04c74070c0f083287fc74782ff
SHA5123443a8230f77555e1c101a6b9a91d6695a45ff1cc5a503cb14ba0b87cefc8a58ab7e3d96df344f2df043fd285bc235e81dae51a8c6317d9262c519f945dd7a91
-
C:\Users\Admin\AppData\Roaming\8075219.exeMD5
3598180fddc06dbd304b76627143b01d
SHA11d39b0dd8425359ed94e606cb04f9c5e49ed1899
SHA25644a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda
SHA5128f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d
-
C:\Users\Admin\AppData\Roaming\8075219.exeMD5
3598180fddc06dbd304b76627143b01d
SHA11d39b0dd8425359ed94e606cb04f9c5e49ed1899
SHA25644a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda
SHA5128f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exeMD5
3598180fddc06dbd304b76627143b01d
SHA11d39b0dd8425359ed94e606cb04f9c5e49ed1899
SHA25644a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda
SHA5128f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exeMD5
3598180fddc06dbd304b76627143b01d
SHA11d39b0dd8425359ed94e606cb04f9c5e49ed1899
SHA25644a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda
SHA5128f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d
-
\Users\Admin\AppData\Roaming\1331350.exeMD5
7758440f5f314ea55143cfb56dabf434
SHA182fe15c964ce358b37115ffb5148d976965c6ef5
SHA2561206f705128ee12694a8fb0b16fc1c1de4703089ea138ba0b2ba80f5c0f7c46b
SHA51217b3e7790952d38311c9d5380f627eced775f38755b2374f6b81e088811706fec14c0d56e01b1aaac2d7030278161c8eb3d0ff6651d14f9e31bbefc9329620bf
-
\Users\Admin\AppData\Roaming\1331350.exeMD5
7758440f5f314ea55143cfb56dabf434
SHA182fe15c964ce358b37115ffb5148d976965c6ef5
SHA2561206f705128ee12694a8fb0b16fc1c1de4703089ea138ba0b2ba80f5c0f7c46b
SHA51217b3e7790952d38311c9d5380f627eced775f38755b2374f6b81e088811706fec14c0d56e01b1aaac2d7030278161c8eb3d0ff6651d14f9e31bbefc9329620bf
-
\Users\Admin\AppData\Roaming\1331350.exeMD5
7758440f5f314ea55143cfb56dabf434
SHA182fe15c964ce358b37115ffb5148d976965c6ef5
SHA2561206f705128ee12694a8fb0b16fc1c1de4703089ea138ba0b2ba80f5c0f7c46b
SHA51217b3e7790952d38311c9d5380f627eced775f38755b2374f6b81e088811706fec14c0d56e01b1aaac2d7030278161c8eb3d0ff6651d14f9e31bbefc9329620bf
-
\Users\Admin\AppData\Roaming\1331350.exeMD5
7758440f5f314ea55143cfb56dabf434
SHA182fe15c964ce358b37115ffb5148d976965c6ef5
SHA2561206f705128ee12694a8fb0b16fc1c1de4703089ea138ba0b2ba80f5c0f7c46b
SHA51217b3e7790952d38311c9d5380f627eced775f38755b2374f6b81e088811706fec14c0d56e01b1aaac2d7030278161c8eb3d0ff6651d14f9e31bbefc9329620bf
-
\Users\Admin\AppData\Roaming\1331350.exeMD5
7758440f5f314ea55143cfb56dabf434
SHA182fe15c964ce358b37115ffb5148d976965c6ef5
SHA2561206f705128ee12694a8fb0b16fc1c1de4703089ea138ba0b2ba80f5c0f7c46b
SHA51217b3e7790952d38311c9d5380f627eced775f38755b2374f6b81e088811706fec14c0d56e01b1aaac2d7030278161c8eb3d0ff6651d14f9e31bbefc9329620bf
-
\Users\Admin\AppData\Roaming\WinHost\WinHoster.exeMD5
3598180fddc06dbd304b76627143b01d
SHA11d39b0dd8425359ed94e606cb04f9c5e49ed1899
SHA25644a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda
SHA5128f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d
-
memory/484-74-0x0000000000310000-0x000000000035A000-memory.dmpFilesize
296KB
-
memory/484-69-0x0000000000BD0000-0x0000000000BD1000-memory.dmpFilesize
4KB
-
memory/484-66-0x0000000000000000-mapping.dmp
-
memory/484-89-0x000000001AEF0000-0x000000001AEF2000-memory.dmpFilesize
8KB
-
memory/852-71-0x0000000000000000-mapping.dmp
-
memory/852-79-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/852-85-0x0000000000350000-0x0000000000356000-memory.dmpFilesize
24KB
-
memory/944-86-0x0000000000850000-0x0000000000851000-memory.dmpFilesize
4KB
-
memory/944-90-0x0000000000330000-0x0000000000331000-memory.dmpFilesize
4KB
-
memory/944-82-0x0000000000000000-mapping.dmp
-
memory/944-98-0x0000000004900000-0x0000000004901000-memory.dmpFilesize
4KB
-
memory/1112-99-0x0000000004C00000-0x0000000004C01000-memory.dmpFilesize
4KB
-
memory/1112-87-0x0000000000540000-0x0000000000572000-memory.dmpFilesize
200KB
-
memory/1112-75-0x0000000000000000-mapping.dmp
-
memory/1112-78-0x0000000000D70000-0x0000000000D71000-memory.dmpFilesize
4KB
-
memory/1332-101-0x0000000000000000-mapping.dmp
-
memory/1332-102-0x000007FEFC411000-0x000007FEFC413000-memory.dmpFilesize
8KB
-
memory/1332-103-0x0000000000320000-0x0000000000321000-memory.dmpFilesize
4KB
-
memory/1672-95-0x0000000000C40000-0x0000000000C41000-memory.dmpFilesize
4KB
-
memory/1672-100-0x00000000047A0000-0x00000000047A1000-memory.dmpFilesize
4KB
-
memory/1672-92-0x0000000000000000-mapping.dmp
-
memory/1936-104-0x0000000000000000-mapping.dmp
-
memory/1936-110-0x00000000003D0000-0x00000000003D1000-memory.dmpFilesize
4KB
-
memory/2028-60-0x0000000001330000-0x0000000001331000-memory.dmpFilesize
4KB
-
memory/2028-65-0x000000001AF10000-0x000000001AF12000-memory.dmpFilesize
8KB
-
memory/2028-64-0x0000000000470000-0x0000000000471000-memory.dmpFilesize
4KB
-
memory/2028-63-0x0000000000250000-0x000000000026E000-memory.dmpFilesize
120KB
-
memory/2028-62-0x0000000000140000-0x0000000000141000-memory.dmpFilesize
4KB