Analysis
-
max time kernel
124s -
max time network
69s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
25-08-2021 04:32
Static task
static1
Behavioral task
behavioral1
Sample
33e4d906579d1842adbddc6e3be27b5b.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
33e4d906579d1842adbddc6e3be27b5b.exe
Resource
win10v20210408
General
-
Target
33e4d906579d1842adbddc6e3be27b5b.exe
-
Size
184KB
-
MD5
33e4d906579d1842adbddc6e3be27b5b
-
SHA1
9cc464b63f810e929cbb383de751bcac70d22020
-
SHA256
b9025aef29f9f9d3126d390e66df8c55a9c9f7c15520f9a59a963932ee86b815
-
SHA512
4c34f247d5e5ebbad752d7b28ce2c86b122eb82c789a05416f786ef0b265da92826530ee5003848c68f71b7dd3f20389f627ca18bf7981e1582837272ba9f798
Malware Config
Extracted
redline
3
deyrolorme.xyz:80
xariebelal.xyz:80
anihelardd.xyz:80
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1496-84-0x0000000000440000-0x0000000000472000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
Processes:
4351589.exe1899859.exe5189010.exe5162594.exeWinHoster.exepid process 676 4351589.exe 1108 1899859.exe 1496 5189010.exe 916 5162594.exe 1772 WinHoster.exe -
Loads dropped DLL 6 IoCs
Processes:
1899859.exeWerFault.exepid process 1108 1899859.exe 1476 WerFault.exe 1476 WerFault.exe 1476 WerFault.exe 1476 WerFault.exe 1476 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
1899859.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 1899859.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1976 676 WerFault.exe 4351589.exe 1476 916 WerFault.exe 5162594.exe -
Processes:
33e4d906579d1842adbddc6e3be27b5b.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 33e4d906579d1842adbddc6e3be27b5b.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 33e4d906579d1842adbddc6e3be27b5b.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
Processes:
4351589.exeWerFault.exe5162594.exeWerFault.exe5189010.exepid process 676 4351589.exe 1976 WerFault.exe 1976 WerFault.exe 1976 WerFault.exe 1976 WerFault.exe 1976 WerFault.exe 1976 WerFault.exe 916 5162594.exe 1476 WerFault.exe 1476 WerFault.exe 1476 WerFault.exe 1476 WerFault.exe 1476 WerFault.exe 1476 WerFault.exe 1496 5189010.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
WerFault.exeWerFault.exepid process 1976 WerFault.exe 1476 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
33e4d906579d1842adbddc6e3be27b5b.exe4351589.exe5162594.exe5189010.exeWerFault.exeWerFault.exedescription pid process Token: SeDebugPrivilege 1632 33e4d906579d1842adbddc6e3be27b5b.exe Token: SeDebugPrivilege 676 4351589.exe Token: SeDebugPrivilege 916 5162594.exe Token: SeDebugPrivilege 1496 5189010.exe Token: SeDebugPrivilege 1976 WerFault.exe Token: SeDebugPrivilege 1476 WerFault.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
33e4d906579d1842adbddc6e3be27b5b.exe1899859.exe4351589.exe5162594.exedescription pid process target process PID 1632 wrote to memory of 676 1632 33e4d906579d1842adbddc6e3be27b5b.exe 4351589.exe PID 1632 wrote to memory of 676 1632 33e4d906579d1842adbddc6e3be27b5b.exe 4351589.exe PID 1632 wrote to memory of 676 1632 33e4d906579d1842adbddc6e3be27b5b.exe 4351589.exe PID 1632 wrote to memory of 1108 1632 33e4d906579d1842adbddc6e3be27b5b.exe 1899859.exe PID 1632 wrote to memory of 1108 1632 33e4d906579d1842adbddc6e3be27b5b.exe 1899859.exe PID 1632 wrote to memory of 1108 1632 33e4d906579d1842adbddc6e3be27b5b.exe 1899859.exe PID 1632 wrote to memory of 1108 1632 33e4d906579d1842adbddc6e3be27b5b.exe 1899859.exe PID 1632 wrote to memory of 1496 1632 33e4d906579d1842adbddc6e3be27b5b.exe 5189010.exe PID 1632 wrote to memory of 1496 1632 33e4d906579d1842adbddc6e3be27b5b.exe 5189010.exe PID 1632 wrote to memory of 1496 1632 33e4d906579d1842adbddc6e3be27b5b.exe 5189010.exe PID 1632 wrote to memory of 1496 1632 33e4d906579d1842adbddc6e3be27b5b.exe 5189010.exe PID 1632 wrote to memory of 916 1632 33e4d906579d1842adbddc6e3be27b5b.exe 5162594.exe PID 1632 wrote to memory of 916 1632 33e4d906579d1842adbddc6e3be27b5b.exe 5162594.exe PID 1632 wrote to memory of 916 1632 33e4d906579d1842adbddc6e3be27b5b.exe 5162594.exe PID 1632 wrote to memory of 916 1632 33e4d906579d1842adbddc6e3be27b5b.exe 5162594.exe PID 1108 wrote to memory of 1772 1108 1899859.exe WinHoster.exe PID 1108 wrote to memory of 1772 1108 1899859.exe WinHoster.exe PID 1108 wrote to memory of 1772 1108 1899859.exe WinHoster.exe PID 1108 wrote to memory of 1772 1108 1899859.exe WinHoster.exe PID 676 wrote to memory of 1976 676 4351589.exe WerFault.exe PID 676 wrote to memory of 1976 676 4351589.exe WerFault.exe PID 676 wrote to memory of 1976 676 4351589.exe WerFault.exe PID 916 wrote to memory of 1476 916 5162594.exe WerFault.exe PID 916 wrote to memory of 1476 916 5162594.exe WerFault.exe PID 916 wrote to memory of 1476 916 5162594.exe WerFault.exe PID 916 wrote to memory of 1476 916 5162594.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\33e4d906579d1842adbddc6e3be27b5b.exe"C:\Users\Admin\AppData\Local\Temp\33e4d906579d1842adbddc6e3be27b5b.exe"1⤵
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Roaming\4351589.exe"C:\Users\Admin\AppData\Roaming\4351589.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 676 -s 19243⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1976
-
-
-
C:\Users\Admin\AppData\Roaming\1899859.exe"C:\Users\Admin\AppData\Roaming\1899859.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"3⤵
- Executes dropped EXE
PID:1772
-
-
-
C:\Users\Admin\AppData\Roaming\5189010.exe"C:\Users\Admin\AppData\Roaming\5189010.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
-
C:\Users\Admin\AppData\Roaming\5162594.exe"C:\Users\Admin\AppData\Roaming\5162594.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 916 -s 19203⤵
- Loads dropped DLL
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
3598180fddc06dbd304b76627143b01d
SHA11d39b0dd8425359ed94e606cb04f9c5e49ed1899
SHA25644a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda
SHA5128f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d
-
MD5
3598180fddc06dbd304b76627143b01d
SHA11d39b0dd8425359ed94e606cb04f9c5e49ed1899
SHA25644a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda
SHA5128f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d
-
MD5
724252e8cc86d50db3dd965a744188c0
SHA14f96e366267aa778d2f6b11bc35e5aca518a6c30
SHA256786bcc1e15c4c6c7a37ac4908c5991d5589b6d04c74070c0f083287fc74782ff
SHA5123443a8230f77555e1c101a6b9a91d6695a45ff1cc5a503cb14ba0b87cefc8a58ab7e3d96df344f2df043fd285bc235e81dae51a8c6317d9262c519f945dd7a91
-
MD5
724252e8cc86d50db3dd965a744188c0
SHA14f96e366267aa778d2f6b11bc35e5aca518a6c30
SHA256786bcc1e15c4c6c7a37ac4908c5991d5589b6d04c74070c0f083287fc74782ff
SHA5123443a8230f77555e1c101a6b9a91d6695a45ff1cc5a503cb14ba0b87cefc8a58ab7e3d96df344f2df043fd285bc235e81dae51a8c6317d9262c519f945dd7a91
-
MD5
7758440f5f314ea55143cfb56dabf434
SHA182fe15c964ce358b37115ffb5148d976965c6ef5
SHA2561206f705128ee12694a8fb0b16fc1c1de4703089ea138ba0b2ba80f5c0f7c46b
SHA51217b3e7790952d38311c9d5380f627eced775f38755b2374f6b81e088811706fec14c0d56e01b1aaac2d7030278161c8eb3d0ff6651d14f9e31bbefc9329620bf
-
MD5
7758440f5f314ea55143cfb56dabf434
SHA182fe15c964ce358b37115ffb5148d976965c6ef5
SHA2561206f705128ee12694a8fb0b16fc1c1de4703089ea138ba0b2ba80f5c0f7c46b
SHA51217b3e7790952d38311c9d5380f627eced775f38755b2374f6b81e088811706fec14c0d56e01b1aaac2d7030278161c8eb3d0ff6651d14f9e31bbefc9329620bf
-
MD5
883fe31989c8dfc8f2e22a94ae2d369a
SHA12933d6fafbebe84c12c0e226bf182e708d3bd32e
SHA2567781a758350e3fba94c86661171371a7fd19f0801bf4cc82c5c94169fed3b9b4
SHA512c9d4ee4ba7e34c4641b25837295a8d7ea6c04f5d25facd9948bb19698e75a833e16f530d6be59fe6cb9d2c5771a1e7e10266adbb121ce1822e1048530e67e313
-
MD5
883fe31989c8dfc8f2e22a94ae2d369a
SHA12933d6fafbebe84c12c0e226bf182e708d3bd32e
SHA2567781a758350e3fba94c86661171371a7fd19f0801bf4cc82c5c94169fed3b9b4
SHA512c9d4ee4ba7e34c4641b25837295a8d7ea6c04f5d25facd9948bb19698e75a833e16f530d6be59fe6cb9d2c5771a1e7e10266adbb121ce1822e1048530e67e313
-
MD5
3598180fddc06dbd304b76627143b01d
SHA11d39b0dd8425359ed94e606cb04f9c5e49ed1899
SHA25644a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda
SHA5128f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d
-
MD5
3598180fddc06dbd304b76627143b01d
SHA11d39b0dd8425359ed94e606cb04f9c5e49ed1899
SHA25644a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda
SHA5128f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d
-
MD5
7758440f5f314ea55143cfb56dabf434
SHA182fe15c964ce358b37115ffb5148d976965c6ef5
SHA2561206f705128ee12694a8fb0b16fc1c1de4703089ea138ba0b2ba80f5c0f7c46b
SHA51217b3e7790952d38311c9d5380f627eced775f38755b2374f6b81e088811706fec14c0d56e01b1aaac2d7030278161c8eb3d0ff6651d14f9e31bbefc9329620bf
-
MD5
7758440f5f314ea55143cfb56dabf434
SHA182fe15c964ce358b37115ffb5148d976965c6ef5
SHA2561206f705128ee12694a8fb0b16fc1c1de4703089ea138ba0b2ba80f5c0f7c46b
SHA51217b3e7790952d38311c9d5380f627eced775f38755b2374f6b81e088811706fec14c0d56e01b1aaac2d7030278161c8eb3d0ff6651d14f9e31bbefc9329620bf
-
MD5
7758440f5f314ea55143cfb56dabf434
SHA182fe15c964ce358b37115ffb5148d976965c6ef5
SHA2561206f705128ee12694a8fb0b16fc1c1de4703089ea138ba0b2ba80f5c0f7c46b
SHA51217b3e7790952d38311c9d5380f627eced775f38755b2374f6b81e088811706fec14c0d56e01b1aaac2d7030278161c8eb3d0ff6651d14f9e31bbefc9329620bf
-
MD5
7758440f5f314ea55143cfb56dabf434
SHA182fe15c964ce358b37115ffb5148d976965c6ef5
SHA2561206f705128ee12694a8fb0b16fc1c1de4703089ea138ba0b2ba80f5c0f7c46b
SHA51217b3e7790952d38311c9d5380f627eced775f38755b2374f6b81e088811706fec14c0d56e01b1aaac2d7030278161c8eb3d0ff6651d14f9e31bbefc9329620bf
-
MD5
7758440f5f314ea55143cfb56dabf434
SHA182fe15c964ce358b37115ffb5148d976965c6ef5
SHA2561206f705128ee12694a8fb0b16fc1c1de4703089ea138ba0b2ba80f5c0f7c46b
SHA51217b3e7790952d38311c9d5380f627eced775f38755b2374f6b81e088811706fec14c0d56e01b1aaac2d7030278161c8eb3d0ff6651d14f9e31bbefc9329620bf
-
MD5
3598180fddc06dbd304b76627143b01d
SHA11d39b0dd8425359ed94e606cb04f9c5e49ed1899
SHA25644a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda
SHA5128f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d