Analysis
-
max time kernel
137s -
max time network
153s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
26-09-2021 11:49
Static task
static1
Behavioral task
behavioral1
Sample
usfive_20210923-211555.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
usfive_20210923-211555.exe
Resource
win10v20210408
General
-
Target
usfive_20210923-211555.exe
-
Size
129KB
-
MD5
f3ece1fccde488f4b34e2e6d8acf8bc6
-
SHA1
b2388fd305a16419830d2a1f77bd06aeb163a570
-
SHA256
7ca61d0c6da0befe6f8dcb57e761d655eaf524c6266425bbf18fcc5a02351f32
-
SHA512
1433bf9963c9092e93bf16ea565596b9b0878c71bc477de8ab6d1c725c099a00467063339271f82ab151f62377701332e076688abb379215124d9be7b8d73939
Malware Config
Extracted
redline
raketa
45.144.29.94:61419
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4004-120-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral2/memory/4004-121-0x000000000041C5D2-mapping.dmp family_redline -
Suspicious use of SetThreadContext 1 IoCs
Processes:
usfive_20210923-211555.exedescription pid process target process PID 664 set thread context of 4004 664 usfive_20210923-211555.exe usfive_20210923-211555.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4080 664 WerFault.exe usfive_20210923-211555.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
WerFault.exepid process 4080 WerFault.exe 4080 WerFault.exe 4080 WerFault.exe 4080 WerFault.exe 4080 WerFault.exe 4080 WerFault.exe 4080 WerFault.exe 4080 WerFault.exe 4080 WerFault.exe 4080 WerFault.exe 4080 WerFault.exe 4080 WerFault.exe 4080 WerFault.exe 4080 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
usfive_20210923-211555.exeWerFault.exedescription pid process Token: SeDebugPrivilege 664 usfive_20210923-211555.exe Token: SeRestorePrivilege 4080 WerFault.exe Token: SeBackupPrivilege 4080 WerFault.exe Token: SeDebugPrivilege 4080 WerFault.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
usfive_20210923-211555.exedescription pid process target process PID 664 wrote to memory of 4004 664 usfive_20210923-211555.exe usfive_20210923-211555.exe PID 664 wrote to memory of 4004 664 usfive_20210923-211555.exe usfive_20210923-211555.exe PID 664 wrote to memory of 4004 664 usfive_20210923-211555.exe usfive_20210923-211555.exe PID 664 wrote to memory of 4004 664 usfive_20210923-211555.exe usfive_20210923-211555.exe PID 664 wrote to memory of 4004 664 usfive_20210923-211555.exe usfive_20210923-211555.exe PID 664 wrote to memory of 4004 664 usfive_20210923-211555.exe usfive_20210923-211555.exe PID 664 wrote to memory of 4004 664 usfive_20210923-211555.exe usfive_20210923-211555.exe PID 664 wrote to memory of 4004 664 usfive_20210923-211555.exe usfive_20210923-211555.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\usfive_20210923-211555.exe"C:\Users\Admin\AppData\Local\Temp\usfive_20210923-211555.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\usfive_20210923-211555.exe"C:\Users\Admin\AppData\Local\Temp\usfive_20210923-211555.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 664 -s 9282⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/664-123-0x0000000005220000-0x0000000005223000-memory.dmpFilesize
12KB
-
memory/664-115-0x00000000058B0000-0x00000000058B1000-memory.dmpFilesize
4KB
-
memory/664-116-0x0000000005270000-0x0000000005271000-memory.dmpFilesize
4KB
-
memory/664-117-0x00000000053B0000-0x00000000053B1000-memory.dmpFilesize
4KB
-
memory/664-118-0x00000000053B0000-0x00000000058AE000-memory.dmpFilesize
5.0MB
-
memory/664-119-0x00000000051D0000-0x00000000051E8000-memory.dmpFilesize
96KB
-
memory/664-114-0x0000000000850000-0x0000000000851000-memory.dmpFilesize
4KB
-
memory/4004-120-0x0000000000400000-0x0000000000422000-memory.dmpFilesize
136KB
-
memory/4004-121-0x000000000041C5D2-mapping.dmp
-
memory/4004-125-0x0000000005730000-0x0000000005731000-memory.dmpFilesize
4KB
-
memory/4004-126-0x0000000005140000-0x0000000005141000-memory.dmpFilesize
4KB
-
memory/4004-127-0x0000000005270000-0x0000000005271000-memory.dmpFilesize
4KB
-
memory/4004-128-0x00000000051A0000-0x00000000051A1000-memory.dmpFilesize
4KB
-
memory/4004-129-0x0000000005120000-0x0000000005726000-memory.dmpFilesize
6.0MB
-
memory/4004-130-0x00000000051E0000-0x00000000051E1000-memory.dmpFilesize
4KB