Analysis
-
max time kernel
116s -
max time network
122s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
24-10-2021 23:01
Static task
static1
Behavioral task
behavioral1
Sample
f00425341d6f6a335323df24e5b0a16abceb38f01a882e610560ec51e8a11b72.exe
Resource
win10-en-20211014
General
-
Target
f00425341d6f6a335323df24e5b0a16abceb38f01a882e610560ec51e8a11b72.exe
-
Size
705KB
-
MD5
e596d3106cb8ecec35bc6af419a5d259
-
SHA1
f4ab5924c3105f0497a33e35f1530f4bfe08b33f
-
SHA256
f00425341d6f6a335323df24e5b0a16abceb38f01a882e610560ec51e8a11b72
-
SHA512
c6ef7bcb1f8152333a89702c0459ff25daa763e8dc53df39c37a6bd9a2e5f439452d45c55749581f31045cd64cf83ae364086a837d498e182ba1c9f70ca55661
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1280-124-0x0000000002DB0000-0x0000000002DCC000-memory.dmp family_redline behavioral1/memory/1280-127-0x0000000002E50000-0x0000000002E6B000-memory.dmp family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
ipstersh.exepid process 1280 ipstersh.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
f00425341d6f6a335323df24e5b0a16abceb38f01a882e610560ec51e8a11b72.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 f00425341d6f6a335323df24e5b0a16abceb38f01a882e610560ec51e8a11b72.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString f00425341d6f6a335323df24e5b0a16abceb38f01a882e610560ec51e8a11b72.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
ipstersh.exepid process 1280 ipstersh.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ipstersh.exedescription pid process Token: SeDebugPrivilege 1280 ipstersh.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
f00425341d6f6a335323df24e5b0a16abceb38f01a882e610560ec51e8a11b72.exedescription pid process target process PID 3748 wrote to memory of 1280 3748 f00425341d6f6a335323df24e5b0a16abceb38f01a882e610560ec51e8a11b72.exe ipstersh.exe PID 3748 wrote to memory of 1280 3748 f00425341d6f6a335323df24e5b0a16abceb38f01a882e610560ec51e8a11b72.exe ipstersh.exe PID 3748 wrote to memory of 1280 3748 f00425341d6f6a335323df24e5b0a16abceb38f01a882e610560ec51e8a11b72.exe ipstersh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f00425341d6f6a335323df24e5b0a16abceb38f01a882e610560ec51e8a11b72.exe"C:\Users\Admin\AppData\Local\Temp\f00425341d6f6a335323df24e5b0a16abceb38f01a882e610560ec51e8a11b72.exe"1⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\wowsfree\ipstersh.exeipstersh.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\wowsfree\ipstersh.exeMD5
a67648a5bb88c3bfb10e76a764efef44
SHA127b7ccf7e4559fcbb3a0e83b600f54f1b602bf7d
SHA256fcbae6e5add0cd76ec5a91761d8f17396dcac7a5ca41f6d9dd7401b4c0b2ce94
SHA512418ca5c8e5f43b94dcd702be7742488f053db1e0d6ee6e34ada4337cedf1832e7a8a4449724f2348abecd8eeee7d6bd5b81378781cf8dfafe6beb4f74a18ddfe
-
C:\Users\Admin\AppData\Roaming\wowsfree\ipstersh.exeMD5
a67648a5bb88c3bfb10e76a764efef44
SHA127b7ccf7e4559fcbb3a0e83b600f54f1b602bf7d
SHA256fcbae6e5add0cd76ec5a91761d8f17396dcac7a5ca41f6d9dd7401b4c0b2ce94
SHA512418ca5c8e5f43b94dcd702be7742488f053db1e0d6ee6e34ada4337cedf1832e7a8a4449724f2348abecd8eeee7d6bd5b81378781cf8dfafe6beb4f74a18ddfe
-
memory/1280-127-0x0000000002E50000-0x0000000002E6B000-memory.dmpFilesize
108KB
-
memory/1280-121-0x0000000001361000-0x0000000001384000-memory.dmpFilesize
140KB
-
memory/1280-129-0x0000000003120000-0x0000000003121000-memory.dmpFilesize
4KB
-
memory/1280-141-0x00000000071A0000-0x00000000071A1000-memory.dmpFilesize
4KB
-
memory/1280-130-0x0000000005702000-0x0000000005703000-memory.dmpFilesize
4KB
-
memory/1280-123-0x0000000000400000-0x0000000001037000-memory.dmpFilesize
12.2MB
-
memory/1280-122-0x00000000001C0000-0x00000000001F0000-memory.dmpFilesize
192KB
-
memory/1280-131-0x0000000005703000-0x0000000005704000-memory.dmpFilesize
4KB
-
memory/1280-124-0x0000000002DB0000-0x0000000002DCC000-memory.dmpFilesize
112KB
-
memory/1280-126-0x0000000005710000-0x0000000005711000-memory.dmpFilesize
4KB
-
memory/1280-140-0x0000000006FC0000-0x0000000006FC1000-memory.dmpFilesize
4KB
-
memory/1280-128-0x0000000005C10000-0x0000000005C11000-memory.dmpFilesize
4KB
-
memory/1280-139-0x0000000006DF0000-0x0000000006DF1000-memory.dmpFilesize
4KB
-
memory/1280-118-0x0000000000000000-mapping.dmp
-
memory/1280-125-0x0000000005700000-0x0000000005701000-memory.dmpFilesize
4KB
-
memory/1280-132-0x0000000006220000-0x0000000006221000-memory.dmpFilesize
4KB
-
memory/1280-133-0x0000000005640000-0x0000000005641000-memory.dmpFilesize
4KB
-
memory/1280-134-0x0000000005704000-0x0000000005706000-memory.dmpFilesize
8KB
-
memory/1280-135-0x0000000006330000-0x0000000006331000-memory.dmpFilesize
4KB
-
memory/1280-136-0x0000000006580000-0x0000000006581000-memory.dmpFilesize
4KB
-
memory/1280-137-0x0000000006C90000-0x0000000006C91000-memory.dmpFilesize
4KB
-
memory/1280-138-0x0000000006D10000-0x0000000006D11000-memory.dmpFilesize
4KB
-
memory/3748-117-0x0000000000400000-0x0000000001081000-memory.dmpFilesize
12.5MB
-
memory/3748-115-0x00000000012A4000-0x0000000001310000-memory.dmpFilesize
432KB
-
memory/3748-116-0x00000000013A0000-0x000000000146F000-memory.dmpFilesize
828KB