Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
24-10-2021 12:46
Static task
static1
Behavioral task
behavioral1
Sample
ac3e3692ed2f66f4e6227cc86df0283c.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
ac3e3692ed2f66f4e6227cc86df0283c.exe
Resource
win10-en-20211014
General
-
Target
ac3e3692ed2f66f4e6227cc86df0283c.exe
-
Size
1.1MB
-
MD5
ac3e3692ed2f66f4e6227cc86df0283c
-
SHA1
b1b4a77aa6c0ccf203ab08f8a8359a736ee03b2a
-
SHA256
6a8380cdaf3d012f2373f6919bbd2ee6c21ae43dd16d29c999528189057ccf1d
-
SHA512
893ce7687f232024f80635a06ea7e711dace41dfb9bf687ba47ace7d9010a67a6e9e8ceb6ccb23bb6c5a5dda1451c380f88c8e6ad1ffedb9f7c39c20420e5397
Malware Config
Extracted
redline
2
146.0.75.231:80
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/296-131-0x0000000000BA0000-0x0000000000BBE000-memory.dmp family_redline behavioral2/memory/296-142-0x0000000005460000-0x0000000005A66000-memory.dmp family_redline -
Executes dropped EXE 3 IoCs
Processes:
Smettere.exe.comSmettere.exe.comRegAsm.exepid process 8 Smettere.exe.com 3948 Smettere.exe.com 296 RegAsm.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ac3e3692ed2f66f4e6227cc86df0283c.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ac3e3692ed2f66f4e6227cc86df0283c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ac3e3692ed2f66f4e6227cc86df0283c.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Smettere.exe.comdescription pid process target process PID 3948 set thread context of 296 3948 Smettere.exe.com RegAsm.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
Smettere.exe.comRegAsm.exepid process 3948 Smettere.exe.com 3948 Smettere.exe.com 3948 Smettere.exe.com 3948 Smettere.exe.com 3948 Smettere.exe.com 3948 Smettere.exe.com 3948 Smettere.exe.com 3948 Smettere.exe.com 3948 Smettere.exe.com 3948 Smettere.exe.com 3948 Smettere.exe.com 3948 Smettere.exe.com 3948 Smettere.exe.com 3948 Smettere.exe.com 3948 Smettere.exe.com 3948 Smettere.exe.com 296 RegAsm.exe 296 RegAsm.exe 296 RegAsm.exe 296 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegAsm.exedescription pid process Token: SeDebugPrivilege 296 RegAsm.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
ac3e3692ed2f66f4e6227cc86df0283c.execmd.execmd.exeSmettere.exe.comSmettere.exe.comdescription pid process target process PID 3384 wrote to memory of 1028 3384 ac3e3692ed2f66f4e6227cc86df0283c.exe dllhost.exe PID 3384 wrote to memory of 1028 3384 ac3e3692ed2f66f4e6227cc86df0283c.exe dllhost.exe PID 3384 wrote to memory of 1028 3384 ac3e3692ed2f66f4e6227cc86df0283c.exe dllhost.exe PID 3384 wrote to memory of 944 3384 ac3e3692ed2f66f4e6227cc86df0283c.exe cmd.exe PID 3384 wrote to memory of 944 3384 ac3e3692ed2f66f4e6227cc86df0283c.exe cmd.exe PID 3384 wrote to memory of 944 3384 ac3e3692ed2f66f4e6227cc86df0283c.exe cmd.exe PID 944 wrote to memory of 744 944 cmd.exe cmd.exe PID 944 wrote to memory of 744 944 cmd.exe cmd.exe PID 944 wrote to memory of 744 944 cmd.exe cmd.exe PID 744 wrote to memory of 580 744 cmd.exe findstr.exe PID 744 wrote to memory of 580 744 cmd.exe findstr.exe PID 744 wrote to memory of 580 744 cmd.exe findstr.exe PID 744 wrote to memory of 8 744 cmd.exe Smettere.exe.com PID 744 wrote to memory of 8 744 cmd.exe Smettere.exe.com PID 744 wrote to memory of 8 744 cmd.exe Smettere.exe.com PID 744 wrote to memory of 352 744 cmd.exe PING.EXE PID 744 wrote to memory of 352 744 cmd.exe PING.EXE PID 744 wrote to memory of 352 744 cmd.exe PING.EXE PID 8 wrote to memory of 3948 8 Smettere.exe.com Smettere.exe.com PID 8 wrote to memory of 3948 8 Smettere.exe.com Smettere.exe.com PID 8 wrote to memory of 3948 8 Smettere.exe.com Smettere.exe.com PID 3948 wrote to memory of 296 3948 Smettere.exe.com RegAsm.exe PID 3948 wrote to memory of 296 3948 Smettere.exe.com RegAsm.exe PID 3948 wrote to memory of 296 3948 Smettere.exe.com RegAsm.exe PID 3948 wrote to memory of 296 3948 Smettere.exe.com RegAsm.exe PID 3948 wrote to memory of 296 3948 Smettere.exe.com RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac3e3692ed2f66f4e6227cc86df0283c.exe"C:\Users\Admin\AppData\Local\Temp\ac3e3692ed2f66f4e6227cc86df0283c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\SysWOW64\dllhost.exedllhost.exe2⤵PID:1028
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Luce.ini2⤵
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\cmd.execmd3⤵
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^KyGbaHswOKLbRCwvDcWxdvZVsmfKotGADOUlVpOMxlueTfJIKFZYvlzgyLuTaGTKtkUrHQAzHpZyfWwePGqDtIraxGtlrUxOsvYIxGwTtFdjkhZoJttMFfFciBIwLdfM$" Copre.ini4⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Smettere.exe.comSmettere.exe.com N4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Smettere.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Smettere.exe.com N5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:296 -
C:\Windows\SysWOW64\PING.EXEping localhost4⤵
- Runs ping.exe
PID:352
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
80cdba403703c10e0a3d0a0ab76178b2
SHA14694d6564dcad667fed8df29ae9973952ed8e064
SHA256dc599a8c3c2d1ef05a0affb6e79c88016f03ea98dd2fd3920f46a1ef3f340958
SHA5129f0ab6a7a37ad7949584d648bc940dff85a31b57ff2288fb036d04bf8200070453b1dafc5635e5854a6d4b8dedc6d121c0031c1eeb887b104de2804d67d9c8a1
-
MD5
e8f4d6532d032c1c2bcd6a2767ba1625
SHA1b563b652d347fb6d6562c3d6b2e1abc083dfe9f5
SHA256fcdd55b13fc6081f6195cd442c61e139ff2b26c33423b1367349d13c3f77e000
SHA512888e0dd898b5aa089066685b3ab640f80c8209d4e2030ac418875c50d2bf1cc45d33fb33dbb125a1752fd813af88d7d3f5ce6377e23b5782f549d04d795674de
-
MD5
17601ebab364160365dfe5dab7a636c1
SHA1d4b49ca26c2a5bebd22b5e0b283a6501be554ba2
SHA2561cec945fd3f1e1e29292366fdd33616e572442a9eac9e3ccf81a21aa59e5fa59
SHA5123fb438683f39bcdc86ae759aa74d3281fe871e3ec84fc9146f935326d1a3fb616b62b0e15af8364534010588fde4aa8eba3f717cdf7b3ac31cf8611845704a56
-
MD5
80cdba403703c10e0a3d0a0ab76178b2
SHA14694d6564dcad667fed8df29ae9973952ed8e064
SHA256dc599a8c3c2d1ef05a0affb6e79c88016f03ea98dd2fd3920f46a1ef3f340958
SHA5129f0ab6a7a37ad7949584d648bc940dff85a31b57ff2288fb036d04bf8200070453b1dafc5635e5854a6d4b8dedc6d121c0031c1eeb887b104de2804d67d9c8a1
-
MD5
5a911a3f76c58daa6360d70023b896b0
SHA13f648ccbca1901dd0e60731ed3b340b66feafa0b
SHA2569f119d6f40f8d9d99381c06712e6c03e292f2c9ed63f9a879268756aeb4713a2
SHA51287e8ac990ee4732ab3a07032e58426abb95c32fdca9501729ec7517eb5362697d02a3534df16c50dd3d4ba80d52171662dab48bc0497d0c7897413e4a2fcb7c0
-
MD5
b58b926c3574d28d5b7fdd2ca3ec30d5
SHA1d260c4ffd603a9cfc057fcb83d678b1cecdf86f9
SHA2566e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3
SHA512b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab
-
MD5
b58b926c3574d28d5b7fdd2ca3ec30d5
SHA1d260c4ffd603a9cfc057fcb83d678b1cecdf86f9
SHA2566e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3
SHA512b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab
-
MD5
c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
MD5
c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
MD5
c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c