Analysis
-
max time kernel
119s -
max time network
132s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
28-01-2022 06:58
Static task
static1
Behavioral task
behavioral1
Sample
ba48cbe3330971221c4c9c406a30ef6f.exe
Resource
win7-en-20211208
General
-
Target
ba48cbe3330971221c4c9c406a30ef6f.exe
-
Size
1.2MB
-
MD5
ba48cbe3330971221c4c9c406a30ef6f
-
SHA1
d766e0b0a7108d201490b256d5164c087ee13715
-
SHA256
067b704b54f19baef687e3e3f4ac845283b1f670752df309e6eb143565851da6
-
SHA512
650e1e0d9bcb1f6f1b123b1782e16fb2a03c8cb034e23b9ff4875572978fa36b3573a65c983555e87ca2adb93adc9dc10e868baa77570620c03e9897ed8a678d
Malware Config
Extracted
redline
185.105.119.120:48759
Extracted
redline
123
46.3.199.85:4329
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/3172-122-0x0000000000400000-0x000000000046C000-memory.dmp family_redline C:\Users\Admin\AppData\Roaming\asf3r3.exe family_redline behavioral2/memory/2624-134-0x0000000000B80000-0x0000000000BA0000-memory.dmp family_redline C:\Users\Admin\AppData\Roaming\asf3r3.exe family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
asf3r3.exee3dwefw.exeoobeldr.exepid process 2624 asf3r3.exe 2168 e3dwefw.exe 1240 oobeldr.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
ba48cbe3330971221c4c9c406a30ef6f.exedescription pid process target process PID 2772 set thread context of 3172 2772 ba48cbe3330971221c4c9c406a30ef6f.exe RegAsm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
RegAsm.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
RegAsm.exeasf3r3.exepid process 3172 RegAsm.exe 3172 RegAsm.exe 3172 RegAsm.exe 3172 RegAsm.exe 3172 RegAsm.exe 2624 asf3r3.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
RegAsm.exeasf3r3.exedescription pid process Token: SeDebugPrivilege 3172 RegAsm.exe Token: SeDebugPrivilege 2624 asf3r3.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
ba48cbe3330971221c4c9c406a30ef6f.exeRegAsm.exee3dwefw.exeoobeldr.exedescription pid process target process PID 2772 wrote to memory of 3172 2772 ba48cbe3330971221c4c9c406a30ef6f.exe RegAsm.exe PID 2772 wrote to memory of 3172 2772 ba48cbe3330971221c4c9c406a30ef6f.exe RegAsm.exe PID 2772 wrote to memory of 3172 2772 ba48cbe3330971221c4c9c406a30ef6f.exe RegAsm.exe PID 2772 wrote to memory of 3172 2772 ba48cbe3330971221c4c9c406a30ef6f.exe RegAsm.exe PID 2772 wrote to memory of 3172 2772 ba48cbe3330971221c4c9c406a30ef6f.exe RegAsm.exe PID 2772 wrote to memory of 3172 2772 ba48cbe3330971221c4c9c406a30ef6f.exe RegAsm.exe PID 2772 wrote to memory of 3172 2772 ba48cbe3330971221c4c9c406a30ef6f.exe RegAsm.exe PID 2772 wrote to memory of 3172 2772 ba48cbe3330971221c4c9c406a30ef6f.exe RegAsm.exe PID 3172 wrote to memory of 2624 3172 RegAsm.exe asf3r3.exe PID 3172 wrote to memory of 2624 3172 RegAsm.exe asf3r3.exe PID 3172 wrote to memory of 2624 3172 RegAsm.exe asf3r3.exe PID 3172 wrote to memory of 2168 3172 RegAsm.exe e3dwefw.exe PID 3172 wrote to memory of 2168 3172 RegAsm.exe e3dwefw.exe PID 3172 wrote to memory of 2168 3172 RegAsm.exe e3dwefw.exe PID 2168 wrote to memory of 380 2168 e3dwefw.exe schtasks.exe PID 2168 wrote to memory of 380 2168 e3dwefw.exe schtasks.exe PID 2168 wrote to memory of 380 2168 e3dwefw.exe schtasks.exe PID 1240 wrote to memory of 984 1240 oobeldr.exe schtasks.exe PID 1240 wrote to memory of 984 1240 oobeldr.exe schtasks.exe PID 1240 wrote to memory of 984 1240 oobeldr.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba48cbe3330971221c4c9c406a30ef6f.exe"C:\Users\Admin\AppData\Local\Temp\ba48cbe3330971221c4c9c406a30ef6f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe#cmd2⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\asf3r3.exe"C:\Users\Admin\AppData\Roaming\asf3r3.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\e3dwefw.exe"C:\Users\Admin\AppData\Roaming\e3dwefw.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"4⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeMD5
67486b272027c5c08c37d2a7dfa3b019
SHA1660cd3fa71e480e03b392ccfff95b1a651ec1563
SHA256cb2f3c7a11ff1993ed3a24d396beeca0f06842b9cd9097351a7c8662250ec677
SHA5126565af5f8e090285258a0abf4faa1c99790b409f4ed8a4233048614ca470f1d7c4a40f951bd7c2664c567f7788f9e689afb3d72fcff853d888fef5b40051cf61
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeMD5
67486b272027c5c08c37d2a7dfa3b019
SHA1660cd3fa71e480e03b392ccfff95b1a651ec1563
SHA256cb2f3c7a11ff1993ed3a24d396beeca0f06842b9cd9097351a7c8662250ec677
SHA5126565af5f8e090285258a0abf4faa1c99790b409f4ed8a4233048614ca470f1d7c4a40f951bd7c2664c567f7788f9e689afb3d72fcff853d888fef5b40051cf61
-
C:\Users\Admin\AppData\Roaming\asf3r3.exeMD5
251a95b3e822ff316dcbeec79f622594
SHA1214ffd96dbb7df6d8e437d57753131142ab3cfa1
SHA2560b1dd3984b36ee6b633f22f4f90eebe1b9f32ec6d6c46134a179f69e6bd11ec7
SHA512f0441fdec6cf50fb8c37a8f5707bba20cde622faa13d9426ffc1f4cd66c0ed428ca5f767aee78f6ffac9d5677d423ddced153b71363f8bcca96c63ca5a13e88f
-
C:\Users\Admin\AppData\Roaming\asf3r3.exeMD5
251a95b3e822ff316dcbeec79f622594
SHA1214ffd96dbb7df6d8e437d57753131142ab3cfa1
SHA2560b1dd3984b36ee6b633f22f4f90eebe1b9f32ec6d6c46134a179f69e6bd11ec7
SHA512f0441fdec6cf50fb8c37a8f5707bba20cde622faa13d9426ffc1f4cd66c0ed428ca5f767aee78f6ffac9d5677d423ddced153b71363f8bcca96c63ca5a13e88f
-
C:\Users\Admin\AppData\Roaming\e3dwefw.exeMD5
67486b272027c5c08c37d2a7dfa3b019
SHA1660cd3fa71e480e03b392ccfff95b1a651ec1563
SHA256cb2f3c7a11ff1993ed3a24d396beeca0f06842b9cd9097351a7c8662250ec677
SHA5126565af5f8e090285258a0abf4faa1c99790b409f4ed8a4233048614ca470f1d7c4a40f951bd7c2664c567f7788f9e689afb3d72fcff853d888fef5b40051cf61
-
C:\Users\Admin\AppData\Roaming\e3dwefw.exeMD5
67486b272027c5c08c37d2a7dfa3b019
SHA1660cd3fa71e480e03b392ccfff95b1a651ec1563
SHA256cb2f3c7a11ff1993ed3a24d396beeca0f06842b9cd9097351a7c8662250ec677
SHA5126565af5f8e090285258a0abf4faa1c99790b409f4ed8a4233048614ca470f1d7c4a40f951bd7c2664c567f7788f9e689afb3d72fcff853d888fef5b40051cf61
-
memory/2624-137-0x00000000052E0000-0x00000000058E6000-memory.dmpFilesize
6.0MB
-
memory/2624-134-0x0000000000B80000-0x0000000000BA0000-memory.dmpFilesize
128KB
-
memory/2772-121-0x00000000055A0000-0x00000000055AA000-memory.dmpFilesize
40KB
-
memory/2772-115-0x0000000000590000-0x00000000006D4000-memory.dmpFilesize
1.3MB
-
memory/2772-116-0x00000000055B0000-0x0000000005AAE000-memory.dmpFilesize
5.0MB
-
memory/2772-117-0x0000000005150000-0x00000000051E2000-memory.dmpFilesize
584KB
-
memory/2772-118-0x0000000004FA0000-0x0000000004FA1000-memory.dmpFilesize
4KB
-
memory/2772-119-0x00000000054F0000-0x0000000005566000-memory.dmpFilesize
472KB
-
memory/2772-120-0x00000000050D0000-0x00000000050EE000-memory.dmpFilesize
120KB
-
memory/3172-128-0x0000000007170000-0x000000000769C000-memory.dmpFilesize
5.2MB
-
memory/3172-131-0x0000000007080000-0x00000000070CB000-memory.dmpFilesize
300KB
-
memory/3172-123-0x0000000005960000-0x0000000005F66000-memory.dmpFilesize
6.0MB
-
memory/3172-122-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/3172-130-0x0000000007000000-0x000000000703E000-memory.dmpFilesize
248KB
-
memory/3172-129-0x0000000006D50000-0x0000000006DB6000-memory.dmpFilesize
408KB
-
memory/3172-124-0x00000000053C0000-0x00000000053D2000-memory.dmpFilesize
72KB
-
memory/3172-127-0x0000000005350000-0x0000000005956000-memory.dmpFilesize
6.0MB
-
memory/3172-138-0x00000000079A0000-0x00000000079F0000-memory.dmpFilesize
320KB
-
memory/3172-126-0x0000000005F70000-0x0000000006132000-memory.dmpFilesize
1.8MB
-
memory/3172-125-0x00000000054F0000-0x00000000055FA000-memory.dmpFilesize
1.0MB