Analysis
-
max time kernel
122s -
max time network
121s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
28-01-2022 08:47
Static task
static1
Behavioral task
behavioral1
Sample
b1af9c20593036c476f84527f9144c53.exe
Resource
win7-en-20211208
General
-
Target
b1af9c20593036c476f84527f9144c53.exe
-
Size
1.4MB
-
MD5
b1af9c20593036c476f84527f9144c53
-
SHA1
d72a110adaa72ee1573661b30960f789c8a43e99
-
SHA256
e0ae1a565fe7f5951aa98cc3465200e0576932e6bd62f4e562f369016c63dabe
-
SHA512
2164b7d975f1920e01b9959143970d0066c6c52c581f1f3a10627fdfdd32cae3518575aeb25c469305e7c2dcd86499a530a8720be775d1c0f8f8756914268ac7
Malware Config
Extracted
redline
5.206.227.236:33067
Extracted
redline
123
46.3.199.85:4329
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/3964-135-0x00000000005A0000-0x000000000060C000-memory.dmp family_redline C:\Users\Admin\AppData\Roaming\asf3r3.exe family_redline C:\Users\Admin\AppData\Roaming\asf3r3.exe family_redline behavioral2/memory/396-147-0x0000000000680000-0x00000000006A0000-memory.dmp family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
asf3r3.exee3dwefw.exeoobeldr.exepid process 396 asf3r3.exe 1216 e3dwefw.exe 2508 oobeldr.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
b1af9c20593036c476f84527f9144c53.exedescription pid process target process PID 3712 set thread context of 3964 3712 b1af9c20593036c476f84527f9144c53.exe RegAsm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
RegAsm.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1252 schtasks.exe 2620 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
RegAsm.exeasf3r3.exepid process 3964 RegAsm.exe 3964 RegAsm.exe 3964 RegAsm.exe 3964 RegAsm.exe 396 asf3r3.exe 3964 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
RegAsm.exeasf3r3.exedescription pid process Token: SeDebugPrivilege 3964 RegAsm.exe Token: SeDebugPrivilege 396 asf3r3.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
b1af9c20593036c476f84527f9144c53.exeRegAsm.exee3dwefw.exeoobeldr.exedescription pid process target process PID 3712 wrote to memory of 3964 3712 b1af9c20593036c476f84527f9144c53.exe RegAsm.exe PID 3712 wrote to memory of 3964 3712 b1af9c20593036c476f84527f9144c53.exe RegAsm.exe PID 3712 wrote to memory of 3964 3712 b1af9c20593036c476f84527f9144c53.exe RegAsm.exe PID 3712 wrote to memory of 3964 3712 b1af9c20593036c476f84527f9144c53.exe RegAsm.exe PID 3712 wrote to memory of 3964 3712 b1af9c20593036c476f84527f9144c53.exe RegAsm.exe PID 3712 wrote to memory of 3964 3712 b1af9c20593036c476f84527f9144c53.exe RegAsm.exe PID 3712 wrote to memory of 3964 3712 b1af9c20593036c476f84527f9144c53.exe RegAsm.exe PID 3712 wrote to memory of 3964 3712 b1af9c20593036c476f84527f9144c53.exe RegAsm.exe PID 3964 wrote to memory of 396 3964 RegAsm.exe asf3r3.exe PID 3964 wrote to memory of 396 3964 RegAsm.exe asf3r3.exe PID 3964 wrote to memory of 396 3964 RegAsm.exe asf3r3.exe PID 3964 wrote to memory of 1216 3964 RegAsm.exe e3dwefw.exe PID 3964 wrote to memory of 1216 3964 RegAsm.exe e3dwefw.exe PID 3964 wrote to memory of 1216 3964 RegAsm.exe e3dwefw.exe PID 1216 wrote to memory of 1252 1216 e3dwefw.exe schtasks.exe PID 1216 wrote to memory of 1252 1216 e3dwefw.exe schtasks.exe PID 1216 wrote to memory of 1252 1216 e3dwefw.exe schtasks.exe PID 2508 wrote to memory of 2620 2508 oobeldr.exe schtasks.exe PID 2508 wrote to memory of 2620 2508 oobeldr.exe schtasks.exe PID 2508 wrote to memory of 2620 2508 oobeldr.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1af9c20593036c476f84527f9144c53.exe"C:\Users\Admin\AppData\Local\Temp\b1af9c20593036c476f84527f9144c53.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe#cmd2⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\asf3r3.exe"C:\Users\Admin\AppData\Roaming\asf3r3.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\e3dwefw.exe"C:\Users\Admin\AppData\Roaming\e3dwefw.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"4⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeMD5
67486b272027c5c08c37d2a7dfa3b019
SHA1660cd3fa71e480e03b392ccfff95b1a651ec1563
SHA256cb2f3c7a11ff1993ed3a24d396beeca0f06842b9cd9097351a7c8662250ec677
SHA5126565af5f8e090285258a0abf4faa1c99790b409f4ed8a4233048614ca470f1d7c4a40f951bd7c2664c567f7788f9e689afb3d72fcff853d888fef5b40051cf61
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeMD5
67486b272027c5c08c37d2a7dfa3b019
SHA1660cd3fa71e480e03b392ccfff95b1a651ec1563
SHA256cb2f3c7a11ff1993ed3a24d396beeca0f06842b9cd9097351a7c8662250ec677
SHA5126565af5f8e090285258a0abf4faa1c99790b409f4ed8a4233048614ca470f1d7c4a40f951bd7c2664c567f7788f9e689afb3d72fcff853d888fef5b40051cf61
-
C:\Users\Admin\AppData\Roaming\asf3r3.exeMD5
251a95b3e822ff316dcbeec79f622594
SHA1214ffd96dbb7df6d8e437d57753131142ab3cfa1
SHA2560b1dd3984b36ee6b633f22f4f90eebe1b9f32ec6d6c46134a179f69e6bd11ec7
SHA512f0441fdec6cf50fb8c37a8f5707bba20cde622faa13d9426ffc1f4cd66c0ed428ca5f767aee78f6ffac9d5677d423ddced153b71363f8bcca96c63ca5a13e88f
-
C:\Users\Admin\AppData\Roaming\asf3r3.exeMD5
251a95b3e822ff316dcbeec79f622594
SHA1214ffd96dbb7df6d8e437d57753131142ab3cfa1
SHA2560b1dd3984b36ee6b633f22f4f90eebe1b9f32ec6d6c46134a179f69e6bd11ec7
SHA512f0441fdec6cf50fb8c37a8f5707bba20cde622faa13d9426ffc1f4cd66c0ed428ca5f767aee78f6ffac9d5677d423ddced153b71363f8bcca96c63ca5a13e88f
-
C:\Users\Admin\AppData\Roaming\e3dwefw.exeMD5
67486b272027c5c08c37d2a7dfa3b019
SHA1660cd3fa71e480e03b392ccfff95b1a651ec1563
SHA256cb2f3c7a11ff1993ed3a24d396beeca0f06842b9cd9097351a7c8662250ec677
SHA5126565af5f8e090285258a0abf4faa1c99790b409f4ed8a4233048614ca470f1d7c4a40f951bd7c2664c567f7788f9e689afb3d72fcff853d888fef5b40051cf61
-
C:\Users\Admin\AppData\Roaming\e3dwefw.exeMD5
67486b272027c5c08c37d2a7dfa3b019
SHA1660cd3fa71e480e03b392ccfff95b1a651ec1563
SHA256cb2f3c7a11ff1993ed3a24d396beeca0f06842b9cd9097351a7c8662250ec677
SHA5126565af5f8e090285258a0abf4faa1c99790b409f4ed8a4233048614ca470f1d7c4a40f951bd7c2664c567f7788f9e689afb3d72fcff853d888fef5b40051cf61
-
memory/396-150-0x0000000004DE0000-0x00000000053E6000-memory.dmpFilesize
6.0MB
-
memory/396-147-0x0000000000680000-0x00000000006A0000-memory.dmpFilesize
128KB
-
memory/3712-133-0x0000000005690000-0x000000000569A000-memory.dmpFilesize
40KB
-
memory/3712-116-0x00000000007B0000-0x000000000091E000-memory.dmpFilesize
1.4MB
-
memory/3712-117-0x00000000053E0000-0x00000000053E1000-memory.dmpFilesize
4KB
-
memory/3712-118-0x00000000058F0000-0x0000000005DEE000-memory.dmpFilesize
5.0MB
-
memory/3712-119-0x0000000005210000-0x00000000052A2000-memory.dmpFilesize
584KB
-
memory/3712-123-0x00000000055F0000-0x0000000005666000-memory.dmpFilesize
472KB
-
memory/3712-132-0x00000000051C0000-0x00000000051DE000-memory.dmpFilesize
120KB
-
memory/3964-141-0x0000000008020000-0x000000000854C000-memory.dmpFilesize
5.2MB
-
memory/3964-144-0x0000000008550000-0x000000000859B000-memory.dmpFilesize
300KB
-
memory/3964-136-0x0000000005100000-0x0000000005706000-memory.dmpFilesize
6.0MB
-
memory/3964-135-0x00000000005A0000-0x000000000060C000-memory.dmpFilesize
432KB
-
memory/3964-143-0x0000000007F60000-0x0000000007F9E000-memory.dmpFilesize
248KB
-
memory/3964-142-0x0000000004A40000-0x0000000004AA6000-memory.dmpFilesize
408KB
-
memory/3964-137-0x0000000004B90000-0x0000000004BA2000-memory.dmpFilesize
72KB
-
memory/3964-140-0x0000000004AF0000-0x00000000050F6000-memory.dmpFilesize
6.0MB
-
memory/3964-151-0x00000000091B0000-0x0000000009200000-memory.dmpFilesize
320KB
-
memory/3964-139-0x0000000005710000-0x00000000058D2000-memory.dmpFilesize
1.8MB
-
memory/3964-138-0x0000000004CC0000-0x0000000004DCA000-memory.dmpFilesize
1.0MB