Analysis
-
max time kernel
156s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
28-01-2022 13:30
Static task
static1
Behavioral task
behavioral1
Sample
b79524c98bfa18999ed070b243ada769bb7295419d510042eb25eba37c2c227c.exe
Resource
win10v2004-en-20220112
General
-
Target
b79524c98bfa18999ed070b243ada769bb7295419d510042eb25eba37c2c227c.exe
-
Size
658KB
-
MD5
203824aed18427599c09b9a602f99d51
-
SHA1
6c031395edbd173fed660845ab7334caf552d173
-
SHA256
b79524c98bfa18999ed070b243ada769bb7295419d510042eb25eba37c2c227c
-
SHA512
e46dbab02f28158566c5e122f645822b23bce18c22d21f647722eb641d94339c4e50aa30b50fb630fb0ac7a82ef3d9a07b9374f7fce534a3a6cd961d22b6ed14
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1500-131-0x0000000000420000-0x00000000004A4000-memory.dmp family_redline behavioral1/memory/1500-134-0x0000000000420000-0x00000000004A4000-memory.dmp family_redline -
Sets service image path in registry 2 TTPs
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
b79524c98bfa18999ed070b243ada769bb7295419d510042eb25eba37c2c227c.exepid process 1500 b79524c98bfa18999ed070b243ada769bb7295419d510042eb25eba37c2c227c.exe -
Modifies data under HKEY_USERS 41 IoCs
Processes:
WaaSMedicAgent.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
b79524c98bfa18999ed070b243ada769bb7295419d510042eb25eba37c2c227c.exepid process 1500 b79524c98bfa18999ed070b243ada769bb7295419d510042eb25eba37c2c227c.exe 1500 b79524c98bfa18999ed070b243ada769bb7295419d510042eb25eba37c2c227c.exe 1500 b79524c98bfa18999ed070b243ada769bb7295419d510042eb25eba37c2c227c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
b79524c98bfa18999ed070b243ada769bb7295419d510042eb25eba37c2c227c.exedescription pid process Token: SeDebugPrivilege 1500 b79524c98bfa18999ed070b243ada769bb7295419d510042eb25eba37c2c227c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b79524c98bfa18999ed070b243ada769bb7295419d510042eb25eba37c2c227c.exe"C:\Users\Admin\AppData\Local\Temp\b79524c98bfa18999ed070b243ada769bb7295419d510042eb25eba37c2c227c.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 38694023962b74f233e49e5c3312d83e xorpv0a6MUWbGFSXMdI1yQ.0.1.0.0.01⤵
- Modifies data under HKEY_USERS
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1500-130-0x0000000000770000-0x00000000007B4000-memory.dmpFilesize
272KB
-
memory/1500-131-0x0000000000420000-0x00000000004A4000-memory.dmpFilesize
528KB
-
memory/1500-132-0x0000000000410000-0x0000000000411000-memory.dmpFilesize
4KB
-
memory/1500-133-0x0000000076E70000-0x0000000077085000-memory.dmpFilesize
2.1MB
-
memory/1500-134-0x0000000000420000-0x00000000004A4000-memory.dmpFilesize
528KB
-
memory/1500-135-0x0000000073570000-0x00000000735F9000-memory.dmpFilesize
548KB
-
memory/1500-137-0x0000000005020000-0x0000000005021000-memory.dmpFilesize
4KB
-
memory/1500-136-0x00000000761A0000-0x0000000076753000-memory.dmpFilesize
5.7MB
-
memory/1500-138-0x0000000005650000-0x0000000005C68000-memory.dmpFilesize
6.1MB
-
memory/1500-139-0x0000000005080000-0x0000000005092000-memory.dmpFilesize
72KB
-
memory/1500-140-0x00000000051B0000-0x00000000052BA000-memory.dmpFilesize
1.0MB
-
memory/1500-141-0x00000000050E0000-0x000000000511C000-memory.dmpFilesize
240KB
-
memory/1500-142-0x0000000005C70000-0x0000000005E32000-memory.dmpFilesize
1.8MB
-
memory/1500-143-0x000000006ED80000-0x000000006EDCC000-memory.dmpFilesize
304KB
-
memory/1500-144-0x00000000063F0000-0x0000000006994000-memory.dmpFilesize
5.6MB
-
memory/1500-145-0x0000000000A80000-0x0000000000B12000-memory.dmpFilesize
584KB
-
memory/1500-146-0x0000000000B20000-0x0000000000B86000-memory.dmpFilesize
408KB
-
memory/1500-147-0x0000000005380000-0x00000000053F6000-memory.dmpFilesize
472KB
-
memory/1500-148-0x0000000005350000-0x000000000536E000-memory.dmpFilesize
120KB
-
memory/1500-149-0x0000000007980000-0x0000000007EAC000-memory.dmpFilesize
5.2MB
-
memory/1500-150-0x0000000006B30000-0x0000000006B80000-memory.dmpFilesize
320KB