Analysis
-
max time kernel
26s -
max time network
25s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
02-02-2022 14:58
Static task
static1
Behavioral task
behavioral1
Sample
183a84c3d59fa6de2b34b5ccbc32637c.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
183a84c3d59fa6de2b34b5ccbc32637c.exe
Resource
win10v2004-en-20220113
General
-
Target
183a84c3d59fa6de2b34b5ccbc32637c.exe
-
Size
489KB
-
MD5
183a84c3d59fa6de2b34b5ccbc32637c
-
SHA1
6e30576335ccda4544d4120af63317e634dc49ed
-
SHA256
d0eed3b006b239de23f8fc768ad6afcb82d6e7e435081602f0aeb2a0d639614e
-
SHA512
bb273052914d30ad66191950a301f9899cf28d7ac52ea3d0a1c1cf1e02f8ffcfccffce031533fcf5d6b39aaf139185dcce683f32fe4b01e55bcb4d21291fa495
Malware Config
Extracted
redline
1
stata2021.best:21675
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4696-183-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Suspicious use of SetThreadContext 1 IoCs
Processes:
183a84c3d59fa6de2b34b5ccbc32637c.exedescription pid process target process PID 3380 set thread context of 4696 3380 183a84c3d59fa6de2b34b5ccbc32637c.exe 183a84c3d59fa6de2b34b5ccbc32637c.exe -
Drops file in Windows directory 5 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe -
Modifies data under HKEY_USERS 41 IoCs
Processes:
WaaSMedicAgent.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
svchost.exedescription pid process Token: SeShutdownPrivilege 2872 svchost.exe Token: SeCreatePagefilePrivilege 2872 svchost.exe Token: SeShutdownPrivilege 2872 svchost.exe Token: SeCreatePagefilePrivilege 2872 svchost.exe Token: SeShutdownPrivilege 2872 svchost.exe Token: SeCreatePagefilePrivilege 2872 svchost.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
183a84c3d59fa6de2b34b5ccbc32637c.exedescription pid process target process PID 3380 wrote to memory of 1680 3380 183a84c3d59fa6de2b34b5ccbc32637c.exe 183a84c3d59fa6de2b34b5ccbc32637c.exe PID 3380 wrote to memory of 1680 3380 183a84c3d59fa6de2b34b5ccbc32637c.exe 183a84c3d59fa6de2b34b5ccbc32637c.exe PID 3380 wrote to memory of 1680 3380 183a84c3d59fa6de2b34b5ccbc32637c.exe 183a84c3d59fa6de2b34b5ccbc32637c.exe PID 3380 wrote to memory of 4696 3380 183a84c3d59fa6de2b34b5ccbc32637c.exe 183a84c3d59fa6de2b34b5ccbc32637c.exe PID 3380 wrote to memory of 4696 3380 183a84c3d59fa6de2b34b5ccbc32637c.exe 183a84c3d59fa6de2b34b5ccbc32637c.exe PID 3380 wrote to memory of 4696 3380 183a84c3d59fa6de2b34b5ccbc32637c.exe 183a84c3d59fa6de2b34b5ccbc32637c.exe PID 3380 wrote to memory of 4696 3380 183a84c3d59fa6de2b34b5ccbc32637c.exe 183a84c3d59fa6de2b34b5ccbc32637c.exe PID 3380 wrote to memory of 4696 3380 183a84c3d59fa6de2b34b5ccbc32637c.exe 183a84c3d59fa6de2b34b5ccbc32637c.exe PID 3380 wrote to memory of 4696 3380 183a84c3d59fa6de2b34b5ccbc32637c.exe 183a84c3d59fa6de2b34b5ccbc32637c.exe PID 3380 wrote to memory of 4696 3380 183a84c3d59fa6de2b34b5ccbc32637c.exe 183a84c3d59fa6de2b34b5ccbc32637c.exe PID 3380 wrote to memory of 4696 3380 183a84c3d59fa6de2b34b5ccbc32637c.exe 183a84c3d59fa6de2b34b5ccbc32637c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\183a84c3d59fa6de2b34b5ccbc32637c.exe"C:\Users\Admin\AppData\Local\Temp\183a84c3d59fa6de2b34b5ccbc32637c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\183a84c3d59fa6de2b34b5ccbc32637c.exeC:\Users\Admin\AppData\Local\Temp\183a84c3d59fa6de2b34b5ccbc32637c.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\183a84c3d59fa6de2b34b5ccbc32637c.exeC:\Users\Admin\AppData\Local\Temp\183a84c3d59fa6de2b34b5ccbc32637c.exe2⤵
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe f2696bf899cf842b55fc33719c5f95dd RnW1TiaOoESXGdlbXssfvQ.0.1.0.0.01⤵
- Modifies data under HKEY_USERS
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\183a84c3d59fa6de2b34b5ccbc32637c.exe.logMD5
e5352797047ad2c91b83e933b24fbc4f
SHA19bf8ac99b6cbf7ce86ce69524c25e3df75b4d772
SHA256b4643874d42d232c55bfbb75c36da41809d0c9ba4b2a203049aa82950345325c
SHA512dd2fc1966c8b3c9511f14801d1ce8110d6bca276a58216b5eeb0a3cfbb0cc8137ea14efbf790e63736230141da456cbaaa4e5c66f2884d4cfe68f499476fd827
-
memory/2872-180-0x0000019484130000-0x0000019484140000-memory.dmpFilesize
64KB
-
memory/2872-181-0x0000019484190000-0x00000194841A0000-memory.dmpFilesize
64KB
-
memory/2872-182-0x00000194871F0000-0x00000194871F4000-memory.dmpFilesize
16KB
-
memory/3380-130-0x0000000000C00000-0x0000000000C80000-memory.dmpFilesize
512KB
-
memory/3380-133-0x0000000005670000-0x00000000056E6000-memory.dmpFilesize
472KB
-
memory/3380-152-0x00000000055B0000-0x00000000055CE000-memory.dmpFilesize
120KB
-
memory/3380-178-0x0000000005CE0000-0x0000000006284000-memory.dmpFilesize
5.6MB
-
memory/4696-183-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/4696-190-0x0000000005DD0000-0x00000000063E8000-memory.dmpFilesize
6.1MB
-
memory/4696-191-0x00000000057B0000-0x00000000057C2000-memory.dmpFilesize
72KB
-
memory/4696-192-0x00000000058E0000-0x00000000059EA000-memory.dmpFilesize
1.0MB