Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220331-en -
submitted
12-04-2022 07:45
Static task
static1
Behavioral task
behavioral1
Sample
15791f0ceae7a162d3280af791cd8837705a7ccb6248bbfc3184cc3306ec4a57.exe
Resource
win10v2004-20220331-en
General
-
Target
15791f0ceae7a162d3280af791cd8837705a7ccb6248bbfc3184cc3306ec4a57.exe
-
Size
233KB
-
MD5
a9d9617466a30b874b80d4fd6465f46b
-
SHA1
b6e42e3a1fbc20c78e003b065440733fb1cafe84
-
SHA256
15791f0ceae7a162d3280af791cd8837705a7ccb6248bbfc3184cc3306ec4a57
-
SHA512
ec3d90e3c7b9427ecb9097941a37872c195cc389bf45a78b7c343d7d964fcf999266cee8bea78907cb302d318b74035948b7db760903692e4275d5016d3e1c89
Malware Config
Extracted
redline
123
188.68.205.12:7053
-
auth_value
cba3087b3c1a6a9c43b3f96591452ea2
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
resource yara_rule behavioral1/files/0x000a000000021810-125.dat family_redline behavioral1/files/0x000a000000021810-127.dat family_redline behavioral1/memory/3220-131-0x0000000000150000-0x0000000000170000-memory.dmp family_redline -
LoaderBot executable 3 IoCs
resource yara_rule behavioral1/files/0x000a000000021e5a-163.dat loaderbot behavioral1/files/0x000a000000021e5a-162.dat loaderbot behavioral1/memory/5056-164-0x0000000000BB0000-0x0000000000FB0000-memory.dmp loaderbot -
Downloads MZ/PE file
-
Executes dropped EXE 8 IoCs
pid Process 3220 M3gJNbpqWpct.exe 4308 BEgHvre3gJNc.exe 5096 5d0aad9e.exe 2588 5baa1271df727828.exe 5056 MinerFull.exe 4636 Driver.exe 4652 Driver.exe 3480 Driver.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-157025953-3125636059-437143553-1000\Control Panel\International\Geo\Nation 15791f0ceae7a162d3280af791cd8837705a7ccb6248bbfc3184cc3306ec4a57.exe Key value queried \REGISTRY\USER\S-1-5-21-157025953-3125636059-437143553-1000\Control Panel\International\Geo\Nation 5baa1271df727828.exe Key value queried \REGISTRY\USER\S-1-5-21-157025953-3125636059-437143553-1000\Control Panel\International\Geo\Nation MinerFull.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-157025953-3125636059-437143553-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\MinerFull.exe" MinerFull.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 18 checkip.amazonaws.com 20 ip-api.com 86 ipinfo.io 87 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4400 4636 WerFault.exe 101 3396 4652 WerFault.exe 106 -
Delays execution with timeout.exe 1 IoCs
pid Process 908 timeout.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 3220 M3gJNbpqWpct.exe 5056 MinerFull.exe 5056 MinerFull.exe 5056 MinerFull.exe 5056 MinerFull.exe 5056 MinerFull.exe 5056 MinerFull.exe 5056 MinerFull.exe 5056 MinerFull.exe 5056 MinerFull.exe 5056 MinerFull.exe 5056 MinerFull.exe 5056 MinerFull.exe 5056 MinerFull.exe 5056 MinerFull.exe 5056 MinerFull.exe 5056 MinerFull.exe 5056 MinerFull.exe 5056 MinerFull.exe 5056 MinerFull.exe 5056 MinerFull.exe 5056 MinerFull.exe 5056 MinerFull.exe 5056 MinerFull.exe 5056 MinerFull.exe 5056 MinerFull.exe 5056 MinerFull.exe 5056 MinerFull.exe 5056 MinerFull.exe 5056 MinerFull.exe 5056 MinerFull.exe 5056 MinerFull.exe 5056 MinerFull.exe 5056 MinerFull.exe 5056 MinerFull.exe 5056 MinerFull.exe 5056 MinerFull.exe 5056 MinerFull.exe 5056 MinerFull.exe 5056 MinerFull.exe 5056 MinerFull.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 648 Process not Found -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 4308 BEgHvre3gJNc.exe Token: SeDebugPrivilege 5096 5d0aad9e.exe Token: SeDebugPrivilege 3220 M3gJNbpqWpct.exe Token: SeDebugPrivilege 2588 5baa1271df727828.exe Token: SeDebugPrivilege 5056 MinerFull.exe Token: SeLockMemoryPrivilege 4636 Driver.exe Token: SeLockMemoryPrivilege 4636 Driver.exe Token: SeLockMemoryPrivilege 3480 Driver.exe Token: SeLockMemoryPrivilege 3480 Driver.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4160 wrote to memory of 3220 4160 15791f0ceae7a162d3280af791cd8837705a7ccb6248bbfc3184cc3306ec4a57.exe 81 PID 4160 wrote to memory of 3220 4160 15791f0ceae7a162d3280af791cd8837705a7ccb6248bbfc3184cc3306ec4a57.exe 81 PID 4160 wrote to memory of 3220 4160 15791f0ceae7a162d3280af791cd8837705a7ccb6248bbfc3184cc3306ec4a57.exe 81 PID 4160 wrote to memory of 4308 4160 15791f0ceae7a162d3280af791cd8837705a7ccb6248bbfc3184cc3306ec4a57.exe 82 PID 4160 wrote to memory of 4308 4160 15791f0ceae7a162d3280af791cd8837705a7ccb6248bbfc3184cc3306ec4a57.exe 82 PID 4308 wrote to memory of 4252 4308 BEgHvre3gJNc.exe 83 PID 4308 wrote to memory of 4252 4308 BEgHvre3gJNc.exe 83 PID 4252 wrote to memory of 1156 4252 cmd.exe 85 PID 4252 wrote to memory of 1156 4252 cmd.exe 85 PID 4252 wrote to memory of 908 4252 cmd.exe 86 PID 4252 wrote to memory of 908 4252 cmd.exe 86 PID 4252 wrote to memory of 5096 4252 cmd.exe 87 PID 4252 wrote to memory of 5096 4252 cmd.exe 87 PID 5096 wrote to memory of 2588 5096 5d0aad9e.exe 99 PID 5096 wrote to memory of 2588 5096 5d0aad9e.exe 99 PID 2588 wrote to memory of 5056 2588 5baa1271df727828.exe 100 PID 2588 wrote to memory of 5056 2588 5baa1271df727828.exe 100 PID 2588 wrote to memory of 5056 2588 5baa1271df727828.exe 100 PID 5056 wrote to memory of 4636 5056 MinerFull.exe 101 PID 5056 wrote to memory of 4636 5056 MinerFull.exe 101 PID 5056 wrote to memory of 4652 5056 MinerFull.exe 106 PID 5056 wrote to memory of 4652 5056 MinerFull.exe 106 PID 5056 wrote to memory of 3480 5056 MinerFull.exe 110 PID 5056 wrote to memory of 3480 5056 MinerFull.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\15791f0ceae7a162d3280af791cd8837705a7ccb6248bbfc3184cc3306ec4a57.exe"C:\Users\Admin\AppData\Local\Temp\15791f0ceae7a162d3280af791cd8837705a7ccb6248bbfc3184cc3306ec4a57.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Public\M3gJNbpqWpct.exe"C:\Users\Public\M3gJNbpqWpct.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3220
-
-
C:\Users\Public\BEgHvre3gJNc.exe"C:\Users\Public\BEgHvre3gJNc.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpA463.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Windows\system32\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d "C:\ProgramData\Graphics Status v3.7.1"4⤵PID:1156
-
-
C:\Windows\system32\timeout.exetimeout 44⤵
- Delays execution with timeout.exe
PID:908
-
-
C:\ProgramData\Graphics Status v3.7.1\5d0aad9e.exe"C:\ProgramData\Graphics Status v3.7.1\5d0aad9e.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\5baa1271df727828.exe"C:\Users\Admin\AppData\Local\Temp\5baa1271df727828.exe"5⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\ProgramData\MinerFull.exe"C:\ProgramData\MinerFull.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 45XQiu9A9vmVd5Cy6X35M12NocUr2Hx69X4ZNNu2BsKJYkdksefg2gXJyvBUeEJyDWTfLD6GWmAu4Tab1w4tycfcFMqy8yH -p x -k -v=0 --donate-level=1 -t 17⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4636 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4636 -s 7648⤵
- Program crash
PID:4400
-
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 45XQiu9A9vmVd5Cy6X35M12NocUr2Hx69X4ZNNu2BsKJYkdksefg2gXJyvBUeEJyDWTfLD6GWmAu4Tab1w4tycfcFMqy8yH -p x -k -v=0 --donate-level=1 -t 17⤵
- Executes dropped EXE
PID:4652 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4652 -s 5648⤵
- Program crash
PID:3396
-
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 45XQiu9A9vmVd5Cy6X35M12NocUr2Hx69X4ZNNu2BsKJYkdksefg2gXJyvBUeEJyDWTfLD6GWmAu4Tab1w4tycfcFMqy8yH -p x -k -v=0 --donate-level=1 -t 17⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3480
-
-
-
-
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 452 -p 4636 -ip 46361⤵PID:440
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 448 -p 4652 -ip 46521⤵PID:1440
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5a73afdf0bdb56bfffa8cff06238072c0
SHA1fca14060883368a62505e169f45d2429b16575e1
SHA25644b6288f33dda17cbfb20581567ef9b898f0fafdd9fd9f8988729b7afddb927e
SHA5121b40eb2ea9a2fd2a7b65260cf30f3001cad03760cd355c649554a2fcee3100cb952826116dda8af1b2c87bfa39420a8855f09518ae0a3fe9823687bc690e80f4
-
Filesize
1.8MB
MD5a73afdf0bdb56bfffa8cff06238072c0
SHA1fca14060883368a62505e169f45d2429b16575e1
SHA25644b6288f33dda17cbfb20581567ef9b898f0fafdd9fd9f8988729b7afddb927e
SHA5121b40eb2ea9a2fd2a7b65260cf30f3001cad03760cd355c649554a2fcee3100cb952826116dda8af1b2c87bfa39420a8855f09518ae0a3fe9823687bc690e80f4
-
Filesize
4.0MB
MD55c7bc4cc56f6e6acb801210bc6eda798
SHA1541b6f50091fdc17c2bc8d596c0e202b854fb991
SHA25648f66e13c00038bb2ec12a58bd34cb79f2cf616230c25224c68b81d6c3d7ebf9
SHA51266558bf8679c264c507a1fb8da2fd81347b339d3786487895f902330d63bf9b44be5a136061b0848801b768fea3e525b934d1b04c2cef959cc878b421c6cbd5d
-
Filesize
4.0MB
MD55c7bc4cc56f6e6acb801210bc6eda798
SHA1541b6f50091fdc17c2bc8d596c0e202b854fb991
SHA25648f66e13c00038bb2ec12a58bd34cb79f2cf616230c25224c68b81d6c3d7ebf9
SHA51266558bf8679c264c507a1fb8da2fd81347b339d3786487895f902330d63bf9b44be5a136061b0848801b768fea3e525b934d1b04c2cef959cc878b421c6cbd5d
-
Filesize
3.9MB
MD59c5e314b009dffdc5d3328c14025cc12
SHA10bc7a3b796eb71a5da4fc4d5117f2dffb22dc76e
SHA256846e6b0104f81323b6e15901bada07749af9c43270ec5f193d16c317d426fc09
SHA512236c4b9b04b76a65e8e8fa5b4ff4c38d8a18c594b333f1dc5e752bb353756667e8fe70e7bc500b20e0cf0f88ee670913b58f2ca3f7123109c1bad7ff81e2c21b
-
Filesize
3.9MB
MD59c5e314b009dffdc5d3328c14025cc12
SHA10bc7a3b796eb71a5da4fc4d5117f2dffb22dc76e
SHA256846e6b0104f81323b6e15901bada07749af9c43270ec5f193d16c317d426fc09
SHA512236c4b9b04b76a65e8e8fa5b4ff4c38d8a18c594b333f1dc5e752bb353756667e8fe70e7bc500b20e0cf0f88ee670913b58f2ca3f7123109c1bad7ff81e2c21b
-
Filesize
346B
MD5e65e42872fa0a20c5a23a9a373eb6e79
SHA179fce61e022e2f2273837af3670f2081010aaa1f
SHA2567c0ab61df8a47b6f14005096fd26f51d4ccdbbab8fde2132c612b4d097fc840a
SHA51268844b9cad7c7b31e6fbaacaeccd75fbe29bde36ce26b50c4d4a6588cf7ff44ba1b32f81919cbb294f331c3e918a17abb6637d6845501b79e0537ee10a24ce60
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
42KB
MD5c523d423234494eeb7b60a892d7a4bea
SHA1db992908237ee2ab5c07f4362b9a29516ac09a5d
SHA25698c0617a52694e05760b7f0584a3a0f15f772a4e8598cdd7bd833401e6c596d3
SHA5120aa6808037697dfd7654a845008e9ee231b05e55a2aa5cb2984a060cc6100d4e7ced45483f832d37bde1adad99facf03b17e6a9268a26ed9b9ced1fa389a81ec
-
Filesize
42KB
MD5c523d423234494eeb7b60a892d7a4bea
SHA1db992908237ee2ab5c07f4362b9a29516ac09a5d
SHA25698c0617a52694e05760b7f0584a3a0f15f772a4e8598cdd7bd833401e6c596d3
SHA5120aa6808037697dfd7654a845008e9ee231b05e55a2aa5cb2984a060cc6100d4e7ced45483f832d37bde1adad99facf03b17e6a9268a26ed9b9ced1fa389a81ec
-
Filesize
106KB
MD564eeb5ab677596ec8516a8414428b5d7
SHA14c8e61d0e2abfccb50c9a949d8bcb318b6c5e52a
SHA2562ac567b583c3dc6843f8d7cba45b102b856f269395ee220801c7a490679a53b3
SHA51216012d1985a45256d4978e0506a900ea9c8009530f0068e7870b3ec5b8ba2ebe0eb3542bc28a43eda3a7c1eb4dd2eeae672abb57a9799d51e1db3aa49598c439
-
Filesize
106KB
MD564eeb5ab677596ec8516a8414428b5d7
SHA14c8e61d0e2abfccb50c9a949d8bcb318b6c5e52a
SHA2562ac567b583c3dc6843f8d7cba45b102b856f269395ee220801c7a490679a53b3
SHA51216012d1985a45256d4978e0506a900ea9c8009530f0068e7870b3ec5b8ba2ebe0eb3542bc28a43eda3a7c1eb4dd2eeae672abb57a9799d51e1db3aa49598c439