Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
12-04-2022 08:26
Static task
static1
Behavioral task
behavioral1
Sample
209609199e47fecdd76a96dabf1f9cf5.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
209609199e47fecdd76a96dabf1f9cf5.exe
Resource
win10v2004-en-20220113
General
-
Target
209609199e47fecdd76a96dabf1f9cf5.exe
-
Size
372KB
-
MD5
209609199e47fecdd76a96dabf1f9cf5
-
SHA1
4ad578096b72f376bd012d3f3ba6a6cd7f162432
-
SHA256
217265e900ce6d8b7750e25c9d4560715f2e58be5a2aa9210ba4f9974ae760c8
-
SHA512
b8893d5d367afb465420e1c0671510db6b1f4603458a0bd416f5ded0f670f7ccdef37133ddf0049dccd822d6b42b0565a94f7f0530d6093d80cedc4638ae08d9
Malware Config
Extracted
redline
123
188.68.205.12:7053
-
auth_value
cba3087b3c1a6a9c43b3f96591452ea2
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
resource yara_rule behavioral2/files/0x000400000001e7b7-137.dat family_redline behavioral2/files/0x000400000001e7b7-138.dat family_redline behavioral2/memory/4972-143-0x0000000000340000-0x0000000000360000-memory.dmp family_redline -
LoaderBot executable 3 IoCs
resource yara_rule behavioral2/files/0x000600000001e7c7-174.dat loaderbot behavioral2/files/0x000600000001e7c7-175.dat loaderbot behavioral2/memory/4796-176-0x0000000000350000-0x0000000000750000-memory.dmp loaderbot -
Downloads MZ/PE file
-
Executes dropped EXE 8 IoCs
pid Process 3360 1.exe 4972 M3gJNbpqWpct.exe 2324 BEgHvre3gJNc.exe 648 8d621f52.exe 260 6048cae8f6c66735.exe 4796 MinerFull.exe 2224 Driver.exe 4524 Driver.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation MinerFull.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 209609199e47fecdd76a96dabf1f9cf5.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 1.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 6048cae8f6c66735.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\MinerFull.exe" MinerFull.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 17 checkip.amazonaws.com 19 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3184 2224 WerFault.exe 96 -
Delays execution with timeout.exe 1 IoCs
pid Process 4688 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4972 M3gJNbpqWpct.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe 4796 MinerFull.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 664 Process not Found -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 2680 209609199e47fecdd76a96dabf1f9cf5.exe Token: SeDebugPrivilege 2324 BEgHvre3gJNc.exe Token: SeDebugPrivilege 648 8d621f52.exe Token: SeDebugPrivilege 4972 M3gJNbpqWpct.exe Token: SeDebugPrivilege 260 6048cae8f6c66735.exe Token: SeDebugPrivilege 4796 MinerFull.exe Token: SeLockMemoryPrivilege 2224 Driver.exe Token: SeLockMemoryPrivilege 2224 Driver.exe Token: SeLockMemoryPrivilege 4524 Driver.exe Token: SeLockMemoryPrivilege 4524 Driver.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2680 wrote to memory of 3360 2680 209609199e47fecdd76a96dabf1f9cf5.exe 78 PID 2680 wrote to memory of 3360 2680 209609199e47fecdd76a96dabf1f9cf5.exe 78 PID 2680 wrote to memory of 3360 2680 209609199e47fecdd76a96dabf1f9cf5.exe 78 PID 3360 wrote to memory of 4972 3360 1.exe 86 PID 3360 wrote to memory of 4972 3360 1.exe 86 PID 3360 wrote to memory of 4972 3360 1.exe 86 PID 3360 wrote to memory of 2324 3360 1.exe 87 PID 3360 wrote to memory of 2324 3360 1.exe 87 PID 2324 wrote to memory of 3252 2324 BEgHvre3gJNc.exe 88 PID 2324 wrote to memory of 3252 2324 BEgHvre3gJNc.exe 88 PID 3252 wrote to memory of 4480 3252 cmd.exe 90 PID 3252 wrote to memory of 4480 3252 cmd.exe 90 PID 3252 wrote to memory of 4688 3252 cmd.exe 91 PID 3252 wrote to memory of 4688 3252 cmd.exe 91 PID 3252 wrote to memory of 648 3252 cmd.exe 92 PID 3252 wrote to memory of 648 3252 cmd.exe 92 PID 648 wrote to memory of 260 648 8d621f52.exe 94 PID 648 wrote to memory of 260 648 8d621f52.exe 94 PID 260 wrote to memory of 4796 260 6048cae8f6c66735.exe 95 PID 260 wrote to memory of 4796 260 6048cae8f6c66735.exe 95 PID 260 wrote to memory of 4796 260 6048cae8f6c66735.exe 95 PID 4796 wrote to memory of 2224 4796 MinerFull.exe 96 PID 4796 wrote to memory of 2224 4796 MinerFull.exe 96 PID 4796 wrote to memory of 4524 4796 MinerFull.exe 101 PID 4796 wrote to memory of 4524 4796 MinerFull.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\209609199e47fecdd76a96dabf1f9cf5.exe"C:\Users\Admin\AppData\Local\Temp\209609199e47fecdd76a96dabf1f9cf5.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\ProgramData\1.exe"C:\ProgramData\1.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Users\Public\M3gJNbpqWpct.exe"C:\Users\Public\M3gJNbpqWpct.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4972
-
-
C:\Users\Public\BEgHvre3gJNc.exe"C:\Users\Public\BEgHvre3gJNc.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp7627.tmp.bat""4⤵
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Windows\system32\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d "C:\ProgramData\Connector Protection v1.5.0"5⤵PID:4480
-
-
C:\Windows\system32\timeout.exetimeout 45⤵
- Delays execution with timeout.exe
PID:4688
-
-
C:\ProgramData\Connector Protection v1.5.0\8d621f52.exe"C:\ProgramData\Connector Protection v1.5.0\8d621f52.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Users\Admin\AppData\Local\Temp\6048cae8f6c66735.exe"C:\Users\Admin\AppData\Local\Temp\6048cae8f6c66735.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:260 -
C:\ProgramData\MinerFull.exe"C:\ProgramData\MinerFull.exe"7⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 45XQiu9A9vmVd5Cy6X35M12NocUr2Hx69X4ZNNu2BsKJYkdksefg2gXJyvBUeEJyDWTfLD6GWmAu4Tab1w4tycfcFMqy8yH -p x -k -v=0 --donate-level=1 -t 18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2224 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2224 -s 7649⤵
- Program crash
PID:3184
-
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 45XQiu9A9vmVd5Cy6X35M12NocUr2Hx69X4ZNNu2BsKJYkdksefg2gXJyvBUeEJyDWTfLD6GWmAu4Tab1w4tycfcFMqy8yH -p x -k -v=0 --donate-level=1 -t 18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4524
-
-
-
-
-
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 456 -p 2224 -ip 22241⤵PID:1856
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
233KB
MD5a9d9617466a30b874b80d4fd6465f46b
SHA1b6e42e3a1fbc20c78e003b065440733fb1cafe84
SHA25615791f0ceae7a162d3280af791cd8837705a7ccb6248bbfc3184cc3306ec4a57
SHA512ec3d90e3c7b9427ecb9097941a37872c195cc389bf45a78b7c343d7d964fcf999266cee8bea78907cb302d318b74035948b7db760903692e4275d5016d3e1c89
-
Filesize
233KB
MD5a9d9617466a30b874b80d4fd6465f46b
SHA1b6e42e3a1fbc20c78e003b065440733fb1cafe84
SHA25615791f0ceae7a162d3280af791cd8837705a7ccb6248bbfc3184cc3306ec4a57
SHA512ec3d90e3c7b9427ecb9097941a37872c195cc389bf45a78b7c343d7d964fcf999266cee8bea78907cb302d318b74035948b7db760903692e4275d5016d3e1c89
-
Filesize
11.6MB
MD517bdbfbcf4b2124366b95fab60a80ea8
SHA1abc45dd46b17618a3b9b2fb8929b5f0f5f9b0857
SHA256645b60fca727defd28a810959061cde49043e7e7b6de8c4e4fbeb5340d54f99f
SHA512b5cb2dd77aac8da49db0d3eeef9a78327a69b8dead7de4cc6c84773ead9a9d4efdd652e8a53514ca1f3869057180c36c51501f507b84735e10acdda0c0b9257f
-
Filesize
11.6MB
MD517bdbfbcf4b2124366b95fab60a80ea8
SHA1abc45dd46b17618a3b9b2fb8929b5f0f5f9b0857
SHA256645b60fca727defd28a810959061cde49043e7e7b6de8c4e4fbeb5340d54f99f
SHA512b5cb2dd77aac8da49db0d3eeef9a78327a69b8dead7de4cc6c84773ead9a9d4efdd652e8a53514ca1f3869057180c36c51501f507b84735e10acdda0c0b9257f
-
Filesize
4.0MB
MD55c7bc4cc56f6e6acb801210bc6eda798
SHA1541b6f50091fdc17c2bc8d596c0e202b854fb991
SHA25648f66e13c00038bb2ec12a58bd34cb79f2cf616230c25224c68b81d6c3d7ebf9
SHA51266558bf8679c264c507a1fb8da2fd81347b339d3786487895f902330d63bf9b44be5a136061b0848801b768fea3e525b934d1b04c2cef959cc878b421c6cbd5d
-
Filesize
4.0MB
MD55c7bc4cc56f6e6acb801210bc6eda798
SHA1541b6f50091fdc17c2bc8d596c0e202b854fb991
SHA25648f66e13c00038bb2ec12a58bd34cb79f2cf616230c25224c68b81d6c3d7ebf9
SHA51266558bf8679c264c507a1fb8da2fd81347b339d3786487895f902330d63bf9b44be5a136061b0848801b768fea3e525b934d1b04c2cef959cc878b421c6cbd5d
-
Filesize
4.8MB
MD59489434a8fab31dd79424d21a2b2cda3
SHA13128cf0dc400a3f044973903b4fbb769680a7962
SHA2563b39beabbff1182740563c3d122dd88e243ab21cb18d6ff4be06f13aff8d98fe
SHA5122302dcbe013c12bd473eaa62567a12134d26f5dd006625483ce2f2f2efdc36fbe68761fc9f4d32075a0cb6d78c2697b07ccfb692ce8073139c158d42810f1707
-
Filesize
4.8MB
MD59489434a8fab31dd79424d21a2b2cda3
SHA13128cf0dc400a3f044973903b4fbb769680a7962
SHA2563b39beabbff1182740563c3d122dd88e243ab21cb18d6ff4be06f13aff8d98fe
SHA5122302dcbe013c12bd473eaa62567a12134d26f5dd006625483ce2f2f2efdc36fbe68761fc9f4d32075a0cb6d78c2697b07ccfb692ce8073139c158d42810f1707
-
Filesize
356B
MD55fa3e132aef485e84f3474c6e9521197
SHA1d12126e5976ab38740166031e26a07003cc8f46c
SHA256fe8aacd4d7079edae4e91f74d746ab44ee7ea6ed40ab7031d2cfda9078882417
SHA5123b58c939f9ea0e3399bfff4db930492cac06d66cc026ea9bb337fa5a56ce1c3d71a9ed684e643fb2568422fb9797143ac2a0e8779e6a46ec5a2761c945e4b2d5
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
42KB
MD5c523d423234494eeb7b60a892d7a4bea
SHA1db992908237ee2ab5c07f4362b9a29516ac09a5d
SHA25698c0617a52694e05760b7f0584a3a0f15f772a4e8598cdd7bd833401e6c596d3
SHA5120aa6808037697dfd7654a845008e9ee231b05e55a2aa5cb2984a060cc6100d4e7ced45483f832d37bde1adad99facf03b17e6a9268a26ed9b9ced1fa389a81ec
-
Filesize
42KB
MD5c523d423234494eeb7b60a892d7a4bea
SHA1db992908237ee2ab5c07f4362b9a29516ac09a5d
SHA25698c0617a52694e05760b7f0584a3a0f15f772a4e8598cdd7bd833401e6c596d3
SHA5120aa6808037697dfd7654a845008e9ee231b05e55a2aa5cb2984a060cc6100d4e7ced45483f832d37bde1adad99facf03b17e6a9268a26ed9b9ced1fa389a81ec
-
Filesize
106KB
MD564eeb5ab677596ec8516a8414428b5d7
SHA14c8e61d0e2abfccb50c9a949d8bcb318b6c5e52a
SHA2562ac567b583c3dc6843f8d7cba45b102b856f269395ee220801c7a490679a53b3
SHA51216012d1985a45256d4978e0506a900ea9c8009530f0068e7870b3ec5b8ba2ebe0eb3542bc28a43eda3a7c1eb4dd2eeae672abb57a9799d51e1db3aa49598c439
-
Filesize
106KB
MD564eeb5ab677596ec8516a8414428b5d7
SHA14c8e61d0e2abfccb50c9a949d8bcb318b6c5e52a
SHA2562ac567b583c3dc6843f8d7cba45b102b856f269395ee220801c7a490679a53b3
SHA51216012d1985a45256d4978e0506a900ea9c8009530f0068e7870b3ec5b8ba2ebe0eb3542bc28a43eda3a7c1eb4dd2eeae672abb57a9799d51e1db3aa49598c439