Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220331-en -
submitted
12/04/2022, 08:28
Static task
static1
Behavioral task
behavioral1
Sample
209609199e47fecdd76a96dabf1f9cf5.exe
Resource
win7-20220331-en
Behavioral task
behavioral2
Sample
209609199e47fecdd76a96dabf1f9cf5.exe
Resource
win10v2004-20220331-en
General
-
Target
209609199e47fecdd76a96dabf1f9cf5.exe
-
Size
372KB
-
MD5
209609199e47fecdd76a96dabf1f9cf5
-
SHA1
4ad578096b72f376bd012d3f3ba6a6cd7f162432
-
SHA256
217265e900ce6d8b7750e25c9d4560715f2e58be5a2aa9210ba4f9974ae760c8
-
SHA512
b8893d5d367afb465420e1c0671510db6b1f4603458a0bd416f5ded0f670f7ccdef37133ddf0049dccd822d6b42b0565a94f7f0530d6093d80cedc4638ae08d9
Malware Config
Extracted
redline
123
188.68.205.12:7053
-
auth_value
cba3087b3c1a6a9c43b3f96591452ea2
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
resource yara_rule behavioral2/files/0x0006000000021e28-131.dat family_redline behavioral2/files/0x0006000000021e28-132.dat family_redline behavioral2/memory/2176-137-0x0000000000B70000-0x0000000000B90000-memory.dmp family_redline -
LoaderBot executable 3 IoCs
resource yara_rule behavioral2/files/0x0006000000021e32-160.dat loaderbot behavioral2/files/0x0006000000021e32-161.dat loaderbot behavioral2/memory/668-162-0x0000000000260000-0x0000000000660000-memory.dmp loaderbot -
Downloads MZ/PE file
-
Executes dropped EXE 7 IoCs
pid Process 1372 1.exe 2176 M3gJNbpqWpct.exe 4952 BEgHvre3gJNc.exe 4024 5d0aad9e.exe 2916 e54fce6a01f17f5d.exe 668 MinerFull.exe 4268 Driver.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-157025953-3125636059-437143553-1000\Control Panel\International\Geo\Nation 1.exe Key value queried \REGISTRY\USER\S-1-5-21-157025953-3125636059-437143553-1000\Control Panel\International\Geo\Nation e54fce6a01f17f5d.exe Key value queried \REGISTRY\USER\S-1-5-21-157025953-3125636059-437143553-1000\Control Panel\International\Geo\Nation MinerFull.exe Key value queried \REGISTRY\USER\S-1-5-21-157025953-3125636059-437143553-1000\Control Panel\International\Geo\Nation 209609199e47fecdd76a96dabf1f9cf5.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-157025953-3125636059-437143553-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\MinerFull.exe" MinerFull.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 28 checkip.amazonaws.com 30 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
pid Process 4628 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe 668 MinerFull.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 4748 209609199e47fecdd76a96dabf1f9cf5.exe Token: SeDebugPrivilege 4952 BEgHvre3gJNc.exe Token: SeDebugPrivilege 4024 5d0aad9e.exe Token: SeDebugPrivilege 2916 e54fce6a01f17f5d.exe Token: SeDebugPrivilege 668 MinerFull.exe Token: SeLockMemoryPrivilege 4268 Driver.exe Token: SeLockMemoryPrivilege 4268 Driver.exe Token: SeDebugPrivilege 2176 M3gJNbpqWpct.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 4748 wrote to memory of 1372 4748 209609199e47fecdd76a96dabf1f9cf5.exe 82 PID 4748 wrote to memory of 1372 4748 209609199e47fecdd76a96dabf1f9cf5.exe 82 PID 4748 wrote to memory of 1372 4748 209609199e47fecdd76a96dabf1f9cf5.exe 82 PID 1372 wrote to memory of 2176 1372 1.exe 83 PID 1372 wrote to memory of 2176 1372 1.exe 83 PID 1372 wrote to memory of 2176 1372 1.exe 83 PID 1372 wrote to memory of 4952 1372 1.exe 84 PID 1372 wrote to memory of 4952 1372 1.exe 84 PID 4952 wrote to memory of 1424 4952 BEgHvre3gJNc.exe 85 PID 4952 wrote to memory of 1424 4952 BEgHvre3gJNc.exe 85 PID 1424 wrote to memory of 4936 1424 cmd.exe 87 PID 1424 wrote to memory of 4936 1424 cmd.exe 87 PID 1424 wrote to memory of 4628 1424 cmd.exe 88 PID 1424 wrote to memory of 4628 1424 cmd.exe 88 PID 1424 wrote to memory of 4024 1424 cmd.exe 89 PID 1424 wrote to memory of 4024 1424 cmd.exe 89 PID 4024 wrote to memory of 2916 4024 5d0aad9e.exe 91 PID 4024 wrote to memory of 2916 4024 5d0aad9e.exe 91 PID 2916 wrote to memory of 668 2916 e54fce6a01f17f5d.exe 92 PID 2916 wrote to memory of 668 2916 e54fce6a01f17f5d.exe 92 PID 2916 wrote to memory of 668 2916 e54fce6a01f17f5d.exe 92 PID 668 wrote to memory of 4268 668 MinerFull.exe 96 PID 668 wrote to memory of 4268 668 MinerFull.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\209609199e47fecdd76a96dabf1f9cf5.exe"C:\Users\Admin\AppData\Local\Temp\209609199e47fecdd76a96dabf1f9cf5.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\ProgramData\1.exe"C:\ProgramData\1.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Public\M3gJNbpqWpct.exe"C:\Users\Public\M3gJNbpqWpct.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2176
-
-
C:\Users\Public\BEgHvre3gJNc.exe"C:\Users\Public\BEgHvre3gJNc.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpB50C.tmp.bat""4⤵
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\system32\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d "C:\ProgramData\Graphics Status v3.7.1"5⤵PID:4936
-
-
C:\Windows\system32\timeout.exetimeout 45⤵
- Delays execution with timeout.exe
PID:4628
-
-
C:\ProgramData\Graphics Status v3.7.1\5d0aad9e.exe"C:\ProgramData\Graphics Status v3.7.1\5d0aad9e.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\e54fce6a01f17f5d.exe"C:\Users\Admin\AppData\Local\Temp\e54fce6a01f17f5d.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\ProgramData\MinerFull.exe"C:\ProgramData\MinerFull.exe"7⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 45XQiu9A9vmVd5Cy6X35M12NocUr2Hx69X4ZNNu2BsKJYkdksefg2gXJyvBUeEJyDWTfLD6GWmAu4Tab1w4tycfcFMqy8yH -p x -k -v=0 --donate-level=1 -t 18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4268
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
233KB
MD5a9d9617466a30b874b80d4fd6465f46b
SHA1b6e42e3a1fbc20c78e003b065440733fb1cafe84
SHA25615791f0ceae7a162d3280af791cd8837705a7ccb6248bbfc3184cc3306ec4a57
SHA512ec3d90e3c7b9427ecb9097941a37872c195cc389bf45a78b7c343d7d964fcf999266cee8bea78907cb302d318b74035948b7db760903692e4275d5016d3e1c89
-
Filesize
233KB
MD5a9d9617466a30b874b80d4fd6465f46b
SHA1b6e42e3a1fbc20c78e003b065440733fb1cafe84
SHA25615791f0ceae7a162d3280af791cd8837705a7ccb6248bbfc3184cc3306ec4a57
SHA512ec3d90e3c7b9427ecb9097941a37872c195cc389bf45a78b7c343d7d964fcf999266cee8bea78907cb302d318b74035948b7db760903692e4275d5016d3e1c89
-
Filesize
42KB
MD5c523d423234494eeb7b60a892d7a4bea
SHA1db992908237ee2ab5c07f4362b9a29516ac09a5d
SHA25698c0617a52694e05760b7f0584a3a0f15f772a4e8598cdd7bd833401e6c596d3
SHA5120aa6808037697dfd7654a845008e9ee231b05e55a2aa5cb2984a060cc6100d4e7ced45483f832d37bde1adad99facf03b17e6a9268a26ed9b9ced1fa389a81ec
-
Filesize
42KB
MD5c523d423234494eeb7b60a892d7a4bea
SHA1db992908237ee2ab5c07f4362b9a29516ac09a5d
SHA25698c0617a52694e05760b7f0584a3a0f15f772a4e8598cdd7bd833401e6c596d3
SHA5120aa6808037697dfd7654a845008e9ee231b05e55a2aa5cb2984a060cc6100d4e7ced45483f832d37bde1adad99facf03b17e6a9268a26ed9b9ced1fa389a81ec
-
Filesize
4.0MB
MD55c7bc4cc56f6e6acb801210bc6eda798
SHA1541b6f50091fdc17c2bc8d596c0e202b854fb991
SHA25648f66e13c00038bb2ec12a58bd34cb79f2cf616230c25224c68b81d6c3d7ebf9
SHA51266558bf8679c264c507a1fb8da2fd81347b339d3786487895f902330d63bf9b44be5a136061b0848801b768fea3e525b934d1b04c2cef959cc878b421c6cbd5d
-
Filesize
4.0MB
MD55c7bc4cc56f6e6acb801210bc6eda798
SHA1541b6f50091fdc17c2bc8d596c0e202b854fb991
SHA25648f66e13c00038bb2ec12a58bd34cb79f2cf616230c25224c68b81d6c3d7ebf9
SHA51266558bf8679c264c507a1fb8da2fd81347b339d3786487895f902330d63bf9b44be5a136061b0848801b768fea3e525b934d1b04c2cef959cc878b421c6cbd5d
-
Filesize
5.8MB
MD575fbd2a8c9f0cc193401ed1807658786
SHA179ff9eb88368ef3fa34ef70f277806d7e2d6adc0
SHA256a506f2ad61afe6cb274840af70a8b9f0ce7f375af587e89e2a5b375144368dde
SHA512de4217d187c78cb639024a2e7f67581fd9821e51beed093049752b3f573cbcb93e28cd316c9e011f3029eccb7e8f4893d3e151cc24daba17099df677144452e2
-
Filesize
5.8MB
MD575fbd2a8c9f0cc193401ed1807658786
SHA179ff9eb88368ef3fa34ef70f277806d7e2d6adc0
SHA256a506f2ad61afe6cb274840af70a8b9f0ce7f375af587e89e2a5b375144368dde
SHA512de4217d187c78cb639024a2e7f67581fd9821e51beed093049752b3f573cbcb93e28cd316c9e011f3029eccb7e8f4893d3e151cc24daba17099df677144452e2
-
Filesize
346B
MD5b4ac0dfe11b1f9b370e32436f34ab66a
SHA1ed5e86d897ba03ce6f4cbc32ab80712cf347334b
SHA25649d0097e164898cd01127f0d3ea4b9295a71f0ecc913d80cdb55d93043eb2cca
SHA5121518d4f40192437f50bc0f6ca55f59e5813facf51cade188eae8bfbfb476756c9d294cb05fe4faf28960d0c670bf05f7a75d67062e626489e0922947d7c4c1ca
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
42KB
MD5c523d423234494eeb7b60a892d7a4bea
SHA1db992908237ee2ab5c07f4362b9a29516ac09a5d
SHA25698c0617a52694e05760b7f0584a3a0f15f772a4e8598cdd7bd833401e6c596d3
SHA5120aa6808037697dfd7654a845008e9ee231b05e55a2aa5cb2984a060cc6100d4e7ced45483f832d37bde1adad99facf03b17e6a9268a26ed9b9ced1fa389a81ec
-
Filesize
42KB
MD5c523d423234494eeb7b60a892d7a4bea
SHA1db992908237ee2ab5c07f4362b9a29516ac09a5d
SHA25698c0617a52694e05760b7f0584a3a0f15f772a4e8598cdd7bd833401e6c596d3
SHA5120aa6808037697dfd7654a845008e9ee231b05e55a2aa5cb2984a060cc6100d4e7ced45483f832d37bde1adad99facf03b17e6a9268a26ed9b9ced1fa389a81ec
-
Filesize
106KB
MD564eeb5ab677596ec8516a8414428b5d7
SHA14c8e61d0e2abfccb50c9a949d8bcb318b6c5e52a
SHA2562ac567b583c3dc6843f8d7cba45b102b856f269395ee220801c7a490679a53b3
SHA51216012d1985a45256d4978e0506a900ea9c8009530f0068e7870b3ec5b8ba2ebe0eb3542bc28a43eda3a7c1eb4dd2eeae672abb57a9799d51e1db3aa49598c439
-
Filesize
106KB
MD564eeb5ab677596ec8516a8414428b5d7
SHA14c8e61d0e2abfccb50c9a949d8bcb318b6c5e52a
SHA2562ac567b583c3dc6843f8d7cba45b102b856f269395ee220801c7a490679a53b3
SHA51216012d1985a45256d4978e0506a900ea9c8009530f0068e7870b3ec5b8ba2ebe0eb3542bc28a43eda3a7c1eb4dd2eeae672abb57a9799d51e1db3aa49598c439