Analysis
-
max time kernel
153s -
max time network
176s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
14-05-2022 13:50
Static task
static1
Behavioral task
behavioral1
Sample
fb368927d9051a0ed52610ad43849d1b0cdf2acee3bb1bf88c63e3fce54a4f0f.exe
Resource
win7-20220414-en
General
-
Target
fb368927d9051a0ed52610ad43849d1b0cdf2acee3bb1bf88c63e3fce54a4f0f.exe
-
Size
692KB
-
MD5
837547af8d2a1f60f8bbe09066f0ffa2
-
SHA1
727421a8ea79d0c0562870c33d055224c7c9a4bc
-
SHA256
fb368927d9051a0ed52610ad43849d1b0cdf2acee3bb1bf88c63e3fce54a4f0f
-
SHA512
579fe72723076eb6605660258caf1b8b2a2cf4f05c50f15c0a6a1d8226c13eb847ade0230e5bb1ba21c820e6b2ae0662b33725e65f7b43e0fb2f98c4e41d6961
Malware Config
Extracted
redline
04062022
62.204.41.166:27688
-
auth_value
48182fe753fa2aff7472da064aa2a5d9
Extracted
arkei
Default
http://62.204.41.69/p8jG9WvgbE.php
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1764-68-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/1764-69-0x0000000000400000-0x0000000000424000-memory.dmp family_redline -
Executes dropped EXE 1 IoCs
Processes:
dcaqbmme.exepid process 952 dcaqbmme.exe -
Loads dropped DLL 2 IoCs
Processes:
fb368927d9051a0ed52610ad43849d1b0cdf2acee3bb1bf88c63e3fce54a4f0f.exepid process 1816 fb368927d9051a0ed52610ad43849d1b0cdf2acee3bb1bf88c63e3fce54a4f0f.exe 1816 fb368927d9051a0ed52610ad43849d1b0cdf2acee3bb1bf88c63e3fce54a4f0f.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
fb368927d9051a0ed52610ad43849d1b0cdf2acee3bb1bf88c63e3fce54a4f0f.exedcaqbmme.exedescription pid process target process PID 1816 set thread context of 2020 1816 fb368927d9051a0ed52610ad43849d1b0cdf2acee3bb1bf88c63e3fce54a4f0f.exe fb368927d9051a0ed52610ad43849d1b0cdf2acee3bb1bf88c63e3fce54a4f0f.exe PID 952 set thread context of 1764 952 dcaqbmme.exe regasm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
fb368927d9051a0ed52610ad43849d1b0cdf2acee3bb1bf88c63e3fce54a4f0f.exedcaqbmme.exepid process 1816 fb368927d9051a0ed52610ad43849d1b0cdf2acee3bb1bf88c63e3fce54a4f0f.exe 952 dcaqbmme.exe 952 dcaqbmme.exe 952 dcaqbmme.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
fb368927d9051a0ed52610ad43849d1b0cdf2acee3bb1bf88c63e3fce54a4f0f.exedcaqbmme.exepid process 1816 fb368927d9051a0ed52610ad43849d1b0cdf2acee3bb1bf88c63e3fce54a4f0f.exe 952 dcaqbmme.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
fb368927d9051a0ed52610ad43849d1b0cdf2acee3bb1bf88c63e3fce54a4f0f.exedcaqbmme.exedescription pid process target process PID 1816 wrote to memory of 952 1816 fb368927d9051a0ed52610ad43849d1b0cdf2acee3bb1bf88c63e3fce54a4f0f.exe dcaqbmme.exe PID 1816 wrote to memory of 952 1816 fb368927d9051a0ed52610ad43849d1b0cdf2acee3bb1bf88c63e3fce54a4f0f.exe dcaqbmme.exe PID 1816 wrote to memory of 952 1816 fb368927d9051a0ed52610ad43849d1b0cdf2acee3bb1bf88c63e3fce54a4f0f.exe dcaqbmme.exe PID 1816 wrote to memory of 952 1816 fb368927d9051a0ed52610ad43849d1b0cdf2acee3bb1bf88c63e3fce54a4f0f.exe dcaqbmme.exe PID 1816 wrote to memory of 2020 1816 fb368927d9051a0ed52610ad43849d1b0cdf2acee3bb1bf88c63e3fce54a4f0f.exe fb368927d9051a0ed52610ad43849d1b0cdf2acee3bb1bf88c63e3fce54a4f0f.exe PID 1816 wrote to memory of 2020 1816 fb368927d9051a0ed52610ad43849d1b0cdf2acee3bb1bf88c63e3fce54a4f0f.exe fb368927d9051a0ed52610ad43849d1b0cdf2acee3bb1bf88c63e3fce54a4f0f.exe PID 1816 wrote to memory of 2020 1816 fb368927d9051a0ed52610ad43849d1b0cdf2acee3bb1bf88c63e3fce54a4f0f.exe fb368927d9051a0ed52610ad43849d1b0cdf2acee3bb1bf88c63e3fce54a4f0f.exe PID 1816 wrote to memory of 2020 1816 fb368927d9051a0ed52610ad43849d1b0cdf2acee3bb1bf88c63e3fce54a4f0f.exe fb368927d9051a0ed52610ad43849d1b0cdf2acee3bb1bf88c63e3fce54a4f0f.exe PID 1816 wrote to memory of 2020 1816 fb368927d9051a0ed52610ad43849d1b0cdf2acee3bb1bf88c63e3fce54a4f0f.exe fb368927d9051a0ed52610ad43849d1b0cdf2acee3bb1bf88c63e3fce54a4f0f.exe PID 952 wrote to memory of 1996 952 dcaqbmme.exe regasm.exe PID 952 wrote to memory of 1996 952 dcaqbmme.exe regasm.exe PID 952 wrote to memory of 1996 952 dcaqbmme.exe regasm.exe PID 952 wrote to memory of 1996 952 dcaqbmme.exe regasm.exe PID 952 wrote to memory of 1996 952 dcaqbmme.exe regasm.exe PID 952 wrote to memory of 1996 952 dcaqbmme.exe regasm.exe PID 952 wrote to memory of 1996 952 dcaqbmme.exe regasm.exe PID 952 wrote to memory of 1996 952 dcaqbmme.exe regasm.exe PID 952 wrote to memory of 2000 952 dcaqbmme.exe regasm.exe PID 952 wrote to memory of 2000 952 dcaqbmme.exe regasm.exe PID 952 wrote to memory of 2000 952 dcaqbmme.exe regasm.exe PID 952 wrote to memory of 2000 952 dcaqbmme.exe regasm.exe PID 952 wrote to memory of 2000 952 dcaqbmme.exe regasm.exe PID 952 wrote to memory of 2000 952 dcaqbmme.exe regasm.exe PID 952 wrote to memory of 2000 952 dcaqbmme.exe regasm.exe PID 952 wrote to memory of 2000 952 dcaqbmme.exe regasm.exe PID 952 wrote to memory of 1764 952 dcaqbmme.exe regasm.exe PID 952 wrote to memory of 1764 952 dcaqbmme.exe regasm.exe PID 952 wrote to memory of 1764 952 dcaqbmme.exe regasm.exe PID 952 wrote to memory of 1764 952 dcaqbmme.exe regasm.exe PID 952 wrote to memory of 1764 952 dcaqbmme.exe regasm.exe PID 952 wrote to memory of 1764 952 dcaqbmme.exe regasm.exe PID 952 wrote to memory of 1764 952 dcaqbmme.exe regasm.exe PID 952 wrote to memory of 1764 952 dcaqbmme.exe regasm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb368927d9051a0ed52610ad43849d1b0cdf2acee3bb1bf88c63e3fce54a4f0f.exe"C:\Users\Admin\AppData\Local\Temp\fb368927d9051a0ed52610ad43849d1b0cdf2acee3bb1bf88c63e3fce54a4f0f.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\dcaqbmme.exe"C:\Users\Admin\AppData\Local\Temp\dcaqbmme.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"3⤵PID:1996
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"3⤵PID:2000
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"3⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\fb368927d9051a0ed52610ad43849d1b0cdf2acee3bb1bf88c63e3fce54a4f0f.exe"C:\Users\Admin\AppData\Local\Temp\fb368927d9051a0ed52610ad43849d1b0cdf2acee3bb1bf88c63e3fce54a4f0f.exe"2⤵PID:2020
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\dcaqbmme.exeFilesize
324KB
MD52652215d4d7a57fc45691bb1d53fb6ce
SHA115838b55aa4b2dc05ca09b2b958056fcb17776bd
SHA256326923ce18fd7a9c8210697d8ffab62481db036588c12f05a21798fcf67bd9a6
SHA512f4694966c4beb4e9cca674b85311de400f7c9ebf7eb9e0e271074281447513d562757bb477a7884b02ba9cdc8caf9b3952afcc0e66b9a36c6c167aa5e731ca59
-
\Users\Admin\AppData\Local\Temp\dcaqbmme.exeFilesize
324KB
MD52652215d4d7a57fc45691bb1d53fb6ce
SHA115838b55aa4b2dc05ca09b2b958056fcb17776bd
SHA256326923ce18fd7a9c8210697d8ffab62481db036588c12f05a21798fcf67bd9a6
SHA512f4694966c4beb4e9cca674b85311de400f7c9ebf7eb9e0e271074281447513d562757bb477a7884b02ba9cdc8caf9b3952afcc0e66b9a36c6c167aa5e731ca59
-
\Users\Admin\AppData\Local\Temp\dcaqbmme.exeFilesize
324KB
MD52652215d4d7a57fc45691bb1d53fb6ce
SHA115838b55aa4b2dc05ca09b2b958056fcb17776bd
SHA256326923ce18fd7a9c8210697d8ffab62481db036588c12f05a21798fcf67bd9a6
SHA512f4694966c4beb4e9cca674b85311de400f7c9ebf7eb9e0e271074281447513d562757bb477a7884b02ba9cdc8caf9b3952afcc0e66b9a36c6c167aa5e731ca59
-
memory/952-59-0x0000000000000000-mapping.dmp
-
memory/1764-66-0x000000000041BC2E-mapping.dmp
-
memory/1764-68-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1764-69-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/1816-56-0x0000000075E51000-0x0000000075E53000-memory.dmpFilesize
8KB
-
memory/1816-65-0x00000000007A0000-0x00000000007A7000-memory.dmpFilesize
28KB
-
memory/2020-63-0x0000000000408430-mapping.dmp
-
memory/2020-70-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB