Analysis
-
max time kernel
125s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
05-06-2022 07:26
Static task
static1
Behavioral task
behavioral1
Sample
0b757d38d347d1f763f59ab7f0423ae8.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0b757d38d347d1f763f59ab7f0423ae8.exe
Resource
win10v2004-20220414-en
General
-
Target
0b757d38d347d1f763f59ab7f0423ae8.exe
-
Size
406KB
-
MD5
0b757d38d347d1f763f59ab7f0423ae8
-
SHA1
fcf1b343ab5c7f9ac72fc6c85b3c478c5875f577
-
SHA256
2105710d19c34b91be3a37c24ab4a4835dcdc606c0f2d8b487beb0d24e336124
-
SHA512
0b9661590897256242ddc4ea43d069999e1ddca9d7fed671a6aa31a60f0da4bd820b8bb6c2502fa1b7979dea932375e2363e882e31379935751af1cdf2ce7d94
Malware Config
Extracted
redline
X
194.127.179.35:35180
-
auth_value
76e43cff05002e5f6e3334fa7946e404
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/3840-136-0x000000000041ADAE-mapping.dmp family_redline behavioral2/memory/3840-142-0x0000000001320000-0x0000000001340000-memory.dmp family_redline behavioral2/memory/3140-164-0x000000000041ADAE-mapping.dmp family_redline behavioral2/memory/4496-174-0x000000000041ADAE-mapping.dmp family_redline -
Executes dropped EXE 3 IoCs
Processes:
WinRar Activator.exechromedrivers32.exechromedrivers32.exepid process 4844 WinRar Activator.exe 1648 chromedrivers32.exe 928 chromedrivers32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0b757d38d347d1f763f59ab7f0423ae8.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation 0b757d38d347d1f763f59ab7f0423ae8.exe -
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
Processes:
0b757d38d347d1f763f59ab7f0423ae8.exechromedrivers32.exechromedrivers32.exedescription pid process target process PID 3192 set thread context of 3840 3192 0b757d38d347d1f763f59ab7f0423ae8.exe vbc.exe PID 1648 set thread context of 3140 1648 chromedrivers32.exe vbc.exe PID 928 set thread context of 4496 928 chromedrivers32.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 5056 schtasks.exe 944 schtasks.exe 1928 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
vbc.exevbc.exevbc.exepid process 3840 vbc.exe 3140 vbc.exe 4496 vbc.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
0b757d38d347d1f763f59ab7f0423ae8.exepid process 3192 0b757d38d347d1f763f59ab7f0423ae8.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
WinRar Activator.exevbc.exevbc.exevbc.exedescription pid process Token: SeDebugPrivilege 4844 WinRar Activator.exe Token: SeDebugPrivilege 3840 vbc.exe Token: SeDebugPrivilege 3140 vbc.exe Token: SeDebugPrivilege 4496 vbc.exe -
Suspicious use of WriteProcessMemory 44 IoCs
Processes:
0b757d38d347d1f763f59ab7f0423ae8.execmd.exechromedrivers32.execmd.exechromedrivers32.execmd.exedescription pid process target process PID 3192 wrote to memory of 4376 3192 0b757d38d347d1f763f59ab7f0423ae8.exe cmd.exe PID 3192 wrote to memory of 4376 3192 0b757d38d347d1f763f59ab7f0423ae8.exe cmd.exe PID 4376 wrote to memory of 5056 4376 cmd.exe schtasks.exe PID 4376 wrote to memory of 5056 4376 cmd.exe schtasks.exe PID 3192 wrote to memory of 4248 3192 0b757d38d347d1f763f59ab7f0423ae8.exe cmd.exe PID 3192 wrote to memory of 4248 3192 0b757d38d347d1f763f59ab7f0423ae8.exe cmd.exe PID 3192 wrote to memory of 3840 3192 0b757d38d347d1f763f59ab7f0423ae8.exe vbc.exe PID 3192 wrote to memory of 3840 3192 0b757d38d347d1f763f59ab7f0423ae8.exe vbc.exe PID 3192 wrote to memory of 3840 3192 0b757d38d347d1f763f59ab7f0423ae8.exe vbc.exe PID 3192 wrote to memory of 3840 3192 0b757d38d347d1f763f59ab7f0423ae8.exe vbc.exe PID 3192 wrote to memory of 3840 3192 0b757d38d347d1f763f59ab7f0423ae8.exe vbc.exe PID 3192 wrote to memory of 3840 3192 0b757d38d347d1f763f59ab7f0423ae8.exe vbc.exe PID 3192 wrote to memory of 3840 3192 0b757d38d347d1f763f59ab7f0423ae8.exe vbc.exe PID 3192 wrote to memory of 3840 3192 0b757d38d347d1f763f59ab7f0423ae8.exe vbc.exe PID 3192 wrote to memory of 4844 3192 0b757d38d347d1f763f59ab7f0423ae8.exe WinRar Activator.exe PID 3192 wrote to memory of 4844 3192 0b757d38d347d1f763f59ab7f0423ae8.exe WinRar Activator.exe PID 1648 wrote to memory of 3124 1648 chromedrivers32.exe cmd.exe PID 1648 wrote to memory of 3124 1648 chromedrivers32.exe cmd.exe PID 3124 wrote to memory of 944 3124 cmd.exe schtasks.exe PID 3124 wrote to memory of 944 3124 cmd.exe schtasks.exe PID 1648 wrote to memory of 1832 1648 chromedrivers32.exe cmd.exe PID 1648 wrote to memory of 1832 1648 chromedrivers32.exe cmd.exe PID 1648 wrote to memory of 3140 1648 chromedrivers32.exe vbc.exe PID 1648 wrote to memory of 3140 1648 chromedrivers32.exe vbc.exe PID 1648 wrote to memory of 3140 1648 chromedrivers32.exe vbc.exe PID 1648 wrote to memory of 3140 1648 chromedrivers32.exe vbc.exe PID 1648 wrote to memory of 3140 1648 chromedrivers32.exe vbc.exe PID 1648 wrote to memory of 3140 1648 chromedrivers32.exe vbc.exe PID 1648 wrote to memory of 3140 1648 chromedrivers32.exe vbc.exe PID 1648 wrote to memory of 3140 1648 chromedrivers32.exe vbc.exe PID 928 wrote to memory of 4216 928 chromedrivers32.exe cmd.exe PID 928 wrote to memory of 4216 928 chromedrivers32.exe cmd.exe PID 4216 wrote to memory of 1928 4216 cmd.exe schtasks.exe PID 4216 wrote to memory of 1928 4216 cmd.exe schtasks.exe PID 928 wrote to memory of 1876 928 chromedrivers32.exe cmd.exe PID 928 wrote to memory of 1876 928 chromedrivers32.exe cmd.exe PID 928 wrote to memory of 4496 928 chromedrivers32.exe vbc.exe PID 928 wrote to memory of 4496 928 chromedrivers32.exe vbc.exe PID 928 wrote to memory of 4496 928 chromedrivers32.exe vbc.exe PID 928 wrote to memory of 4496 928 chromedrivers32.exe vbc.exe PID 928 wrote to memory of 4496 928 chromedrivers32.exe vbc.exe PID 928 wrote to memory of 4496 928 chromedrivers32.exe vbc.exe PID 928 wrote to memory of 4496 928 chromedrivers32.exe vbc.exe PID 928 wrote to memory of 4496 928 chromedrivers32.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b757d38d347d1f763f59ab7f0423ae8.exe"C:\Users\Admin\AppData\Local\Temp\0b757d38d347d1f763f59ab7f0423ae8.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafdnasia" /tr "'C:\Users\Admin\AppData\Roaming\chromedrivers32.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdnasia" /tr "'C:\Users\Admin\AppData\Roaming\chromedrivers32.exe'" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Local\Temp\0b757d38d347d1f763f59ab7f0423ae8.exe" "C:\Users\Admin\AppData\Roaming\chromedrivers32.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\WinRar Activator.exe"C:\Users\Admin\AppData\Local\Temp\WinRar Activator.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\chromedrivers32.exeC:\Users\Admin\AppData\Roaming\chromedrivers32.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafdnasia" /tr "'C:\Users\Admin\AppData\Roaming\chromedrivers32.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdnasia" /tr "'C:\Users\Admin\AppData\Roaming\chromedrivers32.exe'" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Roaming\chromedrivers32.exe" "C:\Users\Admin\AppData\Roaming\chromedrivers32.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\chromedrivers32.exeC:\Users\Admin\AppData\Roaming\chromedrivers32.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafdnasia" /tr "'C:\Users\Admin\AppData\Roaming\chromedrivers32.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdnasia" /tr "'C:\Users\Admin\AppData\Roaming\chromedrivers32.exe'" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Roaming\chromedrivers32.exe" "C:\Users\Admin\AppData\Roaming\chromedrivers32.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\chromedrivers32.exe.logFilesize
859B
MD56e11a15fe4491ead2a94f64d3467be38
SHA19a8329fb71ddc89dae9aa174c0b44a1f646efd63
SHA256087cf6355ae9fc71eea2493b30c6b10a6775f3dd68b2cb5e07fcc13461b74248
SHA5126154e320e2556aef177fc5bfb4e5fe8fabe324af736b89db4db41e6dd51658f7f6a7d0f73c24dc6ccdc4edf14023f4a1ecd0908abac5b82cebd038a93b2fc106
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\vbc.exe.logFilesize
2KB
MD5c40dcb45840af9111f48eb9d55d7649e
SHA1de2c2c9ada9711e8caf7122963ae83a343a4b71c
SHA2569f5ecbc5028a388fcd8bc6c4974b81f9a8dec4bc30101df6f7d797ef71759d01
SHA512fae4924fbfeb06234275187b866e43f83a888f2d13d83c3d17db0c54f2da054745b9a1e4883f84b1ed8faffdf50122f908c15576fc2df7daa76e156c898c8fd5
-
C:\Users\Admin\AppData\Local\Temp\WinRar Activator.exeFilesize
259KB
MD5f385414230d858b00cbe7ffe3daa5928
SHA104f24e4f0bab06e7d58fc39b328baf382dae9cff
SHA256b9ef9b0ae62b70c0ee11f8ff8bc87e2a7b91c2ebbd46af1a29bc5b4119145335
SHA5121f9ad4545b37f2953f1e0f9c9409cc960d7cf30d926c80fb58e92924566d20b3ecf7a971a93f998da105c5e8b36ff5a6b9de46d29a7accd0f96ed9d1c0efb8c2
-
C:\Users\Admin\AppData\Local\Temp\WinRar Activator.exeFilesize
259KB
MD5f385414230d858b00cbe7ffe3daa5928
SHA104f24e4f0bab06e7d58fc39b328baf382dae9cff
SHA256b9ef9b0ae62b70c0ee11f8ff8bc87e2a7b91c2ebbd46af1a29bc5b4119145335
SHA5121f9ad4545b37f2953f1e0f9c9409cc960d7cf30d926c80fb58e92924566d20b3ecf7a971a93f998da105c5e8b36ff5a6b9de46d29a7accd0f96ed9d1c0efb8c2
-
C:\Users\Admin\AppData\Roaming\chromedrivers32.exeFilesize
406KB
MD50b757d38d347d1f763f59ab7f0423ae8
SHA1fcf1b343ab5c7f9ac72fc6c85b3c478c5875f577
SHA2562105710d19c34b91be3a37c24ab4a4835dcdc606c0f2d8b487beb0d24e336124
SHA5120b9661590897256242ddc4ea43d069999e1ddca9d7fed671a6aa31a60f0da4bd820b8bb6c2502fa1b7979dea932375e2363e882e31379935751af1cdf2ce7d94
-
C:\Users\Admin\AppData\Roaming\chromedrivers32.exeFilesize
406KB
MD50b757d38d347d1f763f59ab7f0423ae8
SHA1fcf1b343ab5c7f9ac72fc6c85b3c478c5875f577
SHA2562105710d19c34b91be3a37c24ab4a4835dcdc606c0f2d8b487beb0d24e336124
SHA5120b9661590897256242ddc4ea43d069999e1ddca9d7fed671a6aa31a60f0da4bd820b8bb6c2502fa1b7979dea932375e2363e882e31379935751af1cdf2ce7d94
-
C:\Users\Admin\AppData\Roaming\chromedrivers32.exeFilesize
406KB
MD50b757d38d347d1f763f59ab7f0423ae8
SHA1fcf1b343ab5c7f9ac72fc6c85b3c478c5875f577
SHA2562105710d19c34b91be3a37c24ab4a4835dcdc606c0f2d8b487beb0d24e336124
SHA5120b9661590897256242ddc4ea43d069999e1ddca9d7fed671a6aa31a60f0da4bd820b8bb6c2502fa1b7979dea932375e2363e882e31379935751af1cdf2ce7d94
-
memory/928-170-0x00007FFD42800000-0x00007FFD432C1000-memory.dmpFilesize
10.8MB
-
memory/928-175-0x00007FFD42800000-0x00007FFD432C1000-memory.dmpFilesize
10.8MB
-
memory/944-160-0x0000000000000000-mapping.dmp
-
memory/1648-166-0x00007FFD42800000-0x00007FFD432C1000-memory.dmpFilesize
10.8MB
-
memory/1648-162-0x00007FFD42800000-0x00007FFD432C1000-memory.dmpFilesize
10.8MB
-
memory/1832-161-0x0000000000000000-mapping.dmp
-
memory/1876-172-0x0000000000000000-mapping.dmp
-
memory/1928-171-0x0000000000000000-mapping.dmp
-
memory/3124-159-0x0000000000000000-mapping.dmp
-
memory/3140-164-0x000000000041ADAE-mapping.dmp
-
memory/3192-141-0x00007FFD42800000-0x00007FFD432C1000-memory.dmpFilesize
10.8MB
-
memory/3192-130-0x00000000009D0000-0x0000000000A38000-memory.dmpFilesize
416KB
-
memory/3192-134-0x00007FFD42800000-0x00007FFD432C1000-memory.dmpFilesize
10.8MB
-
memory/3840-144-0x0000000005E50000-0x0000000006468000-memory.dmpFilesize
6.1MB
-
memory/3840-136-0x000000000041ADAE-mapping.dmp
-
memory/3840-152-0x0000000006910000-0x0000000006976000-memory.dmpFilesize
408KB
-
memory/3840-148-0x0000000006A20000-0x0000000006FC4000-memory.dmpFilesize
5.6MB
-
memory/3840-154-0x00000000075A0000-0x0000000007762000-memory.dmpFilesize
1.8MB
-
memory/3840-155-0x00000000083B0000-0x00000000088DC000-memory.dmpFilesize
5.2MB
-
memory/3840-156-0x0000000007870000-0x00000000078C0000-memory.dmpFilesize
320KB
-
memory/3840-147-0x0000000005950000-0x000000000598C000-memory.dmpFilesize
240KB
-
memory/3840-146-0x0000000005A20000-0x0000000005B2A000-memory.dmpFilesize
1.0MB
-
memory/3840-145-0x00000000058F0000-0x0000000005902000-memory.dmpFilesize
72KB
-
memory/3840-149-0x0000000006470000-0x0000000006502000-memory.dmpFilesize
584KB
-
memory/3840-135-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/3840-151-0x00000000066B0000-0x00000000066CE000-memory.dmpFilesize
120KB
-
memory/3840-150-0x0000000006510000-0x0000000006586000-memory.dmpFilesize
472KB
-
memory/3840-142-0x0000000001320000-0x0000000001340000-memory.dmpFilesize
128KB
-
memory/4216-169-0x0000000000000000-mapping.dmp
-
memory/4248-133-0x0000000000000000-mapping.dmp
-
memory/4376-131-0x0000000000000000-mapping.dmp
-
memory/4496-174-0x000000000041ADAE-mapping.dmp
-
memory/4844-137-0x0000000000000000-mapping.dmp
-
memory/4844-140-0x0000022D9E0A0000-0x0000022D9E0E6000-memory.dmpFilesize
280KB
-
memory/4844-143-0x00007FFD42800000-0x00007FFD432C1000-memory.dmpFilesize
10.8MB
-
memory/4844-153-0x00007FFD42800000-0x00007FFD432C1000-memory.dmpFilesize
10.8MB
-
memory/5056-132-0x0000000000000000-mapping.dmp