Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
23-06-2022 14:05
Static task
static1
Behavioral task
behavioral1
Sample
5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9.exe
Resource
win10-20220414-en
General
-
Target
5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9.exe
-
Size
54KB
-
MD5
bf3f098255fe2c23b9135409652e72c2
-
SHA1
a8ec905d04c72ec2fa4099fafa2fc29caa8749a7
-
SHA256
5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9
-
SHA512
67dee018ca82b424d6607f79a2978a2727d08b1ca0495b6099eb2b493d5981d7b9c98d8adeba10272208ea7136339d239733b997636554179dda6771cf3fa9ee
Malware Config
Extracted
redline
kista
65.108.27.131:45256
-
auth_value
4573bf97dc6f0f5ec522dbf1c8c7410e
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/4920-274-0x000000000041AD82-mapping.dmp family_redline behavioral1/memory/4920-312-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
Processes:
Ddxrrdkydmax2.exeB94D.exeBC4C.exeInstaller_ovl.exeInstaller_ovl.exepid process 4832 Ddxrrdkydmax2.exe 4208 B94D.exe 3840 BC4C.exe 300 Installer_ovl.exe 1624 Installer_ovl.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9.exeB94D.exeBC4C.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Windows\CurrentVersion\Run\Shxcerv = "\"C:\\Users\\Admin\\AppData\\Roaming\\Kujbjyaaz\\Shxcerv.exe\"" 5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce B94D.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" B94D.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce BC4C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" BC4C.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9.exedescription pid process target process PID 2308 set thread context of 4920 2308 5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
Ddxrrdkydmax2.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Ddxrrdkydmax2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Ddxrrdkydmax2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Ddxrrdkydmax2.exe -
Delays execution with timeout.exe 3 IoCs
Processes:
timeout.exetimeout.exetimeout.exepid process 2564 timeout.exe 3508 timeout.exe 1956 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9.exeDdxrrdkydmax2.exepid process 2308 5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9.exe 2308 5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9.exe 4832 Ddxrrdkydmax2.exe 4832 Ddxrrdkydmax2.exe 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 2572 -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Ddxrrdkydmax2.exepid process 4832 Ddxrrdkydmax2.exe 2572 2572 2572 2572 -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9.exeInstallUtil.exeInstaller_ovl.exedescription pid process Token: SeDebugPrivilege 2308 5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9.exe Token: SeDebugPrivilege 4920 InstallUtil.exe Token: SeShutdownPrivilege 2572 Token: SeCreatePagefilePrivilege 2572 Token: SeShutdownPrivilege 2572 Token: SeCreatePagefilePrivilege 2572 Token: SeShutdownPrivilege 2572 Token: SeCreatePagefilePrivilege 2572 Token: SeDebugPrivilege 300 Installer_ovl.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9.execmd.exeB94D.exeBC4C.exeInstaller_ovl.execmd.exeInstaller_ovl.execmd.exedescription pid process target process PID 2308 wrote to memory of 4740 2308 5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9.exe cmd.exe PID 2308 wrote to memory of 4740 2308 5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9.exe cmd.exe PID 2308 wrote to memory of 4740 2308 5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9.exe cmd.exe PID 4740 wrote to memory of 1956 4740 cmd.exe timeout.exe PID 4740 wrote to memory of 1956 4740 cmd.exe timeout.exe PID 4740 wrote to memory of 1956 4740 cmd.exe timeout.exe PID 2308 wrote to memory of 4832 2308 5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9.exe Ddxrrdkydmax2.exe PID 2308 wrote to memory of 4832 2308 5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9.exe Ddxrrdkydmax2.exe PID 2308 wrote to memory of 4832 2308 5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9.exe Ddxrrdkydmax2.exe PID 2308 wrote to memory of 4920 2308 5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9.exe InstallUtil.exe PID 2308 wrote to memory of 4920 2308 5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9.exe InstallUtil.exe PID 2308 wrote to memory of 4920 2308 5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9.exe InstallUtil.exe PID 2308 wrote to memory of 4920 2308 5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9.exe InstallUtil.exe PID 2308 wrote to memory of 4920 2308 5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9.exe InstallUtil.exe PID 2308 wrote to memory of 4920 2308 5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9.exe InstallUtil.exe PID 2308 wrote to memory of 4920 2308 5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9.exe InstallUtil.exe PID 2308 wrote to memory of 4920 2308 5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9.exe InstallUtil.exe PID 2572 wrote to memory of 4208 2572 B94D.exe PID 2572 wrote to memory of 4208 2572 B94D.exe PID 2572 wrote to memory of 3840 2572 BC4C.exe PID 2572 wrote to memory of 3840 2572 BC4C.exe PID 2572 wrote to memory of 664 2572 explorer.exe PID 2572 wrote to memory of 664 2572 explorer.exe PID 2572 wrote to memory of 664 2572 explorer.exe PID 2572 wrote to memory of 664 2572 explorer.exe PID 2572 wrote to memory of 1040 2572 explorer.exe PID 2572 wrote to memory of 1040 2572 explorer.exe PID 2572 wrote to memory of 1040 2572 explorer.exe PID 4208 wrote to memory of 300 4208 B94D.exe Installer_ovl.exe PID 4208 wrote to memory of 300 4208 B94D.exe Installer_ovl.exe PID 3840 wrote to memory of 1624 3840 BC4C.exe Installer_ovl.exe PID 3840 wrote to memory of 1624 3840 BC4C.exe Installer_ovl.exe PID 1624 wrote to memory of 3852 1624 Installer_ovl.exe cmd.exe PID 1624 wrote to memory of 3852 1624 Installer_ovl.exe cmd.exe PID 3852 wrote to memory of 2564 3852 cmd.exe timeout.exe PID 3852 wrote to memory of 2564 3852 cmd.exe timeout.exe PID 300 wrote to memory of 2584 300 Installer_ovl.exe cmd.exe PID 300 wrote to memory of 2584 300 Installer_ovl.exe cmd.exe PID 2584 wrote to memory of 3508 2584 cmd.exe timeout.exe PID 2584 wrote to memory of 3508 2584 cmd.exe timeout.exe -
outlook_office_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9.exe"C:\Users\Admin\AppData\Local\Temp\5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 452⤵
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\timeout.exetimeout 453⤵
- Delays execution with timeout.exe
PID:1956
-
-
-
C:\Users\Admin\AppData\Local\Temp\Ddxrrdkydmax2.exe"C:\Users\Admin\AppData\Local\Temp\Ddxrrdkydmax2.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4832
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4920
-
-
C:\Users\Admin\AppData\Local\Temp\B94D.exeC:\Users\Admin\AppData\Local\Temp\B94D.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Installer_ovl.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Installer_ovl.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:300 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 453⤵
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\system32\timeout.exetimeout 454⤵
- Delays execution with timeout.exe
PID:3508
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\BC4C.exeC:\Users\Admin\AppData\Local\Temp\BC4C.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Installer_ovl.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Installer_ovl.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 453⤵
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\system32\timeout.exetimeout 454⤵
- Delays execution with timeout.exe
PID:2564
-
-
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:664
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1040
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
233KB
MD5c6763d96b0d93b647ccd9e92d05a9515
SHA1bfa3a6e5d0e5a911c1c0df5fe7a70d34dc5853df
SHA2566ac7bdfcec3a05380e0b0a0b98f69402228a42231e1b971da608b3ae2e53b3f3
SHA512bf74f537af8fc04b6efc11a3feb142043f98b35c738d5a6d75adf4772a4bf957e9e9fb0703c339ddf346f58a1dc358980d22e981b7f6295509dfa8cca885aac0
-
Filesize
1.7MB
MD56ebe920611d779570697c3aaa7a47990
SHA1343830e9727f173eef48a9f565a98ed4abe3e0f8
SHA256fefde35b7516cdc47f063eb152fcea8d7302ecfb02edc1826c7e36f3b1a90c8f
SHA512ae2f0e457ee1fcd80637b9bf6e1d110a99d8470a1b0932a9341cc54664d4f6ea1bcd216899c2888040bbd179f8e34caa9bbc7b22f11c202da0729659c1ee4560
-
Filesize
29KB
MD545cdecf77c4b82438412f4d1245c8330
SHA161f2a7263e8e499acd0982795f08c61f67ad1c1b
SHA2565701c203c90172150cb55c80e26509f0e2fafc7fc97e04b4706f433daaebc1d7
SHA512f9b26b53fedaffd9b21a68192c9a5d7c69017b35e4a75c5a6b7646c54b8e2b6592fda9e85b81b5dd4967166cb73987aa640adf8bbb93e2186dadb8839d6fd1e1
-
Filesize
29KB
MD545cdecf77c4b82438412f4d1245c8330
SHA161f2a7263e8e499acd0982795f08c61f67ad1c1b
SHA2565701c203c90172150cb55c80e26509f0e2fafc7fc97e04b4706f433daaebc1d7
SHA512f9b26b53fedaffd9b21a68192c9a5d7c69017b35e4a75c5a6b7646c54b8e2b6592fda9e85b81b5dd4967166cb73987aa640adf8bbb93e2186dadb8839d6fd1e1
-
Filesize
95.4MB
MD53eb740375f0bfb1e1a33caae9196ecac
SHA1d1cf9f18e09cfe243c901dbf7f6770e5696c305e
SHA25607b0ed7c89d46efd0b09a54938eded91ba0c894752c2ff0fccd5503157e6ff1c
SHA512e008846771cbcce839449675c9d5bb1abdced540fa691e54a1b59f5e03970250d3edbefed976230894a55b34ac141399734272f307bb0c4438f060b42091a22f
-
Filesize
95.4MB
MD53eb740375f0bfb1e1a33caae9196ecac
SHA1d1cf9f18e09cfe243c901dbf7f6770e5696c305e
SHA25607b0ed7c89d46efd0b09a54938eded91ba0c894752c2ff0fccd5503157e6ff1c
SHA512e008846771cbcce839449675c9d5bb1abdced540fa691e54a1b59f5e03970250d3edbefed976230894a55b34ac141399734272f307bb0c4438f060b42091a22f
-
Filesize
331.9MB
MD5a75b062e777e657eb9bd0fed9e649522
SHA10e3dcbc476715287a1cde80931f45435fd452a31
SHA256e6bb6b6d67fe4825aca2da3df22a6ed539e2d6a20618db9c95a13391e0c3f6e8
SHA5129f0a80095e515c5f8127d71b83e81b5387c8915938b504f316a9b30bc4ec365ed7a9aabe238b33401df772079162293a3ec0252888ccb509f78e0b0ad136cfec
-
Filesize
340.0MB
MD5ea7a392d598f019aef884eb6ed4228e9
SHA19f49dda62e9c79592f8200ad3b8bb2d6ac7094d2
SHA2565f6a97419e72a8b72308c8aec4fd3b240813af81c59c5f8f134d95942b981750
SHA512a46de27e1395f1feb582004c769a1ebc2ea4eba3838dadef25fb973779ca7a256a73090b201847fed4910aeebef34ea5553827cc1003203e48a9fab3971e809c