Analysis
-
max time kernel
301s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
29/06/2022, 01:00
Static task
static1
Behavioral task
behavioral1
Sample
fd0fadecf054fd384b0964b72331387a79d621a90383706838713f086d12ee74.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
fd0fadecf054fd384b0964b72331387a79d621a90383706838713f086d12ee74.exe
Resource
win10v2004-20220414-en
General
-
Target
fd0fadecf054fd384b0964b72331387a79d621a90383706838713f086d12ee74.exe
-
Size
279KB
-
MD5
e8a3b9038499e57efa0fac179995c4eb
-
SHA1
4584bea5ef3c4d6dd4de7bc1162ab5a3000cf6d1
-
SHA256
fd0fadecf054fd384b0964b72331387a79d621a90383706838713f086d12ee74
-
SHA512
063874174ab32f003a26bdf2ee7651e7ff08eeac21bcc8f122a25b840f8901fbcf6ed8289f321e817bc507a86cc54b9c8e715ccc00de12735022723175d28b13
Malware Config
Extracted
redline
mario2
193.106.191.129:80
-
auth_value
4ef7e3fec3a418b2f0233b604d0560d9
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
resource yara_rule behavioral2/memory/3336-159-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 2968 1C23.exe 1524 43E0.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2968 set thread context of 3336 2968 1C23.exe 94 -
Program crash 1 IoCs
pid pid_target Process procid_target 2108 5044 WerFault.exe 89 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fd0fadecf054fd384b0964b72331387a79d621a90383706838713f086d12ee74.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fd0fadecf054fd384b0964b72331387a79d621a90383706838713f086d12ee74.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fd0fadecf054fd384b0964b72331387a79d621a90383706838713f086d12ee74.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3980 fd0fadecf054fd384b0964b72331387a79d621a90383706838713f086d12ee74.exe 3980 fd0fadecf054fd384b0964b72331387a79d621a90383706838713f086d12ee74.exe 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 384 Process not Found -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3980 fd0fadecf054fd384b0964b72331387a79d621a90383706838713f086d12ee74.exe 384 Process not Found 384 Process not Found 384 Process not Found 384 Process not Found -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeShutdownPrivilege 384 Process not Found Token: SeCreatePagefilePrivilege 384 Process not Found Token: SeShutdownPrivilege 384 Process not Found Token: SeCreatePagefilePrivilege 384 Process not Found Token: SeShutdownPrivilege 384 Process not Found Token: SeCreatePagefilePrivilege 384 Process not Found Token: SeShutdownPrivilege 384 Process not Found Token: SeCreatePagefilePrivilege 384 Process not Found Token: SeShutdownPrivilege 384 Process not Found Token: SeCreatePagefilePrivilege 384 Process not Found Token: SeShutdownPrivilege 384 Process not Found Token: SeCreatePagefilePrivilege 384 Process not Found Token: SeShutdownPrivilege 384 Process not Found Token: SeCreatePagefilePrivilege 384 Process not Found Token: SeShutdownPrivilege 384 Process not Found Token: SeCreatePagefilePrivilege 384 Process not Found Token: SeDebugPrivilege 3336 InstallUtil.exe Token: SeShutdownPrivilege 384 Process not Found Token: SeCreatePagefilePrivilege 384 Process not Found Token: SeShutdownPrivilege 384 Process not Found Token: SeCreatePagefilePrivilege 384 Process not Found Token: SeShutdownPrivilege 384 Process not Found Token: SeCreatePagefilePrivilege 384 Process not Found Token: SeShutdownPrivilege 384 Process not Found Token: SeCreatePagefilePrivilege 384 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 384 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 384 wrote to memory of 2968 384 Process not Found 87 PID 384 wrote to memory of 2968 384 Process not Found 87 PID 384 wrote to memory of 2968 384 Process not Found 87 PID 384 wrote to memory of 1524 384 Process not Found 88 PID 384 wrote to memory of 1524 384 Process not Found 88 PID 384 wrote to memory of 1524 384 Process not Found 88 PID 384 wrote to memory of 5044 384 Process not Found 89 PID 384 wrote to memory of 5044 384 Process not Found 89 PID 384 wrote to memory of 5044 384 Process not Found 89 PID 384 wrote to memory of 5044 384 Process not Found 89 PID 384 wrote to memory of 2368 384 Process not Found 93 PID 384 wrote to memory of 2368 384 Process not Found 93 PID 384 wrote to memory of 2368 384 Process not Found 93 PID 2968 wrote to memory of 3336 2968 1C23.exe 94 PID 2968 wrote to memory of 3336 2968 1C23.exe 94 PID 2968 wrote to memory of 3336 2968 1C23.exe 94 PID 2968 wrote to memory of 3336 2968 1C23.exe 94 PID 2968 wrote to memory of 3336 2968 1C23.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd0fadecf054fd384b0964b72331387a79d621a90383706838713f086d12ee74.exe"C:\Users\Admin\AppData\Local\Temp\fd0fadecf054fd384b0964b72331387a79d621a90383706838713f086d12ee74.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3980
-
C:\Users\Admin\AppData\Local\Temp\1C23.exeC:\Users\Admin\AppData\Local\Temp\1C23.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3336
-
-
C:\Users\Admin\AppData\Local\Temp\43E0.exeC:\Users\Admin\AppData\Local\Temp\43E0.exe1⤵
- Executes dropped EXE
PID:1524
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:5044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 9122⤵
- Program crash
PID:2108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5044 -ip 50441⤵PID:2196
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2368
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5df9cc49add3e01f23c63b0f73469f752
SHA16f8199ae9280e13671f5eb5715b093cd93f6732e
SHA256b18d30fdfaa2f3469131da279fe2a64ed3cf6c1cbc8785ea1ba6e7596ae85419
SHA51209100b76b4d0ba5a417da4a68977ed0a9eba8563cc5866e0cf912234ebded7598c482967e1812c143868c43c49eb882f82588dfafc041698b814c564decfc9b5
-
Filesize
1.6MB
MD5df9cc49add3e01f23c63b0f73469f752
SHA16f8199ae9280e13671f5eb5715b093cd93f6732e
SHA256b18d30fdfaa2f3469131da279fe2a64ed3cf6c1cbc8785ea1ba6e7596ae85419
SHA51209100b76b4d0ba5a417da4a68977ed0a9eba8563cc5866e0cf912234ebded7598c482967e1812c143868c43c49eb882f82588dfafc041698b814c564decfc9b5
-
Filesize
6.6MB
MD5a840af25865513286606284b38490add
SHA13ab6eaaa2457f3afc1a37645152a91efa95751af
SHA25626923ba499b7c445e86e76c616dee82cd5699de4bdfcf61d3e09562b36f2fbad
SHA512fec4a023ac03aa0733d6e4f11dd9f79c1329b2b73acd543e85b96d2fd32de4374a26250dd36f82919e32bd022fa3e753c8bf09cdb9e92670314ba0f7ef38ceb6
-
Filesize
6.6MB
MD5a840af25865513286606284b38490add
SHA13ab6eaaa2457f3afc1a37645152a91efa95751af
SHA25626923ba499b7c445e86e76c616dee82cd5699de4bdfcf61d3e09562b36f2fbad
SHA512fec4a023ac03aa0733d6e4f11dd9f79c1329b2b73acd543e85b96d2fd32de4374a26250dd36f82919e32bd022fa3e753c8bf09cdb9e92670314ba0f7ef38ceb6