Analysis
-
max time kernel
125s -
max time network
60s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
05-07-2022 23:32
Static task
static1
Behavioral task
behavioral1
Sample
980735eeb5ec92f91ab59a448a925925369292204d70c0d88db028265e1b8172.exe
Resource
win10-20220414-en
General
-
Target
980735eeb5ec92f91ab59a448a925925369292204d70c0d88db028265e1b8172.exe
-
Size
2.4MB
-
MD5
57201fbd801fd4c98772aa34d60a44ce
-
SHA1
f54e549937f92c9fd68d537105e007e799549374
-
SHA256
980735eeb5ec92f91ab59a448a925925369292204d70c0d88db028265e1b8172
-
SHA512
851f6d6241af1765b0894a0f4b33e1f83f538d21bd19feb3fc5b07a37167387f816ba44dc02ed0192c1bb9fdffb42d7d525ebcddebb65a1e891cfeb9d2a036e2
Malware Config
Extracted
redline
141.95.140.173:33470
-
auth_value
6d9508e5573e656e0dc3c4c5f8526d8e
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
crypton.exeupdator.exewinlogon.exewinlogon.exepid process 4120 crypton.exe 8844 updator.exe 4264 winlogon.exe 4400 winlogon.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\updator.exe upx behavioral1/memory/8844-387-0x0000000001060000-0x0000000001099000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\updator.exe upx behavioral1/memory/8844-560-0x0000000001060000-0x0000000001099000-memory.dmp upx C:\Users\Admin\AppData\Roaming\WindowsFolder\winlogon.exe upx C:\Users\Admin\AppData\Roaming\WindowsFolder\winlogon.exe upx behavioral1/memory/4264-766-0x0000000001360000-0x0000000001399000-memory.dmp upx C:\Users\Admin\AppData\Roaming\WindowsFolder\winlogon.exe upx behavioral1/memory/4400-796-0x0000000001360000-0x0000000001399000-memory.dmp upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
updator.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce updator.exe Set value (str) \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\CompPkgSrv = "C:\\Users\\Admin\\AppData\\Roaming\\winlogon.exe" updator.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 4 IoCs
Processes:
980735eeb5ec92f91ab59a448a925925369292204d70c0d88db028265e1b8172.exeAppLaunch.execrypton.exedescription pid process target process PID 3768 set thread context of 214996 3768 980735eeb5ec92f91ab59a448a925925369292204d70c0d88db028265e1b8172.exe AppLaunch.exe PID 214996 set thread context of 215004 214996 AppLaunch.exe AppLaunch.exe PID 214996 set thread context of 636 214996 AppLaunch.exe AppLaunch.exe PID 4120 set thread context of 182060 4120 crypton.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 215004 AppLaunch.exe 215004 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
AppLaunch.exeAppLaunch.exedescription pid process Token: SeDebugPrivilege 636 AppLaunch.exe Token: SeDebugPrivilege 215004 AppLaunch.exe -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
980735eeb5ec92f91ab59a448a925925369292204d70c0d88db028265e1b8172.exeAppLaunch.exeAppLaunch.exeupdator.execrypton.exedescription pid process target process PID 3768 wrote to memory of 214996 3768 980735eeb5ec92f91ab59a448a925925369292204d70c0d88db028265e1b8172.exe AppLaunch.exe PID 3768 wrote to memory of 214996 3768 980735eeb5ec92f91ab59a448a925925369292204d70c0d88db028265e1b8172.exe AppLaunch.exe PID 3768 wrote to memory of 214996 3768 980735eeb5ec92f91ab59a448a925925369292204d70c0d88db028265e1b8172.exe AppLaunch.exe PID 3768 wrote to memory of 214996 3768 980735eeb5ec92f91ab59a448a925925369292204d70c0d88db028265e1b8172.exe AppLaunch.exe PID 3768 wrote to memory of 214996 3768 980735eeb5ec92f91ab59a448a925925369292204d70c0d88db028265e1b8172.exe AppLaunch.exe PID 214996 wrote to memory of 215004 214996 AppLaunch.exe AppLaunch.exe PID 214996 wrote to memory of 215004 214996 AppLaunch.exe AppLaunch.exe PID 214996 wrote to memory of 215004 214996 AppLaunch.exe AppLaunch.exe PID 214996 wrote to memory of 215004 214996 AppLaunch.exe AppLaunch.exe PID 214996 wrote to memory of 215004 214996 AppLaunch.exe AppLaunch.exe PID 214996 wrote to memory of 215004 214996 AppLaunch.exe AppLaunch.exe PID 214996 wrote to memory of 215004 214996 AppLaunch.exe AppLaunch.exe PID 214996 wrote to memory of 215004 214996 AppLaunch.exe AppLaunch.exe PID 214996 wrote to memory of 636 214996 AppLaunch.exe AppLaunch.exe PID 214996 wrote to memory of 636 214996 AppLaunch.exe AppLaunch.exe PID 214996 wrote to memory of 636 214996 AppLaunch.exe AppLaunch.exe PID 214996 wrote to memory of 636 214996 AppLaunch.exe AppLaunch.exe PID 214996 wrote to memory of 636 214996 AppLaunch.exe AppLaunch.exe PID 214996 wrote to memory of 636 214996 AppLaunch.exe AppLaunch.exe PID 214996 wrote to memory of 636 214996 AppLaunch.exe AppLaunch.exe PID 214996 wrote to memory of 636 214996 AppLaunch.exe AppLaunch.exe PID 636 wrote to memory of 4120 636 AppLaunch.exe crypton.exe PID 636 wrote to memory of 4120 636 AppLaunch.exe crypton.exe PID 636 wrote to memory of 4120 636 AppLaunch.exe crypton.exe PID 636 wrote to memory of 8844 636 AppLaunch.exe updator.exe PID 636 wrote to memory of 8844 636 AppLaunch.exe updator.exe PID 636 wrote to memory of 8844 636 AppLaunch.exe updator.exe PID 8844 wrote to memory of 66404 8844 updator.exe schtasks.exe PID 8844 wrote to memory of 66404 8844 updator.exe schtasks.exe PID 8844 wrote to memory of 66404 8844 updator.exe schtasks.exe PID 4120 wrote to memory of 182060 4120 crypton.exe AppLaunch.exe PID 4120 wrote to memory of 182060 4120 crypton.exe AppLaunch.exe PID 4120 wrote to memory of 182060 4120 crypton.exe AppLaunch.exe PID 4120 wrote to memory of 182060 4120 crypton.exe AppLaunch.exe PID 4120 wrote to memory of 182060 4120 crypton.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\980735eeb5ec92f91ab59a448a925925369292204d70c0d88db028265e1b8172.exe"C:\Users\Admin\AppData\Local\Temp\980735eeb5ec92f91ab59a448a925925369292204d70c0d88db028265e1b8172.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\crypton.exe"C:\Users\Admin\AppData\Local\Temp\crypton.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
-
C:\Users\Admin\AppData\Local\Temp\updator.exe"C:\Users\Admin\AppData\Local\Temp\updator.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 1 /tn "CompPkgSrv" /tr C:\Users\Admin\AppData\Roaming\WindowsFolder\winlogon.exe /f5⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\WindowsFolder\winlogon.exeC:\Users\Admin\AppData\Roaming\WindowsFolder\winlogon.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\WindowsFolder\winlogon.exeC:\Users\Admin\AppData\Roaming\WindowsFolder\winlogon.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.logFilesize
847B
MD5808e884c00533a9eb0e13e64960d9c3a
SHA1279d05181fc6179a12df1a669ff5d8b64c1380ae
SHA2562f6a0aab99b1c228a6642f44f8992646ce84c5a2b3b9941b6cf1f2badf67bdd6
SHA5129489bdb2ffdfeef3c52edcfe9b34c6688eba53eb86075e0564df1cd474723c86b5b5aedc12df1ff5fc12cf97bd1e3cf9701ff61dc4ce90155d70e9ccfd0fc299
-
C:\Users\Admin\AppData\Local\Temp\crypton.exeFilesize
3.3MB
MD54fddb0fb46c2d951db20eca9a3b1c296
SHA122b17e95712be0586272e742acb183d3a28d2e05
SHA2568350c0a227f79ef1a94da8e8bf95a4bc7cd3b590d0dcf78cc6da7236a5cdd1c5
SHA512ce471181a1dfd9195c2afc49b844ca5b8e809bae64d1715cf85d2f5e1050b6838cc0274d053bc27b9fd30e4ee9558a2aa1297b322d07f41ee1c5d6475020a168
-
C:\Users\Admin\AppData\Local\Temp\crypton.exeFilesize
3.3MB
MD54fddb0fb46c2d951db20eca9a3b1c296
SHA122b17e95712be0586272e742acb183d3a28d2e05
SHA2568350c0a227f79ef1a94da8e8bf95a4bc7cd3b590d0dcf78cc6da7236a5cdd1c5
SHA512ce471181a1dfd9195c2afc49b844ca5b8e809bae64d1715cf85d2f5e1050b6838cc0274d053bc27b9fd30e4ee9558a2aa1297b322d07f41ee1c5d6475020a168
-
C:\Users\Admin\AppData\Local\Temp\updator.exeFilesize
96KB
MD5d217c2a5f59c25ae90f29a54d13b21f2
SHA1cda28aca60ae2aafb132b7e66b9de310a22604ee
SHA2565f5ddb7f5934fc851903768ea0911a87b6278e0927169974f8442db9b0d1ca9a
SHA51294c9e81934b9b2f3c98e267bcdd288d5fd81a1b2d155d1496fc5e9a8cff7e4c44871eb01963af653b62b605df89b7a0e6a3d71360c95cd1c60455a6819c5b352
-
C:\Users\Admin\AppData\Local\Temp\updator.exeFilesize
96KB
MD5d217c2a5f59c25ae90f29a54d13b21f2
SHA1cda28aca60ae2aafb132b7e66b9de310a22604ee
SHA2565f5ddb7f5934fc851903768ea0911a87b6278e0927169974f8442db9b0d1ca9a
SHA51294c9e81934b9b2f3c98e267bcdd288d5fd81a1b2d155d1496fc5e9a8cff7e4c44871eb01963af653b62b605df89b7a0e6a3d71360c95cd1c60455a6819c5b352
-
C:\Users\Admin\AppData\Roaming\WindowsFolder\winlogon.exeFilesize
96KB
MD5d217c2a5f59c25ae90f29a54d13b21f2
SHA1cda28aca60ae2aafb132b7e66b9de310a22604ee
SHA2565f5ddb7f5934fc851903768ea0911a87b6278e0927169974f8442db9b0d1ca9a
SHA51294c9e81934b9b2f3c98e267bcdd288d5fd81a1b2d155d1496fc5e9a8cff7e4c44871eb01963af653b62b605df89b7a0e6a3d71360c95cd1c60455a6819c5b352
-
C:\Users\Admin\AppData\Roaming\WindowsFolder\winlogon.exeFilesize
96KB
MD5d217c2a5f59c25ae90f29a54d13b21f2
SHA1cda28aca60ae2aafb132b7e66b9de310a22604ee
SHA2565f5ddb7f5934fc851903768ea0911a87b6278e0927169974f8442db9b0d1ca9a
SHA51294c9e81934b9b2f3c98e267bcdd288d5fd81a1b2d155d1496fc5e9a8cff7e4c44871eb01963af653b62b605df89b7a0e6a3d71360c95cd1c60455a6819c5b352
-
C:\Users\Admin\AppData\Roaming\WindowsFolder\winlogon.exeFilesize
96KB
MD5d217c2a5f59c25ae90f29a54d13b21f2
SHA1cda28aca60ae2aafb132b7e66b9de310a22604ee
SHA2565f5ddb7f5934fc851903768ea0911a87b6278e0927169974f8442db9b0d1ca9a
SHA51294c9e81934b9b2f3c98e267bcdd288d5fd81a1b2d155d1496fc5e9a8cff7e4c44871eb01963af653b62b605df89b7a0e6a3d71360c95cd1c60455a6819c5b352
-
memory/636-170-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/636-147-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/636-163-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/636-178-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/636-158-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/636-179-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/636-175-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/636-156-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/636-173-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/636-184-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/636-172-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/636-140-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/636-152-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/636-143-0x0000000000402CCE-mapping.dmp
-
memory/636-169-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/636-145-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/636-149-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/636-161-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/636-150-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-119-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-122-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-120-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-121-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-124-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-117-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-118-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-123-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/4120-339-0x0000000000000000-mapping.dmp
-
memory/4264-766-0x0000000001360000-0x0000000001399000-memory.dmpFilesize
228KB
-
memory/4400-796-0x0000000001360000-0x0000000001399000-memory.dmpFilesize
228KB
-
memory/8844-373-0x0000000000000000-mapping.dmp
-
memory/8844-387-0x0000000001060000-0x0000000001099000-memory.dmpFilesize
228KB
-
memory/8844-560-0x0000000001060000-0x0000000001099000-memory.dmpFilesize
228KB
-
memory/66404-475-0x0000000000000000-mapping.dmp
-
memory/182060-586-0x0000000000429223-mapping.dmp
-
memory/214996-125-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/214996-133-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/214996-136-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/214996-135-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/214996-134-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/214996-132-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/214996-131-0x00000000004011D4-mapping.dmp
-
memory/215004-246-0x00000000095A0000-0x00000000096AA000-memory.dmpFilesize
1.0MB
-
memory/215004-177-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/215004-167-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/215004-174-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/215004-180-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/215004-181-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/215004-182-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/215004-183-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/215004-171-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/215004-185-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/215004-186-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/215004-187-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/215004-241-0x00000000099F0000-0x0000000009FF6000-memory.dmpFilesize
6.0MB
-
memory/215004-242-0x0000000009470000-0x0000000009482000-memory.dmpFilesize
72KB
-
memory/215004-176-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/215004-253-0x00000000094D0000-0x000000000950E000-memory.dmpFilesize
248KB
-
memory/215004-269-0x0000000009510000-0x000000000955B000-memory.dmpFilesize
300KB
-
memory/215004-290-0x0000000009890000-0x0000000009906000-memory.dmpFilesize
472KB
-
memory/215004-292-0x0000000009910000-0x00000000099A2000-memory.dmpFilesize
584KB
-
memory/215004-294-0x000000000A500000-0x000000000A9FE000-memory.dmpFilesize
5.0MB
-
memory/215004-302-0x000000000A120000-0x000000000A13E000-memory.dmpFilesize
120KB
-
memory/215004-308-0x000000000A3E0000-0x000000000A446000-memory.dmpFilesize
408KB
-
memory/215004-329-0x000000000AED0000-0x000000000B092000-memory.dmpFilesize
1.8MB
-
memory/215004-331-0x000000000B5D0000-0x000000000BAFC000-memory.dmpFilesize
5.2MB
-
memory/215004-157-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/215004-168-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/215004-166-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/215004-165-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/215004-164-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/215004-162-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/215004-159-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/215004-153-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/215004-142-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/215004-144-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/215004-719-0x000000000BB00000-0x000000000BB50000-memory.dmpFilesize
320KB
-
memory/215004-146-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/215004-151-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/215004-139-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/215004-141-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/215004-138-0x000000000041789E-mapping.dmp
-
memory/215004-137-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB