Analysis
-
max time kernel
138s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
06-07-2022 09:58
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Variant.Ursu.588815.10992.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Variant.Ursu.588815.10992.exe
Resource
win10v2004-20220414-en
General
-
Target
SecuriteInfo.com.Variant.Ursu.588815.10992.exe
-
Size
525KB
-
MD5
15f43d61bee241657b1ad10d6aa11e57
-
SHA1
83e96ecb233bd270b4f002c55aa28e92306650ef
-
SHA256
538e65ae9a73e15bd98c8fd0b5ecce5aaecdeb5e36a12a416a56a78c3cfbb3c8
-
SHA512
0e8a516e1439ec1a871d2afba0140a38f2ac8f4f13ad2283d334edf01537aa147023abf81957118b347c7634a05651fb26177e634ba8882d79c35754cfac9e5a
Malware Config
Extracted
redline
wizzy
107.182.128.57:48273
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 14 IoCs
Processes:
resource yara_rule behavioral1/memory/280-59-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/280-60-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/280-61-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/280-62-0x000000000041933E-mapping.dmp family_redline behavioral1/memory/280-64-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/280-66-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/1644-82-0x000000000041933E-mapping.dmp family_redline behavioral1/memory/468-102-0x000000000041933E-mapping.dmp family_redline behavioral1/memory/468-105-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/468-107-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/380-122-0x000000000041933E-mapping.dmp family_redline behavioral1/memory/380-126-0x0000000000080000-0x000000000009E000-memory.dmp family_redline behavioral1/memory/380-130-0x0000000000080000-0x000000000009E000-memory.dmp family_redline behavioral1/memory/380-133-0x0000000000080000-0x000000000009E000-memory.dmp family_redline -
Executes dropped EXE 3 IoCs
Processes:
chromer.exechromer.exechromer.exepid process 1948 chromer.exe 1640 chromer.exe 1760 chromer.exe -
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 4 IoCs
Processes:
SecuriteInfo.com.Variant.Ursu.588815.10992.exechromer.exechromer.exechromer.exedescription pid process target process PID 1640 set thread context of 280 1640 SecuriteInfo.com.Variant.Ursu.588815.10992.exe vbc.exe PID 1948 set thread context of 1644 1948 chromer.exe vbc.exe PID 1640 set thread context of 468 1640 chromer.exe vbc.exe PID 1760 set thread context of 380 1760 chromer.exe vbc.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1624 schtasks.exe 580 schtasks.exe 1044 schtasks.exe 268 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
vbc.exevbc.exevbc.exepid process 280 vbc.exe 280 vbc.exe 1644 vbc.exe 1644 vbc.exe 468 vbc.exe 468 vbc.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
SecuriteInfo.com.Variant.Ursu.588815.10992.exevbc.exechromer.exevbc.exechromer.exevbc.exechromer.exedescription pid process Token: SeDebugPrivilege 1640 SecuriteInfo.com.Variant.Ursu.588815.10992.exe Token: SeDebugPrivilege 280 vbc.exe Token: SeDebugPrivilege 1948 chromer.exe Token: SeDebugPrivilege 1644 vbc.exe Token: SeDebugPrivilege 1640 chromer.exe Token: SeDebugPrivilege 468 vbc.exe Token: SeDebugPrivilege 1760 chromer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
SecuriteInfo.com.Variant.Ursu.588815.10992.execmd.exetaskeng.exechromer.execmd.exechromer.exedescription pid process target process PID 1640 wrote to memory of 280 1640 SecuriteInfo.com.Variant.Ursu.588815.10992.exe vbc.exe PID 1640 wrote to memory of 280 1640 SecuriteInfo.com.Variant.Ursu.588815.10992.exe vbc.exe PID 1640 wrote to memory of 280 1640 SecuriteInfo.com.Variant.Ursu.588815.10992.exe vbc.exe PID 1640 wrote to memory of 280 1640 SecuriteInfo.com.Variant.Ursu.588815.10992.exe vbc.exe PID 1640 wrote to memory of 280 1640 SecuriteInfo.com.Variant.Ursu.588815.10992.exe vbc.exe PID 1640 wrote to memory of 280 1640 SecuriteInfo.com.Variant.Ursu.588815.10992.exe vbc.exe PID 1640 wrote to memory of 280 1640 SecuriteInfo.com.Variant.Ursu.588815.10992.exe vbc.exe PID 1640 wrote to memory of 280 1640 SecuriteInfo.com.Variant.Ursu.588815.10992.exe vbc.exe PID 1640 wrote to memory of 280 1640 SecuriteInfo.com.Variant.Ursu.588815.10992.exe vbc.exe PID 1640 wrote to memory of 1880 1640 SecuriteInfo.com.Variant.Ursu.588815.10992.exe cmd.exe PID 1640 wrote to memory of 1880 1640 SecuriteInfo.com.Variant.Ursu.588815.10992.exe cmd.exe PID 1640 wrote to memory of 1880 1640 SecuriteInfo.com.Variant.Ursu.588815.10992.exe cmd.exe PID 1640 wrote to memory of 1880 1640 SecuriteInfo.com.Variant.Ursu.588815.10992.exe cmd.exe PID 1640 wrote to memory of 1720 1640 SecuriteInfo.com.Variant.Ursu.588815.10992.exe cmd.exe PID 1640 wrote to memory of 1720 1640 SecuriteInfo.com.Variant.Ursu.588815.10992.exe cmd.exe PID 1640 wrote to memory of 1720 1640 SecuriteInfo.com.Variant.Ursu.588815.10992.exe cmd.exe PID 1640 wrote to memory of 1720 1640 SecuriteInfo.com.Variant.Ursu.588815.10992.exe cmd.exe PID 1640 wrote to memory of 1172 1640 SecuriteInfo.com.Variant.Ursu.588815.10992.exe cmd.exe PID 1640 wrote to memory of 1172 1640 SecuriteInfo.com.Variant.Ursu.588815.10992.exe cmd.exe PID 1640 wrote to memory of 1172 1640 SecuriteInfo.com.Variant.Ursu.588815.10992.exe cmd.exe PID 1640 wrote to memory of 1172 1640 SecuriteInfo.com.Variant.Ursu.588815.10992.exe cmd.exe PID 1720 wrote to memory of 1624 1720 cmd.exe schtasks.exe PID 1720 wrote to memory of 1624 1720 cmd.exe schtasks.exe PID 1720 wrote to memory of 1624 1720 cmd.exe schtasks.exe PID 1720 wrote to memory of 1624 1720 cmd.exe schtasks.exe PID 1740 wrote to memory of 1948 1740 taskeng.exe chromer.exe PID 1740 wrote to memory of 1948 1740 taskeng.exe chromer.exe PID 1740 wrote to memory of 1948 1740 taskeng.exe chromer.exe PID 1740 wrote to memory of 1948 1740 taskeng.exe chromer.exe PID 1948 wrote to memory of 1644 1948 chromer.exe vbc.exe PID 1948 wrote to memory of 1644 1948 chromer.exe vbc.exe PID 1948 wrote to memory of 1644 1948 chromer.exe vbc.exe PID 1948 wrote to memory of 1644 1948 chromer.exe vbc.exe PID 1948 wrote to memory of 1644 1948 chromer.exe vbc.exe PID 1948 wrote to memory of 1644 1948 chromer.exe vbc.exe PID 1948 wrote to memory of 1644 1948 chromer.exe vbc.exe PID 1948 wrote to memory of 1644 1948 chromer.exe vbc.exe PID 1948 wrote to memory of 1644 1948 chromer.exe vbc.exe PID 1948 wrote to memory of 1876 1948 chromer.exe cmd.exe PID 1948 wrote to memory of 1876 1948 chromer.exe cmd.exe PID 1948 wrote to memory of 1876 1948 chromer.exe cmd.exe PID 1948 wrote to memory of 1876 1948 chromer.exe cmd.exe PID 1948 wrote to memory of 1048 1948 chromer.exe cmd.exe PID 1948 wrote to memory of 1048 1948 chromer.exe cmd.exe PID 1948 wrote to memory of 1048 1948 chromer.exe cmd.exe PID 1948 wrote to memory of 1048 1948 chromer.exe cmd.exe PID 1948 wrote to memory of 564 1948 chromer.exe cmd.exe PID 1948 wrote to memory of 564 1948 chromer.exe cmd.exe PID 1948 wrote to memory of 564 1948 chromer.exe cmd.exe PID 1948 wrote to memory of 564 1948 chromer.exe cmd.exe PID 1048 wrote to memory of 580 1048 cmd.exe schtasks.exe PID 1048 wrote to memory of 580 1048 cmd.exe schtasks.exe PID 1048 wrote to memory of 580 1048 cmd.exe schtasks.exe PID 1048 wrote to memory of 580 1048 cmd.exe schtasks.exe PID 1740 wrote to memory of 1640 1740 taskeng.exe chromer.exe PID 1740 wrote to memory of 1640 1740 taskeng.exe chromer.exe PID 1740 wrote to memory of 1640 1740 taskeng.exe chromer.exe PID 1740 wrote to memory of 1640 1740 taskeng.exe chromer.exe PID 1640 wrote to memory of 468 1640 chromer.exe vbc.exe PID 1640 wrote to memory of 468 1640 chromer.exe vbc.exe PID 1640 wrote to memory of 468 1640 chromer.exe vbc.exe PID 1640 wrote to memory of 468 1640 chromer.exe vbc.exe PID 1640 wrote to memory of 468 1640 chromer.exe vbc.exe PID 1640 wrote to memory of 468 1640 chromer.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Ursu.588815.10992.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Ursu.588815.10992.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\chromer"2⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\chromer\chromer.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\chromer\chromer.exe'" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Ursu.588815.10992.exe" "C:\Users\Admin\AppData\Roaming\chromer\chromer.exe"2⤵
-
C:\Windows\system32\taskeng.exetaskeng.exe {09FFDBC1-6920-45F9-916F-9F9236F3FE42} S-1-5-21-790309383-526510583-3802439154-1000:TVHJCWMH\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\chromer\chromer.exeC:\Users\Admin\AppData\Roaming\chromer\chromer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\chromer"3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\chromer\chromer.exe'" /f3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\chromer\chromer.exe'" /f4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\chromer\chromer.exe" "C:\Users\Admin\AppData\Roaming\chromer\chromer.exe"3⤵
-
C:\Users\Admin\AppData\Roaming\chromer\chromer.exeC:\Users\Admin\AppData\Roaming\chromer\chromer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\chromer"3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\chromer\chromer.exe'" /f3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\chromer\chromer.exe'" /f4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\chromer\chromer.exe" "C:\Users\Admin\AppData\Roaming\chromer\chromer.exe"3⤵
-
C:\Users\Admin\AppData\Roaming\chromer\chromer.exeC:\Users\Admin\AppData\Roaming\chromer\chromer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\chromer"3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\chromer\chromer.exe'" /f3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\chromer\chromer.exe'" /f4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\chromer\chromer.exe" "C:\Users\Admin\AppData\Roaming\chromer\chromer.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\chromer\chromer.exeFilesize
525KB
MD515f43d61bee241657b1ad10d6aa11e57
SHA183e96ecb233bd270b4f002c55aa28e92306650ef
SHA256538e65ae9a73e15bd98c8fd0b5ecce5aaecdeb5e36a12a416a56a78c3cfbb3c8
SHA5120e8a516e1439ec1a871d2afba0140a38f2ac8f4f13ad2283d334edf01537aa147023abf81957118b347c7634a05651fb26177e634ba8882d79c35754cfac9e5a
-
C:\Users\Admin\AppData\Roaming\chromer\chromer.exeFilesize
525KB
MD515f43d61bee241657b1ad10d6aa11e57
SHA183e96ecb233bd270b4f002c55aa28e92306650ef
SHA256538e65ae9a73e15bd98c8fd0b5ecce5aaecdeb5e36a12a416a56a78c3cfbb3c8
SHA5120e8a516e1439ec1a871d2afba0140a38f2ac8f4f13ad2283d334edf01537aa147023abf81957118b347c7634a05651fb26177e634ba8882d79c35754cfac9e5a
-
C:\Users\Admin\AppData\Roaming\chromer\chromer.exeFilesize
525KB
MD515f43d61bee241657b1ad10d6aa11e57
SHA183e96ecb233bd270b4f002c55aa28e92306650ef
SHA256538e65ae9a73e15bd98c8fd0b5ecce5aaecdeb5e36a12a416a56a78c3cfbb3c8
SHA5120e8a516e1439ec1a871d2afba0140a38f2ac8f4f13ad2283d334edf01537aa147023abf81957118b347c7634a05651fb26177e634ba8882d79c35754cfac9e5a
-
C:\Users\Admin\AppData\Roaming\chromer\chromer.exeFilesize
525KB
MD515f43d61bee241657b1ad10d6aa11e57
SHA183e96ecb233bd270b4f002c55aa28e92306650ef
SHA256538e65ae9a73e15bd98c8fd0b5ecce5aaecdeb5e36a12a416a56a78c3cfbb3c8
SHA5120e8a516e1439ec1a871d2afba0140a38f2ac8f4f13ad2283d334edf01537aa147023abf81957118b347c7634a05651fb26177e634ba8882d79c35754cfac9e5a
-
memory/268-136-0x0000000000000000-mapping.dmp
-
memory/280-61-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/280-60-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/280-62-0x000000000041933E-mapping.dmp
-
memory/280-64-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/280-66-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/280-59-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/280-57-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/280-56-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/380-126-0x0000000000080000-0x000000000009E000-memory.dmpFilesize
120KB
-
memory/380-122-0x000000000041933E-mapping.dmp
-
memory/380-130-0x0000000000080000-0x000000000009E000-memory.dmpFilesize
120KB
-
memory/380-133-0x0000000000080000-0x000000000009E000-memory.dmpFilesize
120KB
-
memory/468-102-0x000000000041933E-mapping.dmp
-
memory/468-107-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/468-105-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/564-85-0x0000000000000000-mapping.dmp
-
memory/576-108-0x0000000000000000-mapping.dmp
-
memory/580-90-0x0000000000000000-mapping.dmp
-
memory/836-124-0x0000000000000000-mapping.dmp
-
memory/1000-109-0x0000000000000000-mapping.dmp
-
memory/1044-111-0x0000000000000000-mapping.dmp
-
memory/1048-84-0x0000000000000000-mapping.dmp
-
memory/1172-69-0x0000000000000000-mapping.dmp
-
memory/1532-123-0x0000000000000000-mapping.dmp
-
memory/1624-70-0x0000000000000000-mapping.dmp
-
memory/1640-55-0x0000000076241000-0x0000000076243000-memory.dmpFilesize
8KB
-
memory/1640-92-0x0000000000000000-mapping.dmp
-
memory/1640-54-0x0000000000EC0000-0x0000000000F4A000-memory.dmpFilesize
552KB
-
memory/1640-94-0x00000000012B0000-0x000000000133A000-memory.dmpFilesize
552KB
-
memory/1644-82-0x000000000041933E-mapping.dmp
-
memory/1684-103-0x0000000000000000-mapping.dmp
-
memory/1720-68-0x0000000000000000-mapping.dmp
-
memory/1760-114-0x00000000012B0000-0x000000000133A000-memory.dmpFilesize
552KB
-
memory/1760-112-0x0000000000000000-mapping.dmp
-
memory/1868-134-0x0000000000000000-mapping.dmp
-
memory/1876-83-0x0000000000000000-mapping.dmp
-
memory/1880-67-0x0000000000000000-mapping.dmp
-
memory/1948-73-0x0000000000000000-mapping.dmp