Analysis
-
max time kernel
55s -
max time network
143s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
06-07-2022 13:48
Static task
static1
Behavioral task
behavioral1
Sample
3a3c096118818ef28420da1a07e93fd8664528d7d2d217334b8fb4fbb5f8ffa5.exe
Resource
win10-20220414-en
General
-
Target
3a3c096118818ef28420da1a07e93fd8664528d7d2d217334b8fb4fbb5f8ffa5.exe
-
Size
2.4MB
-
MD5
e4f8eb7e01eb50044323a07cbe4314fa
-
SHA1
5f81b0be101ff7d8e5eecfe6f1c33a963fcf4930
-
SHA256
3a3c096118818ef28420da1a07e93fd8664528d7d2d217334b8fb4fbb5f8ffa5
-
SHA512
e96d0574f614c9d10c06e5229b9795fe76dbf0d568876742b053e924bd240ec3c93695bbcffba7a81cc123af9ae7c5bd3f6b21aec0af983a46d6149f9464e6ce
Malware Config
Extracted
redline
141.95.140.173:33470
-
auth_value
6d9508e5573e656e0dc3c4c5f8526d8e
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
crypton.exeupdator.exepid process 215080 crypton.exe 2160 updator.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\updator.exe upx behavioral1/memory/2160-363-0x0000000001090000-0x00000000010C9000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\updator.exe upx behavioral1/memory/2160-701-0x0000000001090000-0x00000000010C9000-memory.dmp upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
updator.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3578829114-180201921-3281645608-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce updator.exe Set value (str) \REGISTRY\USER\S-1-5-21-3578829114-180201921-3281645608-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\CompPkgSrv = "C:\\Users\\Admin\\AppData\\Roaming\\winlogon.exe" updator.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 4 IoCs
Processes:
3a3c096118818ef28420da1a07e93fd8664528d7d2d217334b8fb4fbb5f8ffa5.exeAppLaunch.execrypton.exedescription pid process target process PID 2096 set thread context of 215060 2096 3a3c096118818ef28420da1a07e93fd8664528d7d2d217334b8fb4fbb5f8ffa5.exe AppLaunch.exe PID 215060 set thread context of 215120 215060 AppLaunch.exe AppLaunch.exe PID 215060 set thread context of 215136 215060 AppLaunch.exe AppLaunch.exe PID 215080 set thread context of 215448 215080 crypton.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 215560 2160 WerFault.exe updator.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 215120 AppLaunch.exe 215120 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
AppLaunch.exeAppLaunch.exedescription pid process Token: SeDebugPrivilege 215136 AppLaunch.exe Token: SeDebugPrivilege 215120 AppLaunch.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
3a3c096118818ef28420da1a07e93fd8664528d7d2d217334b8fb4fbb5f8ffa5.exeAppLaunch.exeAppLaunch.execrypton.exedescription pid process target process PID 2096 wrote to memory of 215060 2096 3a3c096118818ef28420da1a07e93fd8664528d7d2d217334b8fb4fbb5f8ffa5.exe AppLaunch.exe PID 2096 wrote to memory of 215060 2096 3a3c096118818ef28420da1a07e93fd8664528d7d2d217334b8fb4fbb5f8ffa5.exe AppLaunch.exe PID 2096 wrote to memory of 215060 2096 3a3c096118818ef28420da1a07e93fd8664528d7d2d217334b8fb4fbb5f8ffa5.exe AppLaunch.exe PID 2096 wrote to memory of 215060 2096 3a3c096118818ef28420da1a07e93fd8664528d7d2d217334b8fb4fbb5f8ffa5.exe AppLaunch.exe PID 2096 wrote to memory of 215060 2096 3a3c096118818ef28420da1a07e93fd8664528d7d2d217334b8fb4fbb5f8ffa5.exe AppLaunch.exe PID 215060 wrote to memory of 215120 215060 AppLaunch.exe AppLaunch.exe PID 215060 wrote to memory of 215120 215060 AppLaunch.exe AppLaunch.exe PID 215060 wrote to memory of 215120 215060 AppLaunch.exe AppLaunch.exe PID 215060 wrote to memory of 215120 215060 AppLaunch.exe AppLaunch.exe PID 215060 wrote to memory of 215120 215060 AppLaunch.exe AppLaunch.exe PID 215060 wrote to memory of 215120 215060 AppLaunch.exe AppLaunch.exe PID 215060 wrote to memory of 215120 215060 AppLaunch.exe AppLaunch.exe PID 215060 wrote to memory of 215120 215060 AppLaunch.exe AppLaunch.exe PID 215060 wrote to memory of 215136 215060 AppLaunch.exe AppLaunch.exe PID 215060 wrote to memory of 215136 215060 AppLaunch.exe AppLaunch.exe PID 215060 wrote to memory of 215136 215060 AppLaunch.exe AppLaunch.exe PID 215060 wrote to memory of 215136 215060 AppLaunch.exe AppLaunch.exe PID 215060 wrote to memory of 215136 215060 AppLaunch.exe AppLaunch.exe PID 215060 wrote to memory of 215136 215060 AppLaunch.exe AppLaunch.exe PID 215060 wrote to memory of 215136 215060 AppLaunch.exe AppLaunch.exe PID 215060 wrote to memory of 215136 215060 AppLaunch.exe AppLaunch.exe PID 215136 wrote to memory of 215080 215136 AppLaunch.exe crypton.exe PID 215136 wrote to memory of 215080 215136 AppLaunch.exe crypton.exe PID 215136 wrote to memory of 215080 215136 AppLaunch.exe crypton.exe PID 215136 wrote to memory of 2160 215136 AppLaunch.exe updator.exe PID 215136 wrote to memory of 2160 215136 AppLaunch.exe updator.exe PID 215136 wrote to memory of 2160 215136 AppLaunch.exe updator.exe PID 215080 wrote to memory of 215448 215080 crypton.exe AppLaunch.exe PID 215080 wrote to memory of 215448 215080 crypton.exe AppLaunch.exe PID 215080 wrote to memory of 215448 215080 crypton.exe AppLaunch.exe PID 215080 wrote to memory of 215448 215080 crypton.exe AppLaunch.exe PID 215080 wrote to memory of 215448 215080 crypton.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a3c096118818ef28420da1a07e93fd8664528d7d2d217334b8fb4fbb5f8ffa5.exe"C:\Users\Admin\AppData\Local\Temp\3a3c096118818ef28420da1a07e93fd8664528d7d2d217334b8fb4fbb5f8ffa5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\crypton.exe"C:\Users\Admin\AppData\Local\Temp\crypton.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
-
C:\Users\Admin\AppData\Local\Temp\updator.exe"C:\Users\Admin\AppData\Local\Temp\updator.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2160 -s 5765⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.logFilesize
847B
MD5808e884c00533a9eb0e13e64960d9c3a
SHA1279d05181fc6179a12df1a669ff5d8b64c1380ae
SHA2562f6a0aab99b1c228a6642f44f8992646ce84c5a2b3b9941b6cf1f2badf67bdd6
SHA5129489bdb2ffdfeef3c52edcfe9b34c6688eba53eb86075e0564df1cd474723c86b5b5aedc12df1ff5fc12cf97bd1e3cf9701ff61dc4ce90155d70e9ccfd0fc299
-
C:\Users\Admin\AppData\Local\Temp\crypton.exeFilesize
3.3MB
MD54fddb0fb46c2d951db20eca9a3b1c296
SHA122b17e95712be0586272e742acb183d3a28d2e05
SHA2568350c0a227f79ef1a94da8e8bf95a4bc7cd3b590d0dcf78cc6da7236a5cdd1c5
SHA512ce471181a1dfd9195c2afc49b844ca5b8e809bae64d1715cf85d2f5e1050b6838cc0274d053bc27b9fd30e4ee9558a2aa1297b322d07f41ee1c5d6475020a168
-
C:\Users\Admin\AppData\Local\Temp\crypton.exeFilesize
3.3MB
MD54fddb0fb46c2d951db20eca9a3b1c296
SHA122b17e95712be0586272e742acb183d3a28d2e05
SHA2568350c0a227f79ef1a94da8e8bf95a4bc7cd3b590d0dcf78cc6da7236a5cdd1c5
SHA512ce471181a1dfd9195c2afc49b844ca5b8e809bae64d1715cf85d2f5e1050b6838cc0274d053bc27b9fd30e4ee9558a2aa1297b322d07f41ee1c5d6475020a168
-
C:\Users\Admin\AppData\Local\Temp\updator.exeFilesize
96KB
MD5d217c2a5f59c25ae90f29a54d13b21f2
SHA1cda28aca60ae2aafb132b7e66b9de310a22604ee
SHA2565f5ddb7f5934fc851903768ea0911a87b6278e0927169974f8442db9b0d1ca9a
SHA51294c9e81934b9b2f3c98e267bcdd288d5fd81a1b2d155d1496fc5e9a8cff7e4c44871eb01963af653b62b605df89b7a0e6a3d71360c95cd1c60455a6819c5b352
-
C:\Users\Admin\AppData\Local\Temp\updator.exeFilesize
96KB
MD5d217c2a5f59c25ae90f29a54d13b21f2
SHA1cda28aca60ae2aafb132b7e66b9de310a22604ee
SHA2565f5ddb7f5934fc851903768ea0911a87b6278e0927169974f8442db9b0d1ca9a
SHA51294c9e81934b9b2f3c98e267bcdd288d5fd81a1b2d155d1496fc5e9a8cff7e4c44871eb01963af653b62b605df89b7a0e6a3d71360c95cd1c60455a6819c5b352
-
memory/2096-120-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/2096-122-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/2096-123-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/2096-121-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/2096-119-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/2096-134-0x0000000000400000-0x0000000000555000-memory.dmpFilesize
1.3MB
-
memory/2096-118-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/2096-117-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/2096-116-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/2160-350-0x0000000000000000-mapping.dmp
-
memory/2160-701-0x0000000001090000-0x00000000010C9000-memory.dmpFilesize
228KB
-
memory/2160-363-0x0000000001090000-0x00000000010C9000-memory.dmpFilesize
228KB
-
memory/215060-133-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215060-136-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/215060-124-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/215060-130-0x00000000004011D4-mapping.dmp
-
memory/215060-132-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215060-131-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215060-135-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215080-330-0x0000000000000000-mapping.dmp
-
memory/215120-172-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215120-310-0x0000000009D20000-0x0000000009D86000-memory.dmpFilesize
408KB
-
memory/215120-141-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215120-390-0x000000000B480000-0x000000000B4D0000-memory.dmpFilesize
320KB
-
memory/215120-147-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215120-153-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215120-428-0x000000000B4D0000-0x000000000B692000-memory.dmpFilesize
1.8MB
-
memory/215120-157-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215120-158-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215120-429-0x000000000BBD0000-0x000000000C0FC000-memory.dmpFilesize
5.2MB
-
memory/215120-161-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215120-187-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215120-165-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215120-167-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215120-169-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215120-139-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215120-143-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215120-137-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/215120-138-0x000000000041789E-mapping.dmp
-
memory/215120-145-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215120-302-0x0000000009340000-0x000000000935E000-memory.dmpFilesize
120KB
-
memory/215120-294-0x00000000092A0000-0x0000000009332000-memory.dmpFilesize
584KB
-
memory/215120-293-0x0000000009130000-0x00000000091A6000-memory.dmpFilesize
472KB
-
memory/215120-163-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215120-151-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215120-176-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215120-290-0x0000000009F20000-0x000000000A41E000-memory.dmpFilesize
5.0MB
-
memory/215120-177-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215120-179-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215120-266-0x0000000008E80000-0x0000000008ECB000-memory.dmpFilesize
300KB
-
memory/215120-181-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215120-250-0x0000000008E40000-0x0000000008E7E000-memory.dmpFilesize
248KB
-
memory/215120-244-0x0000000008F10000-0x000000000901A000-memory.dmpFilesize
1.0MB
-
memory/215120-242-0x0000000000AE0000-0x0000000000AF2000-memory.dmpFilesize
72KB
-
memory/215120-186-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215120-184-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215120-241-0x0000000009410000-0x0000000009A16000-memory.dmpFilesize
6.0MB
-
memory/215136-142-0x0000000000402CCE-mapping.dmp
-
memory/215136-171-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215136-185-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215136-183-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215136-182-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215136-180-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215136-175-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215136-164-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215136-166-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215136-168-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215136-170-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215136-178-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215136-174-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215136-173-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215136-162-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215136-159-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215136-156-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215136-152-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215136-149-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215136-140-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/215136-148-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215136-146-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215136-144-0x00000000776A0000-0x000000007782E000-memory.dmpFilesize
1.6MB
-
memory/215448-410-0x0000000000429223-mapping.dmp