Analysis

  • max time kernel
    152s
  • max time network
    181s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2022 20:44

General

  • Target

    rovwer.exe

  • Size

    38.4MB

  • MD5

    7f6bde7964c323190a8e5a54ddfe1646

  • SHA1

    358f7bb03e0d743bf7a900276017c1aa7debcea5

  • SHA256

    e1376d29bc25574d0779428815cb7c4dd52d04d7e55005d2b031f66eaaa12c84

  • SHA512

    2e91e71cdef9e78d1c43cff06fa0120b1dfb61ec0a9e17fb9202fb1072738757aabcf05b5169425d06888f04b3a78dcca84d8fd0400a844e3bc47234261a00fb

  • SSDEEP

    12288:UkxChSElpRh/Alk2ReyATGdBoSNgFKTkjmhFPry83I3LBemU41REa:UkxChSEfQk6eOozFKXFPL3I3LBvUWRL

Malware Config

Extracted

Family

redline

Botnet

Crypt_Cryptex

C2

194.36.177.60:81

Attributes
  • auth_value

    695fd213fb1982a368936f037db38e54

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 6 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 3 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\rovwer.exe
    "C:\Users\Admin\AppData\Local\Temp\rovwer.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:940
    • C:\Users\Admin\AppData\Local\Temp\4c8d97a9c8\rovwer.exe
      "C:\Users\Admin\AppData\Local\Temp\4c8d97a9c8\rovwer.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:520
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\4c8d97a9c8\rovwer.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:1048
      • C:\Users\Admin\AppData\Local\Temp\4c8d97a9c8\rovwer.exe
        "C:\Users\Admin\AppData\Local\Temp\4c8d97a9c8\rovwer.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:556
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=rovwer.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1084
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1084 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1700
      • C:\Users\Admin\1000008002\vvv.exe
        "C:\Users\Admin\1000008002\vvv.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:816
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1652
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {6D8C8DEC-74F9-4C86-93F0-FE8975CF945E} S-1-5-21-3845472200-3839195424-595303356-1000:ZERMMMDR\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1104
    • C:\Users\Admin\AppData\Local\Temp\4c8d97a9c8\rovwer.exe
      C:\Users\Admin\AppData\Local\Temp\4c8d97a9c8\rovwer.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:1020
    • C:\Users\Admin\AppData\Local\Temp\4c8d97a9c8\rovwer.exe
      C:\Users\Admin\AppData\Local\Temp\4c8d97a9c8\rovwer.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:1476

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\1000008002\vvv.exe

    Filesize

    241KB

    MD5

    aca124c45a891c1ef397d8f417321b18

    SHA1

    df65ba744946b458692d3b9e8a7c751f5ce4905d

    SHA256

    f8d62ab41ce1346a6b65b18bab3b87d35143ccdcf680628738c22817987efd70

    SHA512

    979ddbe803c338022650aec8c1c9f90dbb0285e1c1cafcd0c2061bbb4e9ea73b01ecae8ee24da109d943d8a935a26281b595d5aa08e8b47133b12f1094f458d8

  • C:\Users\Admin\1000008002\vvv.exe

    Filesize

    241KB

    MD5

    aca124c45a891c1ef397d8f417321b18

    SHA1

    df65ba744946b458692d3b9e8a7c751f5ce4905d

    SHA256

    f8d62ab41ce1346a6b65b18bab3b87d35143ccdcf680628738c22817987efd70

    SHA512

    979ddbe803c338022650aec8c1c9f90dbb0285e1c1cafcd0c2061bbb4e9ea73b01ecae8ee24da109d943d8a935a26281b595d5aa08e8b47133b12f1094f458d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    60KB

    MD5

    6c6a24456559f305308cb1fb6c5486b3

    SHA1

    3273ac27d78572f16c3316732b9756ebc22cb6ed

    SHA256

    efc3c579bd619ceab040c4b8c1b821b2d82c64fddd9e80a00ec0d7f6577ed973

    SHA512

    587d4a9175a6aa82cd8bb1c11ca6508f95cd218f76ac322ddbd1bc7146a0e25f8937ee426a6fb0fb0bb045cedb24d8c8a9edfe9f654112f293d8701220f726b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    2fcff022dbdcc03557c7a632c2f8a244

    SHA1

    448190ab4d9271d0943d3ddf5141ac5f3d60aa25

    SHA256

    52ac3ee14c2b40e461770c248baafffa5c05cf38a010213208bbd6baaca633c1

    SHA512

    79ec10b901d1445f41c93b9b97f4a890a2fe7bf72d8d9f5e5bc9dae0aeac9f42841bfcbc5d82fcc50b26078f971e794f28ebf6cdef73557b0a0464a054a1eadc

  • C:\Users\Admin\AppData\Local\Temp\4c8d97a9c8\rovwer.exe

    Filesize

    38.4MB

    MD5

    7f6bde7964c323190a8e5a54ddfe1646

    SHA1

    358f7bb03e0d743bf7a900276017c1aa7debcea5

    SHA256

    e1376d29bc25574d0779428815cb7c4dd52d04d7e55005d2b031f66eaaa12c84

    SHA512

    2e91e71cdef9e78d1c43cff06fa0120b1dfb61ec0a9e17fb9202fb1072738757aabcf05b5169425d06888f04b3a78dcca84d8fd0400a844e3bc47234261a00fb

  • C:\Users\Admin\AppData\Local\Temp\4c8d97a9c8\rovwer.exe

    Filesize

    38.4MB

    MD5

    7f6bde7964c323190a8e5a54ddfe1646

    SHA1

    358f7bb03e0d743bf7a900276017c1aa7debcea5

    SHA256

    e1376d29bc25574d0779428815cb7c4dd52d04d7e55005d2b031f66eaaa12c84

    SHA512

    2e91e71cdef9e78d1c43cff06fa0120b1dfb61ec0a9e17fb9202fb1072738757aabcf05b5169425d06888f04b3a78dcca84d8fd0400a844e3bc47234261a00fb

  • C:\Users\Admin\AppData\Local\Temp\4c8d97a9c8\rovwer.exe

    Filesize

    38.4MB

    MD5

    7f6bde7964c323190a8e5a54ddfe1646

    SHA1

    358f7bb03e0d743bf7a900276017c1aa7debcea5

    SHA256

    e1376d29bc25574d0779428815cb7c4dd52d04d7e55005d2b031f66eaaa12c84

    SHA512

    2e91e71cdef9e78d1c43cff06fa0120b1dfb61ec0a9e17fb9202fb1072738757aabcf05b5169425d06888f04b3a78dcca84d8fd0400a844e3bc47234261a00fb

  • C:\Users\Admin\AppData\Local\Temp\4c8d97a9c8\rovwer.exe

    Filesize

    38.4MB

    MD5

    7f6bde7964c323190a8e5a54ddfe1646

    SHA1

    358f7bb03e0d743bf7a900276017c1aa7debcea5

    SHA256

    e1376d29bc25574d0779428815cb7c4dd52d04d7e55005d2b031f66eaaa12c84

    SHA512

    2e91e71cdef9e78d1c43cff06fa0120b1dfb61ec0a9e17fb9202fb1072738757aabcf05b5169425d06888f04b3a78dcca84d8fd0400a844e3bc47234261a00fb

  • C:\Users\Admin\AppData\Local\Temp\4c8d97a9c8\rovwer.exe

    Filesize

    38.4MB

    MD5

    7f6bde7964c323190a8e5a54ddfe1646

    SHA1

    358f7bb03e0d743bf7a900276017c1aa7debcea5

    SHA256

    e1376d29bc25574d0779428815cb7c4dd52d04d7e55005d2b031f66eaaa12c84

    SHA512

    2e91e71cdef9e78d1c43cff06fa0120b1dfb61ec0a9e17fb9202fb1072738757aabcf05b5169425d06888f04b3a78dcca84d8fd0400a844e3bc47234261a00fb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\QFWR5VZY.txt

    Filesize

    608B

    MD5

    1ae31ad0f3d6244561f5f7b47c0a84de

    SHA1

    bc4390b7393c443faf66273cf262a00f45f35649

    SHA256

    8e610378cf5a08f0c7b190aad56beb87c09f8772482ebd7b88f4a69ce6affc33

    SHA512

    1ab19205fce798d7b2df0ed05c34f0d8dc2955bd8a7eec9b84bf15559f99a7db3b57d23957a569a81fbf78dac66baf1769f480c69a4d78d7b991d569e1bc8454

  • \Users\Admin\1000008002\vvv.exe

    Filesize

    241KB

    MD5

    aca124c45a891c1ef397d8f417321b18

    SHA1

    df65ba744946b458692d3b9e8a7c751f5ce4905d

    SHA256

    f8d62ab41ce1346a6b65b18bab3b87d35143ccdcf680628738c22817987efd70

    SHA512

    979ddbe803c338022650aec8c1c9f90dbb0285e1c1cafcd0c2061bbb4e9ea73b01ecae8ee24da109d943d8a935a26281b595d5aa08e8b47133b12f1094f458d8

  • \Users\Admin\AppData\Local\Temp\4c8d97a9c8\rovwer.exe

    Filesize

    38.4MB

    MD5

    7f6bde7964c323190a8e5a54ddfe1646

    SHA1

    358f7bb03e0d743bf7a900276017c1aa7debcea5

    SHA256

    e1376d29bc25574d0779428815cb7c4dd52d04d7e55005d2b031f66eaaa12c84

    SHA512

    2e91e71cdef9e78d1c43cff06fa0120b1dfb61ec0a9e17fb9202fb1072738757aabcf05b5169425d06888f04b3a78dcca84d8fd0400a844e3bc47234261a00fb

  • \Users\Admin\AppData\Local\Temp\4c8d97a9c8\rovwer.exe

    Filesize

    38.4MB

    MD5

    7f6bde7964c323190a8e5a54ddfe1646

    SHA1

    358f7bb03e0d743bf7a900276017c1aa7debcea5

    SHA256

    e1376d29bc25574d0779428815cb7c4dd52d04d7e55005d2b031f66eaaa12c84

    SHA512

    2e91e71cdef9e78d1c43cff06fa0120b1dfb61ec0a9e17fb9202fb1072738757aabcf05b5169425d06888f04b3a78dcca84d8fd0400a844e3bc47234261a00fb

  • memory/520-73-0x0000000001390000-0x0000000001467000-memory.dmp

    Filesize

    860KB

  • memory/520-84-0x0000000000800000-0x0000000000846000-memory.dmp

    Filesize

    280KB

  • memory/520-70-0x0000000000800000-0x0000000000846000-memory.dmp

    Filesize

    280KB

  • memory/520-75-0x0000000001390000-0x0000000001467000-memory.dmp

    Filesize

    860KB

  • memory/520-74-0x0000000001390000-0x0000000001467000-memory.dmp

    Filesize

    860KB

  • memory/520-109-0x0000000007570000-0x0000000007647000-memory.dmp

    Filesize

    860KB

  • memory/520-78-0x0000000075FB0000-0x0000000075FE5000-memory.dmp

    Filesize

    212KB

  • memory/520-77-0x0000000075B90000-0x0000000075BD7000-memory.dmp

    Filesize

    284KB

  • memory/520-83-0x0000000075B90000-0x0000000075BD7000-memory.dmp

    Filesize

    284KB

  • memory/520-82-0x0000000001390000-0x0000000001467000-memory.dmp

    Filesize

    860KB

  • memory/520-71-0x0000000076E70000-0x0000000076F1C000-memory.dmp

    Filesize

    688KB

  • memory/520-86-0x0000000075390000-0x00000000754EC000-memory.dmp

    Filesize

    1.4MB

  • memory/520-87-0x00000000751F0000-0x0000000075247000-memory.dmp

    Filesize

    348KB

  • memory/520-88-0x0000000074D10000-0x0000000074D54000-memory.dmp

    Filesize

    272KB

  • memory/520-89-0x0000000075160000-0x00000000751EF000-memory.dmp

    Filesize

    572KB

  • memory/520-112-0x0000000007570000-0x0000000007647000-memory.dmp

    Filesize

    860KB

  • memory/520-67-0x0000000001390000-0x0000000001467000-memory.dmp

    Filesize

    860KB

  • memory/520-68-0x0000000001390000-0x0000000001467000-memory.dmp

    Filesize

    860KB

  • memory/520-104-0x0000000074BE0000-0x0000000074CD5000-memory.dmp

    Filesize

    980KB

  • memory/520-66-0x0000000001390000-0x0000000001467000-memory.dmp

    Filesize

    860KB

  • memory/556-91-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/556-92-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/556-103-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/556-101-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/556-94-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/556-97-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/556-110-0x0000000001390000-0x0000000001467000-memory.dmp

    Filesize

    860KB

  • memory/556-96-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/816-113-0x0000000000320000-0x0000000000362000-memory.dmp

    Filesize

    264KB

  • memory/940-65-0x00000000002B0000-0x00000000002F6000-memory.dmp

    Filesize

    280KB

  • memory/940-55-0x0000000000050000-0x0000000000127000-memory.dmp

    Filesize

    860KB

  • memory/940-63-0x0000000000050000-0x0000000000127000-memory.dmp

    Filesize

    860KB

  • memory/940-57-0x0000000076121000-0x0000000076123000-memory.dmp

    Filesize

    8KB

  • memory/940-56-0x0000000000050000-0x0000000000127000-memory.dmp

    Filesize

    860KB

  • memory/940-54-0x0000000000050000-0x0000000000127000-memory.dmp

    Filesize

    860KB

  • memory/940-58-0x0000000076E70000-0x0000000076F1C000-memory.dmp

    Filesize

    688KB

  • memory/1020-129-0x0000000001390000-0x0000000001467000-memory.dmp

    Filesize

    860KB

  • memory/1020-134-0x0000000001390000-0x0000000001467000-memory.dmp

    Filesize

    860KB

  • memory/1020-135-0x0000000000090000-0x00000000000D6000-memory.dmp

    Filesize

    280KB

  • memory/1020-132-0x0000000076E70000-0x0000000076F1C000-memory.dmp

    Filesize

    688KB

  • memory/1020-130-0x0000000001390000-0x0000000001467000-memory.dmp

    Filesize

    860KB

  • memory/1020-128-0x0000000001390000-0x0000000001467000-memory.dmp

    Filesize

    860KB

  • memory/1476-148-0x00000000002A0000-0x00000000002E6000-memory.dmp

    Filesize

    280KB

  • memory/1476-147-0x0000000001390000-0x0000000001467000-memory.dmp

    Filesize

    860KB

  • memory/1476-145-0x0000000076E70000-0x0000000076F1C000-memory.dmp

    Filesize

    688KB

  • memory/1476-143-0x0000000001390000-0x0000000001467000-memory.dmp

    Filesize

    860KB

  • memory/1476-142-0x0000000001390000-0x0000000001467000-memory.dmp

    Filesize

    860KB

  • memory/1476-141-0x0000000001390000-0x0000000001467000-memory.dmp

    Filesize

    860KB

  • memory/1652-124-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1652-114-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1652-115-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1652-118-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1652-117-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1652-119-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1652-122-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB