Analysis
-
max time kernel
102s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
28/10/2022, 17:45
Static task
static1
Behavioral task
behavioral1
Sample
b0b4664013262a48fa9543ed9c651c34c9a7233678882f16d86e779c0a9a39ca.exe
Resource
win10-20220812-en
General
-
Target
b0b4664013262a48fa9543ed9c651c34c9a7233678882f16d86e779c0a9a39ca.exe
-
Size
293KB
-
MD5
3776556daf53e7da67e1f0714c292ba0
-
SHA1
04b54e2e1bb59cfe0736c03dfe2e8437d99ee5fd
-
SHA256
b0b4664013262a48fa9543ed9c651c34c9a7233678882f16d86e779c0a9a39ca
-
SHA512
56f011965d2b1fd60d4661abb5cac96fe359db4812071910cb4b842a778052829914ab8006f7056410e500602ce6c9af700d9708f4b3278f36313dcc885ec2ec
-
SSDEEP
6144:UkdPVCFLSWomUIADz7Nl7lwUndTEvKbIT8:UkdPcFWWowqN9l5dTe8
Malware Config
Extracted
redline
bethoven
185.215.113.46:8223
-
auth_value
42d21fccbcd8cb0441971e6ed0b0897a
Signatures
-
Detect Amadey credential stealer module 3 IoCs
resource yara_rule behavioral1/files/0x000800000001ac35-526.dat amadey_cred_module behavioral1/files/0x000800000001ac35-528.dat amadey_cred_module behavioral1/files/0x000800000001ac35-527.dat amadey_cred_module -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/3476-576-0x0000000000422136-mapping.dmp family_redline behavioral1/memory/3476-611-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
Blocklisted process makes network request 1 IoCs
flow pid Process 16 2512 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
pid Process 3812 rovwer.exe 4012 becomeproblem.exe 2744 SETUP_~1.EXE 4544 rovwer.exe 3476 SETUP_~1.EXE 2276 rovwer.exe -
Loads dropped DLL 2 IoCs
pid Process 2512 rundll32.exe 2512 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce becomeproblem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" becomeproblem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\becomeproblem.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000183001\\becomeproblem.exe" rovwer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2744 set thread context of 3476 2744 SETUP_~1.EXE 75 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1264 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 4552 powershell.exe 4552 powershell.exe 4552 powershell.exe 2512 rundll32.exe 2512 rundll32.exe 2512 rundll32.exe 2512 rundll32.exe 3476 SETUP_~1.EXE 3476 SETUP_~1.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2744 SETUP_~1.EXE Token: SeDebugPrivilege 4552 powershell.exe Token: SeDebugPrivilege 3476 SETUP_~1.EXE -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 3676 wrote to memory of 3812 3676 b0b4664013262a48fa9543ed9c651c34c9a7233678882f16d86e779c0a9a39ca.exe 66 PID 3676 wrote to memory of 3812 3676 b0b4664013262a48fa9543ed9c651c34c9a7233678882f16d86e779c0a9a39ca.exe 66 PID 3676 wrote to memory of 3812 3676 b0b4664013262a48fa9543ed9c651c34c9a7233678882f16d86e779c0a9a39ca.exe 66 PID 3812 wrote to memory of 1264 3812 rovwer.exe 67 PID 3812 wrote to memory of 1264 3812 rovwer.exe 67 PID 3812 wrote to memory of 1264 3812 rovwer.exe 67 PID 3812 wrote to memory of 4012 3812 rovwer.exe 69 PID 3812 wrote to memory of 4012 3812 rovwer.exe 69 PID 4012 wrote to memory of 2744 4012 becomeproblem.exe 70 PID 4012 wrote to memory of 2744 4012 becomeproblem.exe 70 PID 4012 wrote to memory of 2744 4012 becomeproblem.exe 70 PID 2744 wrote to memory of 4552 2744 SETUP_~1.EXE 71 PID 2744 wrote to memory of 4552 2744 SETUP_~1.EXE 71 PID 2744 wrote to memory of 4552 2744 SETUP_~1.EXE 71 PID 3812 wrote to memory of 2512 3812 rovwer.exe 74 PID 3812 wrote to memory of 2512 3812 rovwer.exe 74 PID 3812 wrote to memory of 2512 3812 rovwer.exe 74 PID 2744 wrote to memory of 3476 2744 SETUP_~1.EXE 75 PID 2744 wrote to memory of 3476 2744 SETUP_~1.EXE 75 PID 2744 wrote to memory of 3476 2744 SETUP_~1.EXE 75 PID 2744 wrote to memory of 3476 2744 SETUP_~1.EXE 75 PID 2744 wrote to memory of 3476 2744 SETUP_~1.EXE 75 PID 2744 wrote to memory of 3476 2744 SETUP_~1.EXE 75 PID 2744 wrote to memory of 3476 2744 SETUP_~1.EXE 75 PID 2744 wrote to memory of 3476 2744 SETUP_~1.EXE 75 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0b4664013262a48fa9543ed9c651c34c9a7233678882f16d86e779c0a9a39ca.exe"C:\Users\Admin\AppData\Local\Temp\b0b4664013262a48fa9543ed9c651c34c9a7233678882f16d86e779c0a9a39ca.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exe"C:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exe" /F3⤵
- Creates scheduled task(s)
PID:1264
-
-
C:\Users\Admin\AppData\Local\Temp\1000183001\becomeproblem.exe"C:\Users\Admin\AppData\Local\Temp\1000183001\becomeproblem.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA0AA==5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4552
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3476
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\80b59841e5c623\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:2512
-
-
-
C:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exeC:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exe1⤵
- Executes dropped EXE
PID:4544
-
C:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exeC:\Users\Admin\AppData\Local\Temp\b667dbdcd8\rovwer.exe1⤵
- Executes dropped EXE
PID:2276
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD594783fcf58c98f5ea0b416f441ad15eb
SHA1979a7c39c6a5dbed314bc41a22c4ccdca6db206b
SHA256117df0a0e80abf166ef148863dd82ba9e75c05b38ed3979d048f5fcc848ef905
SHA5129301306461cb978e91761b24b1d04339c2bff71771431987cd8dc373387c12feb81dbdbf272da1f7c045eade4ffff1976885ca705ca7cf9a40a6c4a7553aa06c
-
Filesize
785KB
MD5d6e9e86e003086022805cd59d1a406bd
SHA1514a4aaa1d1a0577fb1f84ff5d36cba8ea9619ea
SHA25629a808de2d82612a27d0ffb5a6505a90e0884d8ea332a282847d7da04f52b5f1
SHA512bff9b88db4187f31f1aa4f405d676df909eacf5ad48a9f413278e2fdc656e735c0ab265f0f4cdc87b8885d15109ffc7cfca071faca9352988ec2a6f0afb36ac9
-
Filesize
333.8MB
MD56adc030eeebd67c41f767f7ff4d7fea0
SHA1e5d80aff951e4b6df714cb4eb650bafb54e87370
SHA256b12ba6202ed39313ebef9404fd7513effd5c00d8e3f403fe971a8550843ef5ec
SHA5129a3c48019d245e2a6e041bd8aa0a477c9f24d5678036a6252d112fe493283e5996ffbdcc7d0c8fdafbe0d636a4d26ae28a1c476222dbabb5ad9893b64e977475
-
Filesize
333.8MB
MD56adc030eeebd67c41f767f7ff4d7fea0
SHA1e5d80aff951e4b6df714cb4eb650bafb54e87370
SHA256b12ba6202ed39313ebef9404fd7513effd5c00d8e3f403fe971a8550843ef5ec
SHA5129a3c48019d245e2a6e041bd8aa0a477c9f24d5678036a6252d112fe493283e5996ffbdcc7d0c8fdafbe0d636a4d26ae28a1c476222dbabb5ad9893b64e977475
-
Filesize
333.8MB
MD56adc030eeebd67c41f767f7ff4d7fea0
SHA1e5d80aff951e4b6df714cb4eb650bafb54e87370
SHA256b12ba6202ed39313ebef9404fd7513effd5c00d8e3f403fe971a8550843ef5ec
SHA5129a3c48019d245e2a6e041bd8aa0a477c9f24d5678036a6252d112fe493283e5996ffbdcc7d0c8fdafbe0d636a4d26ae28a1c476222dbabb5ad9893b64e977475
-
Filesize
293KB
MD53776556daf53e7da67e1f0714c292ba0
SHA104b54e2e1bb59cfe0736c03dfe2e8437d99ee5fd
SHA256b0b4664013262a48fa9543ed9c651c34c9a7233678882f16d86e779c0a9a39ca
SHA51256f011965d2b1fd60d4661abb5cac96fe359db4812071910cb4b842a778052829914ab8006f7056410e500602ce6c9af700d9708f4b3278f36313dcc885ec2ec
-
Filesize
293KB
MD53776556daf53e7da67e1f0714c292ba0
SHA104b54e2e1bb59cfe0736c03dfe2e8437d99ee5fd
SHA256b0b4664013262a48fa9543ed9c651c34c9a7233678882f16d86e779c0a9a39ca
SHA51256f011965d2b1fd60d4661abb5cac96fe359db4812071910cb4b842a778052829914ab8006f7056410e500602ce6c9af700d9708f4b3278f36313dcc885ec2ec
-
Filesize
293KB
MD53776556daf53e7da67e1f0714c292ba0
SHA104b54e2e1bb59cfe0736c03dfe2e8437d99ee5fd
SHA256b0b4664013262a48fa9543ed9c651c34c9a7233678882f16d86e779c0a9a39ca
SHA51256f011965d2b1fd60d4661abb5cac96fe359db4812071910cb4b842a778052829914ab8006f7056410e500602ce6c9af700d9708f4b3278f36313dcc885ec2ec
-
Filesize
293KB
MD53776556daf53e7da67e1f0714c292ba0
SHA104b54e2e1bb59cfe0736c03dfe2e8437d99ee5fd
SHA256b0b4664013262a48fa9543ed9c651c34c9a7233678882f16d86e779c0a9a39ca
SHA51256f011965d2b1fd60d4661abb5cac96fe359db4812071910cb4b842a778052829914ab8006f7056410e500602ce6c9af700d9708f4b3278f36313dcc885ec2ec
-
Filesize
126KB
MD5e92a6a3a013a87cf57f3753d77a1b9c9
SHA101366b392cb71fed71f5bc1cd09e0f8c76657519
SHA25642a247529de63a9b43768ac145e38fe9da3adc8b2eed558e3ce11e5cd8bbc0e5
SHA512c59bab1bef238927fe8102cca6080f7b62e945254668201d0eaa49a64c6969e1f8eef65b2fea56d341035f0995b5c24907487351e4cde2b6baa5d49f5a192b57
-
Filesize
126KB
MD5e92a6a3a013a87cf57f3753d77a1b9c9
SHA101366b392cb71fed71f5bc1cd09e0f8c76657519
SHA25642a247529de63a9b43768ac145e38fe9da3adc8b2eed558e3ce11e5cd8bbc0e5
SHA512c59bab1bef238927fe8102cca6080f7b62e945254668201d0eaa49a64c6969e1f8eef65b2fea56d341035f0995b5c24907487351e4cde2b6baa5d49f5a192b57
-
Filesize
126KB
MD5e92a6a3a013a87cf57f3753d77a1b9c9
SHA101366b392cb71fed71f5bc1cd09e0f8c76657519
SHA25642a247529de63a9b43768ac145e38fe9da3adc8b2eed558e3ce11e5cd8bbc0e5
SHA512c59bab1bef238927fe8102cca6080f7b62e945254668201d0eaa49a64c6969e1f8eef65b2fea56d341035f0995b5c24907487351e4cde2b6baa5d49f5a192b57