Analysis
-
max time kernel
137s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/11/2022, 19:54
Static task
static1
Behavioral task
behavioral1
Sample
05f30530f22d03d8454e8eed115d1425.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
05f30530f22d03d8454e8eed115d1425.exe
Resource
win10v2004-20220812-en
General
-
Target
05f30530f22d03d8454e8eed115d1425.exe
-
Size
324KB
-
MD5
05f30530f22d03d8454e8eed115d1425
-
SHA1
868a1b1ccbe54427fcb2f918b1be3d0b0f1889c6
-
SHA256
5655d71f4e4151e4e6117a5ba0d5ca8592354a97a18b4df74201846dd1a4f88c
-
SHA512
caca6e63db3053177258c6bdc86098b27850a1b5960bebcc3f9471cdfa83f48f3fd0fb6a12d410129eebd0cce0b7611f52d931b0332c4920e57d423bad6ece5d
-
SSDEEP
3072:Sp/Tqf+jAg/t5N50Yr3EZW+opHiX7Lig9tjY75Y2JAjC/mJUcA35or15Cr2cYE:Mqo/ti8UU+oRlg96XJAG+Op2c
Malware Config
Extracted
redline
bred
77.73.134.251:4691
-
auth_value
0e8ad10c690c62fa90b012542647f121
Extracted
redline
45.15.156.52:45
-
auth_value
19cd76dae6d01d9649fd29624fa61e51
Extracted
redline
@REDLINEVIP Cloud (TG: @FATHEROFCARDERS)
151.80.89.233:13553
-
auth_value
fbee175162920530e6bf470c8003fa1a
Signatures
-
Detect Amadey credential stealer module 4 IoCs
resource yara_rule behavioral2/files/0x000a000000022f8f-182.dat amadey_cred_module behavioral2/memory/4888-185-0x0000000000510000-0x0000000000534000-memory.dmp amadey_cred_module behavioral2/files/0x000a000000022f8f-184.dat amadey_cred_module behavioral2/files/0x000a000000022f8f-183.dat amadey_cred_module -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 6 IoCs
resource yara_rule behavioral2/files/0x000200000001e790-153.dat family_redline behavioral2/files/0x000200000001e790-154.dat family_redline behavioral2/memory/2100-156-0x0000000000460000-0x0000000000488000-memory.dmp family_redline behavioral2/files/0x0003000000000723-192.dat family_redline behavioral2/files/0x0003000000000723-193.dat family_redline behavioral2/memory/4408-194-0x0000000000280000-0x00000000002A8000-memory.dmp family_redline -
Blocklisted process makes network request 1 IoCs
flow pid Process 52 4888 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 8 IoCs
pid Process 4928 rovwer.exe 2588 linda5.exe 2100 bre.exe 4860 5-11.exe 3356 rovwer.exe 2132 Setup.exe 4408 K.exe 2452 rovwer.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation linda5.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 05f30530f22d03d8454e8eed115d1425.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation rovwer.exe -
Loads dropped DLL 3 IoCs
pid Process 2160 regsvr32.exe 4888 rundll32.exe 4888 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bre.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000016001\\bre.exe" rovwer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5-11.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000018001\\5-11.exe" rovwer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Setup.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000021001\\Setup.exe" rovwer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\linda5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000014001\\linda5.exe" rovwer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 1972 4024 WerFault.exe 77 5100 3356 WerFault.exe 96 3108 2452 WerFault.exe 102 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1832 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4860 5-11.exe 4860 5-11.exe 2100 bre.exe 2100 bre.exe 4888 rundll32.exe 4888 rundll32.exe 4888 rundll32.exe 4888 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4860 5-11.exe Token: SeDebugPrivilege 2100 bre.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 4024 wrote to memory of 4928 4024 05f30530f22d03d8454e8eed115d1425.exe 78 PID 4024 wrote to memory of 4928 4024 05f30530f22d03d8454e8eed115d1425.exe 78 PID 4024 wrote to memory of 4928 4024 05f30530f22d03d8454e8eed115d1425.exe 78 PID 4928 wrote to memory of 1832 4928 rovwer.exe 86 PID 4928 wrote to memory of 1832 4928 rovwer.exe 86 PID 4928 wrote to memory of 1832 4928 rovwer.exe 86 PID 4928 wrote to memory of 2588 4928 rovwer.exe 89 PID 4928 wrote to memory of 2588 4928 rovwer.exe 89 PID 4928 wrote to memory of 2588 4928 rovwer.exe 89 PID 2588 wrote to memory of 2160 2588 linda5.exe 92 PID 2588 wrote to memory of 2160 2588 linda5.exe 92 PID 2588 wrote to memory of 2160 2588 linda5.exe 92 PID 4928 wrote to memory of 2100 4928 rovwer.exe 93 PID 4928 wrote to memory of 2100 4928 rovwer.exe 93 PID 4928 wrote to memory of 2100 4928 rovwer.exe 93 PID 4928 wrote to memory of 4860 4928 rovwer.exe 94 PID 4928 wrote to memory of 4860 4928 rovwer.exe 94 PID 4928 wrote to memory of 4860 4928 rovwer.exe 94 PID 4928 wrote to memory of 4888 4928 rovwer.exe 99 PID 4928 wrote to memory of 4888 4928 rovwer.exe 99 PID 4928 wrote to memory of 4888 4928 rovwer.exe 99 PID 4928 wrote to memory of 2132 4928 rovwer.exe 100 PID 4928 wrote to memory of 2132 4928 rovwer.exe 100 PID 4928 wrote to memory of 2132 4928 rovwer.exe 100 PID 4928 wrote to memory of 4408 4928 rovwer.exe 101 PID 4928 wrote to memory of 4408 4928 rovwer.exe 101 PID 4928 wrote to memory of 4408 4928 rovwer.exe 101 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\05f30530f22d03d8454e8eed115d1425.exe"C:\Users\Admin\AppData\Local\Temp\05f30530f22d03d8454e8eed115d1425.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\e94c2b28f2\rovwer.exe"C:\Users\Admin\AppData\Local\Temp\e94c2b28f2\rovwer.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\e94c2b28f2\rovwer.exe" /F3⤵
- Creates scheduled task(s)
PID:1832
-
-
C:\Users\Admin\AppData\Local\Temp\1000014001\linda5.exe"C:\Users\Admin\AppData\Local\Temp\1000014001\linda5.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" PBOGMwS.FQe /s4⤵
- Loads dropped DLL
PID:2160
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000016001\bre.exe"C:\Users\Admin\AppData\Local\Temp\1000016001\bre.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2100
-
-
C:\Users\Admin\AppData\Local\Temp\1000018001\5-11.exe"C:\Users\Admin\AppData\Local\Temp\1000018001\5-11.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4860
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\80b59841e5c623\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:4888
-
-
C:\Users\Admin\AppData\Local\Temp\1000021001\Setup.exe"C:\Users\Admin\AppData\Local\Temp\1000021001\Setup.exe"3⤵
- Executes dropped EXE
PID:2132
-
-
C:\Users\Admin\AppData\Local\Temp\1000022001\K.exe"C:\Users\Admin\AppData\Local\Temp\1000022001\K.exe"3⤵
- Executes dropped EXE
PID:4408
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4024 -s 9042⤵
- Program crash
PID:1972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4024 -ip 40241⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\e94c2b28f2\rovwer.exeC:\Users\Admin\AppData\Local\Temp\e94c2b28f2\rovwer.exe1⤵
- Executes dropped EXE
PID:3356 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3356 -s 4202⤵
- Program crash
PID:5100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3356 -ip 33561⤵PID:4144
-
C:\Users\Admin\AppData\Local\Temp\e94c2b28f2\rovwer.exeC:\Users\Admin\AppData\Local\Temp\e94c2b28f2\rovwer.exe1⤵
- Executes dropped EXE
PID:2452 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2452 -s 4202⤵
- Program crash
PID:3108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2452 -ip 24521⤵PID:1888
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5d4e0a2af03e661b0fe393be4405a7048
SHA16208452e3a7b29a0c5d7c810b3d58cfe4fd92b4e
SHA2561b9b939987259dbc440b01652002d0342b79828b03802c9406b131ff5b9543b6
SHA512d7c83ab2be4ffa77bbfc0db6df3c5ea9ea6ffd396fe809e426c3df8c2f414c038bdfa4269b7003889ecd16a7ad3fa357c1fce0e5e948f0f579e7a54a83e1b16d
-
Filesize
2.0MB
MD5d4e0a2af03e661b0fe393be4405a7048
SHA16208452e3a7b29a0c5d7c810b3d58cfe4fd92b4e
SHA2561b9b939987259dbc440b01652002d0342b79828b03802c9406b131ff5b9543b6
SHA512d7c83ab2be4ffa77bbfc0db6df3c5ea9ea6ffd396fe809e426c3df8c2f414c038bdfa4269b7003889ecd16a7ad3fa357c1fce0e5e948f0f579e7a54a83e1b16d
-
Filesize
137KB
MD57357ebff6a98df7135b5b4be8ff5451d
SHA17ea82d17eb6d7b1a4c5a2d5240a1ca63bc9809e1
SHA25654ab734131bcbfaded15776d689015fb747cc7919b70b2d8b1808e103bacebb4
SHA5125a23c49b243610ca82ca0308d1b01341da22a59cdaf62b682ee2333bc2e4465c875f5a78f422a2281d9684d76e116bdebcaad98f31e9717db65e4b6779a85fdd
-
Filesize
137KB
MD57357ebff6a98df7135b5b4be8ff5451d
SHA17ea82d17eb6d7b1a4c5a2d5240a1ca63bc9809e1
SHA25654ab734131bcbfaded15776d689015fb747cc7919b70b2d8b1808e103bacebb4
SHA5125a23c49b243610ca82ca0308d1b01341da22a59cdaf62b682ee2333bc2e4465c875f5a78f422a2281d9684d76e116bdebcaad98f31e9717db65e4b6779a85fdd
-
Filesize
199KB
MD578749ccd97954fe2d2b417dfcc4cef9b
SHA1343cb651498238d1ded783756703b161ff82c47f
SHA256b1226e748e0d4bf4004f0f55f53f583a08492f5c9e5f16846ffff4f1945cc5dd
SHA512ca20bbb5adf9053a4ab66b82bd6040bacae665fe090ac568ed6c451a9f2285facfc13d07ff8f401be1e43db6a05209044b8779fcb74991961d209e738e925ee7
-
Filesize
199KB
MD578749ccd97954fe2d2b417dfcc4cef9b
SHA1343cb651498238d1ded783756703b161ff82c47f
SHA256b1226e748e0d4bf4004f0f55f53f583a08492f5c9e5f16846ffff4f1945cc5dd
SHA512ca20bbb5adf9053a4ab66b82bd6040bacae665fe090ac568ed6c451a9f2285facfc13d07ff8f401be1e43db6a05209044b8779fcb74991961d209e738e925ee7
-
Filesize
383.9MB
MD5801b2b56269c47831c3c09e5d91aa658
SHA1d868194d20b7fe3e0279a9e376442dfa5417d0d4
SHA2567b0f7aca0ae6d95d780906d675fd7882bb016bab552d8525f9b6d0616ec8ec89
SHA5125660797f98928e65077183b26798ff9f79ec5282e73104b2fbe29bbdca714f8eed8e269754b3390e24ef10551bcc9496787958b6e7ce09c548eb1728339c7a4a
-
Filesize
382.4MB
MD51fdbcb2ee4d672ad053a6c6cd78932be
SHA1bb81842329592b49f3d89220344c1ee686f77279
SHA25605b4abdb607d46e3da583aa1b8f4767410743d489ce68af0f48e35f5a1a80974
SHA512113ebad2e3fc6b672b5ecbf472af26008abdf87cdbb33f3fa53f0c945888590edbd067385118113c8edace39d38d73a13b7954db7a4fa751e6d68b89c673bbe4
-
Filesize
137KB
MD506cee591f384a048b3403819d9328e82
SHA14b8dd48bb52cf306a21a0ef3a3449c0963dbae4e
SHA256f4d228b52dbea8f6c059c2debe6fea366833f27ae9dcd5b793248e830a0cb8c4
SHA51238928ee89657576814597fb5a4bfe8380b04557921b2b5e5ad09afaa208d3080d897c47154ebc8fdf4a844b55b34f8c7d572ccc2a70e9abdf3861d0621764ae5
-
Filesize
137KB
MD506cee591f384a048b3403819d9328e82
SHA14b8dd48bb52cf306a21a0ef3a3449c0963dbae4e
SHA256f4d228b52dbea8f6c059c2debe6fea366833f27ae9dcd5b793248e830a0cb8c4
SHA51238928ee89657576814597fb5a4bfe8380b04557921b2b5e5ad09afaa208d3080d897c47154ebc8fdf4a844b55b34f8c7d572ccc2a70e9abdf3861d0621764ae5
-
Filesize
1.6MB
MD5979c4b6399c342b0c862018dd887e89a
SHA19f27ccf7b2e8e48ffd54c58aa0bbc246df8e398e
SHA2566dd4ae355acbd54256a2a168c25cdf1c4b23837fa853ab3307370191a903874c
SHA512a00efb89a1b4bdc2ecf4467ccd162f903e1fa13b3a98bc9b1b5c13d17fc411fdf37640a21da691e7abcb7ace893af6d32d609a9fcaf9bf5b42e645ef8c531bc1
-
Filesize
324KB
MD505f30530f22d03d8454e8eed115d1425
SHA1868a1b1ccbe54427fcb2f918b1be3d0b0f1889c6
SHA2565655d71f4e4151e4e6117a5ba0d5ca8592354a97a18b4df74201846dd1a4f88c
SHA512caca6e63db3053177258c6bdc86098b27850a1b5960bebcc3f9471cdfa83f48f3fd0fb6a12d410129eebd0cce0b7611f52d931b0332c4920e57d423bad6ece5d
-
Filesize
324KB
MD505f30530f22d03d8454e8eed115d1425
SHA1868a1b1ccbe54427fcb2f918b1be3d0b0f1889c6
SHA2565655d71f4e4151e4e6117a5ba0d5ca8592354a97a18b4df74201846dd1a4f88c
SHA512caca6e63db3053177258c6bdc86098b27850a1b5960bebcc3f9471cdfa83f48f3fd0fb6a12d410129eebd0cce0b7611f52d931b0332c4920e57d423bad6ece5d
-
Filesize
324KB
MD505f30530f22d03d8454e8eed115d1425
SHA1868a1b1ccbe54427fcb2f918b1be3d0b0f1889c6
SHA2565655d71f4e4151e4e6117a5ba0d5ca8592354a97a18b4df74201846dd1a4f88c
SHA512caca6e63db3053177258c6bdc86098b27850a1b5960bebcc3f9471cdfa83f48f3fd0fb6a12d410129eebd0cce0b7611f52d931b0332c4920e57d423bad6ece5d
-
Filesize
324KB
MD505f30530f22d03d8454e8eed115d1425
SHA1868a1b1ccbe54427fcb2f918b1be3d0b0f1889c6
SHA2565655d71f4e4151e4e6117a5ba0d5ca8592354a97a18b4df74201846dd1a4f88c
SHA512caca6e63db3053177258c6bdc86098b27850a1b5960bebcc3f9471cdfa83f48f3fd0fb6a12d410129eebd0cce0b7611f52d931b0332c4920e57d423bad6ece5d
-
Filesize
1.6MB
MD5979c4b6399c342b0c862018dd887e89a
SHA19f27ccf7b2e8e48ffd54c58aa0bbc246df8e398e
SHA2566dd4ae355acbd54256a2a168c25cdf1c4b23837fa853ab3307370191a903874c
SHA512a00efb89a1b4bdc2ecf4467ccd162f903e1fa13b3a98bc9b1b5c13d17fc411fdf37640a21da691e7abcb7ace893af6d32d609a9fcaf9bf5b42e645ef8c531bc1
-
Filesize
126KB
MD5522adad0782501491314a78c7f32006b
SHA1e487edceeef3a41e2a8eea1e684bcbc3b39adb97
SHA256351fd9b73fa0cbbdfbce0793ca41544f5191650d79317a34024f3c09f73ac9ba
SHA5125f8a103deea3ed5f8641d1f4c91a4f891a8208b679cadbfac4a068afbad0d2f777cd29ace4bdfec590e722435473e4f8465fb80d5cda792dc0236646580101a7
-
Filesize
126KB
MD5522adad0782501491314a78c7f32006b
SHA1e487edceeef3a41e2a8eea1e684bcbc3b39adb97
SHA256351fd9b73fa0cbbdfbce0793ca41544f5191650d79317a34024f3c09f73ac9ba
SHA5125f8a103deea3ed5f8641d1f4c91a4f891a8208b679cadbfac4a068afbad0d2f777cd29ace4bdfec590e722435473e4f8465fb80d5cda792dc0236646580101a7
-
Filesize
126KB
MD5522adad0782501491314a78c7f32006b
SHA1e487edceeef3a41e2a8eea1e684bcbc3b39adb97
SHA256351fd9b73fa0cbbdfbce0793ca41544f5191650d79317a34024f3c09f73ac9ba
SHA5125f8a103deea3ed5f8641d1f4c91a4f891a8208b679cadbfac4a068afbad0d2f777cd29ace4bdfec590e722435473e4f8465fb80d5cda792dc0236646580101a7