Analysis
-
max time kernel
302s -
max time network
307s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-11-2022 03:59
Static task
static1
Behavioral task
behavioral1
Sample
6d42060f990b9861982be51ef06c39b2c7b1bd8b4a06b36cf8434f70f44cce76.exe
Resource
win7-20220812-en
General
-
Target
6d42060f990b9861982be51ef06c39b2c7b1bd8b4a06b36cf8434f70f44cce76.exe
-
Size
1.8MB
-
MD5
06db507c42adffa90360eb3f16ba4814
-
SHA1
ea494b7ff319b10749b0baaad707bc841985f6c4
-
SHA256
6d42060f990b9861982be51ef06c39b2c7b1bd8b4a06b36cf8434f70f44cce76
-
SHA512
1f12901291e9bac11ad4d25200ff49c81f7fdd3b66787b10ec1dd1bb049823b1ef606dd8d949016fc7de0630794fa38131d3727f2f0f205d568037a758adbcf2
-
SSDEEP
49152:c0OB/3taBrb/TMvO90d7HjmAFd4A64nsfJ4LigXG/jpCeqBz1:I3417
Malware Config
Extracted
asyncrat
1.0.7 - modded by last
New
nicehash.at:4343
adsasutex_qwqdanchun
-
delay
1
-
install
true
-
install_file
GoogleDriver.exe
-
install_folder
%AppData%
Extracted
bitrat
1.38
nicehash.at:6000
-
communication_password
005f16f264f006578c55237781f36898
-
install_dir
JavaHelper
-
install_file
Java.exe
-
tor_process
tor
Extracted
redline
cheat
nicehash.at:1338
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/files/0x000b0000000122ec-121.dat family_redline behavioral1/files/0x000b0000000122ec-123.dat family_redline behavioral1/memory/1000-126-0x0000000001100000-0x000000000111E000-memory.dmp family_redline -
Async RAT payload 7 IoCs
resource yara_rule behavioral1/files/0x000c0000000122cc-82.dat asyncrat behavioral1/files/0x000c0000000122cc-83.dat asyncrat behavioral1/memory/1544-84-0x0000000000210000-0x0000000000226000-memory.dmp asyncrat behavioral1/files/0x000a0000000122dd-91.dat asyncrat behavioral1/files/0x000a0000000122dd-92.dat asyncrat behavioral1/memory/868-93-0x00000000011C0000-0x00000000011D6000-memory.dmp asyncrat behavioral1/memory/868-94-0x0000000000440000-0x0000000000460000-memory.dmp asyncrat -
Executes dropped EXE 4 IoCs
pid Process 1544 sqatyavkpcidpvwiialfnbdpawluusrm.exe 868 GoogleDriver.exe 1480 bit.exe 1000 rdln.exe -
resource yara_rule behavioral1/files/0x000d0000000122e4-104.dat upx behavioral1/files/0x000d0000000122e4-106.dat upx behavioral1/memory/1480-109-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1480-128-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java = "C:\\Users\\Admin\\AppData\\Local\\JavaHelper\\Java.exe" bit.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 1480 bit.exe 1480 bit.exe 1480 bit.exe 1480 bit.exe 1480 bit.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1880 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1000 timeout.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2004 powershell.exe 2004 powershell.exe 2004 powershell.exe 1040 powershell.exe 656 powershell.exe 656 powershell.exe 656 powershell.exe 1544 sqatyavkpcidpvwiialfnbdpawluusrm.exe 1920 powershell.exe 1920 powershell.exe 1920 powershell.exe 868 GoogleDriver.exe 1696 powershell.exe 868 GoogleDriver.exe 1696 powershell.exe 1696 powershell.exe 1000 rdln.exe 1000 rdln.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 2004 powershell.exe Token: SeDebugPrivilege 1040 powershell.exe Token: SeDebugPrivilege 656 powershell.exe Token: SeDebugPrivilege 1544 sqatyavkpcidpvwiialfnbdpawluusrm.exe Token: SeDebugPrivilege 868 GoogleDriver.exe Token: SeDebugPrivilege 1920 powershell.exe Token: SeDebugPrivilege 1480 bit.exe Token: SeShutdownPrivilege 1480 bit.exe Token: SeDebugPrivilege 1696 powershell.exe Token: SeDebugPrivilege 1000 rdln.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1480 bit.exe 1480 bit.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 900 wrote to memory of 2004 900 6d42060f990b9861982be51ef06c39b2c7b1bd8b4a06b36cf8434f70f44cce76.exe 27 PID 900 wrote to memory of 2004 900 6d42060f990b9861982be51ef06c39b2c7b1bd8b4a06b36cf8434f70f44cce76.exe 27 PID 900 wrote to memory of 2004 900 6d42060f990b9861982be51ef06c39b2c7b1bd8b4a06b36cf8434f70f44cce76.exe 27 PID 2004 wrote to memory of 832 2004 powershell.exe 29 PID 2004 wrote to memory of 832 2004 powershell.exe 29 PID 2004 wrote to memory of 832 2004 powershell.exe 29 PID 832 wrote to memory of 1040 832 cmd.exe 31 PID 832 wrote to memory of 1040 832 cmd.exe 31 PID 832 wrote to memory of 1040 832 cmd.exe 31 PID 832 wrote to memory of 268 832 cmd.exe 32 PID 832 wrote to memory of 268 832 cmd.exe 32 PID 832 wrote to memory of 268 832 cmd.exe 32 PID 900 wrote to memory of 656 900 6d42060f990b9861982be51ef06c39b2c7b1bd8b4a06b36cf8434f70f44cce76.exe 33 PID 900 wrote to memory of 656 900 6d42060f990b9861982be51ef06c39b2c7b1bd8b4a06b36cf8434f70f44cce76.exe 33 PID 900 wrote to memory of 656 900 6d42060f990b9861982be51ef06c39b2c7b1bd8b4a06b36cf8434f70f44cce76.exe 33 PID 656 wrote to memory of 1424 656 powershell.exe 35 PID 656 wrote to memory of 1424 656 powershell.exe 35 PID 656 wrote to memory of 1424 656 powershell.exe 35 PID 1424 wrote to memory of 1544 1424 cmd.exe 37 PID 1424 wrote to memory of 1544 1424 cmd.exe 37 PID 1424 wrote to memory of 1544 1424 cmd.exe 37 PID 1544 wrote to memory of 688 1544 sqatyavkpcidpvwiialfnbdpawluusrm.exe 38 PID 1544 wrote to memory of 688 1544 sqatyavkpcidpvwiialfnbdpawluusrm.exe 38 PID 1544 wrote to memory of 688 1544 sqatyavkpcidpvwiialfnbdpawluusrm.exe 38 PID 688 wrote to memory of 1880 688 cmd.exe 40 PID 688 wrote to memory of 1880 688 cmd.exe 40 PID 688 wrote to memory of 1880 688 cmd.exe 40 PID 1544 wrote to memory of 1588 1544 sqatyavkpcidpvwiialfnbdpawluusrm.exe 41 PID 1544 wrote to memory of 1588 1544 sqatyavkpcidpvwiialfnbdpawluusrm.exe 41 PID 1544 wrote to memory of 1588 1544 sqatyavkpcidpvwiialfnbdpawluusrm.exe 41 PID 1588 wrote to memory of 1000 1588 cmd.exe 43 PID 1588 wrote to memory of 1000 1588 cmd.exe 43 PID 1588 wrote to memory of 1000 1588 cmd.exe 43 PID 1588 wrote to memory of 868 1588 cmd.exe 44 PID 1588 wrote to memory of 868 1588 cmd.exe 44 PID 1588 wrote to memory of 868 1588 cmd.exe 44 PID 868 wrote to memory of 2028 868 GoogleDriver.exe 46 PID 868 wrote to memory of 2028 868 GoogleDriver.exe 46 PID 868 wrote to memory of 2028 868 GoogleDriver.exe 46 PID 2028 wrote to memory of 1920 2028 cmd.exe 48 PID 2028 wrote to memory of 1920 2028 cmd.exe 48 PID 2028 wrote to memory of 1920 2028 cmd.exe 48 PID 1920 wrote to memory of 1480 1920 powershell.exe 49 PID 1920 wrote to memory of 1480 1920 powershell.exe 49 PID 1920 wrote to memory of 1480 1920 powershell.exe 49 PID 1920 wrote to memory of 1480 1920 powershell.exe 49 PID 868 wrote to memory of 1596 868 GoogleDriver.exe 50 PID 868 wrote to memory of 1596 868 GoogleDriver.exe 50 PID 868 wrote to memory of 1596 868 GoogleDriver.exe 50 PID 1596 wrote to memory of 1696 1596 cmd.exe 52 PID 1596 wrote to memory of 1696 1596 cmd.exe 52 PID 1596 wrote to memory of 1696 1596 cmd.exe 52 PID 1696 wrote to memory of 1000 1696 powershell.exe 53 PID 1696 wrote to memory of 1000 1696 powershell.exe 53 PID 1696 wrote to memory of 1000 1696 powershell.exe 53 PID 1696 wrote to memory of 1000 1696 powershell.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d42060f990b9861982be51ef06c39b2c7b1bd8b4a06b36cf8434f70f44cce76.exe"C:\Users\Admin\AppData\Local\Temp\6d42060f990b9861982be51ef06c39b2c7b1bd8b4a06b36cf8434f70f44cce76.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe "Start-Process cmd \"/k powershell Add-MpPreference -ExclusionPath 'C:\' & fsutil file createnew %AppData%\excluded.txt 1\" -Verb RunAs -WindowStyle hidden -ErrorAction SilentlyContinue"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /k powershell Add-MpPreference -ExclusionPath 'C:\' & fsutil file createnew %AppData%\excluded.txt 13⤵
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath 'C:\'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1040
-
-
C:\Windows\system32\fsutil.exefsutil file createnew C:\Users\Admin\AppData\Roaming\excluded.txt 14⤵PID:268
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe "Start-Process cmd \"/k start %AppData%\sqatyavkpcidpvwiialfnbdpawluusrm.exe\" -WindowStyle hidden"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /k start %AppData%\sqatyavkpcidpvwiialfnbdpawluusrm.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Roaming\sqatyavkpcidpvwiialfnbdpawluusrm.exeC:\Users\Admin\AppData\Roaming\sqatyavkpcidpvwiialfnbdpawluusrm.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "GoogleDriver" /tr '"C:\Users\Admin\AppData\Roaming\GoogleDriver.exe"' & exit5⤵
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "GoogleDriver" /tr '"C:\Users\Admin\AppData\Roaming\GoogleDriver.exe"'6⤵
- Creates scheduled task(s)
PID:1880
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp898B.tmp.bat""5⤵
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\system32\timeout.exetimeout 36⤵
- Delays execution with timeout.exe
PID:1000
-
-
C:\Users\Admin\AppData\Roaming\GoogleDriver.exe"C:\Users\Admin\AppData\Roaming\GoogleDriver.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\bit.exe"' & exit7⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\bit.exe"'8⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\bit.exe"C:\Users\Admin\AppData\Local\Temp\bit.exe"9⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1480
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\rdln.exe"' & exit7⤵
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\rdln.exe"'8⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\rdln.exe"C:\Users\Admin\AppData\Local\Temp\rdln.exe"9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1000
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD532d4216d4ef2af912921fc2931c0bd88
SHA13e79dd260b67ed27134246e9461d8878c7ac73e3
SHA256d1ecf0f3592c06329182cbcd25fa654bb48c441c0b54bfb5c4b40fbaa517cdbf
SHA5127a25bcf3954238ab946ce95dc4153518fe67e773845f2bd037eac64c93906223b3ec611a04160cc20f85c4afa0b7124c8eacb43667ecb3fdde2776698f5b2b37
-
Filesize
1.4MB
MD532d4216d4ef2af912921fc2931c0bd88
SHA13e79dd260b67ed27134246e9461d8878c7ac73e3
SHA256d1ecf0f3592c06329182cbcd25fa654bb48c441c0b54bfb5c4b40fbaa517cdbf
SHA5127a25bcf3954238ab946ce95dc4153518fe67e773845f2bd037eac64c93906223b3ec611a04160cc20f85c4afa0b7124c8eacb43667ecb3fdde2776698f5b2b37
-
Filesize
95KB
MD56aefd743bed0887a18bbbd3b0c533dfb
SHA1bb8140a7efc7a1dec295fa4894b0efa7203c6b49
SHA256001170049bf107796ad564d572ef540743e0a66805f61a51a980998f7c09f5d1
SHA51270cc520173a922443d4ec81f487227a4d6a5e2c3f7d3cee1c0a6ecc94cf8ceee64e53d75e6f6a5f51d0ae050939d78b9cad9d72bf5a3872c72a2ad7a69842929
-
Filesize
95KB
MD56aefd743bed0887a18bbbd3b0c533dfb
SHA1bb8140a7efc7a1dec295fa4894b0efa7203c6b49
SHA256001170049bf107796ad564d572ef540743e0a66805f61a51a980998f7c09f5d1
SHA51270cc520173a922443d4ec81f487227a4d6a5e2c3f7d3cee1c0a6ecc94cf8ceee64e53d75e6f6a5f51d0ae050939d78b9cad9d72bf5a3872c72a2ad7a69842929
-
Filesize
156B
MD5a6c89f904b9dea36c287358972daca28
SHA13f75b541623295544814b9ab5c3db875e4d945d5
SHA256c3336cc0edc228417f3a5e28baf9834878a1f9cb1b65ee21a2c668f9af13409b
SHA512b24d5eb017e0be3aa042baf9ead35c8cb378aceec9249fb126c22af0183592f3a477c94d8f6902705dcef5476bba8672af090812819e2161efcd3af941b9a514
-
Filesize
63KB
MD5dae21c538a7a4f8294d7e19916be9100
SHA1cea1c44030c6f45243a9408e59f8e43304402438
SHA2563184a8183ddd00795ae4da31244c3bdf010ab97addc4df2b66129982c9ede4e4
SHA5128e9dd2b4e4ec9b28cb7c40e41f6ba8607e1c16351398d5de84965ee0a596fe255b8bfafb61eee99c83281d7cb43b029695ce68db3b7c942acfe392d63f7d4e26
-
Filesize
63KB
MD5dae21c538a7a4f8294d7e19916be9100
SHA1cea1c44030c6f45243a9408e59f8e43304402438
SHA2563184a8183ddd00795ae4da31244c3bdf010ab97addc4df2b66129982c9ede4e4
SHA5128e9dd2b4e4ec9b28cb7c40e41f6ba8607e1c16351398d5de84965ee0a596fe255b8bfafb61eee99c83281d7cb43b029695ce68db3b7c942acfe392d63f7d4e26
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5ceb874a5b101bbbc563635cde5c3b992
SHA1fb5e6c087e80fcc24c43f922644a5469720059a8
SHA2567193f0ded7fe33d351673f308c4c3b3ca47ecd806190539db6205f2f085ed8b7
SHA512d204307bb735f223da47cb3941c334336322b8b9f20c7a993003c33e90f84973f04ac17d9976a6d53ed31506e319a2c65144d26858a1d1dfcee54540ee4f652e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5ceb874a5b101bbbc563635cde5c3b992
SHA1fb5e6c087e80fcc24c43f922644a5469720059a8
SHA2567193f0ded7fe33d351673f308c4c3b3ca47ecd806190539db6205f2f085ed8b7
SHA512d204307bb735f223da47cb3941c334336322b8b9f20c7a993003c33e90f84973f04ac17d9976a6d53ed31506e319a2c65144d26858a1d1dfcee54540ee4f652e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5ceb874a5b101bbbc563635cde5c3b992
SHA1fb5e6c087e80fcc24c43f922644a5469720059a8
SHA2567193f0ded7fe33d351673f308c4c3b3ca47ecd806190539db6205f2f085ed8b7
SHA512d204307bb735f223da47cb3941c334336322b8b9f20c7a993003c33e90f84973f04ac17d9976a6d53ed31506e319a2c65144d26858a1d1dfcee54540ee4f652e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5ceb874a5b101bbbc563635cde5c3b992
SHA1fb5e6c087e80fcc24c43f922644a5469720059a8
SHA2567193f0ded7fe33d351673f308c4c3b3ca47ecd806190539db6205f2f085ed8b7
SHA512d204307bb735f223da47cb3941c334336322b8b9f20c7a993003c33e90f84973f04ac17d9976a6d53ed31506e319a2c65144d26858a1d1dfcee54540ee4f652e
-
Filesize
63KB
MD5dae21c538a7a4f8294d7e19916be9100
SHA1cea1c44030c6f45243a9408e59f8e43304402438
SHA2563184a8183ddd00795ae4da31244c3bdf010ab97addc4df2b66129982c9ede4e4
SHA5128e9dd2b4e4ec9b28cb7c40e41f6ba8607e1c16351398d5de84965ee0a596fe255b8bfafb61eee99c83281d7cb43b029695ce68db3b7c942acfe392d63f7d4e26
-
Filesize
63KB
MD5dae21c538a7a4f8294d7e19916be9100
SHA1cea1c44030c6f45243a9408e59f8e43304402438
SHA2563184a8183ddd00795ae4da31244c3bdf010ab97addc4df2b66129982c9ede4e4
SHA5128e9dd2b4e4ec9b28cb7c40e41f6ba8607e1c16351398d5de84965ee0a596fe255b8bfafb61eee99c83281d7cb43b029695ce68db3b7c942acfe392d63f7d4e26