Analysis
-
max time kernel
300s -
max time network
304s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-11-2022 04:21
Behavioral task
behavioral1
Sample
sqatyavkpcidpvwiialfnbdpawluusrm.exe
Resource
win7-20220812-en
General
-
Target
sqatyavkpcidpvwiialfnbdpawluusrm.exe
-
Size
63KB
-
MD5
dae21c538a7a4f8294d7e19916be9100
-
SHA1
cea1c44030c6f45243a9408e59f8e43304402438
-
SHA256
3184a8183ddd00795ae4da31244c3bdf010ab97addc4df2b66129982c9ede4e4
-
SHA512
8e9dd2b4e4ec9b28cb7c40e41f6ba8607e1c16351398d5de84965ee0a596fe255b8bfafb61eee99c83281d7cb43b029695ce68db3b7c942acfe392d63f7d4e26
-
SSDEEP
1536:6hQDnx1Ak32YGbHZCyYaN1bbLwtY3L3VG/tpqKmY7:6hQDnx1Ak32HHZCyP1bbLxL322z
Malware Config
Extracted
asyncrat
1.0.7 - modded by last
New
nicehash.at:4343
adsasutex_qwqdanchun
-
delay
1
-
install
true
-
install_file
GoogleDriver.exe
-
install_folder
%AppData%
Extracted
bitrat
1.38
nicehash.at:6000
-
communication_password
005f16f264f006578c55237781f36898
-
install_dir
JavaHelper
-
install_file
Java.exe
-
tor_process
tor
Extracted
redline
cheat
nicehash.at:1338
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
resource yara_rule behavioral1/files/0x000b0000000122ec-87.dat family_redline behavioral1/files/0x000b0000000122ec-89.dat family_redline behavioral1/memory/1956-92-0x0000000001070000-0x000000000108E000-memory.dmp family_redline behavioral1/memory/664-98-0x00000000003E0000-0x00000000003EA000-memory.dmp family_redline -
Async RAT payload 5 IoCs
resource yara_rule behavioral1/memory/1044-54-0x0000000000A80000-0x0000000000A96000-memory.dmp asyncrat behavioral1/files/0x000b0000000122f1-61.dat asyncrat behavioral1/files/0x000b0000000122f1-62.dat asyncrat behavioral1/memory/564-63-0x0000000001180000-0x0000000001196000-memory.dmp asyncrat behavioral1/memory/564-64-0x0000000000450000-0x0000000000470000-memory.dmp asyncrat -
Executes dropped EXE 3 IoCs
pid Process 564 GoogleDriver.exe 664 bit.exe 1956 rdln.exe -
resource yara_rule behavioral1/files/0x000e000000012353-73.dat upx behavioral1/files/0x000e000000012353-75.dat upx behavioral1/memory/664-79-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/664-95-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java = "C:\\Users\\Admin\\AppData\\Local\\JavaHelper\\Java.exe" bit.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 664 bit.exe 664 bit.exe 664 bit.exe 664 bit.exe 664 bit.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1440 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 628 timeout.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1044 sqatyavkpcidpvwiialfnbdpawluusrm.exe 564 GoogleDriver.exe 1784 powershell.exe 1784 powershell.exe 1784 powershell.exe 1516 powershell.exe 564 GoogleDriver.exe 1516 powershell.exe 1516 powershell.exe 1956 rdln.exe 1956 rdln.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 1044 sqatyavkpcidpvwiialfnbdpawluusrm.exe Token: SeDebugPrivilege 564 GoogleDriver.exe Token: SeDebugPrivilege 1784 powershell.exe Token: SeDebugPrivilege 1516 powershell.exe Token: SeDebugPrivilege 664 bit.exe Token: SeShutdownPrivilege 664 bit.exe Token: SeDebugPrivilege 1956 rdln.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 664 bit.exe 664 bit.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 1044 wrote to memory of 1960 1044 sqatyavkpcidpvwiialfnbdpawluusrm.exe 27 PID 1044 wrote to memory of 1960 1044 sqatyavkpcidpvwiialfnbdpawluusrm.exe 27 PID 1044 wrote to memory of 1960 1044 sqatyavkpcidpvwiialfnbdpawluusrm.exe 27 PID 1960 wrote to memory of 1440 1960 cmd.exe 29 PID 1960 wrote to memory of 1440 1960 cmd.exe 29 PID 1960 wrote to memory of 1440 1960 cmd.exe 29 PID 1044 wrote to memory of 916 1044 sqatyavkpcidpvwiialfnbdpawluusrm.exe 30 PID 1044 wrote to memory of 916 1044 sqatyavkpcidpvwiialfnbdpawluusrm.exe 30 PID 1044 wrote to memory of 916 1044 sqatyavkpcidpvwiialfnbdpawluusrm.exe 30 PID 916 wrote to memory of 628 916 cmd.exe 32 PID 916 wrote to memory of 628 916 cmd.exe 32 PID 916 wrote to memory of 628 916 cmd.exe 32 PID 916 wrote to memory of 564 916 cmd.exe 33 PID 916 wrote to memory of 564 916 cmd.exe 33 PID 916 wrote to memory of 564 916 cmd.exe 33 PID 564 wrote to memory of 580 564 GoogleDriver.exe 35 PID 564 wrote to memory of 580 564 GoogleDriver.exe 35 PID 564 wrote to memory of 580 564 GoogleDriver.exe 35 PID 580 wrote to memory of 1784 580 cmd.exe 37 PID 580 wrote to memory of 1784 580 cmd.exe 37 PID 580 wrote to memory of 1784 580 cmd.exe 37 PID 1784 wrote to memory of 664 1784 powershell.exe 38 PID 1784 wrote to memory of 664 1784 powershell.exe 38 PID 1784 wrote to memory of 664 1784 powershell.exe 38 PID 1784 wrote to memory of 664 1784 powershell.exe 38 PID 564 wrote to memory of 1636 564 GoogleDriver.exe 39 PID 564 wrote to memory of 1636 564 GoogleDriver.exe 39 PID 564 wrote to memory of 1636 564 GoogleDriver.exe 39 PID 1636 wrote to memory of 1516 1636 cmd.exe 41 PID 1636 wrote to memory of 1516 1636 cmd.exe 41 PID 1636 wrote to memory of 1516 1636 cmd.exe 41 PID 1516 wrote to memory of 1956 1516 powershell.exe 42 PID 1516 wrote to memory of 1956 1516 powershell.exe 42 PID 1516 wrote to memory of 1956 1516 powershell.exe 42 PID 1516 wrote to memory of 1956 1516 powershell.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\sqatyavkpcidpvwiialfnbdpawluusrm.exe"C:\Users\Admin\AppData\Local\Temp\sqatyavkpcidpvwiialfnbdpawluusrm.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "GoogleDriver" /tr '"C:\Users\Admin\AppData\Roaming\GoogleDriver.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "GoogleDriver" /tr '"C:\Users\Admin\AppData\Roaming\GoogleDriver.exe"'3⤵
- Creates scheduled task(s)
PID:1440
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpB1E2.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:628
-
-
C:\Users\Admin\AppData\Roaming\GoogleDriver.exe"C:\Users\Admin\AppData\Roaming\GoogleDriver.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\bit.exe"' & exit4⤵
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\bit.exe"'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\bit.exe"C:\Users\Admin\AppData\Local\Temp\bit.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:664
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\rdln.exe"' & exit4⤵
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\rdln.exe"'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\rdln.exe"C:\Users\Admin\AppData\Local\Temp\rdln.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD532d4216d4ef2af912921fc2931c0bd88
SHA13e79dd260b67ed27134246e9461d8878c7ac73e3
SHA256d1ecf0f3592c06329182cbcd25fa654bb48c441c0b54bfb5c4b40fbaa517cdbf
SHA5127a25bcf3954238ab946ce95dc4153518fe67e773845f2bd037eac64c93906223b3ec611a04160cc20f85c4afa0b7124c8eacb43667ecb3fdde2776698f5b2b37
-
Filesize
1.4MB
MD532d4216d4ef2af912921fc2931c0bd88
SHA13e79dd260b67ed27134246e9461d8878c7ac73e3
SHA256d1ecf0f3592c06329182cbcd25fa654bb48c441c0b54bfb5c4b40fbaa517cdbf
SHA5127a25bcf3954238ab946ce95dc4153518fe67e773845f2bd037eac64c93906223b3ec611a04160cc20f85c4afa0b7124c8eacb43667ecb3fdde2776698f5b2b37
-
Filesize
95KB
MD56aefd743bed0887a18bbbd3b0c533dfb
SHA1bb8140a7efc7a1dec295fa4894b0efa7203c6b49
SHA256001170049bf107796ad564d572ef540743e0a66805f61a51a980998f7c09f5d1
SHA51270cc520173a922443d4ec81f487227a4d6a5e2c3f7d3cee1c0a6ecc94cf8ceee64e53d75e6f6a5f51d0ae050939d78b9cad9d72bf5a3872c72a2ad7a69842929
-
Filesize
95KB
MD56aefd743bed0887a18bbbd3b0c533dfb
SHA1bb8140a7efc7a1dec295fa4894b0efa7203c6b49
SHA256001170049bf107796ad564d572ef540743e0a66805f61a51a980998f7c09f5d1
SHA51270cc520173a922443d4ec81f487227a4d6a5e2c3f7d3cee1c0a6ecc94cf8ceee64e53d75e6f6a5f51d0ae050939d78b9cad9d72bf5a3872c72a2ad7a69842929
-
Filesize
156B
MD57c30bd76ff8f80c9f7d39a8031546554
SHA100145c79f5c91b100d64315be7956b6930d9131b
SHA256ea466c3ba65ded64b96265c65c3fbb0d283c123cf546a9d0e830347252fd8929
SHA51217c9dcf55605415577316b939467b934bb9d2f661ef2dee2a220add73490d5c946d2c4820d2e3c0fabfb417eedf809f43b6375cda7cb42d656db36f3b0fdeec0
-
Filesize
63KB
MD5dae21c538a7a4f8294d7e19916be9100
SHA1cea1c44030c6f45243a9408e59f8e43304402438
SHA2563184a8183ddd00795ae4da31244c3bdf010ab97addc4df2b66129982c9ede4e4
SHA5128e9dd2b4e4ec9b28cb7c40e41f6ba8607e1c16351398d5de84965ee0a596fe255b8bfafb61eee99c83281d7cb43b029695ce68db3b7c942acfe392d63f7d4e26
-
Filesize
63KB
MD5dae21c538a7a4f8294d7e19916be9100
SHA1cea1c44030c6f45243a9408e59f8e43304402438
SHA2563184a8183ddd00795ae4da31244c3bdf010ab97addc4df2b66129982c9ede4e4
SHA5128e9dd2b4e4ec9b28cb7c40e41f6ba8607e1c16351398d5de84965ee0a596fe255b8bfafb61eee99c83281d7cb43b029695ce68db3b7c942acfe392d63f7d4e26
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5167fbf9af32219578d221fa3b80db5c1
SHA1229b321bb0596d3e17780ab06aaa464afea4ce29
SHA2561d22b8a7b8212850489b06d5794b69437f180b216c6efb91380a8755479decce
SHA5126f72240a476f1fd407acc4b8df15aa9267b02a37350a92267b0fd1606f1b1efc494573cc87f7f12e78e6e837735f4fb0658742818859e01bb15828a6850f9a39