Analysis
-
max time kernel
137s -
max time network
171s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11-11-2022 20:10
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220901-en
General
-
Target
tmp.exe
-
Size
18.4MB
-
MD5
464502cbaae7b9ed1cd6da844d38ba86
-
SHA1
30dd42539cbfad04564f9db45ca40f2b9e81546c
-
SHA256
6c90b6acb49fff4969b5f5fabde4b4fea363e1902ac675ba02e7ad325804b7d4
-
SHA512
e74b45702eeaca95bc6c9f2aeea8a5958a425dc1f45ecfb127e286a39eb668243b41e56c705ae5fe7a72ff1ab691948adf29ddd6de18509421fa415647a36b59
-
SSDEEP
98304:2pgc9WBd2/ojIbrK51bnqvMwqwWhWznbdyxDDFC4B14d+iXLfg0rf2a33OXA7zTg:2pgnBkbYEMUWIzbdyxDDFCXpZU
Malware Config
Extracted
redline
@NoxyCloud
85.192.63.57:34210
-
auth_value
20dc074852db65a2b74addf964cf576e
Extracted
arrowrat
Client
213.239.219.58:1337
nPxRArUjc
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/memory/1168-130-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral1/memory/1168-134-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral1/memory/1168-138-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process PID 1016 created 0 1016 Quoko tace wesa.exe PID 1968 created 0 1968 ROR.exe -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 1668 MRH.exe 1016 Quoko tace wesa.exe 1968 ROR.exe -
Loads dropped DLL 8 IoCs
pid Process 2044 InstallUtil.exe 2044 InstallUtil.exe 1668 MRH.exe 1668 MRH.exe 2044 InstallUtil.exe 2044 InstallUtil.exe 1016 Quoko tace wesa.exe 1968 ROR.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1628 set thread context of 2044 1628 tmp.exe 27 PID 1016 set thread context of 524 1016 Quoko tace wesa.exe 42 PID 1968 set thread context of 1168 1968 ROR.exe 43 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 628 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1608 PING.EXE -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 1668 MRH.exe 1668 MRH.exe 1668 MRH.exe 1668 MRH.exe 1668 MRH.exe 1016 Quoko tace wesa.exe 1016 Quoko tace wesa.exe 1016 Quoko tace wesa.exe 1016 Quoko tace wesa.exe 1016 Quoko tace wesa.exe 1016 Quoko tace wesa.exe 1016 Quoko tace wesa.exe 1016 Quoko tace wesa.exe 1968 ROR.exe 1968 ROR.exe 1968 ROR.exe 1968 ROR.exe 1968 ROR.exe 1968 ROR.exe 1968 ROR.exe 1968 ROR.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2044 InstallUtil.exe 428 AcroRd32.exe 428 AcroRd32.exe 428 AcroRd32.exe 428 AcroRd32.exe -
Suspicious use of WriteProcessMemory 61 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2044 1628 tmp.exe 27 PID 1628 wrote to memory of 2044 1628 tmp.exe 27 PID 1628 wrote to memory of 2044 1628 tmp.exe 27 PID 1628 wrote to memory of 2044 1628 tmp.exe 27 PID 1628 wrote to memory of 2044 1628 tmp.exe 27 PID 1628 wrote to memory of 2044 1628 tmp.exe 27 PID 1628 wrote to memory of 2044 1628 tmp.exe 27 PID 1628 wrote to memory of 2044 1628 tmp.exe 27 PID 1628 wrote to memory of 2044 1628 tmp.exe 27 PID 1628 wrote to memory of 2044 1628 tmp.exe 27 PID 1628 wrote to memory of 2044 1628 tmp.exe 27 PID 2044 wrote to memory of 428 2044 InstallUtil.exe 30 PID 2044 wrote to memory of 428 2044 InstallUtil.exe 30 PID 2044 wrote to memory of 428 2044 InstallUtil.exe 30 PID 2044 wrote to memory of 428 2044 InstallUtil.exe 30 PID 2044 wrote to memory of 1668 2044 InstallUtil.exe 31 PID 2044 wrote to memory of 1668 2044 InstallUtil.exe 31 PID 2044 wrote to memory of 1668 2044 InstallUtil.exe 31 PID 2044 wrote to memory of 1668 2044 InstallUtil.exe 31 PID 1668 wrote to memory of 628 1668 MRH.exe 32 PID 1668 wrote to memory of 628 1668 MRH.exe 32 PID 1668 wrote to memory of 628 1668 MRH.exe 32 PID 1668 wrote to memory of 628 1668 MRH.exe 32 PID 1668 wrote to memory of 1016 1668 MRH.exe 34 PID 1668 wrote to memory of 1016 1668 MRH.exe 34 PID 1668 wrote to memory of 1016 1668 MRH.exe 34 PID 1668 wrote to memory of 1016 1668 MRH.exe 34 PID 1668 wrote to memory of 1640 1668 MRH.exe 35 PID 1668 wrote to memory of 1640 1668 MRH.exe 35 PID 1668 wrote to memory of 1640 1668 MRH.exe 35 PID 1668 wrote to memory of 1640 1668 MRH.exe 35 PID 1640 wrote to memory of 796 1640 cmd.exe 37 PID 1640 wrote to memory of 796 1640 cmd.exe 37 PID 1640 wrote to memory of 796 1640 cmd.exe 37 PID 1640 wrote to memory of 796 1640 cmd.exe 37 PID 1640 wrote to memory of 1608 1640 cmd.exe 38 PID 1640 wrote to memory of 1608 1640 cmd.exe 38 PID 1640 wrote to memory of 1608 1640 cmd.exe 38 PID 1640 wrote to memory of 1608 1640 cmd.exe 38 PID 2044 wrote to memory of 1968 2044 InstallUtil.exe 40 PID 2044 wrote to memory of 1968 2044 InstallUtil.exe 40 PID 2044 wrote to memory of 1968 2044 InstallUtil.exe 40 PID 2044 wrote to memory of 1968 2044 InstallUtil.exe 40 PID 1016 wrote to memory of 524 1016 Quoko tace wesa.exe 42 PID 1016 wrote to memory of 524 1016 Quoko tace wesa.exe 42 PID 1016 wrote to memory of 524 1016 Quoko tace wesa.exe 42 PID 1016 wrote to memory of 524 1016 Quoko tace wesa.exe 42 PID 1016 wrote to memory of 524 1016 Quoko tace wesa.exe 42 PID 1016 wrote to memory of 524 1016 Quoko tace wesa.exe 42 PID 1016 wrote to memory of 524 1016 Quoko tace wesa.exe 42 PID 1968 wrote to memory of 1168 1968 ROR.exe 43 PID 1968 wrote to memory of 1168 1968 ROR.exe 43 PID 1968 wrote to memory of 1168 1968 ROR.exe 43 PID 1968 wrote to memory of 1168 1968 ROR.exe 43 PID 1968 wrote to memory of 1168 1968 ROR.exe 43 PID 1968 wrote to memory of 1168 1968 ROR.exe 43 PID 1968 wrote to memory of 1168 1968 ROR.exe 43 PID 1016 wrote to memory of 524 1016 Quoko tace wesa.exe 42 PID 1016 wrote to memory of 524 1016 Quoko tace wesa.exe 42 PID 1968 wrote to memory of 1168 1968 ROR.exe 43 PID 1968 wrote to memory of 1168 1968 ROR.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Invoice.pdf"3⤵
- Suspicious use of SetWindowsHookEx
PID:428
-
-
C:\Users\Admin\AppData\Local\Temp\MRH.exe"C:\Users\Admin\AppData\Local\Temp\MRH.exe" 03⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /tn COMSurrogate /f /sc onlogon /rl highest /tr "C:\Users\Admin\Yisike quoquola fika quaveb\Quoko tace wesa.exe"4⤵
- Creates scheduled task(s)
PID:628
-
-
C:\Users\Admin\Yisike quoquola fika quaveb\Quoko tace wesa.exe"C:\Users\Admin\Yisike quoquola fika quaveb\Quoko tace wesa.exe" 04⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"5⤵PID:524
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\MRH.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\chcp.comchcp 650015⤵PID:796
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.15⤵
- Runs ping.exe
PID:1608
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\ROR.exe"C:\Users\Admin\AppData\Local\Temp\ROR.exe" 03⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"4⤵PID:1168
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
717B
MD5ec8ff3b1ded0246437b1472c69dd1811
SHA1d813e874c2524e3a7da6c466c67854ad16800326
SHA256e634c2d1ed20e0638c95597adf4c9d392ebab932d3353f18af1e4421f4bb9cab
SHA512e967b804cbf2d6da30a532cbc62557d09bd236807790040c6bee5584a482dc09d724fc1d9ac0de6aa5b4e8b1fff72c8ab3206222cc2c95a91035754ac1257552
-
Filesize
61KB
MD53dcf580a93972319e82cafbc047d34d5
SHA18528d2a1363e5de77dc3b1142850e51ead0f4b6b
SHA25640810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1
SHA51298384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD5f61d82dff4f5537c07d1ab0e3e5a9326
SHA1aa86dca11472c8375405eb733c47123141a3abff
SHA256ac22fe213d3e0399754d4bdfe99951e811475e10cf5bd68adfae0c2b01ae59a6
SHA512d41293bc10f5612f1471076075cec1c38b299a9e3aacfb74b41d2824e488f987c16e08a0521c5f3cd02d4a7e68cdbabef203ce29c31e71647b38cd3fb527df73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5373684876baeaa01e07c1bfd09a8fc53
SHA1433dae463c3c4d9935b26b43b98e86ef327de33e
SHA25684779df3d7f182b77cff9b0edc93cd3aa62fe1ce312b7572f1d7b2d66ebb372a
SHA51273da6b740802740be21e72d91d41b755ac71f118b26670c83f65b37b69c4974ed695c276aa6e8988369be9131db550a21f25b880a4526917d41ab12bfbe57cfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54283ab8fdc7a53a836e4003d9a4b526f
SHA18d38c568ad21d17f861acb3b56122399b4555c22
SHA25615517c3eb29aa247fc1e34baac23e5fb07047598dcd303965783898e977e1c44
SHA512e47faf79ff00a065932637ba3fd337ab96418f7fdbe3329a6d90dc64620550a1ff86629b5e18cfbc6eb3474ee98a9393c463bfa6922b373dd416ded1516876ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5f1420143e8759e6371ec84a60385a9cc
SHA162fca6db5248b2fb483ab10eedcf7509f730f9f6
SHA2566ef292bb63428c68d82b0c910fb14ee7f1759d3e7bf6b2075b083e171244e326
SHA5126b2a49154dc230ee9d2a44b6ca32409d286f0b51025ca0d84d93ae01b8ba797549d912a843ceece631776f3d77404ee2443259736d555f9b16b8c6d7d2901e3c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6ORS647J\library[1].bin
Filesize259KB
MD594aafe6b249b7f529f9d66a6f7d0b80e
SHA1a83eee4aa9c936a8e423c4b2b7d2b1036a9a0c44
SHA25641c631caa7c9e95166917bec39627c488400d180622e4b2bb3a3629732692b54
SHA512e94befd6c2462bbab13e0e66569c78d34d075f15a9923713f9e72bbd7f791103ef20161b7f830a9ad1f2745ccd9e60bbbe7540f87c025d3be4b0dba3d546d5cb
-
Filesize
163KB
MD55441d36f8dcfdd31e75562b380bea7a8
SHA170053ce7491743efacaa4b40f452efb3f32df4e8
SHA25658098a6f25d3fb423b49a97cf917a406c5841d7ac792ef04ecb9646f5629baf3
SHA51206a19ace54e2ccb25faaba3dce7a4b72010d1002efbd5d3e1cab1f23493dd8ada55803e9cd695a79c6030204224a84c5192b334b2e8c1007713e1f472f645bbe
-
Filesize
1.9MB
MD518585735c8866b21e2723a6f020bafd0
SHA1afb5b2c9d5ca57501835b0c56fd97b0641f01d88
SHA256e9c817d02acaf2fbb59a0a44be05dbb284ee622f50b2e2a598daac8bfb564672
SHA51288516af4bbbd9562a9ae9840124c6f9f1402f9a15a0ace5e2413023bbd80c37aa441cc39b8b48f8ca58f4192273e16cd590cd2e9e9a4298f6ed5b0497d54e6b8
-
Filesize
1.9MB
MD518585735c8866b21e2723a6f020bafd0
SHA1afb5b2c9d5ca57501835b0c56fd97b0641f01d88
SHA256e9c817d02acaf2fbb59a0a44be05dbb284ee622f50b2e2a598daac8bfb564672
SHA51288516af4bbbd9562a9ae9840124c6f9f1402f9a15a0ace5e2413023bbd80c37aa441cc39b8b48f8ca58f4192273e16cd590cd2e9e9a4298f6ed5b0497d54e6b8
-
Filesize
1.7MB
MD585ea4565608d2f6c35decb6ed8547749
SHA1e15ae6c93c9e998b030609fdf4b3274925694229
SHA256f6706aafbeb4e8e10478bb1fd5b171e2f7f13399416344aba46233593e6f5d69
SHA512762b5e5293067c484ca54fa297f5770217275a7594083b64b15ed65955f64ba158bbf58a7713419c2dc15d265a7bf8c85b4f11c8fd27e62ba21f429493df4dd5
-
Filesize
327.4MB
MD514f135012326d5feefbfd4f3f482ff05
SHA1a8e14e6d2c940e1e81e4b6fa0a8b6923653ade1a
SHA2565fb31e9453379d9b888b27db31527a53791b376436a62541bf3db67c79c46010
SHA512aeef35b1a8ec472e374803d9692a185773f99f7163f72478aa276e7df04cb7d11a5c5140375c09f1aa8fd983e302e5f5fd53d50d6d8ae2003eaa6e445b81b7fa
-
Filesize
1.9MB
MD518585735c8866b21e2723a6f020bafd0
SHA1afb5b2c9d5ca57501835b0c56fd97b0641f01d88
SHA256e9c817d02acaf2fbb59a0a44be05dbb284ee622f50b2e2a598daac8bfb564672
SHA51288516af4bbbd9562a9ae9840124c6f9f1402f9a15a0ace5e2413023bbd80c37aa441cc39b8b48f8ca58f4192273e16cd590cd2e9e9a4298f6ed5b0497d54e6b8
-
Filesize
1.9MB
MD518585735c8866b21e2723a6f020bafd0
SHA1afb5b2c9d5ca57501835b0c56fd97b0641f01d88
SHA256e9c817d02acaf2fbb59a0a44be05dbb284ee622f50b2e2a598daac8bfb564672
SHA51288516af4bbbd9562a9ae9840124c6f9f1402f9a15a0ace5e2413023bbd80c37aa441cc39b8b48f8ca58f4192273e16cd590cd2e9e9a4298f6ed5b0497d54e6b8
-
Filesize
1.7MB
MD585ea4565608d2f6c35decb6ed8547749
SHA1e15ae6c93c9e998b030609fdf4b3274925694229
SHA256f6706aafbeb4e8e10478bb1fd5b171e2f7f13399416344aba46233593e6f5d69
SHA512762b5e5293067c484ca54fa297f5770217275a7594083b64b15ed65955f64ba158bbf58a7713419c2dc15d265a7bf8c85b4f11c8fd27e62ba21f429493df4dd5
-
Filesize
1.7MB
MD585ea4565608d2f6c35decb6ed8547749
SHA1e15ae6c93c9e998b030609fdf4b3274925694229
SHA256f6706aafbeb4e8e10478bb1fd5b171e2f7f13399416344aba46233593e6f5d69
SHA512762b5e5293067c484ca54fa297f5770217275a7594083b64b15ed65955f64ba158bbf58a7713419c2dc15d265a7bf8c85b4f11c8fd27e62ba21f429493df4dd5
-
Filesize
262KB
MD51b51fec95f5403305749c4bcb3485b14
SHA1f4974196213a94911c850504924f38cd9e7fe889
SHA2563c0d3f9a776c503eca4e0a014006fe1a8f53e5e22138f6add9e45ad0fbf8844e
SHA5126e8aa862cb2d95fe67c212de2ee59f903a3de6e16bdd87918e31bc2d7de9a1bdd61f756f1bdf35aa41c7e3620650b9ad9bbaa65487d7152fdf7420767a91e90d
-
Filesize
262KB
MD51b51fec95f5403305749c4bcb3485b14
SHA1f4974196213a94911c850504924f38cd9e7fe889
SHA2563c0d3f9a776c503eca4e0a014006fe1a8f53e5e22138f6add9e45ad0fbf8844e
SHA5126e8aa862cb2d95fe67c212de2ee59f903a3de6e16bdd87918e31bc2d7de9a1bdd61f756f1bdf35aa41c7e3620650b9ad9bbaa65487d7152fdf7420767a91e90d
-
Filesize
325.6MB
MD5709d063e450893257f8efa3359a8a839
SHA1f932fe6c749030847e9989315c0cf7c7e26b5483
SHA256169a7e81002b5585e6d7b477a59d28264e019e144560dd567d967b8e27c3a657
SHA5122d0abd04d71140c22a1d17833f4ad13e6a3abe25b6a958c73dc21b9ee2d05fae4a344662df0501f328b2d683788602f4f0d2463a43e45a7d5ec7d79f57b7c638
-
Filesize
326.0MB
MD502c72af481eec111240ab54501fbcf88
SHA126f7d76ecedf11a22e8907c9458ede14480e8298
SHA256c88cd082599b118a5602c45c97ed873338d5534a8a15646969bb1594fca10289
SHA51275efbed9cb91cdf44ae67e86eff3bff40f34a7774963677763734d08302d45bc92a3c4222e9c85a2b94de667a2299533bc9f7ff04aede2fe8fae5a85090bc3fb