Analysis
-
max time kernel
117s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 02:33
Static task
static1
Behavioral task
behavioral1
Sample
e68accfec9356e006e37e652d1f9061d82d1f00670b9d029b32a4ceba67fa900.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e68accfec9356e006e37e652d1f9061d82d1f00670b9d029b32a4ceba67fa900.exe
Resource
win10v2004-20220812-en
General
-
Target
e68accfec9356e006e37e652d1f9061d82d1f00670b9d029b32a4ceba67fa900.exe
-
Size
246KB
-
MD5
d97676c845137efe4c44586ab8db7bf6
-
SHA1
d254580d33e716a83f12130cc3adf6efeebf7d13
-
SHA256
e68accfec9356e006e37e652d1f9061d82d1f00670b9d029b32a4ceba67fa900
-
SHA512
18f774b6615fb4858014009e1dfbeb657d2f24703861ff9db28d70cddaf64c0a926a7153a3077b4f3ee131c2f694af3321abb270c8cf0e314c68d3f8ba2bff61
-
SSDEEP
3072:ssMHbbVC9QYGE4LvZDjsn2nM5ykfIcU4vaSNb5qjJ8Fe4t2QhpG9tWsWhJ4dLMAn:sHtrLvZDjZPSIcUUqit2Qhw9q4JNn
Malware Config
Extracted
amadey
3.50
193.56.146.174/g84kvj4jck/index.php
Extracted
redline
ritchshit
94.103.183.33:80
-
auth_value
98c1a18edcc6e04afa19a0ee3b16a6e2
Extracted
raccoon
16465d0e7bfd19684d4e56a43306c91b
http://79.137.196.11/
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4320-155-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
Processes:
rovwer.exe236.exerovwer.exeokok.exeokok.exerovwer.exepid process 2924 rovwer.exe 4884 236.exe 2688 rovwer.exe 2024 okok.exe 4808 okok.exe 2792 rovwer.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
e68accfec9356e006e37e652d1f9061d82d1f00670b9d029b32a4ceba67fa900.exerovwer.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation e68accfec9356e006e37e652d1f9061d82d1f00670b9d029b32a4ceba67fa900.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation rovwer.exe -
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
rovwer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\236.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000221001\\236.exe" rovwer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\okok.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000223001\\okok.exe" rovwer.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
236.exeokok.exedescription pid process target process PID 4884 set thread context of 4320 4884 236.exe vbc.exe PID 2024 set thread context of 4808 2024 okok.exe okok.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4452 2804 WerFault.exe e68accfec9356e006e37e652d1f9061d82d1f00670b9d029b32a4ceba67fa900.exe 456 4884 WerFault.exe 236.exe 5072 2688 WerFault.exe rovwer.exe 4280 2792 WerFault.exe rovwer.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
vbc.exepid process 4320 vbc.exe 4320 vbc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
okok.exevbc.exedescription pid process Token: SeDebugPrivilege 2024 okok.exe Token: SeDebugPrivilege 4320 vbc.exe -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
e68accfec9356e006e37e652d1f9061d82d1f00670b9d029b32a4ceba67fa900.exerovwer.execmd.exe236.exeokok.exedescription pid process target process PID 2804 wrote to memory of 2924 2804 e68accfec9356e006e37e652d1f9061d82d1f00670b9d029b32a4ceba67fa900.exe rovwer.exe PID 2804 wrote to memory of 2924 2804 e68accfec9356e006e37e652d1f9061d82d1f00670b9d029b32a4ceba67fa900.exe rovwer.exe PID 2804 wrote to memory of 2924 2804 e68accfec9356e006e37e652d1f9061d82d1f00670b9d029b32a4ceba67fa900.exe rovwer.exe PID 2924 wrote to memory of 3980 2924 rovwer.exe schtasks.exe PID 2924 wrote to memory of 3980 2924 rovwer.exe schtasks.exe PID 2924 wrote to memory of 3980 2924 rovwer.exe schtasks.exe PID 2924 wrote to memory of 4704 2924 rovwer.exe cmd.exe PID 2924 wrote to memory of 4704 2924 rovwer.exe cmd.exe PID 2924 wrote to memory of 4704 2924 rovwer.exe cmd.exe PID 4704 wrote to memory of 3504 4704 cmd.exe cmd.exe PID 4704 wrote to memory of 3504 4704 cmd.exe cmd.exe PID 4704 wrote to memory of 3504 4704 cmd.exe cmd.exe PID 4704 wrote to memory of 4484 4704 cmd.exe cacls.exe PID 4704 wrote to memory of 4484 4704 cmd.exe cacls.exe PID 4704 wrote to memory of 4484 4704 cmd.exe cacls.exe PID 4704 wrote to memory of 2456 4704 cmd.exe cacls.exe PID 4704 wrote to memory of 2456 4704 cmd.exe cacls.exe PID 4704 wrote to memory of 2456 4704 cmd.exe cacls.exe PID 4704 wrote to memory of 2692 4704 cmd.exe cmd.exe PID 4704 wrote to memory of 2692 4704 cmd.exe cmd.exe PID 4704 wrote to memory of 2692 4704 cmd.exe cmd.exe PID 4704 wrote to memory of 8 4704 cmd.exe cacls.exe PID 4704 wrote to memory of 8 4704 cmd.exe cacls.exe PID 4704 wrote to memory of 8 4704 cmd.exe cacls.exe PID 4704 wrote to memory of 4460 4704 cmd.exe cacls.exe PID 4704 wrote to memory of 4460 4704 cmd.exe cacls.exe PID 4704 wrote to memory of 4460 4704 cmd.exe cacls.exe PID 2924 wrote to memory of 4884 2924 rovwer.exe 236.exe PID 2924 wrote to memory of 4884 2924 rovwer.exe 236.exe PID 2924 wrote to memory of 4884 2924 rovwer.exe 236.exe PID 4884 wrote to memory of 4320 4884 236.exe vbc.exe PID 4884 wrote to memory of 4320 4884 236.exe vbc.exe PID 4884 wrote to memory of 4320 4884 236.exe vbc.exe PID 4884 wrote to memory of 4320 4884 236.exe vbc.exe PID 4884 wrote to memory of 4320 4884 236.exe vbc.exe PID 2924 wrote to memory of 2024 2924 rovwer.exe okok.exe PID 2924 wrote to memory of 2024 2924 rovwer.exe okok.exe PID 2924 wrote to memory of 2024 2924 rovwer.exe okok.exe PID 2024 wrote to memory of 4808 2024 okok.exe okok.exe PID 2024 wrote to memory of 4808 2024 okok.exe okok.exe PID 2024 wrote to memory of 4808 2024 okok.exe okok.exe PID 2024 wrote to memory of 4808 2024 okok.exe okok.exe PID 2024 wrote to memory of 4808 2024 okok.exe okok.exe PID 2024 wrote to memory of 4808 2024 okok.exe okok.exe PID 2024 wrote to memory of 4808 2024 okok.exe okok.exe PID 2024 wrote to memory of 4808 2024 okok.exe okok.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e68accfec9356e006e37e652d1f9061d82d1f00670b9d029b32a4ceba67fa900.exe"C:\Users\Admin\AppData\Local\Temp\e68accfec9356e006e37e652d1f9061d82d1f00670b9d029b32a4ceba67fa900.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe"C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe" /F3⤵
- Creates scheduled task(s)
PID:3980 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rovwer.exe" /P "Admin:N"&&CACLS "rovwer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\99e342142d" /P "Admin:N"&&CACLS "..\99e342142d" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:3504
-
C:\Windows\SysWOW64\cacls.exeCACLS "rovwer.exe" /P "Admin:N"4⤵PID:4484
-
C:\Windows\SysWOW64\cacls.exeCACLS "rovwer.exe" /P "Admin:R" /E4⤵PID:2456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2692
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\99e342142d" /P "Admin:N"4⤵PID:8
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\99e342142d" /P "Admin:R" /E4⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\1000221001\236.exe"C:\Users\Admin\AppData\Local\Temp\1000221001\236.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4320 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4884 -s 1484⤵
- Program crash
PID:456 -
C:\Users\Admin\AppData\Local\Temp\1000223001\okok.exe"C:\Users\Admin\AppData\Local\Temp\1000223001\okok.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\1000223001\okok.exe"C:\Users\Admin\AppData\Local\Temp\1000223001\okok.exe"4⤵
- Executes dropped EXE
PID:4808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2804 -s 11362⤵
- Program crash
PID:4452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2804 -ip 28041⤵PID:1268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4884 -ip 48841⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe1⤵
- Executes dropped EXE
PID:2688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 4162⤵
- Program crash
PID:5072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2688 -ip 26881⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe1⤵
- Executes dropped EXE
PID:2792 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 4242⤵
- Program crash
PID:4280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2792 -ip 27921⤵PID:204
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
929KB
MD5f159a709fd4cd800d0a1f766089c4318
SHA1e2335ecebfc16d030d36183a5a1f1f61853dfea8
SHA256f4dc5eedf8dd119d3b84eae34493e0b09e3bf2ff15d45e5f67266cf146f06d74
SHA5124abb21862da9d34edb8a1827d5c19f050c6a7bb45a10fa81baa169703c2a914c6123313199292bc684ab098c7cab279680233fbc3446a100874ad68774adc354
-
Filesize
929KB
MD5f159a709fd4cd800d0a1f766089c4318
SHA1e2335ecebfc16d030d36183a5a1f1f61853dfea8
SHA256f4dc5eedf8dd119d3b84eae34493e0b09e3bf2ff15d45e5f67266cf146f06d74
SHA5124abb21862da9d34edb8a1827d5c19f050c6a7bb45a10fa81baa169703c2a914c6123313199292bc684ab098c7cab279680233fbc3446a100874ad68774adc354
-
Filesize
594KB
MD5811f64ea53b76f4e63f3baa9cbf449af
SHA1bdbb1cb65db56922bdab468e47a4b4ecfad9bc13
SHA256199a20b72c4eb70450a036e25f8abc1eae9b0ba5ab269651d25480b909ac6168
SHA5123f0f7ba95068b56bb604e564c01ea6bb3b0dcd6a10d437301467a56b823a7e7c040ed16ed989bd444239fee2265248f264a86d1a1a7c9f610666679c3f99caa1
-
Filesize
594KB
MD5811f64ea53b76f4e63f3baa9cbf449af
SHA1bdbb1cb65db56922bdab468e47a4b4ecfad9bc13
SHA256199a20b72c4eb70450a036e25f8abc1eae9b0ba5ab269651d25480b909ac6168
SHA5123f0f7ba95068b56bb604e564c01ea6bb3b0dcd6a10d437301467a56b823a7e7c040ed16ed989bd444239fee2265248f264a86d1a1a7c9f610666679c3f99caa1
-
Filesize
594KB
MD5811f64ea53b76f4e63f3baa9cbf449af
SHA1bdbb1cb65db56922bdab468e47a4b4ecfad9bc13
SHA256199a20b72c4eb70450a036e25f8abc1eae9b0ba5ab269651d25480b909ac6168
SHA5123f0f7ba95068b56bb604e564c01ea6bb3b0dcd6a10d437301467a56b823a7e7c040ed16ed989bd444239fee2265248f264a86d1a1a7c9f610666679c3f99caa1
-
Filesize
246KB
MD5d97676c845137efe4c44586ab8db7bf6
SHA1d254580d33e716a83f12130cc3adf6efeebf7d13
SHA256e68accfec9356e006e37e652d1f9061d82d1f00670b9d029b32a4ceba67fa900
SHA51218f774b6615fb4858014009e1dfbeb657d2f24703861ff9db28d70cddaf64c0a926a7153a3077b4f3ee131c2f694af3321abb270c8cf0e314c68d3f8ba2bff61
-
Filesize
246KB
MD5d97676c845137efe4c44586ab8db7bf6
SHA1d254580d33e716a83f12130cc3adf6efeebf7d13
SHA256e68accfec9356e006e37e652d1f9061d82d1f00670b9d029b32a4ceba67fa900
SHA51218f774b6615fb4858014009e1dfbeb657d2f24703861ff9db28d70cddaf64c0a926a7153a3077b4f3ee131c2f694af3321abb270c8cf0e314c68d3f8ba2bff61
-
Filesize
246KB
MD5d97676c845137efe4c44586ab8db7bf6
SHA1d254580d33e716a83f12130cc3adf6efeebf7d13
SHA256e68accfec9356e006e37e652d1f9061d82d1f00670b9d029b32a4ceba67fa900
SHA51218f774b6615fb4858014009e1dfbeb657d2f24703861ff9db28d70cddaf64c0a926a7153a3077b4f3ee131c2f694af3321abb270c8cf0e314c68d3f8ba2bff61
-
Filesize
246KB
MD5d97676c845137efe4c44586ab8db7bf6
SHA1d254580d33e716a83f12130cc3adf6efeebf7d13
SHA256e68accfec9356e006e37e652d1f9061d82d1f00670b9d029b32a4ceba67fa900
SHA51218f774b6615fb4858014009e1dfbeb657d2f24703861ff9db28d70cddaf64c0a926a7153a3077b4f3ee131c2f694af3321abb270c8cf0e314c68d3f8ba2bff61