Analysis
-
max time kernel
133s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 00:01
Static task
static1
Behavioral task
behavioral1
Sample
6E587363F78CB91DE1B18CFE6A44174EB9426B724BCC7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6E587363F78CB91DE1B18CFE6A44174EB9426B724BCC7.exe
Resource
win10v2004-20220812-en
General
-
Target
6E587363F78CB91DE1B18CFE6A44174EB9426B724BCC7.exe
-
Size
4.5MB
-
MD5
d48e7bfd3aeb182e89b7e7ce883cd3f2
-
SHA1
b851e6bbf0c6fa176dac656b7bf45eaaa073e5d8
-
SHA256
6e587363f78cb91de1b18cfe6a44174eb9426b724bcc757c3f7314a2881d3b39
-
SHA512
e5fbea3a7a1c85dc60c0953ababceb308bea28a5abb338804fc3c3e521ffe4e9b85eb0d717bd37a3862edbf6aaaa19c1f62a500ad53645a9ca0c57282b0fd1a5
-
SSDEEP
49152:4DKt5jqtb72StuLh5cyqHo+oDc+HTst7R39JM9wWAToTCN7x/isxJ:E5KLhvN+ooV3ASWQ715xJ
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
Google Chrome.exesvchost.exeSQLi Dorks Generator By The N3RoX[x86].exeGoogle Chrome.exeDevCWO.exeGoogle Chrome.exepid process 5028 Google Chrome.exe 3908 svchost.exe 1140 SQLi Dorks Generator By The N3RoX[x86].exe 2764 Google Chrome.exe 380 DevCWO.exe 2436 Google Chrome.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
6E587363F78CB91DE1B18CFE6A44174EB9426B724BCC7.exesvchost.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 6E587363F78CB91DE1B18CFE6A44174EB9426B724BCC7.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation svchost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 51 ipinfo.io 52 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
powershell.exesvchost.exepowershell.exepid process 2508 powershell.exe 2508 powershell.exe 3908 svchost.exe 4164 powershell.exe 4164 powershell.exe 3908 svchost.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
svchost.exepowershell.exeGoogle Chrome.exeGoogle Chrome.exepowershell.exeGoogle Chrome.exedescription pid process Token: SeDebugPrivilege 3908 svchost.exe Token: SeDebugPrivilege 2508 powershell.exe Token: SeDebugPrivilege 2764 Google Chrome.exe Token: SeDebugPrivilege 5028 Google Chrome.exe Token: SeDebugPrivilege 4164 powershell.exe Token: SeDebugPrivilege 2436 Google Chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
SQLi Dorks Generator By The N3RoX[x86].exepid process 1140 SQLi Dorks Generator By The N3RoX[x86].exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
6E587363F78CB91DE1B18CFE6A44174EB9426B724BCC7.exesvchost.execmd.exepowershell.exeGoogle Chrome.execmd.execmd.exepowershell.exedescription pid process target process PID 4472 wrote to memory of 5028 4472 6E587363F78CB91DE1B18CFE6A44174EB9426B724BCC7.exe Google Chrome.exe PID 4472 wrote to memory of 5028 4472 6E587363F78CB91DE1B18CFE6A44174EB9426B724BCC7.exe Google Chrome.exe PID 4472 wrote to memory of 5028 4472 6E587363F78CB91DE1B18CFE6A44174EB9426B724BCC7.exe Google Chrome.exe PID 4472 wrote to memory of 3908 4472 6E587363F78CB91DE1B18CFE6A44174EB9426B724BCC7.exe svchost.exe PID 4472 wrote to memory of 3908 4472 6E587363F78CB91DE1B18CFE6A44174EB9426B724BCC7.exe svchost.exe PID 4472 wrote to memory of 1140 4472 6E587363F78CB91DE1B18CFE6A44174EB9426B724BCC7.exe SQLi Dorks Generator By The N3RoX[x86].exe PID 4472 wrote to memory of 1140 4472 6E587363F78CB91DE1B18CFE6A44174EB9426B724BCC7.exe SQLi Dorks Generator By The N3RoX[x86].exe PID 4472 wrote to memory of 1140 4472 6E587363F78CB91DE1B18CFE6A44174EB9426B724BCC7.exe SQLi Dorks Generator By The N3RoX[x86].exe PID 3908 wrote to memory of 60 3908 svchost.exe cmd.exe PID 3908 wrote to memory of 60 3908 svchost.exe cmd.exe PID 60 wrote to memory of 2508 60 cmd.exe powershell.exe PID 60 wrote to memory of 2508 60 cmd.exe powershell.exe PID 2508 wrote to memory of 2764 2508 powershell.exe Google Chrome.exe PID 2508 wrote to memory of 2764 2508 powershell.exe Google Chrome.exe PID 2764 wrote to memory of 4956 2764 Google Chrome.exe cmd.exe PID 2764 wrote to memory of 4956 2764 Google Chrome.exe cmd.exe PID 4956 wrote to memory of 3272 4956 cmd.exe schtasks.exe PID 4956 wrote to memory of 3272 4956 cmd.exe schtasks.exe PID 3908 wrote to memory of 1064 3908 svchost.exe cmd.exe PID 3908 wrote to memory of 1064 3908 svchost.exe cmd.exe PID 1064 wrote to memory of 4164 1064 cmd.exe powershell.exe PID 1064 wrote to memory of 4164 1064 cmd.exe powershell.exe PID 4164 wrote to memory of 380 4164 powershell.exe DevCWO.exe PID 4164 wrote to memory of 380 4164 powershell.exe DevCWO.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6E587363F78CB91DE1B18CFE6A44174EB9426B724BCC7.exe"C:\Users\Admin\AppData\Local\Temp\6E587363F78CB91DE1B18CFE6A44174EB9426B724BCC7.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Users\Admin\AppData\Roaming\Google Chrome.exe"C:\Users\Admin\AppData\Roaming\Google Chrome.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5028
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\Google Chrome.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\Google Chrome.exe"'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\Google Chrome.exe"C:\Users\Admin\AppData\Local\Temp\Google Chrome.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C schtasks /create /tn \GoogleChrome /tr "C:\Users\Admin\AppData\Roaming\Google Chrome\Google Chrome.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f6⤵
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\system32\schtasks.exeschtasks /create /tn \GoogleChrome /tr "C:\Users\Admin\AppData\Roaming\Google Chrome\Google Chrome.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f7⤵
- Creates scheduled task(s)
PID:3272
-
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\DevCWO.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\DevCWO.exe"'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\DevCWO.exe"C:\Users\Admin\AppData\Local\Temp\DevCWO.exe"5⤵
- Executes dropped EXE
PID:380
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\SQLi Dorks Generator By The N3RoX[x86].exe"C:\Users\Admin\AppData\Local\Temp\SQLi Dorks Generator By The N3RoX[x86].exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1140
-
-
C:\Users\Admin\AppData\Roaming\Google Chrome\Google Chrome.exe"C:\Users\Admin\AppData\Roaming\Google Chrome\Google Chrome.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2436
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
Filesize
2KB
MD56cf293cb4d80be23433eecf74ddb5503
SHA124fe4752df102c2ef492954d6b046cb5512ad408
SHA256b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8
SHA5120f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00
-
Filesize
64B
MD55caad758326454b5788ec35315c4c304
SHA13aef8dba8042662a7fcf97e51047dc636b4d4724
SHA25683e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391
SHA5124e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693
-
Filesize
2.5MB
MD57bc0a36bc35c40f23951db94ec13568f
SHA1308a8a7b160a890fd8074649575295dd23dac873
SHA256b386c6775e3cff49dc90319b0f658386ddb4fec6034363e483567c8d8b0f5262
SHA512fc9526911ef8695213119f7f904ea2283a8bc3c338abc26f724b385504067373cca55ceecfd54753baab5475fdea91c42daf39ddbd74915fc4f6eb7520ee4e62
-
Filesize
2.5MB
MD57bc0a36bc35c40f23951db94ec13568f
SHA1308a8a7b160a890fd8074649575295dd23dac873
SHA256b386c6775e3cff49dc90319b0f658386ddb4fec6034363e483567c8d8b0f5262
SHA512fc9526911ef8695213119f7f904ea2283a8bc3c338abc26f724b385504067373cca55ceecfd54753baab5475fdea91c42daf39ddbd74915fc4f6eb7520ee4e62
-
Filesize
196KB
MD58d0042b80d25d0c74a619a3d594c9deb
SHA1c13fe83d6cfbdd37d8e24a908ed65fedd964e723
SHA256955025ec2a4a635f597080fac9287b2692b69536b16f7c736a041a163011cb85
SHA5120571e96d5615a75f8b2fce43488074e4ed84b69180d087f361542a08d49065a08b995996b578ad926c589035eccbd57a0431eb2ff5f12e472e97889774fb94c0
-
Filesize
196KB
MD58d0042b80d25d0c74a619a3d594c9deb
SHA1c13fe83d6cfbdd37d8e24a908ed65fedd964e723
SHA256955025ec2a4a635f597080fac9287b2692b69536b16f7c736a041a163011cb85
SHA5120571e96d5615a75f8b2fce43488074e4ed84b69180d087f361542a08d49065a08b995996b578ad926c589035eccbd57a0431eb2ff5f12e472e97889774fb94c0
-
Filesize
3.8MB
MD515578026730e6167e7de93f7b87b2af2
SHA16c554e922ec846d6338d9e97182c30486b154002
SHA2567335d92aa0d7a2c2233b172e11474aa953c47cb7b8e6bded3dbf91a9d881e973
SHA51286452d1b77997455d4eec36cb70328792252cdd1b906ab2e4b8c17a016841dfc2760b305d3b2a1087e498e00ad8e7658cc7557a85183bb9b75d9f7df8e950dab
-
Filesize
3.8MB
MD515578026730e6167e7de93f7b87b2af2
SHA16c554e922ec846d6338d9e97182c30486b154002
SHA2567335d92aa0d7a2c2233b172e11474aa953c47cb7b8e6bded3dbf91a9d881e973
SHA51286452d1b77997455d4eec36cb70328792252cdd1b906ab2e4b8c17a016841dfc2760b305d3b2a1087e498e00ad8e7658cc7557a85183bb9b75d9f7df8e950dab
-
Filesize
403KB
MD5f903148b5a0c07db2c61ce05fa5c7db2
SHA1b636a8bf5769f7fe27c263eab54026ac03732ad4
SHA2562999cb6a5b4a9d38c8f85c1b24a6574147c12c90b4a36e5a81c7aa9c7eecfe3d
SHA5123abb409a61e167f60af116cd2191435bdc7876ce5483905bd944a01dec2c41e5736ae4ffeb628ea74eeef205e7b5e0c0e04520b58e14aa3240bf9a2de0dfd9b9
-
Filesize
403KB
MD5f903148b5a0c07db2c61ce05fa5c7db2
SHA1b636a8bf5769f7fe27c263eab54026ac03732ad4
SHA2562999cb6a5b4a9d38c8f85c1b24a6574147c12c90b4a36e5a81c7aa9c7eecfe3d
SHA5123abb409a61e167f60af116cd2191435bdc7876ce5483905bd944a01dec2c41e5736ae4ffeb628ea74eeef205e7b5e0c0e04520b58e14aa3240bf9a2de0dfd9b9
-
Filesize
196KB
MD58d0042b80d25d0c74a619a3d594c9deb
SHA1c13fe83d6cfbdd37d8e24a908ed65fedd964e723
SHA256955025ec2a4a635f597080fac9287b2692b69536b16f7c736a041a163011cb85
SHA5120571e96d5615a75f8b2fce43488074e4ed84b69180d087f361542a08d49065a08b995996b578ad926c589035eccbd57a0431eb2ff5f12e472e97889774fb94c0
-
Filesize
196KB
MD58d0042b80d25d0c74a619a3d594c9deb
SHA1c13fe83d6cfbdd37d8e24a908ed65fedd964e723
SHA256955025ec2a4a635f597080fac9287b2692b69536b16f7c736a041a163011cb85
SHA5120571e96d5615a75f8b2fce43488074e4ed84b69180d087f361542a08d49065a08b995996b578ad926c589035eccbd57a0431eb2ff5f12e472e97889774fb94c0
-
Filesize
275KB
MD532a56b4e67436bdd3d39809a9be949b8
SHA1dac60ca2763d18ce9451b28f4d0a1d9fbdc3f4fc
SHA2565f6475a6d18503fbc2eb916e32ed1d6b4769f58d364ef2f94c2fd1a52c9aa1df
SHA51270b8dc7b1509cfa3975c97baa4a2b49746fac2438307ab97ae67bdd0e98d2d26e05f2e83c0349234b4deb9314715aea01084fd11e7f77b2d4bba856aa7726e47
-
Filesize
275KB
MD532a56b4e67436bdd3d39809a9be949b8
SHA1dac60ca2763d18ce9451b28f4d0a1d9fbdc3f4fc
SHA2565f6475a6d18503fbc2eb916e32ed1d6b4769f58d364ef2f94c2fd1a52c9aa1df
SHA51270b8dc7b1509cfa3975c97baa4a2b49746fac2438307ab97ae67bdd0e98d2d26e05f2e83c0349234b4deb9314715aea01084fd11e7f77b2d4bba856aa7726e47