Analysis
-
max time kernel
85s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11-03-2023 10:51
Static task
static1
Behavioral task
behavioral1
Sample
446215913dd436aae1317ad90bf75677.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
446215913dd436aae1317ad90bf75677.exe
Resource
win10v2004-20230220-en
General
-
Target
446215913dd436aae1317ad90bf75677.exe
-
Size
4.2MB
-
MD5
446215913dd436aae1317ad90bf75677
-
SHA1
6f9c887f3fe17b16045fd2fa2d754c744447a4d2
-
SHA256
4bbf8447f25f44cabc87e9e20bf6594475f999a58e86c76bbad265d1db9bd513
-
SHA512
dd1b3f89efb92245640289b43ceedbf3bb562578286966d3a72bd03ff145f36054788353d39804489174c6f9018624820f54cad560394be7cf09f5127188acb3
-
SSDEEP
98304:scyyd+oHduCY3f3rFQtAjgyzZdGxHeqWF0KfgOjCH:sAswQFQtLUGFeqlm
Malware Config
Extracted
bitrat
1.38
185.246.220.122:1488
-
communication_password
81dc9bdb52d04dc20036dbd8313ed055
-
tor_process
tor
Extracted
redline
185.246.220.122:7164
-
auth_value
bc36aaf1c6447fa611401422deaa29dd
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
446215913dd436aae1317ad90bf75677.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation 446215913dd436aae1317ad90bf75677.exe -
Executes dropped EXE 1 IoCs
Processes:
rr.exepid process 2236 rr.exe -
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
446215913dd436aae1317ad90bf75677.exerr.exedescription pid process target process PID 2644 set thread context of 1732 2644 446215913dd436aae1317ad90bf75677.exe vbc.exe PID 2236 set thread context of 972 2236 rr.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2560 1732 WerFault.exe vbc.exe 3128 1732 WerFault.exe vbc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
vbc.exepid process 972 vbc.exe 972 vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
vbc.exedescription pid process Token: SeDebugPrivilege 972 vbc.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
446215913dd436aae1317ad90bf75677.exerr.exedescription pid process target process PID 2644 wrote to memory of 1732 2644 446215913dd436aae1317ad90bf75677.exe vbc.exe PID 2644 wrote to memory of 1732 2644 446215913dd436aae1317ad90bf75677.exe vbc.exe PID 2644 wrote to memory of 1732 2644 446215913dd436aae1317ad90bf75677.exe vbc.exe PID 2644 wrote to memory of 1732 2644 446215913dd436aae1317ad90bf75677.exe vbc.exe PID 2644 wrote to memory of 1732 2644 446215913dd436aae1317ad90bf75677.exe vbc.exe PID 2644 wrote to memory of 1732 2644 446215913dd436aae1317ad90bf75677.exe vbc.exe PID 2644 wrote to memory of 1732 2644 446215913dd436aae1317ad90bf75677.exe vbc.exe PID 2644 wrote to memory of 1732 2644 446215913dd436aae1317ad90bf75677.exe vbc.exe PID 2644 wrote to memory of 1732 2644 446215913dd436aae1317ad90bf75677.exe vbc.exe PID 2644 wrote to memory of 1732 2644 446215913dd436aae1317ad90bf75677.exe vbc.exe PID 2644 wrote to memory of 1732 2644 446215913dd436aae1317ad90bf75677.exe vbc.exe PID 2644 wrote to memory of 2236 2644 446215913dd436aae1317ad90bf75677.exe rr.exe PID 2644 wrote to memory of 2236 2644 446215913dd436aae1317ad90bf75677.exe rr.exe PID 2644 wrote to memory of 2236 2644 446215913dd436aae1317ad90bf75677.exe rr.exe PID 2236 wrote to memory of 972 2236 rr.exe vbc.exe PID 2236 wrote to memory of 972 2236 rr.exe vbc.exe PID 2236 wrote to memory of 972 2236 rr.exe vbc.exe PID 2236 wrote to memory of 972 2236 rr.exe vbc.exe PID 2236 wrote to memory of 972 2236 rr.exe vbc.exe PID 2236 wrote to memory of 972 2236 rr.exe vbc.exe PID 2236 wrote to memory of 972 2236 rr.exe vbc.exe PID 2236 wrote to memory of 972 2236 rr.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\446215913dd436aae1317ad90bf75677.exe"C:\Users\Admin\AppData\Local\Temp\446215913dd436aae1317ad90bf75677.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:1732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1732 -s 1843⤵
- Program crash
PID:2560 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1732 -s 1883⤵
- Program crash
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\rr.exe"C:\Users\Admin\AppData\Local\Temp\rr.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1732 -ip 17321⤵PID:1876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1732 -ip 17321⤵PID:3360
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
328KB
MD53f2f9975e1964be99f7e51ddc30f8c07
SHA11e6d873c70d4ac66daf350087a50409050eeeaff
SHA256843dc782676a45c6e1ab1197fe4d16ba3bc57943423eca12ec2b69ece68ac32f
SHA51289848eb83bced651355f5d8f5fe767fe7830ebe4287be4345223438318246089710e5393a4a75b7cf5c5eb2df22429ebd56f248b46e628c44ea8f5df88c5fb0d
-
Filesize
328KB
MD53f2f9975e1964be99f7e51ddc30f8c07
SHA11e6d873c70d4ac66daf350087a50409050eeeaff
SHA256843dc782676a45c6e1ab1197fe4d16ba3bc57943423eca12ec2b69ece68ac32f
SHA51289848eb83bced651355f5d8f5fe767fe7830ebe4287be4345223438318246089710e5393a4a75b7cf5c5eb2df22429ebd56f248b46e628c44ea8f5df88c5fb0d
-
Filesize
328KB
MD53f2f9975e1964be99f7e51ddc30f8c07
SHA11e6d873c70d4ac66daf350087a50409050eeeaff
SHA256843dc782676a45c6e1ab1197fe4d16ba3bc57943423eca12ec2b69ece68ac32f
SHA51289848eb83bced651355f5d8f5fe767fe7830ebe4287be4345223438318246089710e5393a4a75b7cf5c5eb2df22429ebd56f248b46e628c44ea8f5df88c5fb0d