Analysis
-
max time kernel
152s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2023, 09:30
Static task
static1
Behavioral task
behavioral1
Sample
088741941219ea34940cc026a4ee3738.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
088741941219ea34940cc026a4ee3738.exe
Resource
win10v2004-20230221-en
General
-
Target
088741941219ea34940cc026a4ee3738.exe
-
Size
4.7MB
-
MD5
088741941219ea34940cc026a4ee3738
-
SHA1
4b10ff754a208ba307fc41aa0970287c2a7ee58a
-
SHA256
3d92beaabcabe3357af8aa6785bb05164aad01caf3d1e897a7972c5e2fa41916
-
SHA512
a6283fd6982a45b6431f842776a49e70593b2e24d9bcb334027ee52e0136cb8313d5ddda7d5151a98e2092134713a984ab09b4f27ba1596926982279670c2338
-
SSDEEP
49152:JAEknD2qbP62EXPZEujwoDy2NaK6BlICAJkOKhbciZC:OEg2qbP62EXPZEujS2NN0lI1k1bcw
Malware Config
Extracted
redline
FM
91.193.43.63:81
-
auth_value
686ed4f5bce1c0303019c1940beddd78
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation 088741941219ea34940cc026a4ee3738.exe -
Executes dropped EXE 2 IoCs
pid Process 1292 t1.exe 3148 m2.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1292 set thread context of 3672 1292 t1.exe 85 PID 3148 set thread context of 4612 3148 m2.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3592 1292 WerFault.exe 84 2276 3148 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3672 RegSvcs.exe 3672 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4604 088741941219ea34940cc026a4ee3738.exe Token: SeDebugPrivilege 3672 RegSvcs.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 4604 wrote to memory of 1292 4604 088741941219ea34940cc026a4ee3738.exe 84 PID 4604 wrote to memory of 1292 4604 088741941219ea34940cc026a4ee3738.exe 84 PID 4604 wrote to memory of 1292 4604 088741941219ea34940cc026a4ee3738.exe 84 PID 4604 wrote to memory of 3148 4604 088741941219ea34940cc026a4ee3738.exe 83 PID 4604 wrote to memory of 3148 4604 088741941219ea34940cc026a4ee3738.exe 83 PID 4604 wrote to memory of 3148 4604 088741941219ea34940cc026a4ee3738.exe 83 PID 1292 wrote to memory of 3672 1292 t1.exe 85 PID 1292 wrote to memory of 3672 1292 t1.exe 85 PID 1292 wrote to memory of 3672 1292 t1.exe 85 PID 1292 wrote to memory of 3672 1292 t1.exe 85 PID 1292 wrote to memory of 3672 1292 t1.exe 85 PID 3148 wrote to memory of 3860 3148 m2.exe 88 PID 3148 wrote to memory of 3860 3148 m2.exe 88 PID 3148 wrote to memory of 3860 3148 m2.exe 88 PID 3148 wrote to memory of 4612 3148 m2.exe 89 PID 3148 wrote to memory of 4612 3148 m2.exe 89 PID 3148 wrote to memory of 4612 3148 m2.exe 89 PID 3148 wrote to memory of 4612 3148 m2.exe 89 PID 3148 wrote to memory of 4612 3148 m2.exe 89 PID 4604 wrote to memory of 3856 4604 088741941219ea34940cc026a4ee3738.exe 93 PID 4604 wrote to memory of 3856 4604 088741941219ea34940cc026a4ee3738.exe 93 PID 4604 wrote to memory of 3856 4604 088741941219ea34940cc026a4ee3738.exe 93 PID 3856 wrote to memory of 1440 3856 cmd.exe 95 PID 3856 wrote to memory of 1440 3856 cmd.exe 95 PID 3856 wrote to memory of 1440 3856 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\088741941219ea34940cc026a4ee3738.exe"C:\Users\Admin\AppData\Local\Temp\088741941219ea34940cc026a4ee3738.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Roaming\configurationValue\m2.exe"C:\Users\Admin\AppData\Roaming\configurationValue\m2.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:3860
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:4612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3148 -s 2403⤵
- Program crash
PID:2276
-
-
-
C:\Users\Admin\AppData\Roaming\configurationValue\t1.exe"C:\Users\Admin\AppData\Roaming\configurationValue\t1.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1292 -s 2643⤵
- Program crash
PID:3592
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "088741941219ea34940cc026a4ee3738.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 33⤵PID:1440
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1292 -ip 12921⤵PID:4520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3148 -ip 31481⤵PID:3228
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD52ed1def1f5dc78902379e135ca9fefd5
SHA132897b24c9723e446e97c97985e4b51fddd46880
SHA256bb519a602d022358ac9166cadfda5ed749a50e18cd3c7b0edb580b6355bef45e
SHA512dd71aec1a57c0ca93f1a92bb5c45da5eb4d992a18d08509be29f84b326bab58e32da90d0f76e735f173578566747f38e4235886e029d3822ce76d60198a6a984
-
Filesize
3.5MB
MD52ed1def1f5dc78902379e135ca9fefd5
SHA132897b24c9723e446e97c97985e4b51fddd46880
SHA256bb519a602d022358ac9166cadfda5ed749a50e18cd3c7b0edb580b6355bef45e
SHA512dd71aec1a57c0ca93f1a92bb5c45da5eb4d992a18d08509be29f84b326bab58e32da90d0f76e735f173578566747f38e4235886e029d3822ce76d60198a6a984
-
Filesize
3.5MB
MD52ed1def1f5dc78902379e135ca9fefd5
SHA132897b24c9723e446e97c97985e4b51fddd46880
SHA256bb519a602d022358ac9166cadfda5ed749a50e18cd3c7b0edb580b6355bef45e
SHA512dd71aec1a57c0ca93f1a92bb5c45da5eb4d992a18d08509be29f84b326bab58e32da90d0f76e735f173578566747f38e4235886e029d3822ce76d60198a6a984
-
Filesize
1.2MB
MD56c5e639b6f2990ec3ca245fabe57f90e
SHA1405341016cfdf326104fbbe7a8fe36e5ce6909a5
SHA256aafcc581a22eeb53e99fe4a96df687d116afc713227d2b60b76e5e47bda8c2b7
SHA5123a61fd6675c4e92bbcbaacb7955b093b8706a5f6759495d8313e4874cbeeff9f4d605e32ff86702c94d4f568dfa62a4f42812775183a24d34443892b7fde18b7
-
Filesize
1.2MB
MD56c5e639b6f2990ec3ca245fabe57f90e
SHA1405341016cfdf326104fbbe7a8fe36e5ce6909a5
SHA256aafcc581a22eeb53e99fe4a96df687d116afc713227d2b60b76e5e47bda8c2b7
SHA5123a61fd6675c4e92bbcbaacb7955b093b8706a5f6759495d8313e4874cbeeff9f4d605e32ff86702c94d4f568dfa62a4f42812775183a24d34443892b7fde18b7
-
Filesize
1.2MB
MD56c5e639b6f2990ec3ca245fabe57f90e
SHA1405341016cfdf326104fbbe7a8fe36e5ce6909a5
SHA256aafcc581a22eeb53e99fe4a96df687d116afc713227d2b60b76e5e47bda8c2b7
SHA5123a61fd6675c4e92bbcbaacb7955b093b8706a5f6759495d8313e4874cbeeff9f4d605e32ff86702c94d4f568dfa62a4f42812775183a24d34443892b7fde18b7