Analysis
-
max time kernel
131s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22-03-2023 20:49
Static task
static1
Behavioral task
behavioral1
Sample
0bc3bf3d578af6f367f2ba1e2684c686ab2339fbcaa3edd38e83789a692df1e2.exe
Resource
win7-20230220-en
General
-
Target
0bc3bf3d578af6f367f2ba1e2684c686ab2339fbcaa3edd38e83789a692df1e2.exe
-
Size
313KB
-
MD5
f766e02da046dcd0b34eed69e2c68182
-
SHA1
b37a62cc2e299e204f64a741a532685bfd42289f
-
SHA256
0bc3bf3d578af6f367f2ba1e2684c686ab2339fbcaa3edd38e83789a692df1e2
-
SHA512
2a88b490526c09abc76ea28cb5e81733a5afb1571783e38c36595bd48b45350f2f70dceacee65c03e880d43a6e544e36b499cf9aa47b96baa7861b7eff0ae3db
-
SSDEEP
6144:Q+kiHuUvh9Qfpe08PcowUm6GQhT+hF96JRTTfmCtdS8tpqj:Q+kiHxzQfpN8sUmVQohF4JxNdSm0j
Malware Config
Extracted
redline
dozk
91.215.85.15:25916
-
auth_value
9f1dc4ff242fb8b53742acae0ef96143
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral2/memory/3752-136-0x0000000002770000-0x00000000027C2000-memory.dmp family_redline behavioral2/memory/3752-137-0x0000000002770000-0x00000000027C2000-memory.dmp family_redline behavioral2/memory/3752-139-0x0000000002770000-0x00000000027C2000-memory.dmp family_redline behavioral2/memory/3752-141-0x0000000002770000-0x00000000027C2000-memory.dmp family_redline behavioral2/memory/3752-143-0x0000000002770000-0x00000000027C2000-memory.dmp family_redline behavioral2/memory/3752-145-0x0000000002770000-0x00000000027C2000-memory.dmp family_redline behavioral2/memory/3752-147-0x0000000002770000-0x00000000027C2000-memory.dmp family_redline behavioral2/memory/3752-149-0x0000000002770000-0x00000000027C2000-memory.dmp family_redline behavioral2/memory/3752-151-0x0000000002770000-0x00000000027C2000-memory.dmp family_redline behavioral2/memory/3752-153-0x0000000002770000-0x00000000027C2000-memory.dmp family_redline behavioral2/memory/3752-155-0x0000000002770000-0x00000000027C2000-memory.dmp family_redline behavioral2/memory/3752-157-0x0000000002770000-0x00000000027C2000-memory.dmp family_redline behavioral2/memory/3752-159-0x0000000002770000-0x00000000027C2000-memory.dmp family_redline behavioral2/memory/3752-162-0x0000000002770000-0x00000000027C2000-memory.dmp family_redline behavioral2/memory/3752-166-0x0000000002770000-0x00000000027C2000-memory.dmp family_redline behavioral2/memory/3752-168-0x0000000002770000-0x00000000027C2000-memory.dmp family_redline behavioral2/memory/3752-170-0x0000000002770000-0x00000000027C2000-memory.dmp family_redline behavioral2/memory/3752-172-0x0000000002770000-0x00000000027C2000-memory.dmp family_redline behavioral2/memory/3752-174-0x0000000002770000-0x00000000027C2000-memory.dmp family_redline behavioral2/memory/3752-176-0x0000000002770000-0x00000000027C2000-memory.dmp family_redline behavioral2/memory/3752-178-0x0000000002770000-0x00000000027C2000-memory.dmp family_redline behavioral2/memory/3752-180-0x0000000002770000-0x00000000027C2000-memory.dmp family_redline behavioral2/memory/3752-182-0x0000000002770000-0x00000000027C2000-memory.dmp family_redline behavioral2/memory/3752-184-0x0000000002770000-0x00000000027C2000-memory.dmp family_redline behavioral2/memory/3752-186-0x0000000002770000-0x00000000027C2000-memory.dmp family_redline behavioral2/memory/3752-188-0x0000000002770000-0x00000000027C2000-memory.dmp family_redline behavioral2/memory/3752-190-0x0000000002770000-0x00000000027C2000-memory.dmp family_redline behavioral2/memory/3752-192-0x0000000002770000-0x00000000027C2000-memory.dmp family_redline behavioral2/memory/3752-194-0x0000000002770000-0x00000000027C2000-memory.dmp family_redline behavioral2/memory/3752-196-0x0000000002770000-0x00000000027C2000-memory.dmp family_redline behavioral2/memory/3752-198-0x0000000002770000-0x00000000027C2000-memory.dmp family_redline behavioral2/memory/3752-200-0x0000000002770000-0x00000000027C2000-memory.dmp family_redline behavioral2/memory/3752-202-0x0000000002770000-0x00000000027C2000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3588 3752 WerFault.exe 0bc3bf3d578af6f367f2ba1e2684c686ab2339fbcaa3edd38e83789a692df1e2.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
0bc3bf3d578af6f367f2ba1e2684c686ab2339fbcaa3edd38e83789a692df1e2.exetaskmgr.exepid process 3752 0bc3bf3d578af6f367f2ba1e2684c686ab2339fbcaa3edd38e83789a692df1e2.exe 3752 0bc3bf3d578af6f367f2ba1e2684c686ab2339fbcaa3edd38e83789a692df1e2.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
0bc3bf3d578af6f367f2ba1e2684c686ab2339fbcaa3edd38e83789a692df1e2.exetaskmgr.exedescription pid process Token: SeDebugPrivilege 3752 0bc3bf3d578af6f367f2ba1e2684c686ab2339fbcaa3edd38e83789a692df1e2.exe Token: SeDebugPrivilege 4644 taskmgr.exe Token: SeSystemProfilePrivilege 4644 taskmgr.exe Token: SeCreateGlobalPrivilege 4644 taskmgr.exe Token: 33 4644 taskmgr.exe Token: SeIncBasePriorityPrivilege 4644 taskmgr.exe -
Suspicious use of FindShellTrayWindow 40 IoCs
Processes:
taskmgr.exepid process 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe -
Suspicious use of SendNotifyMessage 40 IoCs
Processes:
taskmgr.exepid process 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0bc3bf3d578af6f367f2ba1e2684c686ab2339fbcaa3edd38e83789a692df1e2.exe"C:\Users\Admin\AppData\Local\Temp\0bc3bf3d578af6f367f2ba1e2684c686ab2339fbcaa3edd38e83789a692df1e2.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3752 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3752 -s 12122⤵
- Program crash
PID:3588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3752 -ip 37521⤵PID:3864
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4644