Analysis
-
max time kernel
151s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2023 01:31
Static task
static1
Behavioral task
behavioral1
Sample
d0a2035c0431796c138a26d1c9a75142b613c5417dc96a9200723870d0b3a687.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d0a2035c0431796c138a26d1c9a75142b613c5417dc96a9200723870d0b3a687.exe
Resource
win10v2004-20230220-en
General
-
Target
d0a2035c0431796c138a26d1c9a75142b613c5417dc96a9200723870d0b3a687.exe
-
Size
1.2MB
-
MD5
6af6a7fac1197a9b12b28c0e4db8c18a
-
SHA1
357ae7d706de393d8743dbbe0d94bc87922643cf
-
SHA256
d0a2035c0431796c138a26d1c9a75142b613c5417dc96a9200723870d0b3a687
-
SHA512
6a89fbff98be91a89008830f7aa3f88ef8fcd4c9967d1443abda4bad71097f6abc6a1371e0767e8853a3e52bd4e3f944f4ccbb7f8173d06d7c777bc71823f899
-
SSDEEP
24576:2TbBv5rUyXVTW6Hq69NuPQPyUfezTtJiC7nVUriVGAQ+hw17tq:IBJTzHqBQrW3tEwnGtdCOBq
Malware Config
Extracted
redline
2
135.181.7.171:81
-
auth_value
101013a5e99e0857595aae297a11351d
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
d0a2035c0431796c138a26d1c9a75142b613c5417dc96a9200723870d0b3a687.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation d0a2035c0431796c138a26d1c9a75142b613c5417dc96a9200723870d0b3a687.exe -
Executes dropped EXE 2 IoCs
Processes:
4usfliof.exeyee9mbi69cm7.exepid process 328 4usfliof.exe 4664 yee9mbi69cm7.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
4usfliof.exeyee9mbi69cm7.exedescription pid process target process PID 328 set thread context of 4868 328 4usfliof.exe RegSvcs.exe PID 4664 set thread context of 4568 4664 yee9mbi69cm7.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3368 328 WerFault.exe 4usfliof.exe 3992 4664 WerFault.exe yee9mbi69cm7.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
RegSvcs.exepid process 4868 RegSvcs.exe 4868 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegSvcs.exedescription pid process Token: SeDebugPrivilege 4868 RegSvcs.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
d0a2035c0431796c138a26d1c9a75142b613c5417dc96a9200723870d0b3a687.execmd.exe4usfliof.exeyee9mbi69cm7.exedescription pid process target process PID 4388 wrote to memory of 3232 4388 d0a2035c0431796c138a26d1c9a75142b613c5417dc96a9200723870d0b3a687.exe cmd.exe PID 4388 wrote to memory of 3232 4388 d0a2035c0431796c138a26d1c9a75142b613c5417dc96a9200723870d0b3a687.exe cmd.exe PID 4388 wrote to memory of 3232 4388 d0a2035c0431796c138a26d1c9a75142b613c5417dc96a9200723870d0b3a687.exe cmd.exe PID 3232 wrote to memory of 208 3232 cmd.exe cmd.exe PID 3232 wrote to memory of 208 3232 cmd.exe cmd.exe PID 3232 wrote to memory of 208 3232 cmd.exe cmd.exe PID 3232 wrote to memory of 328 3232 cmd.exe 4usfliof.exe PID 3232 wrote to memory of 328 3232 cmd.exe 4usfliof.exe PID 3232 wrote to memory of 328 3232 cmd.exe 4usfliof.exe PID 3232 wrote to memory of 4664 3232 cmd.exe yee9mbi69cm7.exe PID 3232 wrote to memory of 4664 3232 cmd.exe yee9mbi69cm7.exe PID 3232 wrote to memory of 4664 3232 cmd.exe yee9mbi69cm7.exe PID 328 wrote to memory of 4868 328 4usfliof.exe RegSvcs.exe PID 328 wrote to memory of 4868 328 4usfliof.exe RegSvcs.exe PID 328 wrote to memory of 4868 328 4usfliof.exe RegSvcs.exe PID 328 wrote to memory of 4868 328 4usfliof.exe RegSvcs.exe PID 328 wrote to memory of 4868 328 4usfliof.exe RegSvcs.exe PID 4664 wrote to memory of 4568 4664 yee9mbi69cm7.exe RegSvcs.exe PID 4664 wrote to memory of 4568 4664 yee9mbi69cm7.exe RegSvcs.exe PID 4664 wrote to memory of 4568 4664 yee9mbi69cm7.exe RegSvcs.exe PID 4664 wrote to memory of 4568 4664 yee9mbi69cm7.exe RegSvcs.exe PID 4664 wrote to memory of 4568 4664 yee9mbi69cm7.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0a2035c0431796c138a26d1c9a75142b613c5417dc96a9200723870d0b3a687.exe"C:\Users\Admin\AppData\Local\Temp\d0a2035c0431796c138a26d1c9a75142b613c5417dc96a9200723870d0b3a687.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.bat" "2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c dir /b "*.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\4usfliof.exe"4usfliof.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 328 -s 2924⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\yee9mbi69cm7.exe"yee9mbi69cm7.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4664 -s 2924⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 328 -ip 3281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 4664 -ip 46641⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\4usfliof.exeFilesize
3.4MB
MD5b154114f2d13496dc9630cac4e707672
SHA1ade072fea73e4f76c073e17bb75dc2d13b275919
SHA25672d79fb5cfd43477a78468976fa015486f13504f36315379ccd3ede0e84b3ddb
SHA512dfd8fef8eea701b017b935b62f99f306a9ba9adfd9a5fe0a5c18346b2e6cc432af62dda2638ded60c5d09b1b53fe8e75d1c5aac4d9f6cac6306a3a3cbbbfb8af
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\4usfliof.exeFilesize
3.4MB
MD5b154114f2d13496dc9630cac4e707672
SHA1ade072fea73e4f76c073e17bb75dc2d13b275919
SHA25672d79fb5cfd43477a78468976fa015486f13504f36315379ccd3ede0e84b3ddb
SHA512dfd8fef8eea701b017b935b62f99f306a9ba9adfd9a5fe0a5c18346b2e6cc432af62dda2638ded60c5d09b1b53fe8e75d1c5aac4d9f6cac6306a3a3cbbbfb8af
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.batFilesize
85B
MD5a1099e439c142789ff2183c18f77cdca
SHA1f7efcca92b6138c091c926277d5c29dfefe0872e
SHA2568fd34feb39582f009552d460e8d24539dd00bb1251f2e721277fb3559c998917
SHA5127bc34150f5662589f6d16803716deb7974c56e4665907bd7e2a4337c6e9397603b3a8d9e4f8f64c5bbb4c948c168843555fcc744f86eb932cddb3d94af6b7cdc
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\yee9mbi69cm7.exeFilesize
5.7MB
MD5d076d83093cf70d43ae8202cb9603d0d
SHA14df9ed4524474c5108453453dcfe837aa148b761
SHA256f84056220c4d155ccd53c681575df2c05185fdfdf17780a1f3722cc6f10f0c30
SHA512b7c38277d614dfe5c28dd61d7289c9b3d306e51811df1237ccf8ecb851c9a20692f6fe9641f367b507b87340ad96c8617e95dd60e954bd6d63aa0e4780317310
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\yee9mbi69cm7.exeFilesize
5.7MB
MD5d076d83093cf70d43ae8202cb9603d0d
SHA14df9ed4524474c5108453453dcfe837aa148b761
SHA256f84056220c4d155ccd53c681575df2c05185fdfdf17780a1f3722cc6f10f0c30
SHA512b7c38277d614dfe5c28dd61d7289c9b3d306e51811df1237ccf8ecb851c9a20692f6fe9641f367b507b87340ad96c8617e95dd60e954bd6d63aa0e4780317310
-
memory/4568-176-0x0000000000400000-0x000000000056C000-memory.dmpFilesize
1.4MB
-
memory/4568-181-0x0000000000400000-0x000000000056C000-memory.dmpFilesize
1.4MB
-
memory/4568-178-0x0000000000400000-0x000000000056C000-memory.dmpFilesize
1.4MB
-
memory/4568-177-0x0000000000400000-0x000000000056C000-memory.dmpFilesize
1.4MB
-
memory/4568-156-0x0000000000400000-0x000000000056C000-memory.dmpFilesize
1.4MB
-
memory/4868-153-0x0000000005C20000-0x0000000006238000-memory.dmpFilesize
6.1MB
-
memory/4868-447-0x0000000006960000-0x00000000069F2000-memory.dmpFilesize
584KB
-
memory/4868-155-0x00000000056D0000-0x00000000056E2000-memory.dmpFilesize
72KB
-
memory/4868-154-0x00000000057A0000-0x00000000058AA000-memory.dmpFilesize
1.0MB
-
memory/4868-148-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/4868-180-0x0000000005750000-0x0000000005760000-memory.dmpFilesize
64KB
-
memory/4868-443-0x0000000006E10000-0x00000000073B4000-memory.dmpFilesize
5.6MB
-
memory/4868-157-0x0000000005760000-0x000000000579C000-memory.dmpFilesize
240KB
-
memory/4868-456-0x0000000006A00000-0x0000000006A66000-memory.dmpFilesize
408KB
-
memory/4868-519-0x0000000005750000-0x0000000005760000-memory.dmpFilesize
64KB
-
memory/4868-604-0x0000000007880000-0x0000000007A42000-memory.dmpFilesize
1.8MB
-
memory/4868-613-0x0000000008690000-0x0000000008BBC000-memory.dmpFilesize
5.2MB
-
memory/4868-634-0x0000000007730000-0x00000000077A6000-memory.dmpFilesize
472KB
-
memory/4868-637-0x00000000077B0000-0x0000000007800000-memory.dmpFilesize
320KB