Overview
overview
10Static
static
ByteSize.dll
windows10-2004-x64
1DeviceId.dll
windows10-2004-x64
1DotRas.dll
windows10-2004-x64
1DryIoc.dll
windows10-2004-x64
1Loader.exe
windows10-2004-x64
10language/d...es.dll
windows10-2004-x64
1language/d...es.dll
windows10-2004-x64
1language/e...es.dll
windows10-2004-x64
1language/e...es.dll
windows10-2004-x64
1language/e...es.dll
windows10-2004-x64
1language/f...es.dll
windows10-2004-x64
1language/h...es.dll
windows10-2004-x64
1language/i...es.dll
windows10-2004-x64
1language/p...Id.dll
windows10-2004-x64
1language/p...as.dll
windows10-2004-x64
1language/p...oc.dll
windows10-2004-x64
1language/p...es.dll
windows10-2004-x64
1language/p...e3.dll
windows10-2004-x64
3language/r...es.dll
windows10-2004-x64
1language/r...es.dll
windows10-2004-x64
1Analysis
-
max time kernel
160s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2022, 10:26
Static task
static1
Behavioral task
behavioral1
Sample
ByteSize.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral2
Sample
DeviceId.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
DotRas.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral4
Sample
DryIoc.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
Loader.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral6
Sample
language/de/IPVanish.resources.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
language/de/Microsoft.Win32.TaskScheduler.resources.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral8
Sample
language/en/IPVanish.resources.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
language/es/IPVanish.resources.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral10
Sample
language/es/Microsoft.Win32.TaskScheduler.resources.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral11
Sample
language/fr/Microsoft.Win32.TaskScheduler.resources.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral12
Sample
language/hi/IPVanish.resources.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
language/it/Microsoft.Win32.TaskScheduler.resources.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral14
Sample
language/pl/DeviceId.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
language/pl/DotRas.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral16
Sample
language/pl/DryIoc.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
language/pl/Microsoft.Win32.TaskScheduler.resources.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral18
Sample
language/pl/e_sqlite3.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral19
Sample
language/ru/IPVanish.resources.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral20
Sample
language/ru/Microsoft.Win32.TaskScheduler.resources.dll
Resource
win10v2004-20220812-en
General
-
Target
Loader.exe
-
Size
366KB
-
MD5
d46101844376994b61c19ea15912979d
-
SHA1
ef31093a80c6c25ec5a4f2324453e0b8aecc6166
-
SHA256
c6c4a2c8e5485d5021b74517948d39ffcff969405d8b26ebfa564a017dc61095
-
SHA512
a80a826e99f70363646368f02994f35258f41c2be5a77dbf5aac155470e071a9c927fe857841160370f277d1c5acfc3db0e13b397f6f23902381fcd04b4785c3
-
SSDEEP
6144:UmtFN9/Dzh8Wm6XtPCFbCbBBBB0y8ZvtoPEn+gIzqVJrBBBBBBBtchweBBoBBBB2:UmtFN9/DdkFbCbBBBB0ygymywBBBBBBU
Malware Config
Extracted
redline
@nmrzv_8
77.73.134.24:80
-
auth_value
1eec868816c2feca6b467734d7cb723e
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral5/memory/100300-133-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 3016 svhost.exe 452 Demeon.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4508 set thread context of 100300 4508 Loader.exe 82 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3800 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 100300 AppLaunch.exe 100300 AppLaunch.exe 5080 powershell.exe 5080 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 100300 AppLaunch.exe Token: SeDebugPrivilege 5080 powershell.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4508 wrote to memory of 100300 4508 Loader.exe 82 PID 4508 wrote to memory of 100300 4508 Loader.exe 82 PID 4508 wrote to memory of 100300 4508 Loader.exe 82 PID 4508 wrote to memory of 100300 4508 Loader.exe 82 PID 4508 wrote to memory of 100300 4508 Loader.exe 82 PID 100300 wrote to memory of 3016 100300 AppLaunch.exe 91 PID 100300 wrote to memory of 3016 100300 AppLaunch.exe 91 PID 3016 wrote to memory of 5080 3016 svhost.exe 92 PID 3016 wrote to memory of 5080 3016 svhost.exe 92 PID 5080 wrote to memory of 3800 5080 powershell.exe 94 PID 5080 wrote to memory of 3800 5080 powershell.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:100300 -
C:\Users\Admin\AppData\Local\Temp\svhost.exe"C:\Users\Admin\AppData\Local\Temp\svhost.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "SCHTASKS.exe /Create /SC MINUTE /ED 12/12/2030 /TN Soft /TR C:\Users\Admin\AppData\Roaming\Demeon.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /SC MINUTE /ED 12/12/2030 /TN Soft /TR C:\Users\Admin\AppData\Roaming\Demeon.exe5⤵
- Creates scheduled task(s)
PID:3800
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Demeon.exeC:\Users\Admin\AppData\Roaming\Demeon.exe1⤵
- Executes dropped EXE
PID:452
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.5MB
MD53862bfb4f1273249bd73a8cba326d9a1
SHA1952fc20b5c6aefbbdffdd2f33035bf57f31322e2
SHA2562cd9fea6d90b1971118a4b434ad7d51ec70e188824c755db0891adba40c458d8
SHA512cf2f01e674684a6f869fc030c7ef51bd88155763de79423647879a319c249a8bfe85bdeccc0fc8e7b815021a0a3490aee126302438b35e3bddd41f3d4938180d
-
Filesize
4.5MB
MD53862bfb4f1273249bd73a8cba326d9a1
SHA1952fc20b5c6aefbbdffdd2f33035bf57f31322e2
SHA2562cd9fea6d90b1971118a4b434ad7d51ec70e188824c755db0891adba40c458d8
SHA512cf2f01e674684a6f869fc030c7ef51bd88155763de79423647879a319c249a8bfe85bdeccc0fc8e7b815021a0a3490aee126302438b35e3bddd41f3d4938180d
-
Filesize
4.5MB
MD53862bfb4f1273249bd73a8cba326d9a1
SHA1952fc20b5c6aefbbdffdd2f33035bf57f31322e2
SHA2562cd9fea6d90b1971118a4b434ad7d51ec70e188824c755db0891adba40c458d8
SHA512cf2f01e674684a6f869fc030c7ef51bd88155763de79423647879a319c249a8bfe85bdeccc0fc8e7b815021a0a3490aee126302438b35e3bddd41f3d4938180d
-
Filesize
4.5MB
MD53862bfb4f1273249bd73a8cba326d9a1
SHA1952fc20b5c6aefbbdffdd2f33035bf57f31322e2
SHA2562cd9fea6d90b1971118a4b434ad7d51ec70e188824c755db0891adba40c458d8
SHA512cf2f01e674684a6f869fc030c7ef51bd88155763de79423647879a319c249a8bfe85bdeccc0fc8e7b815021a0a3490aee126302438b35e3bddd41f3d4938180d