Analysis
-
max time kernel
52s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2023 15:38
Static task
static1
Behavioral task
behavioral1
Sample
9f390e9ca00464a6f7e1ce321baceb22.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
9f390e9ca00464a6f7e1ce321baceb22.exe
Resource
win10v2004-20230220-en
General
-
Target
9f390e9ca00464a6f7e1ce321baceb22.exe
-
Size
13.5MB
-
MD5
9f390e9ca00464a6f7e1ce321baceb22
-
SHA1
d5d813e0bad5c64cd95b23919eba1432778b7965
-
SHA256
255cb2aeeac6f7dd8359b29b0fbbb02122683894e061b6b305684e396fef85a7
-
SHA512
54b958487f40537c80374acb37d0cec27bb169fc5549768fb05a161de1a10546cea7c6be1d59df5fb615ed8285f0bf03f33203a1ec0a28fcc6694497e6a6ee2f
-
SSDEEP
393216:M1xsX4B8eD3F+oI9KtC9I5cfZLxsaZf4nT70mrsMYd:M1GI9FQmOfZLSP0Qc
Malware Config
Extracted
redline
5350206221
195.20.17.139:80
-
auth_value
cf75908d75b4508135a38c8679c86f6e
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Nirsoft 1 IoCs
Processes:
resource yara_rule behavioral2/memory/736-186-0x0000000000400000-0x000000000041C000-memory.dmp Nirsoft -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
9f390e9ca00464a6f7e1ce321baceb22.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation 9f390e9ca00464a6f7e1ce321baceb22.exe -
Executes dropped EXE 6 IoCs
Processes:
nig1r21312312.exenig1r21312312.exenig1r21312312.exeanimecool.exenig1r21312312.exenig1r21312312.exepid process 736 nig1r21312312.exe 5088 nig1r21312312.exe 1896 nig1r21312312.exe 2944 animecool.exe 2704 nig1r21312312.exe 3984 nig1r21312312.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\nig1r21312312.exe upx C:\Users\Admin\AppData\Local\Temp\nig1r21312312.exe upx C:\Users\Admin\AppData\Local\Temp\nig1r21312312.exe upx behavioral2/memory/736-186-0x0000000000400000-0x000000000041C000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\nig1r21312312.exe upx C:\Users\Admin\AppData\Local\Temp\nig1r21312312.exe upx C:\Users\Admin\AppData\Local\Temp\nig1r21312312.exe upx -
Uses the VBS compiler for execution 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4084 5072 WerFault.exe animecool2.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2792 timeout.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
9f390e9ca00464a6f7e1ce321baceb22.exenig1r21312312.exenig1r21312312.execmd.exenig1r21312312.execmd.exedescription pid process target process PID 4724 wrote to memory of 736 4724 9f390e9ca00464a6f7e1ce321baceb22.exe nig1r21312312.exe PID 4724 wrote to memory of 736 4724 9f390e9ca00464a6f7e1ce321baceb22.exe nig1r21312312.exe PID 4724 wrote to memory of 736 4724 9f390e9ca00464a6f7e1ce321baceb22.exe nig1r21312312.exe PID 4724 wrote to memory of 5088 4724 9f390e9ca00464a6f7e1ce321baceb22.exe nig1r21312312.exe PID 4724 wrote to memory of 5088 4724 9f390e9ca00464a6f7e1ce321baceb22.exe nig1r21312312.exe PID 4724 wrote to memory of 5088 4724 9f390e9ca00464a6f7e1ce321baceb22.exe nig1r21312312.exe PID 4724 wrote to memory of 1896 4724 9f390e9ca00464a6f7e1ce321baceb22.exe nig1r21312312.exe PID 4724 wrote to memory of 1896 4724 9f390e9ca00464a6f7e1ce321baceb22.exe nig1r21312312.exe PID 4724 wrote to memory of 1896 4724 9f390e9ca00464a6f7e1ce321baceb22.exe nig1r21312312.exe PID 736 wrote to memory of 2944 736 nig1r21312312.exe animecool.exe PID 736 wrote to memory of 2944 736 nig1r21312312.exe animecool.exe PID 736 wrote to memory of 2944 736 nig1r21312312.exe animecool.exe PID 4724 wrote to memory of 2704 4724 9f390e9ca00464a6f7e1ce321baceb22.exe nig1r21312312.exe PID 4724 wrote to memory of 2704 4724 9f390e9ca00464a6f7e1ce321baceb22.exe nig1r21312312.exe PID 4724 wrote to memory of 2704 4724 9f390e9ca00464a6f7e1ce321baceb22.exe nig1r21312312.exe PID 2704 wrote to memory of 2112 2704 nig1r21312312.exe cmd.exe PID 2704 wrote to memory of 2112 2704 nig1r21312312.exe cmd.exe PID 2704 wrote to memory of 2112 2704 nig1r21312312.exe cmd.exe PID 2112 wrote to memory of 3984 2112 cmd.exe nig1r21312312.exe PID 2112 wrote to memory of 3984 2112 cmd.exe nig1r21312312.exe PID 2112 wrote to memory of 3984 2112 cmd.exe nig1r21312312.exe PID 3984 wrote to memory of 4172 3984 nig1r21312312.exe cmd.exe PID 3984 wrote to memory of 4172 3984 nig1r21312312.exe cmd.exe PID 3984 wrote to memory of 4172 3984 nig1r21312312.exe cmd.exe PID 4172 wrote to memory of 2792 4172 cmd.exe timeout.exe PID 4172 wrote to memory of 2792 4172 cmd.exe timeout.exe PID 4172 wrote to memory of 2792 4172 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f390e9ca00464a6f7e1ce321baceb22.exe"C:\Users\Admin\AppData\Local\Temp\9f390e9ca00464a6f7e1ce321baceb22.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\nig1r21312312.exe"C:\Users\Admin\AppData\Local\Temp\nig1r21312312.exe" exec hide C:\Users\Admin\AppData\Local\Temp\animecool.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Users\Admin\AppData\Local\Temp\animecool.exeC:\Users\Admin\AppData\Local\Temp\animecool.exe3⤵
- Executes dropped EXE
PID:2944 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"4⤵PID:2104
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nig1r21312312.exe"C:\Users\Admin\AppData\Local\Temp\nig1r21312312.exe" exec hide C:\Users\Admin\AppData\Local\Temp\animecool2.exe2⤵
- Executes dropped EXE
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\animecool2.exeC:\Users\Admin\AppData\Local\Temp\animecool2.exe3⤵PID:4900
-
C:\Users\Admin\AppData\Local\Temp\animecool2.exe"C:\Users\Admin\AppData\Local\Temp\animecool2.exe"4⤵PID:5072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 11725⤵
- Program crash
PID:4084
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nig1r21312312.exe"C:\Users\Admin\AppData\Local\Temp\nig1r21312312.exe" exec hide C:\Users\Admin\AppData\Local\Temp\govno312321412412.bat2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\govno312321412412.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\nig1r21312312.exenig1r21312312.exe exec hide fds333333333333333.bat4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3984
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nig1r21312312.exe"C:\Users\Admin\AppData\Local\Temp\nig1r21312312.exe" exec hide C:\Users\Admin\AppData\Local\Temp\poxuipluspoxui.exe2⤵
- Executes dropped EXE
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\poxuipluspoxui.exeC:\Users\Admin\AppData\Local\Temp\poxuipluspoxui.exe3⤵PID:2168
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c fds333333333333333.bat1⤵
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\SysWOW64\timeout.exetimeout 602⤵
- Delays execution with timeout.exe
PID:2792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5072 -ip 50721⤵PID:2092
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD596289e39f5ebfe7268735134d6ff1b98
SHA1a84ea4b2f4ac506ccc1ab6d576c398685acc2a84
SHA2562dd956b770de14caca1852de96886e69650cb22ca001cf3b8aa2362d9b40aa8c
SHA51269edb2e6193561933ec7e13850af489b8ae917134e096d36d0e36f6156f28422bc39ffbc60e56e8332783fc0e10f7b8850fbe31d4560e0ee5ec3776b5d251ea0
-
Filesize
1.8MB
MD596289e39f5ebfe7268735134d6ff1b98
SHA1a84ea4b2f4ac506ccc1ab6d576c398685acc2a84
SHA2562dd956b770de14caca1852de96886e69650cb22ca001cf3b8aa2362d9b40aa8c
SHA51269edb2e6193561933ec7e13850af489b8ae917134e096d36d0e36f6156f28422bc39ffbc60e56e8332783fc0e10f7b8850fbe31d4560e0ee5ec3776b5d251ea0
-
Filesize
192.5MB
MD5171e9c1ddd9f75e8fc060013a1e00093
SHA1637db7c8ae841a737d7741faf24ffeb2963b9e12
SHA2565346e72672a09f81b604d792793dc822920dc96c3147cf62205c5a927ab52927
SHA512dacea57989b01fedc360fd2f778ad88d09c4d9785411ad81c42cb2f9cd2f10232ae8a6413ebbe2acf0a1de51267e9b04a9c2ff04e7c9adf4afa1d15f00d0183b
-
Filesize
194.1MB
MD5bbc3242a96a37ad43c6164e0aaac5e70
SHA108b2338d29dd6821388568386dc1c0f2523c61c9
SHA2562d2fe4784d860d54e749096e915b2c82ae75adfbc40c3afcd0d1baf89201f26b
SHA512a49881a8a2c6514186eecf3af768929faec44837ccb25c70f8552108345dd27093e749bb49e507b9cc4538b3ef98ed0f0bfc9e84d8cb1f4f826ce04a2df0cd08
-
Filesize
195.6MB
MD58dcbb6c8a3ad7f97a8f63fec4120f3e8
SHA1a13841c10efa5f0bb00e02177c944bcaffbd4aba
SHA256642fd8111485ce8a4b60cd06a1c83ab5843a9dcf8d218dea52dc0ff218b4190e
SHA51299e792160cdd43ae14ca4b578ba213d47e30b84ebf56107ab7f881f84344fdc39c222b03f60b387a89df44c8fa936f253c13517197eae0b410662bde40a4056e
-
Filesize
55B
MD578d34993a3f671785ab9ad1097e6620e
SHA1ff600ffda2d8661cba3f1352b6df9eeff39c3b10
SHA256988bf35e06ed737cff745ce0b33df976634072586148fba37f8056b294c0404c
SHA512d3491ca6825c5f0b9ed4d345cc7627a752b04ab5c1f638c9a921c7619e8c08029e4d56bf773012baa232d76964dc41af6d0f54712d5671b3bc9eabc10f710cce
-
Filesize
64B
MD5d930ae56d269e8cbf42a884838a1940f
SHA186b54cc38ea58a602a8418c256deac72ef7bda95
SHA2564cab9b91745224c84bf43bd0702d6754f311f0a0c62669311d05038c3fc06d32
SHA512db647a3a570981b5171d8b97c32ded9a01ec14dd96b79a483d794fa53c11373324a01e28565f67d27c89edace73435fe875f7462f52c57e207390adaec16ecb2
-
Filesize
559.6MB
MD5cd8708f1e71b377c69ba40fd319f0b68
SHA1faf96a034842ed610ed09ffacf1172818cc5452d
SHA25672dfe4c21326fe53b0a002d87bfdf255790b5a6497857363e6793bece7faace7
SHA5127ae9529068cb8cde7b0cf006b14aaff63035764a2c79d9ae96638f376b28a31a734b3eeff65388b9cc34116e295dff3e1c1fc8d1a60783b146f3cb17124cae38
-
Filesize
223.9MB
MD50628a109432cb5d140e9a923d15a552b
SHA14e867aa5540102d3cad2a4221e09e68406a5fb99
SHA25666fb1e396db828e4c57fee5ef843e64ca374d026d65f3dba789000b845697669
SHA512ef4f7e9064a5be98608f9316d69e90653b9f8ba9381c2ab3aef2d03a8a4f14dd84386b3cc64ce6451f87b6ef6bbe8e8f64c3f166a834a0fe89eef57987e1f1ea
-
Filesize
222.8MB
MD50dc4cf03b7f6d2ca1a10b29102d651de
SHA1b5ab1316d2cacc481eaf302ba6ebe24bfaa06f40
SHA2569e54e56bdc7db641b03cd929a2d537fbb3b29d489bcc05a765bd749e43c09b5e
SHA51202a5cbf678c5127d9507ae5cfbbb580ec7237cc0244ed5c282ba13ab50e0a277e6aab2c3bc9ce16886bda31efd518aa2488832534812f8075ef762c3e19c3236
-
Filesize
215.7MB
MD5a31d909ce931c7816419979be2d5291e
SHA17469c204a7af2bb9b1be8676bce5358a82326e55
SHA256ae4bd4c33b90934bd8c77622dc35c486a4a37f8d2599185d87edb8d6d25c08e9
SHA51250c854ad01b2ff8a9e1abeea463942029077fc44ce953cb770afbb78f12bf93dc9b8b0d2e8f646528524ae63de0d584e18975401127a88851f4c4d8995677d3c
-
Filesize
227.4MB
MD5e787f39bec6087beb8632837df8273d0
SHA14101e6b016be56962451c32a282a1083a92c7c21
SHA256812be8ea1f8acbe2eb6c97d6b07be335b47e8bcba52eba05e00bc0627ab50b0c
SHA51223e56ba1fa46f12ade9a078420b60aa77e5407a202fa345122547064ab50ad42ea182a96c9d1fa04c99c1a9cc54c41df783379bd2af0509c18fb99ab66836934
-
Filesize
219.5MB
MD5332101d30c44bf53daad27ae1f6d2cb9
SHA1c41322ab85e77e338b2bb1da82e4efede0dc0912
SHA2560496fd9c68f6ba89eb69a0b70a3a86f8f19f94ce90d775b8816213390869bd6a
SHA512a6c9d7c6fa8faee89a72c6bafc089db6dbfd604d476f1f32a7836b448dd15e918df91ae8d4b2aab2d88c2c3c56307ec3b7078525e61a6f3420a6e2ee4d27a5ab
-
Filesize
912B
MD513f4b9e6b4712ba1ffa2d1946d69254c
SHA10376ca7dd2ce25ed14f008639623b8bbb24a138b
SHA2563a7fe1103dc1b701455ae455709e6bd4c303f432160f5f169bc5b79f9eabd2d2
SHA512e62b27d24a7ff7a201b9815b6207469372ed1e973246231367414289ca656427c4e2c13406d10fc4bf5752c473af908518ca2d266f5bc9574e69ac90588f1c5c
-
Filesize
1KB
MD551f553a99e273bfabf19c2eac1373ca3
SHA1e8d64414f068c7608fe8f070d69ba28e8d23924a
SHA25698f1c70825c1764063e60de7eda997ace6b1deae30347a7813607ef54ab8fdee
SHA512d1be17fbca473bae19bf1c21e96aec706c17ebae746ec5f1136a4acbed5ce123fbfc237d1994b9328e540567004189ebb5579ad560073fe908e73cddfbf5cb35
-
Filesize
1KB
MD5b1a22c2794a486715eaddda0dc50116f
SHA1549b88d2ff18841bdb29b78bd90a202e9696435e
SHA2569c68667236a317346a0b43cdf291e6c77a336e103b3f64beeab29d32ef02dfb9
SHA5122c048256475a0645644b59bcc97ddbc7860f73be0a1422a69f850abc13ef68acb31f179f725b7ca4ae43c392707148154a3cdddf3a2030670317163306d5326b
-
Filesize
1KB
MD5b1a22c2794a486715eaddda0dc50116f
SHA1549b88d2ff18841bdb29b78bd90a202e9696435e
SHA2569c68667236a317346a0b43cdf291e6c77a336e103b3f64beeab29d32ef02dfb9
SHA5122c048256475a0645644b59bcc97ddbc7860f73be0a1422a69f850abc13ef68acb31f179f725b7ca4ae43c392707148154a3cdddf3a2030670317163306d5326b
-
Filesize
1KB
MD572d54a0e12520c856a030bd69fe07dd9
SHA14ae0bef624581c833555e4ed7a3bc4d013aed71a
SHA2560f9d6a3df7abc176229f28931b67a8bfe36b62d529c4436b44fcf92e8030a9e4
SHA512fe591c06d2668426cfa700acbe7b4e7178f56a831338e95bc97e51d314ef903a0018358bce4671f95a6cc9cc9bb795899e75846f9a2f275c3676f9ca69b7ba40
-
Filesize
1KB
MD572d54a0e12520c856a030bd69fe07dd9
SHA14ae0bef624581c833555e4ed7a3bc4d013aed71a
SHA2560f9d6a3df7abc176229f28931b67a8bfe36b62d529c4436b44fcf92e8030a9e4
SHA512fe591c06d2668426cfa700acbe7b4e7178f56a831338e95bc97e51d314ef903a0018358bce4671f95a6cc9cc9bb795899e75846f9a2f275c3676f9ca69b7ba40
-
Filesize
1KB
MD5b1a22c2794a486715eaddda0dc50116f
SHA1549b88d2ff18841bdb29b78bd90a202e9696435e
SHA2569c68667236a317346a0b43cdf291e6c77a336e103b3f64beeab29d32ef02dfb9
SHA5122c048256475a0645644b59bcc97ddbc7860f73be0a1422a69f850abc13ef68acb31f179f725b7ca4ae43c392707148154a3cdddf3a2030670317163306d5326b
-
Filesize
12B
MD5ba0b49752d76706c744130521f8f58c2
SHA1aead73c555ac868c6aec637ee5bdfba52153f60f
SHA256659858634a37fb9a82b1a4638b5a3226c95abe029b976c4e16396013e37756b0
SHA512182ed35a5ddb82735ca16c8dc25a69a0147dee2da70c8ab5d77c002d3df8916cab0ce0960f813c73ccf1ec585f1925757880625520dfd46b8cea52c0f7736704
-
Filesize
12B
MD5ba0b49752d76706c744130521f8f58c2
SHA1aead73c555ac868c6aec637ee5bdfba52153f60f
SHA256659858634a37fb9a82b1a4638b5a3226c95abe029b976c4e16396013e37756b0
SHA512182ed35a5ddb82735ca16c8dc25a69a0147dee2da70c8ab5d77c002d3df8916cab0ce0960f813c73ccf1ec585f1925757880625520dfd46b8cea52c0f7736704
-
Filesize
960B
MD5449411ac8eba78bcac1103ab055f3ae6
SHA14fe0336ed4bc9732b665ef78db41324ca6e1dc38
SHA256ebefb966f956f4390ddaf22ec1664c41b5be3fe28c85fa314b9297b0a11fe11f
SHA51248e862a311e170a5fa6e168a80cef2ace10b87bb8fb1f7e56899d04978f131243939cbca994b5aeb7476f3db6c282cc4677695a41056f58e87c98e3822e13b4b
-
Filesize
96B
MD522c6378b8ff01ae8510843c81aa396b4
SHA17b1c635b9c2b01b76df82bf0b522ba92ddd22551
SHA256584152375a2700cb4530a1d18c6f677f0528fad648fab26b4f779bc9e4269640
SHA512a22c665cb60d1b33a6daf265deaab331ca8e884bd3d08ba19475c3a9e12f59ba3f17e73b8f3dcda3ec7e9f314496271dc2ce27eae3db22792dec3ddea1f5c2a2
-
Filesize
912B
MD50af4eed349bd1c076d6aecd9164f67ca
SHA10e6c484e9695a1afca8b03de2d30f62bb8e7f45f
SHA2567fcbdfef580af33fb503babe7ac49349b0e40c178d0d066e6f5289683a6e532e
SHA512401229408b441a5e9e2aed8652bfb59607b30b4c0f90c21a8548d6716909d1639471202d029a0cca337691ac0c90cce476056e65d6c439bef2041bc20bd41e96
-
Filesize
1KB
MD5da72df07989dd798166b18486d3b16ad
SHA1218ea4d8faae11bf8dacc2732eed9b0e29a4dd6f
SHA256e3573e3d610f340b4af943f2353f2b82afdd51c1aded42b830d0116f558e8f20
SHA512d600164db9870758988c99b36d241c219b69832695e8c8bd26f136eea0832e0a7d1d30130ce3f110e65447d535594a470cab03cd5b03bb029bf5908061365355
-
Filesize
1KB
MD5da72df07989dd798166b18486d3b16ad
SHA1218ea4d8faae11bf8dacc2732eed9b0e29a4dd6f
SHA256e3573e3d610f340b4af943f2353f2b82afdd51c1aded42b830d0116f558e8f20
SHA512d600164db9870758988c99b36d241c219b69832695e8c8bd26f136eea0832e0a7d1d30130ce3f110e65447d535594a470cab03cd5b03bb029bf5908061365355
-
Filesize
1KB
MD5da72df07989dd798166b18486d3b16ad
SHA1218ea4d8faae11bf8dacc2732eed9b0e29a4dd6f
SHA256e3573e3d610f340b4af943f2353f2b82afdd51c1aded42b830d0116f558e8f20
SHA512d600164db9870758988c99b36d241c219b69832695e8c8bd26f136eea0832e0a7d1d30130ce3f110e65447d535594a470cab03cd5b03bb029bf5908061365355
-
Filesize
1KB
MD5da72df07989dd798166b18486d3b16ad
SHA1218ea4d8faae11bf8dacc2732eed9b0e29a4dd6f
SHA256e3573e3d610f340b4af943f2353f2b82afdd51c1aded42b830d0116f558e8f20
SHA512d600164db9870758988c99b36d241c219b69832695e8c8bd26f136eea0832e0a7d1d30130ce3f110e65447d535594a470cab03cd5b03bb029bf5908061365355