Analysis
-
max time kernel
48s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
07-06-2023 09:01
Static task
static1
Behavioral task
behavioral1
Sample
3f0e8a9d61be8b596b4be752965295ad.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3f0e8a9d61be8b596b4be752965295ad.exe
Resource
win10v2004-20230220-en
General
-
Target
3f0e8a9d61be8b596b4be752965295ad.exe
-
Size
1.1MB
-
MD5
3f0e8a9d61be8b596b4be752965295ad
-
SHA1
23399af014c60bcd53af9591a6bb80bc09772139
-
SHA256
69f24003a768ac6451b4bac285475486d27c39723f474e3b8a19c61ceb732838
-
SHA512
340137d0b76a523dc680847f656048f02545a306d5fac927fd53bfe41e07ab0fea893a821e45344e2ade31d078ec6cd1cff4a6398e09321037973df703fcd8e7
-
SSDEEP
6144:Tuo1XQlPoSlw4524UcL/LHh5Z8Z0AOkGZKWklMdGwuss4tjS0G+zLT1YS:TXX4flh524UOyKKWklMdGOtjasBY
Malware Config
Extracted
redline
1
95.216.249.153:81
-
auth_value
a290efd4796d37556cc5af7e83c91346
Extracted
systembc
5.42.95.122:4308
194.87.111.29:4308
Extracted
laplas
http://45.159.189.105
-
api_key
ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4
Extracted
laplas
http://45.159.189.105
-
api_key
ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
pid Process 1500 LengthLong64.exe 1736 LengthLong32.exe 1292 LengthLong32x.exe 2840 ntlhost.exe -
Loads dropped DLL 14 IoCs
pid Process 2036 RegSvcs.exe 2036 RegSvcs.exe 2036 RegSvcs.exe 2036 RegSvcs.exe 1792 WerFault.exe 1792 WerFault.exe 2036 RegSvcs.exe 2036 RegSvcs.exe 1792 WerFault.exe 1892 WerFault.exe 1892 WerFault.exe 1892 WerFault.exe 1292 LengthLong32x.exe 1292 LengthLong32x.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" LengthLong32x.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1472 set thread context of 2036 1472 3f0e8a9d61be8b596b4be752965295ad.exe 29 PID 1736 set thread context of 1240 1736 LengthLong32.exe 36 PID 1500 set thread context of 1416 1500 LengthLong64.exe 39 -
Program crash 3 IoCs
pid pid_target Process procid_target 1364 1472 WerFault.exe 27 1792 1736 WerFault.exe 34 1892 1500 WerFault.exe 32 -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 13 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2036 RegSvcs.exe 2036 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2036 RegSvcs.exe -
Suspicious use of WriteProcessMemory 55 IoCs
description pid Process procid_target PID 1472 wrote to memory of 2036 1472 3f0e8a9d61be8b596b4be752965295ad.exe 29 PID 1472 wrote to memory of 2036 1472 3f0e8a9d61be8b596b4be752965295ad.exe 29 PID 1472 wrote to memory of 2036 1472 3f0e8a9d61be8b596b4be752965295ad.exe 29 PID 1472 wrote to memory of 2036 1472 3f0e8a9d61be8b596b4be752965295ad.exe 29 PID 1472 wrote to memory of 2036 1472 3f0e8a9d61be8b596b4be752965295ad.exe 29 PID 1472 wrote to memory of 2036 1472 3f0e8a9d61be8b596b4be752965295ad.exe 29 PID 1472 wrote to memory of 2036 1472 3f0e8a9d61be8b596b4be752965295ad.exe 29 PID 1472 wrote to memory of 2036 1472 3f0e8a9d61be8b596b4be752965295ad.exe 29 PID 1472 wrote to memory of 2036 1472 3f0e8a9d61be8b596b4be752965295ad.exe 29 PID 1472 wrote to memory of 1364 1472 3f0e8a9d61be8b596b4be752965295ad.exe 30 PID 1472 wrote to memory of 1364 1472 3f0e8a9d61be8b596b4be752965295ad.exe 30 PID 1472 wrote to memory of 1364 1472 3f0e8a9d61be8b596b4be752965295ad.exe 30 PID 1472 wrote to memory of 1364 1472 3f0e8a9d61be8b596b4be752965295ad.exe 30 PID 2036 wrote to memory of 1500 2036 RegSvcs.exe 32 PID 2036 wrote to memory of 1500 2036 RegSvcs.exe 32 PID 2036 wrote to memory of 1500 2036 RegSvcs.exe 32 PID 2036 wrote to memory of 1500 2036 RegSvcs.exe 32 PID 2036 wrote to memory of 1736 2036 RegSvcs.exe 34 PID 2036 wrote to memory of 1736 2036 RegSvcs.exe 34 PID 2036 wrote to memory of 1736 2036 RegSvcs.exe 34 PID 2036 wrote to memory of 1736 2036 RegSvcs.exe 34 PID 1736 wrote to memory of 1240 1736 LengthLong32.exe 36 PID 1736 wrote to memory of 1240 1736 LengthLong32.exe 36 PID 1736 wrote to memory of 1240 1736 LengthLong32.exe 36 PID 1736 wrote to memory of 1240 1736 LengthLong32.exe 36 PID 1736 wrote to memory of 1240 1736 LengthLong32.exe 36 PID 1736 wrote to memory of 1240 1736 LengthLong32.exe 36 PID 1736 wrote to memory of 1240 1736 LengthLong32.exe 36 PID 1736 wrote to memory of 1240 1736 LengthLong32.exe 36 PID 1736 wrote to memory of 1240 1736 LengthLong32.exe 36 PID 1736 wrote to memory of 1792 1736 LengthLong32.exe 37 PID 1736 wrote to memory of 1792 1736 LengthLong32.exe 37 PID 1736 wrote to memory of 1792 1736 LengthLong32.exe 37 PID 1736 wrote to memory of 1792 1736 LengthLong32.exe 37 PID 2036 wrote to memory of 1292 2036 RegSvcs.exe 38 PID 2036 wrote to memory of 1292 2036 RegSvcs.exe 38 PID 2036 wrote to memory of 1292 2036 RegSvcs.exe 38 PID 2036 wrote to memory of 1292 2036 RegSvcs.exe 38 PID 1500 wrote to memory of 1416 1500 LengthLong64.exe 39 PID 1500 wrote to memory of 1416 1500 LengthLong64.exe 39 PID 1500 wrote to memory of 1416 1500 LengthLong64.exe 39 PID 1500 wrote to memory of 1416 1500 LengthLong64.exe 39 PID 1500 wrote to memory of 1416 1500 LengthLong64.exe 39 PID 1500 wrote to memory of 1416 1500 LengthLong64.exe 39 PID 1500 wrote to memory of 1416 1500 LengthLong64.exe 39 PID 1500 wrote to memory of 1416 1500 LengthLong64.exe 39 PID 1500 wrote to memory of 1416 1500 LengthLong64.exe 39 PID 1500 wrote to memory of 1892 1500 LengthLong64.exe 40 PID 1500 wrote to memory of 1892 1500 LengthLong64.exe 40 PID 1500 wrote to memory of 1892 1500 LengthLong64.exe 40 PID 1500 wrote to memory of 1892 1500 LengthLong64.exe 40 PID 1292 wrote to memory of 2840 1292 LengthLong32x.exe 42 PID 1292 wrote to memory of 2840 1292 LengthLong32x.exe 42 PID 1292 wrote to memory of 2840 1292 LengthLong32x.exe 42 PID 1292 wrote to memory of 2840 1292 LengthLong32x.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f0e8a9d61be8b596b4be752965295ad.exe"C:\Users\Admin\AppData\Local\Temp\3f0e8a9d61be8b596b4be752965295ad.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\LengthLong64.exe"C:\Users\Admin\AppData\Local\Temp\LengthLong64.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵PID:1416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 484⤵
- Loads dropped DLL
- Program crash
PID:1892
-
-
-
C:\Users\Admin\AppData\Local\Temp\LengthLong32.exe"C:\Users\Admin\AppData\Local\Temp\LengthLong32.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵PID:1240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1736 -s 484⤵
- Loads dropped DLL
- Program crash
PID:1792
-
-
-
C:\Users\Admin\AppData\Local\Temp\LengthLong32x.exe"C:\Users\Admin\AppData\Local\Temp\LengthLong32x.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe4⤵
- Executes dropped EXE
PID:2840
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 482⤵
- Program crash
PID:1364
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5742ce6f109e52828b334a98f531461d3
SHA1c46b392fb40f97e4b04ccbe19fc0a9e86adc1665
SHA25654a7b5300de9f292d573e00b54e95da01f1d5885e3440fa19c4e01e268045d4e
SHA5121f293da3469bddc966acf7d2d668d76261440199e3ecff112947d6dd169933c93b13c50fa7e968acd25849572435097993201fa8bf6aa41b17ca37e27c3a73c8
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
923KB
MD50c0827b80b8450ed442d0a5afbc1324c
SHA1f212fc466d539f1b327e0f23269c4d2818e9bbfb
SHA25696bb40eaf29d3619c016a62e397e02761e898f342ab4dfdb52232ceddc13846a
SHA51275df0198b67109a5443c06e63c9ef145ae343c7519c9e2a4b7a06ddaf880c95a725ba223e2f183d52ee13f70c9a599e2b2ac2bcbc3d0510a4ef11941d7af118c
-
Filesize
923KB
MD50c0827b80b8450ed442d0a5afbc1324c
SHA1f212fc466d539f1b327e0f23269c4d2818e9bbfb
SHA25696bb40eaf29d3619c016a62e397e02761e898f342ab4dfdb52232ceddc13846a
SHA51275df0198b67109a5443c06e63c9ef145ae343c7519c9e2a4b7a06ddaf880c95a725ba223e2f183d52ee13f70c9a599e2b2ac2bcbc3d0510a4ef11941d7af118c
-
Filesize
3.8MB
MD568be007bd3fa09d26fcee584a9157770
SHA16f191c0587c8055f26367f25ce0f7787ca272714
SHA25671acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e
SHA512f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245
-
Filesize
3.8MB
MD568be007bd3fa09d26fcee584a9157770
SHA16f191c0587c8055f26367f25ce0f7787ca272714
SHA25671acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e
SHA512f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245
-
Filesize
3.8MB
MD568be007bd3fa09d26fcee584a9157770
SHA16f191c0587c8055f26367f25ce0f7787ca272714
SHA25671acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e
SHA512f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245
-
Filesize
3.4MB
MD5ac27f58d41c18197d3eb0242610c6dbf
SHA1505ed23652ea471cf1315f6eda6bd5729b87025e
SHA2568af2872503e066bcf59ef6cfe86d77a54382420e9e731f8674103b7f414c9b84
SHA5121386bf095925f7d37f125bc4ec1bd89f11b75ff87d49e42a7729aabf6f75bdbb380c687530330e92545434493ac34d1cb38da78b117765a35d1f1f0a10d50380
-
Filesize
3.4MB
MD5ac27f58d41c18197d3eb0242610c6dbf
SHA1505ed23652ea471cf1315f6eda6bd5729b87025e
SHA2568af2872503e066bcf59ef6cfe86d77a54382420e9e731f8674103b7f414c9b84
SHA5121386bf095925f7d37f125bc4ec1bd89f11b75ff87d49e42a7729aabf6f75bdbb380c687530330e92545434493ac34d1cb38da78b117765a35d1f1f0a10d50380
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
493.8MB
MD545b0466a29d7f96c4ba7b413b908a923
SHA183ef3dfd7d3988cd02a01b6d49008f3e57b59793
SHA2560484e3982fa19df5843e29930731b1a22d7782a6e149bbd9dd4eb2178eac5483
SHA5127ae1aa9abf34e1efdd7c4445f9ceda37e89bb1d4aff2454872b0284da6978e42cf058042863678c65fb34f8b787f0d04e47fd91f6a5e3d0eb4f6996def44bf5b
-
Filesize
923KB
MD50c0827b80b8450ed442d0a5afbc1324c
SHA1f212fc466d539f1b327e0f23269c4d2818e9bbfb
SHA25696bb40eaf29d3619c016a62e397e02761e898f342ab4dfdb52232ceddc13846a
SHA51275df0198b67109a5443c06e63c9ef145ae343c7519c9e2a4b7a06ddaf880c95a725ba223e2f183d52ee13f70c9a599e2b2ac2bcbc3d0510a4ef11941d7af118c
-
Filesize
923KB
MD50c0827b80b8450ed442d0a5afbc1324c
SHA1f212fc466d539f1b327e0f23269c4d2818e9bbfb
SHA25696bb40eaf29d3619c016a62e397e02761e898f342ab4dfdb52232ceddc13846a
SHA51275df0198b67109a5443c06e63c9ef145ae343c7519c9e2a4b7a06ddaf880c95a725ba223e2f183d52ee13f70c9a599e2b2ac2bcbc3d0510a4ef11941d7af118c
-
Filesize
923KB
MD50c0827b80b8450ed442d0a5afbc1324c
SHA1f212fc466d539f1b327e0f23269c4d2818e9bbfb
SHA25696bb40eaf29d3619c016a62e397e02761e898f342ab4dfdb52232ceddc13846a
SHA51275df0198b67109a5443c06e63c9ef145ae343c7519c9e2a4b7a06ddaf880c95a725ba223e2f183d52ee13f70c9a599e2b2ac2bcbc3d0510a4ef11941d7af118c
-
Filesize
923KB
MD50c0827b80b8450ed442d0a5afbc1324c
SHA1f212fc466d539f1b327e0f23269c4d2818e9bbfb
SHA25696bb40eaf29d3619c016a62e397e02761e898f342ab4dfdb52232ceddc13846a
SHA51275df0198b67109a5443c06e63c9ef145ae343c7519c9e2a4b7a06ddaf880c95a725ba223e2f183d52ee13f70c9a599e2b2ac2bcbc3d0510a4ef11941d7af118c
-
Filesize
923KB
MD50c0827b80b8450ed442d0a5afbc1324c
SHA1f212fc466d539f1b327e0f23269c4d2818e9bbfb
SHA25696bb40eaf29d3619c016a62e397e02761e898f342ab4dfdb52232ceddc13846a
SHA51275df0198b67109a5443c06e63c9ef145ae343c7519c9e2a4b7a06ddaf880c95a725ba223e2f183d52ee13f70c9a599e2b2ac2bcbc3d0510a4ef11941d7af118c
-
Filesize
3.8MB
MD568be007bd3fa09d26fcee584a9157770
SHA16f191c0587c8055f26367f25ce0f7787ca272714
SHA25671acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e
SHA512f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245
-
Filesize
3.8MB
MD568be007bd3fa09d26fcee584a9157770
SHA16f191c0587c8055f26367f25ce0f7787ca272714
SHA25671acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e
SHA512f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245
-
Filesize
3.4MB
MD5ac27f58d41c18197d3eb0242610c6dbf
SHA1505ed23652ea471cf1315f6eda6bd5729b87025e
SHA2568af2872503e066bcf59ef6cfe86d77a54382420e9e731f8674103b7f414c9b84
SHA5121386bf095925f7d37f125bc4ec1bd89f11b75ff87d49e42a7729aabf6f75bdbb380c687530330e92545434493ac34d1cb38da78b117765a35d1f1f0a10d50380
-
Filesize
3.4MB
MD5ac27f58d41c18197d3eb0242610c6dbf
SHA1505ed23652ea471cf1315f6eda6bd5729b87025e
SHA2568af2872503e066bcf59ef6cfe86d77a54382420e9e731f8674103b7f414c9b84
SHA5121386bf095925f7d37f125bc4ec1bd89f11b75ff87d49e42a7729aabf6f75bdbb380c687530330e92545434493ac34d1cb38da78b117765a35d1f1f0a10d50380
-
Filesize
3.4MB
MD5ac27f58d41c18197d3eb0242610c6dbf
SHA1505ed23652ea471cf1315f6eda6bd5729b87025e
SHA2568af2872503e066bcf59ef6cfe86d77a54382420e9e731f8674103b7f414c9b84
SHA5121386bf095925f7d37f125bc4ec1bd89f11b75ff87d49e42a7729aabf6f75bdbb380c687530330e92545434493ac34d1cb38da78b117765a35d1f1f0a10d50380
-
Filesize
3.4MB
MD5ac27f58d41c18197d3eb0242610c6dbf
SHA1505ed23652ea471cf1315f6eda6bd5729b87025e
SHA2568af2872503e066bcf59ef6cfe86d77a54382420e9e731f8674103b7f414c9b84
SHA5121386bf095925f7d37f125bc4ec1bd89f11b75ff87d49e42a7729aabf6f75bdbb380c687530330e92545434493ac34d1cb38da78b117765a35d1f1f0a10d50380
-
Filesize
3.4MB
MD5ac27f58d41c18197d3eb0242610c6dbf
SHA1505ed23652ea471cf1315f6eda6bd5729b87025e
SHA2568af2872503e066bcf59ef6cfe86d77a54382420e9e731f8674103b7f414c9b84
SHA5121386bf095925f7d37f125bc4ec1bd89f11b75ff87d49e42a7729aabf6f75bdbb380c687530330e92545434493ac34d1cb38da78b117765a35d1f1f0a10d50380
-
Filesize
503.4MB
MD5d8e89f7a519cf676ce4a89ced0bdc4cd
SHA19c4948d3c1e19ad775acc74c0d91fdcb5c4c147b
SHA2561e71460abe9719b2dde2d3d0d96e4dcd6cd9b18051ff6bf145ed0b7a76259b64
SHA512f1071c9184ffeab6b66d2f7d7724cc4bd8d7d5b5905046556e77f8f29f6238664f29a7f3a87a2e892d36305351a09bc8999db1d0c506ec073186ed75b64f0f58
-
Filesize
497.4MB
MD5dc58e24995bc32b826e8a0ffaac56beb
SHA10e343b92909df72d3b0187212c1c9b64c5e0c12f
SHA2560fc70210fe8ad8a5a007df3ed3ed604f234ffaf031c9f01154ce2c8b3f33aa01
SHA512bba126102f18eefccea3a29ae790093e140fdcb145725f86b3d2c2cddbb4384a684b42e12695be65b614431a49410d0e0db320b820d276554e11a2f0b1481bcf