Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
22/07/2023, 03:48
Static task
static1
Behavioral task
behavioral1
Sample
9b52e97ef9a8fd351fd878ebf36f8377.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
9b52e97ef9a8fd351fd878ebf36f8377.exe
Resource
win10v2004-20230703-en
General
-
Target
9b52e97ef9a8fd351fd878ebf36f8377.exe
-
Size
3.1MB
-
MD5
9b52e97ef9a8fd351fd878ebf36f8377
-
SHA1
8931188c8ae85bc39a0bb7bfe4249d6098533954
-
SHA256
2f94e4ce7f8ee0d584b776988ac0dd80df820f5a44d866271efce73c6ad84fc6
-
SHA512
a0e720287758aa3110512741bc4657e65cba46ec932d81a3bcb14d12cff50e78fed976ff351e1b47056eeb9690d0638ea5a0cc89bea826290e3ac391e496f767
-
SSDEEP
49152:HNR10gLk3Fw7aitvQpBymUlb9vHMQmdFbL64FXm:HNR95yByvlJlcFbBF
Malware Config
Extracted
redline
@ytlogsbot
176.123.9.85:16482
-
auth_value
36b3ee30353ed1e6c1776af75fcfbc2c
Extracted
redline
lux3
176.123.9.142:14845
-
auth_value
e94dff9a76da90d6b000642c4a52574b
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
resource yara_rule behavioral1/memory/2212-54-0x0000000000AC0000-0x0000000000DE7000-memory.dmp family_redline behavioral1/memory/2072-56-0x0000000000400000-0x0000000000592000-memory.dmp family_redline behavioral1/memory/2072-62-0x0000000000400000-0x0000000000592000-memory.dmp family_redline behavioral1/memory/2072-63-0x0000000000400000-0x0000000000592000-memory.dmp family_redline -
Executes dropped EXE 2 IoCs
pid Process 2336 @ytlogsbot.exe 2552 lux3.exe -
Loads dropped DLL 2 IoCs
pid Process 2072 AppLaunch.exe 2072 AppLaunch.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2212 set thread context of 2072 2212 9b52e97ef9a8fd351fd878ebf36f8377.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 1892 2212 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2336 @ytlogsbot.exe 2336 @ytlogsbot.exe 2552 lux3.exe 2552 lux3.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2336 @ytlogsbot.exe Token: SeDebugPrivilege 2552 lux3.exe Token: SeDebugPrivilege 2072 AppLaunch.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2072 2212 9b52e97ef9a8fd351fd878ebf36f8377.exe 29 PID 2212 wrote to memory of 2072 2212 9b52e97ef9a8fd351fd878ebf36f8377.exe 29 PID 2212 wrote to memory of 2072 2212 9b52e97ef9a8fd351fd878ebf36f8377.exe 29 PID 2212 wrote to memory of 2072 2212 9b52e97ef9a8fd351fd878ebf36f8377.exe 29 PID 2212 wrote to memory of 2072 2212 9b52e97ef9a8fd351fd878ebf36f8377.exe 29 PID 2212 wrote to memory of 2072 2212 9b52e97ef9a8fd351fd878ebf36f8377.exe 29 PID 2212 wrote to memory of 2072 2212 9b52e97ef9a8fd351fd878ebf36f8377.exe 29 PID 2212 wrote to memory of 2072 2212 9b52e97ef9a8fd351fd878ebf36f8377.exe 29 PID 2212 wrote to memory of 2072 2212 9b52e97ef9a8fd351fd878ebf36f8377.exe 29 PID 2212 wrote to memory of 1892 2212 9b52e97ef9a8fd351fd878ebf36f8377.exe 30 PID 2212 wrote to memory of 1892 2212 9b52e97ef9a8fd351fd878ebf36f8377.exe 30 PID 2212 wrote to memory of 1892 2212 9b52e97ef9a8fd351fd878ebf36f8377.exe 30 PID 2212 wrote to memory of 1892 2212 9b52e97ef9a8fd351fd878ebf36f8377.exe 30 PID 2072 wrote to memory of 2336 2072 AppLaunch.exe 31 PID 2072 wrote to memory of 2336 2072 AppLaunch.exe 31 PID 2072 wrote to memory of 2336 2072 AppLaunch.exe 31 PID 2072 wrote to memory of 2336 2072 AppLaunch.exe 31 PID 2072 wrote to memory of 2336 2072 AppLaunch.exe 31 PID 2072 wrote to memory of 2336 2072 AppLaunch.exe 31 PID 2072 wrote to memory of 2336 2072 AppLaunch.exe 31 PID 2072 wrote to memory of 2552 2072 AppLaunch.exe 32 PID 2072 wrote to memory of 2552 2072 AppLaunch.exe 32 PID 2072 wrote to memory of 2552 2072 AppLaunch.exe 32 PID 2072 wrote to memory of 2552 2072 AppLaunch.exe 32 PID 2072 wrote to memory of 2552 2072 AppLaunch.exe 32 PID 2072 wrote to memory of 2552 2072 AppLaunch.exe 32 PID 2072 wrote to memory of 2552 2072 AppLaunch.exe 32 PID 2072 wrote to memory of 1132 2072 AppLaunch.exe 36 PID 2072 wrote to memory of 1132 2072 AppLaunch.exe 36 PID 2072 wrote to memory of 1132 2072 AppLaunch.exe 36 PID 2072 wrote to memory of 1132 2072 AppLaunch.exe 36 PID 2072 wrote to memory of 1132 2072 AppLaunch.exe 36 PID 2072 wrote to memory of 1132 2072 AppLaunch.exe 36 PID 2072 wrote to memory of 1132 2072 AppLaunch.exe 36 PID 1132 wrote to memory of 2016 1132 cmd.exe 38 PID 1132 wrote to memory of 2016 1132 cmd.exe 38 PID 1132 wrote to memory of 2016 1132 cmd.exe 38 PID 1132 wrote to memory of 2016 1132 cmd.exe 38 PID 1132 wrote to memory of 2016 1132 cmd.exe 38 PID 1132 wrote to memory of 2016 1132 cmd.exe 38 PID 1132 wrote to memory of 2016 1132 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b52e97ef9a8fd351fd878ebf36f8377.exe"C:\Users\Admin\AppData\Local\Temp\9b52e97ef9a8fd351fd878ebf36f8377.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Roaming\configurationValue\@ytlogsbot.exe"C:\Users\Admin\AppData\Roaming\configurationValue\@ytlogsbot.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2336
-
-
C:\Users\Admin\AppData\Roaming\configurationValue\lux3.exe"C:\Users\Admin\AppData\Roaming\configurationValue\lux3.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "AppLaunch.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 34⤵PID:2016
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 362⤵
- Program crash
PID:1892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
127KB
MD5dc0d6257af6ac44eb10333a282b0f738
SHA1a749e2c90b313174a91a6e51db6bc8e6dc00f37e
SHA256f80103f2a3b19dc0e0b26e84e4f259b5e07226527c06b253ea441c98eeb98808
SHA5123d264ab41521b858c285f80dd3cafabb3c80b1ae0fcff901a5bdadf81b3aed075c164c4d908cee0a0ace700b755e4f04f4dc1715e6009008975bd90c5b7d3b23
-
Filesize
127KB
MD5dc0d6257af6ac44eb10333a282b0f738
SHA1a749e2c90b313174a91a6e51db6bc8e6dc00f37e
SHA256f80103f2a3b19dc0e0b26e84e4f259b5e07226527c06b253ea441c98eeb98808
SHA5123d264ab41521b858c285f80dd3cafabb3c80b1ae0fcff901a5bdadf81b3aed075c164c4d908cee0a0ace700b755e4f04f4dc1715e6009008975bd90c5b7d3b23
-
Filesize
168KB
MD5936cb3023cd500e07e9ad5dda9996c3f
SHA15772bd98e8da65cb1339e45074b0a6eaf07219a6
SHA2567c533374288bae24f70e51c9b70c372e9d91fea2c51ce84903f47ea769fba83f
SHA51238054bc192025b0c46ad5ba75c9ba869602fc782e7abfffb6a14cf18b3b3f4b7e93f9bcb48c253a888f5c758fdfcd85a40ab9e77153ec8bf496e00c13a32cd8b
-
Filesize
168KB
MD5936cb3023cd500e07e9ad5dda9996c3f
SHA15772bd98e8da65cb1339e45074b0a6eaf07219a6
SHA2567c533374288bae24f70e51c9b70c372e9d91fea2c51ce84903f47ea769fba83f
SHA51238054bc192025b0c46ad5ba75c9ba869602fc782e7abfffb6a14cf18b3b3f4b7e93f9bcb48c253a888f5c758fdfcd85a40ab9e77153ec8bf496e00c13a32cd8b
-
Filesize
127KB
MD5dc0d6257af6ac44eb10333a282b0f738
SHA1a749e2c90b313174a91a6e51db6bc8e6dc00f37e
SHA256f80103f2a3b19dc0e0b26e84e4f259b5e07226527c06b253ea441c98eeb98808
SHA5123d264ab41521b858c285f80dd3cafabb3c80b1ae0fcff901a5bdadf81b3aed075c164c4d908cee0a0ace700b755e4f04f4dc1715e6009008975bd90c5b7d3b23
-
Filesize
168KB
MD5936cb3023cd500e07e9ad5dda9996c3f
SHA15772bd98e8da65cb1339e45074b0a6eaf07219a6
SHA2567c533374288bae24f70e51c9b70c372e9d91fea2c51ce84903f47ea769fba83f
SHA51238054bc192025b0c46ad5ba75c9ba869602fc782e7abfffb6a14cf18b3b3f4b7e93f9bcb48c253a888f5c758fdfcd85a40ab9e77153ec8bf496e00c13a32cd8b