Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230824-en -
resource tags
arch:x64arch:x86image:win7-20230824-enlocale:en-usos:windows7-x64system -
submitted
25/08/2023, 08:21
Static task
static1
Behavioral task
behavioral1
Sample
570efc68da46e50e3eea236631563a18.exe
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
570efc68da46e50e3eea236631563a18.exe
Resource
win10v2004-20230703-en
General
-
Target
570efc68da46e50e3eea236631563a18.exe
-
Size
6.5MB
-
MD5
570efc68da46e50e3eea236631563a18
-
SHA1
a3005e8c78bbff5b78c2a50d5076115119d2a526
-
SHA256
97d5f77f0a710652228f3275c412593cf378cd631ab0cf32e922a1dce1dd9c7f
-
SHA512
e0522026b5872db2ab2ca32d741d42b0783edf0c64b1a02b73fc566eb0fc99d323ce42ce79f6ca811e4428383bfc1db596bb5406d2a2456e7d6a76a8e0c3c3b0
-
SSDEEP
196608:RMrnBhp03r6MN7bIv/ir/xPvhRS23TTdYeDtmC7uO/:RMrb+7FhIv/i9HjS2DTlDwCCO
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/1192-7-0x0000000000400000-0x000000000045A000-memory.dmp family_redline behavioral1/memory/1192-9-0x0000000000400000-0x000000000045A000-memory.dmp family_redline behavioral1/memory/1192-12-0x0000000000400000-0x000000000045A000-memory.dmp family_redline behavioral1/memory/1192-15-0x0000000000400000-0x000000000045A000-memory.dmp family_redline behavioral1/memory/1192-17-0x0000000000400000-0x000000000045A000-memory.dmp family_redline -
Executes dropped EXE 1 IoCs
pid Process 2644 ChromeClose.exe -
Loads dropped DLL 1 IoCs
pid Process 3068 570efc68da46e50e3eea236631563a18.exe -
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3068 set thread context of 1192 3068 570efc68da46e50e3eea236631563a18.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2644 ChromeClose.exe 1192 vbc.exe 1192 vbc.exe 1192 vbc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2644 ChromeClose.exe Token: SeDebugPrivilege 1192 vbc.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3068 wrote to memory of 1192 3068 570efc68da46e50e3eea236631563a18.exe 30 PID 3068 wrote to memory of 1192 3068 570efc68da46e50e3eea236631563a18.exe 30 PID 3068 wrote to memory of 1192 3068 570efc68da46e50e3eea236631563a18.exe 30 PID 3068 wrote to memory of 1192 3068 570efc68da46e50e3eea236631563a18.exe 30 PID 3068 wrote to memory of 1192 3068 570efc68da46e50e3eea236631563a18.exe 30 PID 3068 wrote to memory of 1192 3068 570efc68da46e50e3eea236631563a18.exe 30 PID 3068 wrote to memory of 1192 3068 570efc68da46e50e3eea236631563a18.exe 30 PID 3068 wrote to memory of 1192 3068 570efc68da46e50e3eea236631563a18.exe 30 PID 3068 wrote to memory of 1192 3068 570efc68da46e50e3eea236631563a18.exe 30 PID 3068 wrote to memory of 2644 3068 570efc68da46e50e3eea236631563a18.exe 31 PID 3068 wrote to memory of 2644 3068 570efc68da46e50e3eea236631563a18.exe 31 PID 3068 wrote to memory of 2644 3068 570efc68da46e50e3eea236631563a18.exe 31 PID 3068 wrote to memory of 2644 3068 570efc68da46e50e3eea236631563a18.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\570efc68da46e50e3eea236631563a18.exe"C:\Users\Admin\AppData\Local\Temp\570efc68da46e50e3eea236631563a18.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1192
-
-
C:\Users\Admin\AppData\Local\Temp\ChromeClose.exe"C:\Users\Admin\AppData\Local\Temp\ChromeClose.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.6MB
MD57a3059b652dcbe5b578ec98a507dfb16
SHA19f6938dac4e567fedbf5d6baa5488bf17cff7873
SHA2568eca6c037417729d3c44acffb290a49564ff244b82cf35f4415ec0615ede241c
SHA512ed66233263745d80a72179744fa9c1b252c3674821e15f456cdc3e8de1843ed249fefb9102761251686ed75ec4b620fdd35a0f918748d98b2368c1472b24c1d9
-
Filesize
5.6MB
MD57a3059b652dcbe5b578ec98a507dfb16
SHA19f6938dac4e567fedbf5d6baa5488bf17cff7873
SHA2568eca6c037417729d3c44acffb290a49564ff244b82cf35f4415ec0615ede241c
SHA512ed66233263745d80a72179744fa9c1b252c3674821e15f456cdc3e8de1843ed249fefb9102761251686ed75ec4b620fdd35a0f918748d98b2368c1472b24c1d9
-
Filesize
5.6MB
MD57a3059b652dcbe5b578ec98a507dfb16
SHA19f6938dac4e567fedbf5d6baa5488bf17cff7873
SHA2568eca6c037417729d3c44acffb290a49564ff244b82cf35f4415ec0615ede241c
SHA512ed66233263745d80a72179744fa9c1b252c3674821e15f456cdc3e8de1843ed249fefb9102761251686ed75ec4b620fdd35a0f918748d98b2368c1472b24c1d9