Analysis
-
max time kernel
138s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
08/10/2023, 16:39
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.cb698e20300ec3b8cf4a62900222e79f25d56d9c58429770c965cb75bb865651_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.cb698e20300ec3b8cf4a62900222e79f25d56d9c58429770c965cb75bb865651_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.cb698e20300ec3b8cf4a62900222e79f25d56d9c58429770c965cb75bb865651_JC.exe
-
Size
1.1MB
-
MD5
6dbba7624b12797fac50d9d2619ba6d4
-
SHA1
f40a52df40c80871eea9aef44872b5d70df4bac6
-
SHA256
cb698e20300ec3b8cf4a62900222e79f25d56d9c58429770c965cb75bb865651
-
SHA512
ad4292aa8bec21fe031878efb0b16d477c7a065f8a72b656cc675d890e5c8943f839034d38aa33d598dbfc0ad5439011d4e1b6e5f78f87558ef8840b0e9539db
-
SSDEEP
24576:JyFLGR24k96an3/WKANvqWLaguiNYmeecEyfPX3:81GR26O3/WKKqcpVreeze
Malware Config
Extracted
redline
lutyr
77.91.124.55:19071
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/files/0x00060000000162a6-50.dat family_redline behavioral1/files/0x00060000000162a6-53.dat family_redline behavioral1/files/0x00060000000162a6-55.dat family_redline behavioral1/files/0x00060000000162a6-54.dat family_redline behavioral1/memory/2848-56-0x00000000009B0000-0x00000000009EE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 856 OK8xN4vA.exe 2284 oY7xM8XU.exe 2784 sX1nr1Yn.exe 2000 vg1mN1VN.exe 2684 1CS26iU3.exe 2848 2br437wl.exe -
Loads dropped DLL 12 IoCs
pid Process 2452 NEAS.cb698e20300ec3b8cf4a62900222e79f25d56d9c58429770c965cb75bb865651_JC.exe 856 OK8xN4vA.exe 856 OK8xN4vA.exe 2284 oY7xM8XU.exe 2284 oY7xM8XU.exe 2784 sX1nr1Yn.exe 2784 sX1nr1Yn.exe 2000 vg1mN1VN.exe 2000 vg1mN1VN.exe 2684 1CS26iU3.exe 2000 vg1mN1VN.exe 2848 2br437wl.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" oY7xM8XU.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" sX1nr1Yn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" vg1mN1VN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" NEAS.cb698e20300ec3b8cf4a62900222e79f25d56d9c58429770c965cb75bb865651_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" OK8xN4vA.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2452 wrote to memory of 856 2452 NEAS.cb698e20300ec3b8cf4a62900222e79f25d56d9c58429770c965cb75bb865651_JC.exe 28 PID 2452 wrote to memory of 856 2452 NEAS.cb698e20300ec3b8cf4a62900222e79f25d56d9c58429770c965cb75bb865651_JC.exe 28 PID 2452 wrote to memory of 856 2452 NEAS.cb698e20300ec3b8cf4a62900222e79f25d56d9c58429770c965cb75bb865651_JC.exe 28 PID 2452 wrote to memory of 856 2452 NEAS.cb698e20300ec3b8cf4a62900222e79f25d56d9c58429770c965cb75bb865651_JC.exe 28 PID 2452 wrote to memory of 856 2452 NEAS.cb698e20300ec3b8cf4a62900222e79f25d56d9c58429770c965cb75bb865651_JC.exe 28 PID 2452 wrote to memory of 856 2452 NEAS.cb698e20300ec3b8cf4a62900222e79f25d56d9c58429770c965cb75bb865651_JC.exe 28 PID 2452 wrote to memory of 856 2452 NEAS.cb698e20300ec3b8cf4a62900222e79f25d56d9c58429770c965cb75bb865651_JC.exe 28 PID 856 wrote to memory of 2284 856 OK8xN4vA.exe 29 PID 856 wrote to memory of 2284 856 OK8xN4vA.exe 29 PID 856 wrote to memory of 2284 856 OK8xN4vA.exe 29 PID 856 wrote to memory of 2284 856 OK8xN4vA.exe 29 PID 856 wrote to memory of 2284 856 OK8xN4vA.exe 29 PID 856 wrote to memory of 2284 856 OK8xN4vA.exe 29 PID 856 wrote to memory of 2284 856 OK8xN4vA.exe 29 PID 2284 wrote to memory of 2784 2284 oY7xM8XU.exe 30 PID 2284 wrote to memory of 2784 2284 oY7xM8XU.exe 30 PID 2284 wrote to memory of 2784 2284 oY7xM8XU.exe 30 PID 2284 wrote to memory of 2784 2284 oY7xM8XU.exe 30 PID 2284 wrote to memory of 2784 2284 oY7xM8XU.exe 30 PID 2284 wrote to memory of 2784 2284 oY7xM8XU.exe 30 PID 2284 wrote to memory of 2784 2284 oY7xM8XU.exe 30 PID 2784 wrote to memory of 2000 2784 sX1nr1Yn.exe 31 PID 2784 wrote to memory of 2000 2784 sX1nr1Yn.exe 31 PID 2784 wrote to memory of 2000 2784 sX1nr1Yn.exe 31 PID 2784 wrote to memory of 2000 2784 sX1nr1Yn.exe 31 PID 2784 wrote to memory of 2000 2784 sX1nr1Yn.exe 31 PID 2784 wrote to memory of 2000 2784 sX1nr1Yn.exe 31 PID 2784 wrote to memory of 2000 2784 sX1nr1Yn.exe 31 PID 2000 wrote to memory of 2684 2000 vg1mN1VN.exe 32 PID 2000 wrote to memory of 2684 2000 vg1mN1VN.exe 32 PID 2000 wrote to memory of 2684 2000 vg1mN1VN.exe 32 PID 2000 wrote to memory of 2684 2000 vg1mN1VN.exe 32 PID 2000 wrote to memory of 2684 2000 vg1mN1VN.exe 32 PID 2000 wrote to memory of 2684 2000 vg1mN1VN.exe 32 PID 2000 wrote to memory of 2684 2000 vg1mN1VN.exe 32 PID 2000 wrote to memory of 2848 2000 vg1mN1VN.exe 33 PID 2000 wrote to memory of 2848 2000 vg1mN1VN.exe 33 PID 2000 wrote to memory of 2848 2000 vg1mN1VN.exe 33 PID 2000 wrote to memory of 2848 2000 vg1mN1VN.exe 33 PID 2000 wrote to memory of 2848 2000 vg1mN1VN.exe 33 PID 2000 wrote to memory of 2848 2000 vg1mN1VN.exe 33 PID 2000 wrote to memory of 2848 2000 vg1mN1VN.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.cb698e20300ec3b8cf4a62900222e79f25d56d9c58429770c965cb75bb865651_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.cb698e20300ec3b8cf4a62900222e79f25d56d9c58429770c965cb75bb865651_JC.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\OK8xN4vA.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\OK8xN4vA.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oY7xM8XU.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oY7xM8XU.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\sX1nr1Yn.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\sX1nr1Yn.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vg1mN1VN.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vg1mN1VN.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1CS26iU3.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1CS26iU3.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2684
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2br437wl.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2br437wl.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2848
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1005KB
MD5997eae2b820518f9813c6a93b8030ce4
SHA14af7d2920e4adccb2e360ac923c41d4b84d2df1a
SHA25640f910b65de2cba340c8d5cd079499b05bfdcec4a9bfdaaf2bc5923affd91fc0
SHA512aeac54bc0c8a26332d1a5a1d528f3c2bd90987ad0fce9fbc3409b99ba74dfad33c2765becd98985728c167a6523e89484474a1a1dca6afa6b040523d2b7b935f
-
Filesize
1005KB
MD5997eae2b820518f9813c6a93b8030ce4
SHA14af7d2920e4adccb2e360ac923c41d4b84d2df1a
SHA25640f910b65de2cba340c8d5cd079499b05bfdcec4a9bfdaaf2bc5923affd91fc0
SHA512aeac54bc0c8a26332d1a5a1d528f3c2bd90987ad0fce9fbc3409b99ba74dfad33c2765becd98985728c167a6523e89484474a1a1dca6afa6b040523d2b7b935f
-
Filesize
816KB
MD5082ad1e2331eab07de3774f208b17c13
SHA17d7eac6827a619fde8eb27ff8c1925367bdb40c1
SHA2569c423d2ab55633d5059b50b540c42e65f77307005c9214ac1ed5c8ff476d2624
SHA51203446b2d5efc07ab1b224c2ea17bbc6e09037833db9c76dfb102c2020c0f546f6275ccf3d8e0cfd4fae27b8918e5bff4a2c17105e17a8c953e45382802b8e83d
-
Filesize
816KB
MD5082ad1e2331eab07de3774f208b17c13
SHA17d7eac6827a619fde8eb27ff8c1925367bdb40c1
SHA2569c423d2ab55633d5059b50b540c42e65f77307005c9214ac1ed5c8ff476d2624
SHA51203446b2d5efc07ab1b224c2ea17bbc6e09037833db9c76dfb102c2020c0f546f6275ccf3d8e0cfd4fae27b8918e5bff4a2c17105e17a8c953e45382802b8e83d
-
Filesize
522KB
MD5f22224931b39519460c4941f2d138952
SHA12b0bdb23889b84b40637d29f10d04226bf0e585e
SHA256f6e4ac8f9fb337afc7f526ebd4abc422cca2fe4e5c6f21485105230c293ac26c
SHA5122eac14b931f5b97f2aedbe606ed1b5f70884ed5091fb83abff2476e26c7f672dfc68e0a450bf2a5ccd5575fa46b96d160eff7bb18c28f130fac67570ffaea6f6
-
Filesize
522KB
MD5f22224931b39519460c4941f2d138952
SHA12b0bdb23889b84b40637d29f10d04226bf0e585e
SHA256f6e4ac8f9fb337afc7f526ebd4abc422cca2fe4e5c6f21485105230c293ac26c
SHA5122eac14b931f5b97f2aedbe606ed1b5f70884ed5091fb83abff2476e26c7f672dfc68e0a450bf2a5ccd5575fa46b96d160eff7bb18c28f130fac67570ffaea6f6
-
Filesize
326KB
MD59355c0a179b3976e18c376bf127322ff
SHA12f6ea0920837053f9e563f5efe2b0092cf75a09a
SHA256d5e97942238cc7ec981899340d01250608f3cc212f3b6d9b4bcc819b14536843
SHA51209d69322176216c38a743cce6501b0f392cc96d7e923a528a5bd42a45f9644e9715e8cb4ac5746b721066aa616a9bfd003ae64666f17cb6f5a1382f7bb87fbb2
-
Filesize
326KB
MD59355c0a179b3976e18c376bf127322ff
SHA12f6ea0920837053f9e563f5efe2b0092cf75a09a
SHA256d5e97942238cc7ec981899340d01250608f3cc212f3b6d9b4bcc819b14536843
SHA51209d69322176216c38a743cce6501b0f392cc96d7e923a528a5bd42a45f9644e9715e8cb4ac5746b721066aa616a9bfd003ae64666f17cb6f5a1382f7bb87fbb2
-
Filesize
190KB
MD5a6656e3d6d06c8ce9cbb4b6952553c20
SHA1af45103616dc896da5ee4268fd5f9483b5b97c1c
SHA256fec303b128c44607654c078736b96d2762722f51b6c473dfe5415158fd83718b
SHA512f53f2214d3f192a352b2a93c66d91988a41a5ab9dbf15edd62ea8ce38da8a732114e3c46526d4dc6f3132330913b1acb90fa11ff454a1520d117149a86678d84
-
Filesize
190KB
MD5a6656e3d6d06c8ce9cbb4b6952553c20
SHA1af45103616dc896da5ee4268fd5f9483b5b97c1c
SHA256fec303b128c44607654c078736b96d2762722f51b6c473dfe5415158fd83718b
SHA512f53f2214d3f192a352b2a93c66d91988a41a5ab9dbf15edd62ea8ce38da8a732114e3c46526d4dc6f3132330913b1acb90fa11ff454a1520d117149a86678d84
-
Filesize
221KB
MD53d92a33495f8b76b92d1843f86f3b6a0
SHA1b7b617e7e60e7353651c49ea748888efe49663de
SHA256f40f6d0df649c12db80c20e00a995709fec2542ba7761a9fe3e41cf82c8950c4
SHA51234ab2f4ee0355553c6fe2fc135ba416c7b9a57a21b470c699046a299091ad4b305282e940b1d99e8bccd73ff1faba6d8e5c3a8b8273acb34d6b291568e33ab87
-
Filesize
221KB
MD53d92a33495f8b76b92d1843f86f3b6a0
SHA1b7b617e7e60e7353651c49ea748888efe49663de
SHA256f40f6d0df649c12db80c20e00a995709fec2542ba7761a9fe3e41cf82c8950c4
SHA51234ab2f4ee0355553c6fe2fc135ba416c7b9a57a21b470c699046a299091ad4b305282e940b1d99e8bccd73ff1faba6d8e5c3a8b8273acb34d6b291568e33ab87
-
Filesize
1005KB
MD5997eae2b820518f9813c6a93b8030ce4
SHA14af7d2920e4adccb2e360ac923c41d4b84d2df1a
SHA25640f910b65de2cba340c8d5cd079499b05bfdcec4a9bfdaaf2bc5923affd91fc0
SHA512aeac54bc0c8a26332d1a5a1d528f3c2bd90987ad0fce9fbc3409b99ba74dfad33c2765becd98985728c167a6523e89484474a1a1dca6afa6b040523d2b7b935f
-
Filesize
1005KB
MD5997eae2b820518f9813c6a93b8030ce4
SHA14af7d2920e4adccb2e360ac923c41d4b84d2df1a
SHA25640f910b65de2cba340c8d5cd079499b05bfdcec4a9bfdaaf2bc5923affd91fc0
SHA512aeac54bc0c8a26332d1a5a1d528f3c2bd90987ad0fce9fbc3409b99ba74dfad33c2765becd98985728c167a6523e89484474a1a1dca6afa6b040523d2b7b935f
-
Filesize
816KB
MD5082ad1e2331eab07de3774f208b17c13
SHA17d7eac6827a619fde8eb27ff8c1925367bdb40c1
SHA2569c423d2ab55633d5059b50b540c42e65f77307005c9214ac1ed5c8ff476d2624
SHA51203446b2d5efc07ab1b224c2ea17bbc6e09037833db9c76dfb102c2020c0f546f6275ccf3d8e0cfd4fae27b8918e5bff4a2c17105e17a8c953e45382802b8e83d
-
Filesize
816KB
MD5082ad1e2331eab07de3774f208b17c13
SHA17d7eac6827a619fde8eb27ff8c1925367bdb40c1
SHA2569c423d2ab55633d5059b50b540c42e65f77307005c9214ac1ed5c8ff476d2624
SHA51203446b2d5efc07ab1b224c2ea17bbc6e09037833db9c76dfb102c2020c0f546f6275ccf3d8e0cfd4fae27b8918e5bff4a2c17105e17a8c953e45382802b8e83d
-
Filesize
522KB
MD5f22224931b39519460c4941f2d138952
SHA12b0bdb23889b84b40637d29f10d04226bf0e585e
SHA256f6e4ac8f9fb337afc7f526ebd4abc422cca2fe4e5c6f21485105230c293ac26c
SHA5122eac14b931f5b97f2aedbe606ed1b5f70884ed5091fb83abff2476e26c7f672dfc68e0a450bf2a5ccd5575fa46b96d160eff7bb18c28f130fac67570ffaea6f6
-
Filesize
522KB
MD5f22224931b39519460c4941f2d138952
SHA12b0bdb23889b84b40637d29f10d04226bf0e585e
SHA256f6e4ac8f9fb337afc7f526ebd4abc422cca2fe4e5c6f21485105230c293ac26c
SHA5122eac14b931f5b97f2aedbe606ed1b5f70884ed5091fb83abff2476e26c7f672dfc68e0a450bf2a5ccd5575fa46b96d160eff7bb18c28f130fac67570ffaea6f6
-
Filesize
326KB
MD59355c0a179b3976e18c376bf127322ff
SHA12f6ea0920837053f9e563f5efe2b0092cf75a09a
SHA256d5e97942238cc7ec981899340d01250608f3cc212f3b6d9b4bcc819b14536843
SHA51209d69322176216c38a743cce6501b0f392cc96d7e923a528a5bd42a45f9644e9715e8cb4ac5746b721066aa616a9bfd003ae64666f17cb6f5a1382f7bb87fbb2
-
Filesize
326KB
MD59355c0a179b3976e18c376bf127322ff
SHA12f6ea0920837053f9e563f5efe2b0092cf75a09a
SHA256d5e97942238cc7ec981899340d01250608f3cc212f3b6d9b4bcc819b14536843
SHA51209d69322176216c38a743cce6501b0f392cc96d7e923a528a5bd42a45f9644e9715e8cb4ac5746b721066aa616a9bfd003ae64666f17cb6f5a1382f7bb87fbb2
-
Filesize
190KB
MD5a6656e3d6d06c8ce9cbb4b6952553c20
SHA1af45103616dc896da5ee4268fd5f9483b5b97c1c
SHA256fec303b128c44607654c078736b96d2762722f51b6c473dfe5415158fd83718b
SHA512f53f2214d3f192a352b2a93c66d91988a41a5ab9dbf15edd62ea8ce38da8a732114e3c46526d4dc6f3132330913b1acb90fa11ff454a1520d117149a86678d84
-
Filesize
190KB
MD5a6656e3d6d06c8ce9cbb4b6952553c20
SHA1af45103616dc896da5ee4268fd5f9483b5b97c1c
SHA256fec303b128c44607654c078736b96d2762722f51b6c473dfe5415158fd83718b
SHA512f53f2214d3f192a352b2a93c66d91988a41a5ab9dbf15edd62ea8ce38da8a732114e3c46526d4dc6f3132330913b1acb90fa11ff454a1520d117149a86678d84
-
Filesize
221KB
MD53d92a33495f8b76b92d1843f86f3b6a0
SHA1b7b617e7e60e7353651c49ea748888efe49663de
SHA256f40f6d0df649c12db80c20e00a995709fec2542ba7761a9fe3e41cf82c8950c4
SHA51234ab2f4ee0355553c6fe2fc135ba416c7b9a57a21b470c699046a299091ad4b305282e940b1d99e8bccd73ff1faba6d8e5c3a8b8273acb34d6b291568e33ab87
-
Filesize
221KB
MD53d92a33495f8b76b92d1843f86f3b6a0
SHA1b7b617e7e60e7353651c49ea748888efe49663de
SHA256f40f6d0df649c12db80c20e00a995709fec2542ba7761a9fe3e41cf82c8950c4
SHA51234ab2f4ee0355553c6fe2fc135ba416c7b9a57a21b470c699046a299091ad4b305282e940b1d99e8bccd73ff1faba6d8e5c3a8b8273acb34d6b291568e33ab87