Analysis
-
max time kernel
301s -
max time network
319s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
01/11/2023, 05:40
Static task
static1
Behavioral task
behavioral1
Sample
Ls0Br9Za.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
Ls0Br9Za.exe
Resource
win10-20231023-en
General
-
Target
Ls0Br9Za.exe
-
Size
1.1MB
-
MD5
a27e73c52f42787700145736dd46fa22
-
SHA1
42c31a258db2e2730f02e9335c57cc00f1030bac
-
SHA256
fd23996e921e97a72d681c169baba40ff7e32e5fa03fbdaf9f83dff289352d7f
-
SHA512
4ef87d85e55d6f4f0c36c5bce6bda6ea8ae26a24b0e19615c2d0bf3fb07277a2f6b059517c4f3e25709bc7dc83e746123b5b1a1f4761e96c5cd90f80a9f3cc71
-
SSDEEP
24576:UyNK1dpWnOtA2YJVUFNDzNXQhbMMr0UaWO7T3DxJBe3:jw1viJVUFdNgaMonHvB
Malware Config
Extracted
redline
kinza
77.91.124.86:19084
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/files/0x0008000000015c9f-46.dat family_redline behavioral1/files/0x0008000000015c9f-43.dat family_redline behavioral1/files/0x0008000000015c9f-50.dat family_redline behavioral1/files/0x0008000000015c9f-49.dat family_redline behavioral1/memory/2604-51-0x0000000000170000-0x00000000001AE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2784 Bu5jZ1UT.exe 2156 SH9Rs7of.exe 2700 1gW37ZL5.exe 2604 2LE115qj.exe -
Loads dropped DLL 9 IoCs
pid Process 2016 Ls0Br9Za.exe 2784 Bu5jZ1UT.exe 2784 Bu5jZ1UT.exe 2156 SH9Rs7of.exe 2156 SH9Rs7of.exe 2156 SH9Rs7of.exe 2700 1gW37ZL5.exe 2156 SH9Rs7of.exe 2604 2LE115qj.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" Ls0Br9Za.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Bu5jZ1UT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" SH9Rs7of.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2700 set thread context of 2592 2700 1gW37ZL5.exe 31 -
Program crash 1 IoCs
pid pid_target Process procid_target 2896 2592 WerFault.exe 31 -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2784 2016 Ls0Br9Za.exe 28 PID 2016 wrote to memory of 2784 2016 Ls0Br9Za.exe 28 PID 2016 wrote to memory of 2784 2016 Ls0Br9Za.exe 28 PID 2016 wrote to memory of 2784 2016 Ls0Br9Za.exe 28 PID 2016 wrote to memory of 2784 2016 Ls0Br9Za.exe 28 PID 2016 wrote to memory of 2784 2016 Ls0Br9Za.exe 28 PID 2016 wrote to memory of 2784 2016 Ls0Br9Za.exe 28 PID 2784 wrote to memory of 2156 2784 Bu5jZ1UT.exe 29 PID 2784 wrote to memory of 2156 2784 Bu5jZ1UT.exe 29 PID 2784 wrote to memory of 2156 2784 Bu5jZ1UT.exe 29 PID 2784 wrote to memory of 2156 2784 Bu5jZ1UT.exe 29 PID 2784 wrote to memory of 2156 2784 Bu5jZ1UT.exe 29 PID 2784 wrote to memory of 2156 2784 Bu5jZ1UT.exe 29 PID 2784 wrote to memory of 2156 2784 Bu5jZ1UT.exe 29 PID 2156 wrote to memory of 2700 2156 SH9Rs7of.exe 30 PID 2156 wrote to memory of 2700 2156 SH9Rs7of.exe 30 PID 2156 wrote to memory of 2700 2156 SH9Rs7of.exe 30 PID 2156 wrote to memory of 2700 2156 SH9Rs7of.exe 30 PID 2156 wrote to memory of 2700 2156 SH9Rs7of.exe 30 PID 2156 wrote to memory of 2700 2156 SH9Rs7of.exe 30 PID 2156 wrote to memory of 2700 2156 SH9Rs7of.exe 30 PID 2700 wrote to memory of 2592 2700 1gW37ZL5.exe 31 PID 2700 wrote to memory of 2592 2700 1gW37ZL5.exe 31 PID 2700 wrote to memory of 2592 2700 1gW37ZL5.exe 31 PID 2700 wrote to memory of 2592 2700 1gW37ZL5.exe 31 PID 2700 wrote to memory of 2592 2700 1gW37ZL5.exe 31 PID 2700 wrote to memory of 2592 2700 1gW37ZL5.exe 31 PID 2700 wrote to memory of 2592 2700 1gW37ZL5.exe 31 PID 2700 wrote to memory of 2592 2700 1gW37ZL5.exe 31 PID 2700 wrote to memory of 2592 2700 1gW37ZL5.exe 31 PID 2700 wrote to memory of 2592 2700 1gW37ZL5.exe 31 PID 2700 wrote to memory of 2592 2700 1gW37ZL5.exe 31 PID 2700 wrote to memory of 2592 2700 1gW37ZL5.exe 31 PID 2700 wrote to memory of 2592 2700 1gW37ZL5.exe 31 PID 2700 wrote to memory of 2592 2700 1gW37ZL5.exe 31 PID 2156 wrote to memory of 2604 2156 SH9Rs7of.exe 32 PID 2156 wrote to memory of 2604 2156 SH9Rs7of.exe 32 PID 2156 wrote to memory of 2604 2156 SH9Rs7of.exe 32 PID 2156 wrote to memory of 2604 2156 SH9Rs7of.exe 32 PID 2156 wrote to memory of 2604 2156 SH9Rs7of.exe 32 PID 2156 wrote to memory of 2604 2156 SH9Rs7of.exe 32 PID 2156 wrote to memory of 2604 2156 SH9Rs7of.exe 32 PID 2592 wrote to memory of 2896 2592 AppLaunch.exe 33 PID 2592 wrote to memory of 2896 2592 AppLaunch.exe 33 PID 2592 wrote to memory of 2896 2592 AppLaunch.exe 33 PID 2592 wrote to memory of 2896 2592 AppLaunch.exe 33 PID 2592 wrote to memory of 2896 2592 AppLaunch.exe 33 PID 2592 wrote to memory of 2896 2592 AppLaunch.exe 33 PID 2592 wrote to memory of 2896 2592 AppLaunch.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ls0Br9Za.exe"C:\Users\Admin\AppData\Local\Temp\Ls0Br9Za.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Bu5jZ1UT.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Bu5jZ1UT.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\SH9Rs7of.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\SH9Rs7of.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1gW37ZL5.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1gW37ZL5.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2592 -s 2686⤵
- Program crash
PID:2896
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2LE115qj.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2LE115qj.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2604
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
756KB
MD5a0705fbabcee8e2e0b90a48814566528
SHA1a791e1070c30e3b33263f2531a15f62b6ae073b7
SHA256a2dec2e068643d4dcc3d83d4fc313bd8c118a0c60de3f8a626564008ba615b4a
SHA51278d7d947ef57549abacbf873e053420d6c2085ba7699ab9b30cef8e3caefaf7817144b45613597a5c33bfa523e8145584f73d48e00dd60029df81974271ad591
-
Filesize
756KB
MD5a0705fbabcee8e2e0b90a48814566528
SHA1a791e1070c30e3b33263f2531a15f62b6ae073b7
SHA256a2dec2e068643d4dcc3d83d4fc313bd8c118a0c60de3f8a626564008ba615b4a
SHA51278d7d947ef57549abacbf873e053420d6c2085ba7699ab9b30cef8e3caefaf7817144b45613597a5c33bfa523e8145584f73d48e00dd60029df81974271ad591
-
Filesize
560KB
MD54c3b01b48105d3c12a486f911ac6d175
SHA15417c2dc6fe32eccc037b6f2dc64c583e6dd2e97
SHA25609bb43fd7f88aed722b7722bf9eb1259c7391305cc102206c300d5d242cf7e8e
SHA512731147b676ac6bfa0323c5259224c27b8ba5ccc427cf712d2b079aaba17bdd13dd9cca0a9d8e6f4b90871a49f332a9e8752355ee01eda5a4eb29cf02145a2882
-
Filesize
560KB
MD54c3b01b48105d3c12a486f911ac6d175
SHA15417c2dc6fe32eccc037b6f2dc64c583e6dd2e97
SHA25609bb43fd7f88aed722b7722bf9eb1259c7391305cc102206c300d5d242cf7e8e
SHA512731147b676ac6bfa0323c5259224c27b8ba5ccc427cf712d2b079aaba17bdd13dd9cca0a9d8e6f4b90871a49f332a9e8752355ee01eda5a4eb29cf02145a2882
-
Filesize
1.0MB
MD595c243293d9c54cc67d169e6af872c90
SHA1d130ef2e95929b54c9de61725b429a2cf3bed172
SHA2562382e0e91de0fd618963fda26307b4b497c5cbf5b476249893bc796945867bbe
SHA512d1197368e48eb1b95fdb39797ec4dbf245dbe698cc739b2b631f54bb679a83c283fa0532703d63b3fb979adf55b86219adccdbd6ca178b59413cc625fd1f121c
-
Filesize
1.0MB
MD595c243293d9c54cc67d169e6af872c90
SHA1d130ef2e95929b54c9de61725b429a2cf3bed172
SHA2562382e0e91de0fd618963fda26307b4b497c5cbf5b476249893bc796945867bbe
SHA512d1197368e48eb1b95fdb39797ec4dbf245dbe698cc739b2b631f54bb679a83c283fa0532703d63b3fb979adf55b86219adccdbd6ca178b59413cc625fd1f121c
-
Filesize
1.0MB
MD595c243293d9c54cc67d169e6af872c90
SHA1d130ef2e95929b54c9de61725b429a2cf3bed172
SHA2562382e0e91de0fd618963fda26307b4b497c5cbf5b476249893bc796945867bbe
SHA512d1197368e48eb1b95fdb39797ec4dbf245dbe698cc739b2b631f54bb679a83c283fa0532703d63b3fb979adf55b86219adccdbd6ca178b59413cc625fd1f121c
-
Filesize
222KB
MD55fa4d311053ef59eb8b8aa765a6a8ace
SHA1d714ebd3b76c02d7839ca4ee257fd28bfd727388
SHA2566291d4fc06b5513700c6a64faacda8f317617727a65d28c2394d952ce17e7493
SHA512d9b945fb203d42385c8c3a2e99895a17d9aed2966c72e1a23685b1b2fedac526b22858257a3de6f4f008d7f3181a9d3f6bda38fb4578ae9a9c7f9484b4c2888a
-
Filesize
222KB
MD55fa4d311053ef59eb8b8aa765a6a8ace
SHA1d714ebd3b76c02d7839ca4ee257fd28bfd727388
SHA2566291d4fc06b5513700c6a64faacda8f317617727a65d28c2394d952ce17e7493
SHA512d9b945fb203d42385c8c3a2e99895a17d9aed2966c72e1a23685b1b2fedac526b22858257a3de6f4f008d7f3181a9d3f6bda38fb4578ae9a9c7f9484b4c2888a
-
Filesize
756KB
MD5a0705fbabcee8e2e0b90a48814566528
SHA1a791e1070c30e3b33263f2531a15f62b6ae073b7
SHA256a2dec2e068643d4dcc3d83d4fc313bd8c118a0c60de3f8a626564008ba615b4a
SHA51278d7d947ef57549abacbf873e053420d6c2085ba7699ab9b30cef8e3caefaf7817144b45613597a5c33bfa523e8145584f73d48e00dd60029df81974271ad591
-
Filesize
756KB
MD5a0705fbabcee8e2e0b90a48814566528
SHA1a791e1070c30e3b33263f2531a15f62b6ae073b7
SHA256a2dec2e068643d4dcc3d83d4fc313bd8c118a0c60de3f8a626564008ba615b4a
SHA51278d7d947ef57549abacbf873e053420d6c2085ba7699ab9b30cef8e3caefaf7817144b45613597a5c33bfa523e8145584f73d48e00dd60029df81974271ad591
-
Filesize
560KB
MD54c3b01b48105d3c12a486f911ac6d175
SHA15417c2dc6fe32eccc037b6f2dc64c583e6dd2e97
SHA25609bb43fd7f88aed722b7722bf9eb1259c7391305cc102206c300d5d242cf7e8e
SHA512731147b676ac6bfa0323c5259224c27b8ba5ccc427cf712d2b079aaba17bdd13dd9cca0a9d8e6f4b90871a49f332a9e8752355ee01eda5a4eb29cf02145a2882
-
Filesize
560KB
MD54c3b01b48105d3c12a486f911ac6d175
SHA15417c2dc6fe32eccc037b6f2dc64c583e6dd2e97
SHA25609bb43fd7f88aed722b7722bf9eb1259c7391305cc102206c300d5d242cf7e8e
SHA512731147b676ac6bfa0323c5259224c27b8ba5ccc427cf712d2b079aaba17bdd13dd9cca0a9d8e6f4b90871a49f332a9e8752355ee01eda5a4eb29cf02145a2882
-
Filesize
1.0MB
MD595c243293d9c54cc67d169e6af872c90
SHA1d130ef2e95929b54c9de61725b429a2cf3bed172
SHA2562382e0e91de0fd618963fda26307b4b497c5cbf5b476249893bc796945867bbe
SHA512d1197368e48eb1b95fdb39797ec4dbf245dbe698cc739b2b631f54bb679a83c283fa0532703d63b3fb979adf55b86219adccdbd6ca178b59413cc625fd1f121c
-
Filesize
1.0MB
MD595c243293d9c54cc67d169e6af872c90
SHA1d130ef2e95929b54c9de61725b429a2cf3bed172
SHA2562382e0e91de0fd618963fda26307b4b497c5cbf5b476249893bc796945867bbe
SHA512d1197368e48eb1b95fdb39797ec4dbf245dbe698cc739b2b631f54bb679a83c283fa0532703d63b3fb979adf55b86219adccdbd6ca178b59413cc625fd1f121c
-
Filesize
1.0MB
MD595c243293d9c54cc67d169e6af872c90
SHA1d130ef2e95929b54c9de61725b429a2cf3bed172
SHA2562382e0e91de0fd618963fda26307b4b497c5cbf5b476249893bc796945867bbe
SHA512d1197368e48eb1b95fdb39797ec4dbf245dbe698cc739b2b631f54bb679a83c283fa0532703d63b3fb979adf55b86219adccdbd6ca178b59413cc625fd1f121c
-
Filesize
222KB
MD55fa4d311053ef59eb8b8aa765a6a8ace
SHA1d714ebd3b76c02d7839ca4ee257fd28bfd727388
SHA2566291d4fc06b5513700c6a64faacda8f317617727a65d28c2394d952ce17e7493
SHA512d9b945fb203d42385c8c3a2e99895a17d9aed2966c72e1a23685b1b2fedac526b22858257a3de6f4f008d7f3181a9d3f6bda38fb4578ae9a9c7f9484b4c2888a
-
Filesize
222KB
MD55fa4d311053ef59eb8b8aa765a6a8ace
SHA1d714ebd3b76c02d7839ca4ee257fd28bfd727388
SHA2566291d4fc06b5513700c6a64faacda8f317617727a65d28c2394d952ce17e7493
SHA512d9b945fb203d42385c8c3a2e99895a17d9aed2966c72e1a23685b1b2fedac526b22858257a3de6f4f008d7f3181a9d3f6bda38fb4578ae9a9c7f9484b4c2888a