Analysis
-
max time kernel
168s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
14/11/2023, 19:48
Static task
static1
Behavioral task
behavioral1
Sample
715929716a7d37d5652fa8074663528e667d5c7cb863fa5c10236abfc8afe67c.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
715929716a7d37d5652fa8074663528e667d5c7cb863fa5c10236abfc8afe67c.exe
Resource
win10v2004-20231023-en
General
-
Target
715929716a7d37d5652fa8074663528e667d5c7cb863fa5c10236abfc8afe67c.exe
-
Size
7.6MB
-
MD5
e0495fabb8bf654d89c4b571399d24a9
-
SHA1
aab7de877c7b8a0efa2140991c2db0127bc4cde6
-
SHA256
715929716a7d37d5652fa8074663528e667d5c7cb863fa5c10236abfc8afe67c
-
SHA512
1fed44090527fc54587739f8d2e45f26b2bf296e630c0e45d5eaae8db4d8bd2fbfabdd62e7eb2e3c7280a001952c33d0dff42405d60dd37892d93be2a999bf7f
-
SSDEEP
196608:WUC0unv5XP0khthdM8U/n0AnVgJ8Ke2QdyO5:WL0uv5XP9htT1Y2QdH
Malware Config
Extracted
redline
178.33.57.144:4968
-
auth_value
4a64dff6e5e36b93d1cc6f3539dd92df
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/4092-9-0x0000000000470000-0x0000000000490000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\Control Panel\International\Geo\Nation 715929716a7d37d5652fa8074663528e667d5c7cb863fa5c10236abfc8afe67c.exe -
Executes dropped EXE 3 IoCs
pid Process 3940 YoutubeMovieMaker.exe 4364 chromedrivers64.exe 1032 chromedrivers64.exe -
Uses the VBS compiler for execution 1 TTPs
-
resource yara_rule behavioral2/files/0x000c000000022e25-14.dat vmprotect behavioral2/files/0x000c000000022e25-22.dat vmprotect behavioral2/files/0x000c000000022e25-21.dat vmprotect -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4040 set thread context of 4092 4040 715929716a7d37d5652fa8074663528e667d5c7cb863fa5c10236abfc8afe67c.exe 101 PID 4364 set thread context of 2936 4364 chromedrivers64.exe 116 PID 1032 set thread context of 912 1032 chromedrivers64.exe 128 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2792 schtasks.exe 4912 schtasks.exe 4600 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4040 715929716a7d37d5652fa8074663528e667d5c7cb863fa5c10236abfc8afe67c.exe -
Suspicious use of WriteProcessMemory 53 IoCs
description pid Process procid_target PID 4040 wrote to memory of 4700 4040 715929716a7d37d5652fa8074663528e667d5c7cb863fa5c10236abfc8afe67c.exe 92 PID 4040 wrote to memory of 4700 4040 715929716a7d37d5652fa8074663528e667d5c7cb863fa5c10236abfc8afe67c.exe 92 PID 4040 wrote to memory of 4700 4040 715929716a7d37d5652fa8074663528e667d5c7cb863fa5c10236abfc8afe67c.exe 92 PID 4700 wrote to memory of 2792 4700 cmd.exe 94 PID 4700 wrote to memory of 2792 4700 cmd.exe 94 PID 4700 wrote to memory of 2792 4700 cmd.exe 94 PID 4040 wrote to memory of 800 4040 715929716a7d37d5652fa8074663528e667d5c7cb863fa5c10236abfc8afe67c.exe 95 PID 4040 wrote to memory of 800 4040 715929716a7d37d5652fa8074663528e667d5c7cb863fa5c10236abfc8afe67c.exe 95 PID 4040 wrote to memory of 800 4040 715929716a7d37d5652fa8074663528e667d5c7cb863fa5c10236abfc8afe67c.exe 95 PID 4040 wrote to memory of 4092 4040 715929716a7d37d5652fa8074663528e667d5c7cb863fa5c10236abfc8afe67c.exe 101 PID 4040 wrote to memory of 4092 4040 715929716a7d37d5652fa8074663528e667d5c7cb863fa5c10236abfc8afe67c.exe 101 PID 4040 wrote to memory of 4092 4040 715929716a7d37d5652fa8074663528e667d5c7cb863fa5c10236abfc8afe67c.exe 101 PID 4040 wrote to memory of 4092 4040 715929716a7d37d5652fa8074663528e667d5c7cb863fa5c10236abfc8afe67c.exe 101 PID 4040 wrote to memory of 4092 4040 715929716a7d37d5652fa8074663528e667d5c7cb863fa5c10236abfc8afe67c.exe 101 PID 4040 wrote to memory of 4092 4040 715929716a7d37d5652fa8074663528e667d5c7cb863fa5c10236abfc8afe67c.exe 101 PID 4040 wrote to memory of 4092 4040 715929716a7d37d5652fa8074663528e667d5c7cb863fa5c10236abfc8afe67c.exe 101 PID 4040 wrote to memory of 4092 4040 715929716a7d37d5652fa8074663528e667d5c7cb863fa5c10236abfc8afe67c.exe 101 PID 4040 wrote to memory of 3940 4040 715929716a7d37d5652fa8074663528e667d5c7cb863fa5c10236abfc8afe67c.exe 103 PID 4040 wrote to memory of 3940 4040 715929716a7d37d5652fa8074663528e667d5c7cb863fa5c10236abfc8afe67c.exe 103 PID 4364 wrote to memory of 4084 4364 chromedrivers64.exe 109 PID 4364 wrote to memory of 4084 4364 chromedrivers64.exe 109 PID 4364 wrote to memory of 4084 4364 chromedrivers64.exe 109 PID 4084 wrote to memory of 4912 4084 cmd.exe 111 PID 4084 wrote to memory of 4912 4084 cmd.exe 111 PID 4084 wrote to memory of 4912 4084 cmd.exe 111 PID 4364 wrote to memory of 1132 4364 chromedrivers64.exe 112 PID 4364 wrote to memory of 1132 4364 chromedrivers64.exe 112 PID 4364 wrote to memory of 1132 4364 chromedrivers64.exe 112 PID 4364 wrote to memory of 2936 4364 chromedrivers64.exe 116 PID 4364 wrote to memory of 2936 4364 chromedrivers64.exe 116 PID 4364 wrote to memory of 2936 4364 chromedrivers64.exe 116 PID 4364 wrote to memory of 2936 4364 chromedrivers64.exe 116 PID 4364 wrote to memory of 2936 4364 chromedrivers64.exe 116 PID 4364 wrote to memory of 2936 4364 chromedrivers64.exe 116 PID 4364 wrote to memory of 2936 4364 chromedrivers64.exe 116 PID 4364 wrote to memory of 2936 4364 chromedrivers64.exe 116 PID 1032 wrote to memory of 3676 1032 chromedrivers64.exe 123 PID 1032 wrote to memory of 3676 1032 chromedrivers64.exe 123 PID 1032 wrote to memory of 3676 1032 chromedrivers64.exe 123 PID 3676 wrote to memory of 4600 3676 cmd.exe 125 PID 3676 wrote to memory of 4600 3676 cmd.exe 125 PID 3676 wrote to memory of 4600 3676 cmd.exe 125 PID 1032 wrote to memory of 1656 1032 chromedrivers64.exe 126 PID 1032 wrote to memory of 1656 1032 chromedrivers64.exe 126 PID 1032 wrote to memory of 1656 1032 chromedrivers64.exe 126 PID 1032 wrote to memory of 912 1032 chromedrivers64.exe 128 PID 1032 wrote to memory of 912 1032 chromedrivers64.exe 128 PID 1032 wrote to memory of 912 1032 chromedrivers64.exe 128 PID 1032 wrote to memory of 912 1032 chromedrivers64.exe 128 PID 1032 wrote to memory of 912 1032 chromedrivers64.exe 128 PID 1032 wrote to memory of 912 1032 chromedrivers64.exe 128 PID 1032 wrote to memory of 912 1032 chromedrivers64.exe 128 PID 1032 wrote to memory of 912 1032 chromedrivers64.exe 128
Processes
-
C:\Users\Admin\AppData\Local\Temp\715929716a7d37d5652fa8074663528e667d5c7cb863fa5c10236abfc8afe67c.exe"C:\Users\Admin\AppData\Local\Temp\715929716a7d37d5652fa8074663528e667d5c7cb863fa5c10236abfc8afe67c.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\chromedrivers64.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\chromedrivers64.exe'" /f3⤵
- Creates scheduled task(s)
PID:2792
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Local\Temp\715929716a7d37d5652fa8074663528e667d5c7cb863fa5c10236abfc8afe67c.exe" "C:\Users\Admin\AppData\Roaming\chromedrivers64.exe"2⤵PID:800
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:4092
-
-
C:\Users\Admin\AppData\Local\Temp\YoutubeMovieMaker.exe"C:\Users\Admin\AppData\Local\Temp\YoutubeMovieMaker.exe"2⤵
- Executes dropped EXE
PID:3940
-
-
C:\Users\Admin\AppData\Roaming\chromedrivers64.exeC:\Users\Admin\AppData\Roaming\chromedrivers64.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\chromedrivers64.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\chromedrivers64.exe'" /f3⤵
- Creates scheduled task(s)
PID:4912
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Roaming\chromedrivers64.exe" "C:\Users\Admin\AppData\Roaming\chromedrivers64.exe"2⤵PID:1132
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:2936
-
-
C:\Users\Admin\AppData\Roaming\chromedrivers64.exeC:\Users\Admin\AppData\Roaming\chromedrivers64.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\chromedrivers64.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\chromedrivers64.exe'" /f3⤵
- Creates scheduled task(s)
PID:4600
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Roaming\chromedrivers64.exe" "C:\Users\Admin\AppData\Roaming\chromedrivers64.exe"2⤵PID:1656
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
520B
MD541c37de2b4598f7759f865817dba5f80
SHA1884ccf344bc2dd409425dc5ace0fd909a5f8cce4
SHA256427235491a8da3fc8770ed60d30af731835c94585cd08d4d81fca9f703b283bc
SHA512a8f3c74916623de100e4cf22e05df9cdf541b1e32443aab0434f35fb9c4a7fa950b997ce589b532e65731ae471a1f152cd5c00ea1df4bd7a6b57eb27c93c54bd
-
Filesize
6.5MB
MD53480ba8c91b402dded857c98643ee427
SHA1e5949093ec1f1bdfff1bae5be474c021647e5a3b
SHA256504b546d479ea7c7d3e8c53cb8f7490981aaebc1e27a5cf2fba9161478679e85
SHA51246d78bf3cd8b0b69aed1f6a24d2e7480fe7a5672b00becc0edf9b8e072ed13ad28528482af06b5ab48178579f16bf3290c5e4908bd57d80526bf56438d132c94
-
Filesize
6.5MB
MD53480ba8c91b402dded857c98643ee427
SHA1e5949093ec1f1bdfff1bae5be474c021647e5a3b
SHA256504b546d479ea7c7d3e8c53cb8f7490981aaebc1e27a5cf2fba9161478679e85
SHA51246d78bf3cd8b0b69aed1f6a24d2e7480fe7a5672b00becc0edf9b8e072ed13ad28528482af06b5ab48178579f16bf3290c5e4908bd57d80526bf56438d132c94
-
Filesize
6.5MB
MD53480ba8c91b402dded857c98643ee427
SHA1e5949093ec1f1bdfff1bae5be474c021647e5a3b
SHA256504b546d479ea7c7d3e8c53cb8f7490981aaebc1e27a5cf2fba9161478679e85
SHA51246d78bf3cd8b0b69aed1f6a24d2e7480fe7a5672b00becc0edf9b8e072ed13ad28528482af06b5ab48178579f16bf3290c5e4908bd57d80526bf56438d132c94
-
Filesize
7.6MB
MD5e0495fabb8bf654d89c4b571399d24a9
SHA1aab7de877c7b8a0efa2140991c2db0127bc4cde6
SHA256715929716a7d37d5652fa8074663528e667d5c7cb863fa5c10236abfc8afe67c
SHA5121fed44090527fc54587739f8d2e45f26b2bf296e630c0e45d5eaae8db4d8bd2fbfabdd62e7eb2e3c7280a001952c33d0dff42405d60dd37892d93be2a999bf7f
-
Filesize
7.6MB
MD5e0495fabb8bf654d89c4b571399d24a9
SHA1aab7de877c7b8a0efa2140991c2db0127bc4cde6
SHA256715929716a7d37d5652fa8074663528e667d5c7cb863fa5c10236abfc8afe67c
SHA5121fed44090527fc54587739f8d2e45f26b2bf296e630c0e45d5eaae8db4d8bd2fbfabdd62e7eb2e3c7280a001952c33d0dff42405d60dd37892d93be2a999bf7f
-
Filesize
7.6MB
MD5e0495fabb8bf654d89c4b571399d24a9
SHA1aab7de877c7b8a0efa2140991c2db0127bc4cde6
SHA256715929716a7d37d5652fa8074663528e667d5c7cb863fa5c10236abfc8afe67c
SHA5121fed44090527fc54587739f8d2e45f26b2bf296e630c0e45d5eaae8db4d8bd2fbfabdd62e7eb2e3c7280a001952c33d0dff42405d60dd37892d93be2a999bf7f