Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/09/2024, 01:59
Static task
static1
Behavioral task
behavioral1
Sample
92a24e160937ec00bd6a8e855cd55b9329760131c1412f35b18c92aacc299883.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
92a24e160937ec00bd6a8e855cd55b9329760131c1412f35b18c92aacc299883.exe
Resource
win10v2004-20240802-en
General
-
Target
92a24e160937ec00bd6a8e855cd55b9329760131c1412f35b18c92aacc299883.exe
-
Size
1.4MB
-
MD5
9f5fea618279281fdc697b0d43760a16
-
SHA1
198b4078dd03e7cc8d58c024fcc8956704a87893
-
SHA256
92a24e160937ec00bd6a8e855cd55b9329760131c1412f35b18c92aacc299883
-
SHA512
e80df43046447f29c23ec05a16ffd4003efacec15eca5ad16dbe15345174621f5ad7752a23cd1b5268ec46ae74c283233dbb223e8e2557a9f3c87a70c4f4f6e4
-
SSDEEP
24576:Z9/YFro7myA9aUx6P2lms+OKMREuMJY3cOz9ra:ZOp9MUxKyKMRfMJMla
Malware Config
Extracted
redline
unique0109
185.215.113.67:21405
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/memory/2632-35-0x0000000000090000-0x00000000000E2000-memory.dmp family_redline behavioral1/memory/2632-37-0x0000000000090000-0x00000000000E2000-memory.dmp family_redline behavioral1/memory/2632-38-0x0000000000090000-0x00000000000E2000-memory.dmp family_redline -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Deletes itself 1 IoCs
pid Process 1632 Christmas.pif -
Executes dropped EXE 2 IoCs
pid Process 1632 Christmas.pif 2632 RegAsm.exe -
Loads dropped DLL 3 IoCs
pid Process 2320 cmd.exe 1632 Christmas.pif 2632 RegAsm.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2764 tasklist.exe 2960 tasklist.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\ChildWaterproof 92a24e160937ec00bd6a8e855cd55b9329760131c1412f35b18c92aacc299883.exe File opened for modification C:\Windows\HispanicSteve 92a24e160937ec00bd6a8e855cd55b9329760131c1412f35b18c92aacc299883.exe File opened for modification C:\Windows\FairlyIntroductory 92a24e160937ec00bd6a8e855cd55b9329760131c1412f35b18c92aacc299883.exe File opened for modification C:\Windows\MateFeb 92a24e160937ec00bd6a8e855cd55b9329760131c1412f35b18c92aacc299883.exe File opened for modification C:\Windows\OopsGuitars 92a24e160937ec00bd6a8e855cd55b9329760131c1412f35b18c92aacc299883.exe File opened for modification C:\Windows\ArtificialAlbania 92a24e160937ec00bd6a8e855cd55b9329760131c1412f35b18c92aacc299883.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Christmas.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 92a24e160937ec00bd6a8e855cd55b9329760131c1412f35b18c92aacc299883.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1632 Christmas.pif 1632 Christmas.pif 1632 Christmas.pif 1632 Christmas.pif 1632 Christmas.pif 1632 Christmas.pif 1632 Christmas.pif 1632 Christmas.pif 2632 RegAsm.exe 2632 RegAsm.exe 2632 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2960 tasklist.exe Token: SeDebugPrivilege 2764 tasklist.exe Token: SeDebugPrivilege 2632 RegAsm.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1632 Christmas.pif 1632 Christmas.pif 1632 Christmas.pif -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1632 Christmas.pif 1632 Christmas.pif 1632 Christmas.pif -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 540 wrote to memory of 2320 540 92a24e160937ec00bd6a8e855cd55b9329760131c1412f35b18c92aacc299883.exe 31 PID 540 wrote to memory of 2320 540 92a24e160937ec00bd6a8e855cd55b9329760131c1412f35b18c92aacc299883.exe 31 PID 540 wrote to memory of 2320 540 92a24e160937ec00bd6a8e855cd55b9329760131c1412f35b18c92aacc299883.exe 31 PID 540 wrote to memory of 2320 540 92a24e160937ec00bd6a8e855cd55b9329760131c1412f35b18c92aacc299883.exe 31 PID 2320 wrote to memory of 2960 2320 cmd.exe 33 PID 2320 wrote to memory of 2960 2320 cmd.exe 33 PID 2320 wrote to memory of 2960 2320 cmd.exe 33 PID 2320 wrote to memory of 2960 2320 cmd.exe 33 PID 2320 wrote to memory of 1828 2320 cmd.exe 34 PID 2320 wrote to memory of 1828 2320 cmd.exe 34 PID 2320 wrote to memory of 1828 2320 cmd.exe 34 PID 2320 wrote to memory of 1828 2320 cmd.exe 34 PID 2320 wrote to memory of 2764 2320 cmd.exe 36 PID 2320 wrote to memory of 2764 2320 cmd.exe 36 PID 2320 wrote to memory of 2764 2320 cmd.exe 36 PID 2320 wrote to memory of 2764 2320 cmd.exe 36 PID 2320 wrote to memory of 2772 2320 cmd.exe 37 PID 2320 wrote to memory of 2772 2320 cmd.exe 37 PID 2320 wrote to memory of 2772 2320 cmd.exe 37 PID 2320 wrote to memory of 2772 2320 cmd.exe 37 PID 2320 wrote to memory of 2636 2320 cmd.exe 38 PID 2320 wrote to memory of 2636 2320 cmd.exe 38 PID 2320 wrote to memory of 2636 2320 cmd.exe 38 PID 2320 wrote to memory of 2636 2320 cmd.exe 38 PID 2320 wrote to memory of 2644 2320 cmd.exe 39 PID 2320 wrote to memory of 2644 2320 cmd.exe 39 PID 2320 wrote to memory of 2644 2320 cmd.exe 39 PID 2320 wrote to memory of 2644 2320 cmd.exe 39 PID 2320 wrote to memory of 2628 2320 cmd.exe 40 PID 2320 wrote to memory of 2628 2320 cmd.exe 40 PID 2320 wrote to memory of 2628 2320 cmd.exe 40 PID 2320 wrote to memory of 2628 2320 cmd.exe 40 PID 2320 wrote to memory of 1632 2320 cmd.exe 41 PID 2320 wrote to memory of 1632 2320 cmd.exe 41 PID 2320 wrote to memory of 1632 2320 cmd.exe 41 PID 2320 wrote to memory of 1632 2320 cmd.exe 41 PID 2320 wrote to memory of 2680 2320 cmd.exe 42 PID 2320 wrote to memory of 2680 2320 cmd.exe 42 PID 2320 wrote to memory of 2680 2320 cmd.exe 42 PID 2320 wrote to memory of 2680 2320 cmd.exe 42 PID 1632 wrote to memory of 2632 1632 Christmas.pif 43 PID 1632 wrote to memory of 2632 1632 Christmas.pif 43 PID 1632 wrote to memory of 2632 1632 Christmas.pif 43 PID 1632 wrote to memory of 2632 1632 Christmas.pif 43 PID 1632 wrote to memory of 2632 1632 Christmas.pif 43 PID 1632 wrote to memory of 2632 1632 Christmas.pif 43 PID 1632 wrote to memory of 2632 1632 Christmas.pif 43 PID 1632 wrote to memory of 2632 1632 Christmas.pif 43 PID 1632 wrote to memory of 2632 1632 Christmas.pif 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\92a24e160937ec00bd6a8e855cd55b9329760131c1412f35b18c92aacc299883.exe"C:\Users\Admin\AppData\Local\Temp\92a24e160937ec00bd6a8e855cd55b9329760131c1412f35b18c92aacc299883.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Jose Jose.bat & Jose.bat & exit2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"3⤵
- System Location Discovery: System Language Discovery
PID:1828
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2764
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"3⤵
- System Location Discovery: System Language Discovery
PID:2772
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 8272433⤵
- System Location Discovery: System Language Discovery
PID:2636
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "CATCIRWILLIAMSPROFESSION" Burlington3⤵
- System Location Discovery: System Language Discovery
PID:2644
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Cameras + ..\Affect + ..\Amenities + ..\Ja + ..\Los + ..\Birthday + ..\Eliminate + ..\Melissa C3⤵
- System Location Discovery: System Language Discovery
PID:2628
-
-
C:\Users\Admin\AppData\Local\Temp\827243\Christmas.pifChristmas.pif C3⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\827243\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\827243\RegAsm.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 53⤵
- System Location Discovery: System Language Discovery
PID:2680
-
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
576KB
MD5af2c7ab0b47e3f89131c1f477701bcd2
SHA1842db71eee4440ea1090eee708aa3a0b27da5301
SHA2568c8ed94e58a4456a0aabd448425cb7602019f0efce146bb5d3670c471ff9de80
SHA5121a9de34608da60fa2bb14c503debe4131eabb8156b2ed7ae51489ffab13181a88df1c4a02b1331dc8731bb6418ea93030df7789382a7046a0aea5bfbe19b25bd
-
Filesize
95KB
MD547ca6ff2405757093a39dd21d9a90055
SHA1dec4f32b7201484609cb2597d126ec11bbac5aef
SHA256fb9efeb562fd817252d78023ec09f0a81f478e834bcca263d9679759a089fc1b
SHA512a5b3ca22723ed7fac1903c37093c2cc4daa65fbd25ad2b012e7877b4d6037af3610be79bd293756357f1eafddafb92db464c14dca2ed8d464f6d65baf55fb53f
-
Filesize
68KB
MD5540e2e531f3ef953ee24e41fc3c4b734
SHA1fae277f98217519de3154eddf208d15eaca86e13
SHA256b271b477ed275355e180503c8928b9cfc943285eddbb277201548e9cb1cbbdfb
SHA512a83a9f1370e5714d042038a4f7047cf880c6dadb8cae8c4db44da93a50431dc3902eaf40f1f84a5ba5a20172f09d4353568263c576fe39a2e5d400923ad8c28d
-
Filesize
871KB
MD544693bc6ae29647e826324f1cb03b8f8
SHA1dc08c1144d112116e72227408bd6c6f7a5ba8112
SHA256458b8a482d601b04ecbc85865f2fecb8dd35790be2b7cf272d54efb8f07f341c
SHA512c9def728e63aad9d93051bc6e7dfe1c50fe5a183c7c1bdfa30e242c02611cc902dcfa42f7900fbf2e5818a6336e4f3018cccc1272139f061c52a121435e499e6
-
Filesize
80KB
MD5a45b810c4e588f70b6d9f7868cf41021
SHA15b06afd2e70a0ec78149ec561302a00d6ef8d9e8
SHA2560f6bdebfbca53c6d4d9c4ab95090fecf502616c74d8d3e06dd533e84c0be7b4d
SHA5124b0687b4ce8f3e4f0e771cc1c32088c2d199159b6433604408f8e8be0dda71d56984857dc9a8de3f0f5213ee20916112adabd33d30c5b45327f688aee429610c
-
Filesize
947B
MD5d396944732116d039ed215fc45daf80b
SHA14ba51a03e4082ed3df9e15216693a86bb6889488
SHA2569bbe702d70718c86a4cf31c8cf89badbb2148cf65b5c1e55f02f94bbf9bb391b
SHA51291c8b219856cdad1ec976903001e24bfa500db3dcb316a95470c713f1e06dbc9f8acc3022407991a6feaf4859366796da9e5d56269b5b214b8817ff4a9a37c78
-
Filesize
76KB
MD58c2e280e0ae378d740b2290dd32a3b8f
SHA14f17a062dc7b4900323ad04858c054d241091bd1
SHA256fe69bfec7083056b954bedda974eefcf698e8cacc77e70e1d3b52ca2a5a59a7d
SHA512cc47a8a97326e927e63cae3f647cd481f537b322187219c7940275e493a3a05128db0f9b305ce448dfe7bd722d1917412770ba15202d939263bded4accdcf2c4
-
Filesize
56KB
MD591db20bed71a9d0e1aac5bad5f8d6a9b
SHA128f5d8d18ab339b673cd7776918c14e32812402d
SHA256227c0a7bef3c456647d7573131e8fc0dcd3983e13288d35da675d9a0bf176ebc
SHA512cf5f887fe006c6559ad5610bab8cc0afbae1c4e9ef2c55915f710efe90c8a09a9d33d6dad6c286a1386bf1addbd7c88d3704ea315a579e88e53b6cef5f2584c1
-
Filesize
71KB
MD517b202fa8093854fea43232078df4f1b
SHA1f430b9fcab891cdd8a057b1b8267b312475bb2d9
SHA2564956b8296c6b0344e97e1a310889240d21f42bf11f2259848e99646d04e9b1ba
SHA512041073de3e8c004f3eee0f8f580bc8a1656fa2e7e4dc3524f2a61bf8630b08dff1c51d7c563c8d4b62fcc6857c48ea7ada0790ab00db026b48443a62b52708cf
-
Filesize
22KB
MD57b5b6151e9d1151fac435551f34579ac
SHA14ac29aaa2efeb120c6dcbd1909bdb87c170b01ef
SHA2562da8df91d10965a9e496f0339e25968d27db9308c2311dbd8ff82dce1c166d97
SHA512f53a905a870d01525f85fc127fc2530b0eb745050b276624fcba1a9043c0e56ef576673310b681647c661f4d61f5d9c8dcd3843548fc40738cdd7da8c7e913fa
-
Filesize
78KB
MD537abbdfd1a62b68e162ca95ad86e1163
SHA17257315d7a98065278f927fc9d531d6a5e81e98e
SHA256ec01ce72a1e6f975ea78104ffa2207d9cc737762f2e001591282ec16f3394467
SHA5128c22a43647a30371f0fed6d7f8a3cba4596d5ac6d2198db8984b1906fae9cd0923b94ff5117f1a52e1d2fbc6009bdcc42f3f4694ba2629345bf6a2026caf844d
-
Filesize
52KB
MD5ae8ece3d790ffd78e6b91a6b64e48fe5
SHA178a5b5662c8a7c92eacf2d1094ca635bea67ec62
SHA256fd00df2aa9c3a903590c392ef0fb081ec8f07fd0844618138a743ee368d920e8
SHA512a670f47bfe87bed6e412bbe699bb1662802d0d3950aee69c63a79d0e16c2ed4abd86980f5cc77c9bef18e5957484deee7ed47a60aee95c4c40032983f31e4f85
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
872KB
MD518ce19b57f43ce0a5af149c96aecc685
SHA11bd5ca29fc35fc8ac346f23b155337c5b28bbc36
SHA256d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd
SHA512a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558
-
Filesize
63KB
MD5b58b926c3574d28d5b7fdd2ca3ec30d5
SHA1d260c4ffd603a9cfc057fcb83d678b1cecdf86f9
SHA2566e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3
SHA512b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab