Overview
overview
10Static
static
10log sender...ip.dll
windows11-21h2-x64
1log sender...py.dll
windows11-21h2-x64
1log sender...ol.dll
windows11-21h2-x64
1log sender...er.dll
windows11-21h2-x64
1log sender...se.dll
windows11-21h2-x64
1log sender...ET.dll
windows11-21h2-x64
1log sender...es.dll
windows11-21h2-x64
1log sender...on.dll
windows11-21h2-x64
1log sender...ta.dll
windows11-21h2-x64
3log sender...ml.dll
windows11-21h2-x64
3log sender...er.dll
windows11-21h2-x64
1log sender...ss.dll
windows11-21h2-x64
1log sender...rs.dll
windows11-21h2-x64
1log sender...te.dll
windows11-21h2-x64
1log sender...ry.dll
windows11-21h2-x64
1log sender...rs.dll
windows11-21h2-x64
1log sender...fe.dll
windows11-21h2-x64
1log sender...eb.dll
windows11-21h2-x64
1log sender...on.dll
windows11-21h2-x64
1log sender...ns.dll
windows11-21h2-x64
1log sender...le.dll
windows11-21h2-x64
3log sender...on.dll
windows11-21h2-x64
3log sender...ps.dll
windows11-21h2-x64
1log sender...er.dll
windows11-21h2-x64
1log sender...er.dll
windows11-21h2-x64
1log sender...ot.exe
windows11-21h2-x64
10log sender...rp.dll
windows11-21h2-x64
1log sender...op.dll
windows11-21h2-x64
1log sender...ns.exe
windows11-21h2-x64
8log sender...me.exe
windows11-21h2-x64
7log sender...rp.dll
windows11-21h2-x64
3log sender...op.dll
windows11-21h2-x64
3Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
13-10-2024 22:55
Behavioral task
behavioral1
Sample
log sender/DotNetZip.dll
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
log sender/Entropy.dll
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
log sender/HandyControl.dll
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
log sender/IpMatcher.dll
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
log sender/License.dll
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
log sender/MailBee.NET.dll
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
log sender/Microsoft.Bcl.AsyncInterfaces.dll
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
log sender/Newtonsoft.Json.dll
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
log sender/PresentationFramework-SystemData.dll
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
log sender/PresentationFramework-SystemXml.dll
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
log sender/RegexMatcher.dll
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
log sender/SharpCompress.dll
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
log sender/System.Buffers.dll
Resource
win11-20241007-en
Behavioral task
behavioral14
Sample
log sender/System.Data.SQLite.dll
Resource
win11-20241007-en
Behavioral task
behavioral15
Sample
log sender/System.Memory.dll
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
log sender/System.Numerics.Vectors.dll
Resource
win11-20241007-en
Behavioral task
behavioral17
Sample
log sender/System.Runtime.CompilerServices.Unsafe.dll
Resource
win11-20241007-en
Behavioral task
behavioral18
Sample
log sender/System.Text.Encodings.Web.dll
Resource
win11-20241007-en
Behavioral task
behavioral19
Sample
log sender/System.Text.Json.dll
Resource
win11-20241007-en
Behavioral task
behavioral20
Sample
log sender/System.Threading.Tasks.Extensions.dll
Resource
win11-20241007-en
Behavioral task
behavioral21
Sample
log sender/System.ValueTuple.dll
Resource
win11-20240802-en
Behavioral task
behavioral22
Sample
log sender/System.Windows.Controls.Ribbon.dll
Resource
win11-20241007-en
Behavioral task
behavioral23
Sample
log sender/Timestamps.dll
Resource
win11-20241007-en
Behavioral task
behavioral24
Sample
log sender/UrlMatcher.dll
Resource
win11-20241007-en
Behavioral task
behavioral25
Sample
log sender/WatsonWebserver.dll
Resource
win11-20241007-en
Behavioral task
behavioral26
Sample
log sender/logs bot.exe
Resource
win11-20241007-en
Behavioral task
behavioral27
Sample
log sender/x64/GoSrp.dll
Resource
win11-20241007-en
Behavioral task
behavioral28
Sample
log sender/x64/SQLite.Interop.dll
Resource
win11-20240802-en
Behavioral task
behavioral29
Sample
log sender/x64/expections.exe
Resource
win11-20241007-en
Behavioral task
behavioral30
Sample
log sender/x64/runtime.exe
Resource
win11-20241007-en
Behavioral task
behavioral31
Sample
log sender/x86/GoSrp.dll
Resource
win11-20241007-en
Behavioral task
behavioral32
Sample
log sender/x86/SQLite.Interop.dll
Resource
win11-20241007-en
General
-
Target
log sender/logs bot.exe
-
Size
894KB
-
MD5
ac2c05fb13ae53e3d6d38ef3a8815b0d
-
SHA1
baaf57949abcad93a9247a55746fa517e495f048
-
SHA256
efed9ff5c81d6d2a63f057e9fc5ee2d15b85a2c51df4a92c17d87cc8b529a2c3
-
SHA512
5d55fb685ce2bf5d3769a8c8cf48efdd961a4c8609cdeadea1a3062bb5dfddd0e97da414290daea2798733b8815dcd33786a27c300cc7aa578c6ba3b746b05ed
-
SSDEEP
12288:sMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9Q2BVko8kufuAj:snsJ39LyjbJkQFMhmC+6GD9TBVkNt
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 6 IoCs
resource yara_rule behavioral26/files/0x001c00000002ab18-5.dat family_redline behavioral26/files/0x001c00000002ac00-66.dat family_redline behavioral26/memory/3200-129-0x0000000000400000-0x00000000004E6000-memory.dmp family_redline behavioral26/memory/4452-130-0x0000000000CF0000-0x0000000000D1A000-memory.dmp family_redline behavioral26/memory/4592-245-0x0000000000400000-0x00000000004E6000-memory.dmp family_redline behavioral26/memory/4592-277-0x0000000000400000-0x00000000004E6000-memory.dmp family_redline -
Executes dropped EXE 3 IoCs
pid Process 4452 ._cache_logs bot.exe 4592 Synaptics.exe 3556 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" logs bot.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language logs bot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_logs bot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Kills process with taskkill 2 IoCs
pid Process 4560 taskkill.exe 2352 taskkill.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ logs bot.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 788 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4452 ._cache_logs bot.exe Token: SeDebugPrivilege 3556 ._cache_Synaptics.exe Token: SeDebugPrivilege 2352 taskkill.exe Token: SeDebugPrivilege 4560 taskkill.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 788 EXCEL.EXE 788 EXCEL.EXE 788 EXCEL.EXE 788 EXCEL.EXE 788 EXCEL.EXE 788 EXCEL.EXE 788 EXCEL.EXE 788 EXCEL.EXE -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 3200 wrote to memory of 4452 3200 logs bot.exe 77 PID 3200 wrote to memory of 4452 3200 logs bot.exe 77 PID 3200 wrote to memory of 4452 3200 logs bot.exe 77 PID 3200 wrote to memory of 4592 3200 logs bot.exe 78 PID 3200 wrote to memory of 4592 3200 logs bot.exe 78 PID 3200 wrote to memory of 4592 3200 logs bot.exe 78 PID 4592 wrote to memory of 3556 4592 Synaptics.exe 79 PID 4592 wrote to memory of 3556 4592 Synaptics.exe 79 PID 4592 wrote to memory of 3556 4592 Synaptics.exe 79 PID 3556 wrote to memory of 4572 3556 ._cache_Synaptics.exe 82 PID 3556 wrote to memory of 4572 3556 ._cache_Synaptics.exe 82 PID 3556 wrote to memory of 4572 3556 ._cache_Synaptics.exe 82 PID 4452 wrote to memory of 2288 4452 ._cache_logs bot.exe 83 PID 4452 wrote to memory of 2288 4452 ._cache_logs bot.exe 83 PID 4452 wrote to memory of 2288 4452 ._cache_logs bot.exe 83 PID 4572 wrote to memory of 4560 4572 cmd.exe 86 PID 4572 wrote to memory of 4560 4572 cmd.exe 86 PID 4572 wrote to memory of 4560 4572 cmd.exe 86 PID 2288 wrote to memory of 2352 2288 cmd.exe 87 PID 2288 wrote to memory of 2352 2288 cmd.exe 87 PID 2288 wrote to memory of 2352 2288 cmd.exe 87 PID 4572 wrote to memory of 1144 4572 cmd.exe 88 PID 4572 wrote to memory of 1144 4572 cmd.exe 88 PID 4572 wrote to memory of 1144 4572 cmd.exe 88 PID 2288 wrote to memory of 928 2288 cmd.exe 89 PID 2288 wrote to memory of 928 2288 cmd.exe 89 PID 2288 wrote to memory of 928 2288 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\log sender\logs bot.exe"C:\Users\Admin\AppData\Local\Temp\log sender\logs bot.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\log sender\._cache_logs bot.exe"C:\Users\Admin\AppData\Local\Temp\log sender\._cache_logs bot.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 4452 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\log sender\._cache_logs bot.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 44524⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2352
-
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 34⤵
- System Location Discovery: System Language Discovery
PID:928
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\log sender\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\log sender\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 3556 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\log sender\._cache_Synaptics.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 35565⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4560
-
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 35⤵
- System Location Discovery: System Language Discovery
PID:1144
-
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
894KB
MD5ac2c05fb13ae53e3d6d38ef3a8815b0d
SHA1baaf57949abcad93a9247a55746fa517e495f048
SHA256efed9ff5c81d6d2a63f057e9fc5ee2d15b85a2c51df4a92c17d87cc8b529a2c3
SHA5125d55fb685ce2bf5d3769a8c8cf48efdd961a4c8609cdeadea1a3062bb5dfddd0e97da414290daea2798733b8815dcd33786a27c300cc7aa578c6ba3b746b05ed
-
Filesize
23KB
MD5bc229651fdf9fca87e95033f0a394ae4
SHA147db3ed13516f30aa4adc24d22b86a96d5608e72
SHA256cbcc1eb8b5d42c55f819df407b1b6d5ac586892edffcbb839cdd00223acb600f
SHA51261cd506da288546758dc49199c3d555d97d26d1824f7b20a222de36c9a0c14661c9ed6e4911439c59cca2182c2910d255809a159ac534dd8e8fd4dcc4fc1ec2e
-
Filesize
141KB
MD5f008bbd1ebe31a75bcfdd521f231c5ad
SHA1c70b5fd20d0ee74ba1a0963da1d751cd36669572
SHA256b313386e5d12e8a34f346f2ced1e94912351533282d337a95812131959c72c83
SHA512da9168b7492cd2d5fcd91fe99525f06ba1d1ae4cfde2a40d837290aee591a974ffa86c9977c07e42b31472b696b37017c7bad98de3138bd3afee7c7cb1648e56
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04