Analysis
-
max time kernel
131s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-11-2024 01:50
Static task
static1
Behavioral task
behavioral1
Sample
f7a1329e5d2d787c17e5357dfe8242f14dc9e1faf5981a1a4d9d8d1d6511f9ff.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f7a1329e5d2d787c17e5357dfe8242f14dc9e1faf5981a1a4d9d8d1d6511f9ff.exe
Resource
win10v2004-20241007-en
General
-
Target
f7a1329e5d2d787c17e5357dfe8242f14dc9e1faf5981a1a4d9d8d1d6511f9ff.exe
-
Size
2.2MB
-
MD5
a7fadc5ffccd272e1f3e5dc1717926de
-
SHA1
d7ec968dbd537158f91b3493fd5f6657e7572836
-
SHA256
f7a1329e5d2d787c17e5357dfe8242f14dc9e1faf5981a1a4d9d8d1d6511f9ff
-
SHA512
a297600ba51c2ffa19ddcf0183a949393ea138240cb404ad38b4f90aaaf2dbec2cc8e4cc3f32678ae01e65653f18d91782fde4e3f54789c161986f2561d981d7
-
SSDEEP
49152:V5OXoeI6Fye8Aivbktejn/dGiGf/vkADafh2KdOTD5Q1f:V5Youevbk2ngiwFafhLOT9Q1
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
51.210.137.6:47909
-
auth_value
3a050df92d0cf082b2cdaf87863616be
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/memory/2672-28-0x0000000000400000-0x0000000000432000-memory.dmp family_redline behavioral1/memory/2672-35-0x0000000000400000-0x0000000000432000-memory.dmp family_redline behavioral1/memory/2672-34-0x0000000000400000-0x0000000000432000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 2928 123.exe 2768 321.exe -
Loads dropped DLL 12 IoCs
pid Process 2256 f7a1329e5d2d787c17e5357dfe8242f14dc9e1faf5981a1a4d9d8d1d6511f9ff.exe 2256 f7a1329e5d2d787c17e5357dfe8242f14dc9e1faf5981a1a4d9d8d1d6511f9ff.exe 2256 f7a1329e5d2d787c17e5357dfe8242f14dc9e1faf5981a1a4d9d8d1d6511f9ff.exe 2256 f7a1329e5d2d787c17e5357dfe8242f14dc9e1faf5981a1a4d9d8d1d6511f9ff.exe 2256 f7a1329e5d2d787c17e5357dfe8242f14dc9e1faf5981a1a4d9d8d1d6511f9ff.exe 2256 f7a1329e5d2d787c17e5357dfe8242f14dc9e1faf5981a1a4d9d8d1d6511f9ff.exe 2424 WerFault.exe 2424 WerFault.exe 2424 WerFault.exe 2108 WerFault.exe 2108 WerFault.exe 2108 WerFault.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2928 set thread context of 2672 2928 123.exe 34 PID 2768 set thread context of 560 2768 321.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2424 2928 WerFault.exe 30 2108 2768 WerFault.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7a1329e5d2d787c17e5357dfe8242f14dc9e1faf5981a1a4d9d8d1d6511f9ff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 321.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2928 2256 f7a1329e5d2d787c17e5357dfe8242f14dc9e1faf5981a1a4d9d8d1d6511f9ff.exe 30 PID 2256 wrote to memory of 2928 2256 f7a1329e5d2d787c17e5357dfe8242f14dc9e1faf5981a1a4d9d8d1d6511f9ff.exe 30 PID 2256 wrote to memory of 2928 2256 f7a1329e5d2d787c17e5357dfe8242f14dc9e1faf5981a1a4d9d8d1d6511f9ff.exe 30 PID 2256 wrote to memory of 2928 2256 f7a1329e5d2d787c17e5357dfe8242f14dc9e1faf5981a1a4d9d8d1d6511f9ff.exe 30 PID 2256 wrote to memory of 2768 2256 f7a1329e5d2d787c17e5357dfe8242f14dc9e1faf5981a1a4d9d8d1d6511f9ff.exe 32 PID 2256 wrote to memory of 2768 2256 f7a1329e5d2d787c17e5357dfe8242f14dc9e1faf5981a1a4d9d8d1d6511f9ff.exe 32 PID 2256 wrote to memory of 2768 2256 f7a1329e5d2d787c17e5357dfe8242f14dc9e1faf5981a1a4d9d8d1d6511f9ff.exe 32 PID 2256 wrote to memory of 2768 2256 f7a1329e5d2d787c17e5357dfe8242f14dc9e1faf5981a1a4d9d8d1d6511f9ff.exe 32 PID 2928 wrote to memory of 2672 2928 123.exe 34 PID 2928 wrote to memory of 2672 2928 123.exe 34 PID 2928 wrote to memory of 2672 2928 123.exe 34 PID 2928 wrote to memory of 2672 2928 123.exe 34 PID 2928 wrote to memory of 2672 2928 123.exe 34 PID 2928 wrote to memory of 2672 2928 123.exe 34 PID 2928 wrote to memory of 2424 2928 123.exe 35 PID 2928 wrote to memory of 2424 2928 123.exe 35 PID 2928 wrote to memory of 2424 2928 123.exe 35 PID 2928 wrote to memory of 2424 2928 123.exe 35 PID 2768 wrote to memory of 560 2768 321.exe 36 PID 2768 wrote to memory of 560 2768 321.exe 36 PID 2768 wrote to memory of 560 2768 321.exe 36 PID 2768 wrote to memory of 560 2768 321.exe 36 PID 2768 wrote to memory of 560 2768 321.exe 36 PID 2768 wrote to memory of 560 2768 321.exe 36 PID 2768 wrote to memory of 2108 2768 321.exe 37 PID 2768 wrote to memory of 2108 2768 321.exe 37 PID 2768 wrote to memory of 2108 2768 321.exe 37 PID 2768 wrote to memory of 2108 2768 321.exe 37 PID 560 wrote to memory of 2660 560 vbc.exe 38 PID 560 wrote to memory of 2660 560 vbc.exe 38 PID 560 wrote to memory of 2660 560 vbc.exe 38 PID 560 wrote to memory of 2660 560 vbc.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7a1329e5d2d787c17e5357dfe8242f14dc9e1faf5981a1a4d9d8d1d6511f9ff.exe"C:\Users\Admin\AppData\Local\Temp\f7a1329e5d2d787c17e5357dfe8242f14dc9e1faf5981a1a4d9d8d1d6511f9ff.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\Temp\123.exe"C:\Windows\Temp\123.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2928 -s 483⤵
- Loads dropped DLL
- Program crash
PID:2424
-
-
-
C:\Windows\Temp\321.exe"C:\Windows\Temp\321.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\bebra.exe4⤵
- System Location Discovery: System Language Discovery
PID:2660
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 483⤵
- Loads dropped DLL
- Program crash
PID:2108
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
515KB
MD51244eae9b1995837eb39eecdd646fbc6
SHA11b6edf0cdf255b7d3267d58816ecc36b19c9d32a
SHA256777d9fc3cf159b1554720893800d7ea5289995778744257c4fa34a678d2c43b5
SHA512e302df8763863ceca10fd7df2ae07cc532193c12e72a2920b3620310525c0d1a6c0aee2c9f6a702d5419c61999df52d12f2109e0081eab23dfa27a6add068dd0
-
Filesize
2.9MB
MD5f291aa00046d70c3f20bef3bcdb74053
SHA10741b75321f0f140954db48b401f061ac932d246
SHA256c3897c2a1c41dded26b54515782fb189862938b56fb48f75f3e7fbc7360ab8e5
SHA512b66b2cdcdd989ec28407957865269d818f619834b3cf3149b8fe66c2969acddb43b742242d1a230eb9a3ed6f710078206b4025e60e1611a7e5c0e85083871568