Analysis
-
max time kernel
133s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-11-2024 02:17
Static task
static1
Behavioral task
behavioral1
Sample
fa17fb4d70e3c39e5548ea0f6980ae951c1f009890d79471b4792360002e34a7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa17fb4d70e3c39e5548ea0f6980ae951c1f009890d79471b4792360002e34a7.exe
Resource
win10v2004-20241007-en
General
-
Target
fa17fb4d70e3c39e5548ea0f6980ae951c1f009890d79471b4792360002e34a7.exe
-
Size
2.1MB
-
MD5
9cc134659561ee2afd14fd6433e9661d
-
SHA1
9c358826da568be19f1c244f810d3ff59087c295
-
SHA256
fa17fb4d70e3c39e5548ea0f6980ae951c1f009890d79471b4792360002e34a7
-
SHA512
34fa7b49d7cdbae6bcd9d57af67c36258fd7c3721abda9e576a523630c0f072d1a67ed43ecd7304256907d1625f4dbb8e68ed98c0934e734ba338cb1fafdd125
-
SSDEEP
49152:V5O7fPYebhETwwFP+/CHapiBiSyKHKmagg5vtpNuT4D3S:V5EfP1bhmFPaCuiRsmJgnpNuT4DC
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
51.89.207.166:47909
-
auth_value
3a050df92d0cf082b2cdaf87863616be
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/memory/1560-52-0x0000000000400000-0x0000000000432000-memory.dmp family_redline behavioral1/memory/1560-51-0x0000000000400000-0x0000000000432000-memory.dmp family_redline behavioral1/memory/1560-44-0x0000000000400000-0x0000000000432000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 2408 123.exe 2540 321.exe -
Loads dropped DLL 12 IoCs
pid Process 3028 fa17fb4d70e3c39e5548ea0f6980ae951c1f009890d79471b4792360002e34a7.exe 3028 fa17fb4d70e3c39e5548ea0f6980ae951c1f009890d79471b4792360002e34a7.exe 3028 fa17fb4d70e3c39e5548ea0f6980ae951c1f009890d79471b4792360002e34a7.exe 3028 fa17fb4d70e3c39e5548ea0f6980ae951c1f009890d79471b4792360002e34a7.exe 3028 fa17fb4d70e3c39e5548ea0f6980ae951c1f009890d79471b4792360002e34a7.exe 3028 fa17fb4d70e3c39e5548ea0f6980ae951c1f009890d79471b4792360002e34a7.exe 1868 WerFault.exe 1868 WerFault.exe 1976 WerFault.exe 1976 WerFault.exe 1976 WerFault.exe 1868 WerFault.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2540 set thread context of 2976 2540 321.exe 34 PID 2408 set thread context of 1560 2408 123.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1868 2408 WerFault.exe 30 1976 2540 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa17fb4d70e3c39e5548ea0f6980ae951c1f009890d79471b4792360002e34a7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 321.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 123.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2408 3028 fa17fb4d70e3c39e5548ea0f6980ae951c1f009890d79471b4792360002e34a7.exe 30 PID 3028 wrote to memory of 2408 3028 fa17fb4d70e3c39e5548ea0f6980ae951c1f009890d79471b4792360002e34a7.exe 30 PID 3028 wrote to memory of 2408 3028 fa17fb4d70e3c39e5548ea0f6980ae951c1f009890d79471b4792360002e34a7.exe 30 PID 3028 wrote to memory of 2408 3028 fa17fb4d70e3c39e5548ea0f6980ae951c1f009890d79471b4792360002e34a7.exe 30 PID 3028 wrote to memory of 2540 3028 fa17fb4d70e3c39e5548ea0f6980ae951c1f009890d79471b4792360002e34a7.exe 31 PID 3028 wrote to memory of 2540 3028 fa17fb4d70e3c39e5548ea0f6980ae951c1f009890d79471b4792360002e34a7.exe 31 PID 3028 wrote to memory of 2540 3028 fa17fb4d70e3c39e5548ea0f6980ae951c1f009890d79471b4792360002e34a7.exe 31 PID 3028 wrote to memory of 2540 3028 fa17fb4d70e3c39e5548ea0f6980ae951c1f009890d79471b4792360002e34a7.exe 31 PID 2540 wrote to memory of 2976 2540 321.exe 34 PID 2540 wrote to memory of 2976 2540 321.exe 34 PID 2540 wrote to memory of 2976 2540 321.exe 34 PID 2540 wrote to memory of 2976 2540 321.exe 34 PID 2540 wrote to memory of 2976 2540 321.exe 34 PID 2408 wrote to memory of 1560 2408 123.exe 35 PID 2408 wrote to memory of 1560 2408 123.exe 35 PID 2408 wrote to memory of 1560 2408 123.exe 35 PID 2408 wrote to memory of 1560 2408 123.exe 35 PID 2540 wrote to memory of 2976 2540 321.exe 34 PID 2408 wrote to memory of 1560 2408 123.exe 35 PID 2540 wrote to memory of 1976 2540 321.exe 36 PID 2540 wrote to memory of 1976 2540 321.exe 36 PID 2540 wrote to memory of 1976 2540 321.exe 36 PID 2540 wrote to memory of 1976 2540 321.exe 36 PID 2408 wrote to memory of 1560 2408 123.exe 35 PID 2408 wrote to memory of 1868 2408 123.exe 37 PID 2408 wrote to memory of 1868 2408 123.exe 37 PID 2408 wrote to memory of 1868 2408 123.exe 37 PID 2408 wrote to memory of 1868 2408 123.exe 37 PID 2976 wrote to memory of 1744 2976 vbc.exe 38 PID 2976 wrote to memory of 1744 2976 vbc.exe 38 PID 2976 wrote to memory of 1744 2976 vbc.exe 38 PID 2976 wrote to memory of 1744 2976 vbc.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa17fb4d70e3c39e5548ea0f6980ae951c1f009890d79471b4792360002e34a7.exe"C:\Users\Admin\AppData\Local\Temp\fa17fb4d70e3c39e5548ea0f6980ae951c1f009890d79471b4792360002e34a7.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\Temp\123.exe"C:\Windows\Temp\123.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2408 -s 483⤵
- Loads dropped DLL
- Program crash
PID:1868
-
-
-
C:\Windows\Temp\321.exe"C:\Windows\Temp\321.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\bebra.exe4⤵
- System Location Discovery: System Language Discovery
PID:1744
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2540 -s 483⤵
- Loads dropped DLL
- Program crash
PID:1976
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
781KB
MD50632395c34953f977b66430b2e419f54
SHA13f66a0792520591681b111f160f4e466acbd8493
SHA25683fdd437290ea0cbead8f5661509722b693a5ae393e695d4b5c797fb79e298de
SHA512f9b25b52d07f7edc974ba3240696927cbba8a29a1e053727ed5220aff899fe81a5744c335d20a3ecc5ce0cd1c24913e9e92ff498185daeb76ac9e44501fdfd6b
-
Filesize
3.1MB
MD50d73467bf51df297e4c69c977b8f71d5
SHA102872ad910b72e289c056fe6c488896e0211160f
SHA2561810896e37030314c7cad251890b3e5d69e724d3d155dae682adc674734e9a99
SHA512cab6b7cd35b1f9633cb0d1d69ca0e1470ab903fd9f0d6be0b1d1cdec2db4f3363bd83e182339470ef5158e25a7ae431b36b715c1d94f4911a7eb9e33bd966849