Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-12-2024 20:44
Static task
static1
Behavioral task
behavioral1
Sample
af9946ffb432459ef1503fcc00736583f5281fdad55ad095931ffe593d132d74.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
af9946ffb432459ef1503fcc00736583f5281fdad55ad095931ffe593d132d74.exe
Resource
win10v2004-20241007-en
General
-
Target
af9946ffb432459ef1503fcc00736583f5281fdad55ad095931ffe593d132d74.exe
-
Size
8.1MB
-
MD5
d6e69be656af26b6f4fda79eda3de0f3
-
SHA1
cadf54b019c4202847c12cc8d84807ea1fd07b5e
-
SHA256
af9946ffb432459ef1503fcc00736583f5281fdad55ad095931ffe593d132d74
-
SHA512
e1773782f278f91493984d9226e559a18004a80c0883066111ef0f147fa0e0bf65c7fe22b26026779309ceb3aad81ffbf5796c3c79981402b73c1fa2fa9f5c49
-
SSDEEP
196608:tAUdsL+AUdsLmAUdsLmAUdsLmAUdsLmAUdsk:tPq+PqmPqmPqmPqmPF
Malware Config
Extracted
redline
816FA
88.99.151.68:7200
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/memory/2312-35-0x0000000000080000-0x00000000000D2000-memory.dmp family_redline behavioral1/memory/2312-36-0x0000000000080000-0x00000000000D2000-memory.dmp family_redline behavioral1/memory/2312-37-0x0000000000080000-0x00000000000D2000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 1 IoCs
pid Process 800 Community.pif -
Loads dropped DLL 1 IoCs
pid Process 2824 cmd.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2656 tasklist.exe 2736 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language af9946ffb432459ef1503fcc00736583f5281fdad55ad095931ffe593d132d74.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Community.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2900 schtasks.exe 2588 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 800 Community.pif 800 Community.pif 800 Community.pif 800 Community.pif 800 Community.pif 800 Community.pif 800 Community.pif 800 Community.pif 800 Community.pif 800 Community.pif 800 Community.pif 800 Community.pif 800 Community.pif 800 Community.pif 800 Community.pif 800 Community.pif 800 Community.pif 800 Community.pif 800 Community.pif 800 Community.pif 800 Community.pif 800 Community.pif -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2656 tasklist.exe Token: SeDebugPrivilege 2736 tasklist.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 800 Community.pif 800 Community.pif 800 Community.pif -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 800 Community.pif 800 Community.pif 800 Community.pif -
Suspicious use of WriteProcessMemory 58 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2824 2644 af9946ffb432459ef1503fcc00736583f5281fdad55ad095931ffe593d132d74.exe 30 PID 2644 wrote to memory of 2824 2644 af9946ffb432459ef1503fcc00736583f5281fdad55ad095931ffe593d132d74.exe 30 PID 2644 wrote to memory of 2824 2644 af9946ffb432459ef1503fcc00736583f5281fdad55ad095931ffe593d132d74.exe 30 PID 2644 wrote to memory of 2824 2644 af9946ffb432459ef1503fcc00736583f5281fdad55ad095931ffe593d132d74.exe 30 PID 2824 wrote to memory of 2656 2824 cmd.exe 32 PID 2824 wrote to memory of 2656 2824 cmd.exe 32 PID 2824 wrote to memory of 2656 2824 cmd.exe 32 PID 2824 wrote to memory of 2656 2824 cmd.exe 32 PID 2824 wrote to memory of 2920 2824 cmd.exe 33 PID 2824 wrote to memory of 2920 2824 cmd.exe 33 PID 2824 wrote to memory of 2920 2824 cmd.exe 33 PID 2824 wrote to memory of 2920 2824 cmd.exe 33 PID 2824 wrote to memory of 2736 2824 cmd.exe 35 PID 2824 wrote to memory of 2736 2824 cmd.exe 35 PID 2824 wrote to memory of 2736 2824 cmd.exe 35 PID 2824 wrote to memory of 2736 2824 cmd.exe 35 PID 2824 wrote to memory of 2572 2824 cmd.exe 36 PID 2824 wrote to memory of 2572 2824 cmd.exe 36 PID 2824 wrote to memory of 2572 2824 cmd.exe 36 PID 2824 wrote to memory of 2572 2824 cmd.exe 36 PID 2824 wrote to memory of 2604 2824 cmd.exe 37 PID 2824 wrote to memory of 2604 2824 cmd.exe 37 PID 2824 wrote to memory of 2604 2824 cmd.exe 37 PID 2824 wrote to memory of 2604 2824 cmd.exe 37 PID 2824 wrote to memory of 2808 2824 cmd.exe 38 PID 2824 wrote to memory of 2808 2824 cmd.exe 38 PID 2824 wrote to memory of 2808 2824 cmd.exe 38 PID 2824 wrote to memory of 2808 2824 cmd.exe 38 PID 2824 wrote to memory of 2564 2824 cmd.exe 39 PID 2824 wrote to memory of 2564 2824 cmd.exe 39 PID 2824 wrote to memory of 2564 2824 cmd.exe 39 PID 2824 wrote to memory of 2564 2824 cmd.exe 39 PID 2824 wrote to memory of 800 2824 cmd.exe 40 PID 2824 wrote to memory of 800 2824 cmd.exe 40 PID 2824 wrote to memory of 800 2824 cmd.exe 40 PID 2824 wrote to memory of 800 2824 cmd.exe 40 PID 2824 wrote to memory of 2724 2824 cmd.exe 41 PID 2824 wrote to memory of 2724 2824 cmd.exe 41 PID 2824 wrote to memory of 2724 2824 cmd.exe 41 PID 2824 wrote to memory of 2724 2824 cmd.exe 41 PID 800 wrote to memory of 3004 800 Community.pif 42 PID 800 wrote to memory of 3004 800 Community.pif 42 PID 800 wrote to memory of 3004 800 Community.pif 42 PID 800 wrote to memory of 3004 800 Community.pif 42 PID 800 wrote to memory of 2900 800 Community.pif 44 PID 800 wrote to memory of 2900 800 Community.pif 44 PID 800 wrote to memory of 2900 800 Community.pif 44 PID 800 wrote to memory of 2900 800 Community.pif 44 PID 3004 wrote to memory of 2588 3004 cmd.exe 46 PID 3004 wrote to memory of 2588 3004 cmd.exe 46 PID 3004 wrote to memory of 2588 3004 cmd.exe 46 PID 3004 wrote to memory of 2588 3004 cmd.exe 46 PID 800 wrote to memory of 2312 800 Community.pif 47 PID 800 wrote to memory of 2312 800 Community.pif 47 PID 800 wrote to memory of 2312 800 Community.pif 47 PID 800 wrote to memory of 2312 800 Community.pif 47 PID 800 wrote to memory of 2312 800 Community.pif 47 PID 800 wrote to memory of 2312 800 Community.pif 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\af9946ffb432459ef1503fcc00736583f5281fdad55ad095931ffe593d132d74.exe"C:\Users\Admin\AppData\Local\Temp\af9946ffb432459ef1503fcc00736583f5281fdad55ad095931ffe593d132d74.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Cassette Cassette.cmd & Cassette.cmd & exit2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2920
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2572
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 1774793⤵
- System Location Discovery: System Language Discovery
PID:2604
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "FoolBurkeRetainedWait" Drop3⤵
- System Location Discovery: System Language Discovery
PID:2808
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Tracked + ..\Luggage + ..\Prime + ..\Involved + ..\Fluid + ..\Newport + ..\Rod + ..\Society s3⤵
- System Location Discovery: System Language Discovery
PID:2564
-
-
C:\Users\Admin\AppData\Local\Temp\177479\Community.pifCommunity.pif s3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Windows\SysWOW64\cmd.execmd /c schtasks.exe /create /tn "Capable" /tr "wscript //B 'C:\Users\Admin\AppData\Local\SkyNav Technologies\SkyPilot.js'" /sc daily /mo 1 /ri 3 /du 23:57 /F /RL HIGHEST4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "Capable" /tr "wscript //B 'C:\Users\Admin\AppData\Local\SkyNav Technologies\SkyPilot.js'" /sc daily /mo 1 /ri 3 /du 23:57 /F /RL HIGHEST5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2588
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "SkyPilot" /tr "wscript //B 'C:\Users\Admin\AppData\Local\SkyNav Technologies\SkyPilot.js'" /sc onlogon /F /RL HIGHEST4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2900
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe4⤵
- System Location Discovery: System Language Discovery
PID:2312
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 153⤵
- System Location Discovery: System Language Discovery
PID:2724
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
550KB
MD52b13a9489351b8c1d7fea05188c2355c
SHA1c22a5d57303bc2887f1439e695d6d537ca32cb03
SHA2562dec1a0fd2bc8d3e538484d0c8914fbf3306ee9bec35afeabf9cee4104e1df8d
SHA5122424ccb73856d97248047521c24009c1ba619d30784fcde64c7ba30d06efa577f91bc26450cb2cbf560849f57ce58619a6474bd7e3ec3d03236dbdd303ccbde3
-
Filesize
6KB
MD54f0abd6588c8c75164b32182d57064d0
SHA1ca56a2a18f885325af7a9608fd37bdcfd9928f60
SHA256cd27421f2758e883e53d498e3fafba2b519688c1f482489d51ad75a4fbff3b5f
SHA51257267ee995b563840ee8d1b29e194b037bf39cc4cd9acf33beb9ce8a43137eaf70405139558e789453ffbcceae176f08cbae653a4635f97358cf5c6c0582f8d0
-
Filesize
241B
MD53b1ee79ec6fe9dfb3629ab806fe1b2d6
SHA1d3005fed3fcd45b8242a5c72ac9e96f87b72f6b9
SHA25673bdf5cf3e6b23be2ad017516c63467578798c5c9b92923ac5a85fad74687505
SHA512b1973db9bab3b551aaf741bfe1cf04ee2e65a7987b89a3027f4a048af0e1d9c14bb5dfe179cb5e9c06adb9fcf64d3c3b5ba0b6e6af5cf62c56e5bf1603468a92
-
Filesize
77KB
MD53c7d5da72c368a40bcfd258a8728aec6
SHA147bf8b740677c22b6f33128c3e67095cda710ef0
SHA256ee0d0d10a8e626b9ba71378297dc13dd0cc1f5814d505524be75a9b4cbf2e703
SHA5124cecccac58b6b2102c30a21da722fcfa9a075619c015fb6e5405bf9caa116993d765490609837e8003f49ce4bf06c96c488ddbe99151dbb7b2b243b9f5944c6f
-
Filesize
92KB
MD58ec3ecfac9a939428d32f07837ca00ef
SHA19229486c66f359f92d5f704e1a67caa9aedb7523
SHA256b32582f214374b6358e389038419f16912a4812fb139492677870b7cbd0fa00e
SHA5128410ecbb278801a1ef44d8599f68a7f5928bb7f3cfcecdbe57898ffb897d9b8ac1b4020e3502a359782a13d6200bb228afd3164da29a1cde89491218401e1f24
-
Filesize
59KB
MD585b7d2edb777e816b0597df78af14cb1
SHA1361bf29d1b667029e3c7e421dc9d60fc6c7e12be
SHA25673b17516142e6f26d6eec9da8e1700268175cfacb62303fb8b3ea073afa035c5
SHA512045e0dc2b5b480ca521264dd951c9fe9aed70d7ece51bb97e1d9acb83f6a9bfeb06e41ec67d886e204b01777728546c49352bd0b492784a0f3b0476cffd5b654
-
Filesize
81KB
MD53848c192447fcf1281796dd46e8449cc
SHA1c727acea27cc04c246f4f9d502625f017f7b1300
SHA256f261f507e779e7ec2b5580e7ebcc48024253f02b4478bad30020080c68241a9b
SHA5125152966433a7bfe11d9738990fcd45b57ece95c99284cde0bfd3fc096265a6334bf4e2d274e3ddc08132eb9839805775e4a1bf95fe37b11225c5eb98048d3394
-
Filesize
58KB
MD5025e06b944d66cceccd594a71a7f6a84
SHA1c32ef76e8ee6df6b9d47774c9c7664738d74d486
SHA256a93408df366ea9bb432d6ee58b995b829193acad7790b4e2c7714aa4cf7676bb
SHA512fc00bf517ae1ed8eff491cec8c6f600e3ff87463be928d04c273dcc81e3ebe2db56c1a134f55ef9726e74f042d518bea0f93607077ee2568e756e58f0854d22c
-
Filesize
78KB
MD5807b5fb1b7d75a5b808e1c97911fdcc3
SHA1bc12b9f63b3beb8b7f64b61f5245a0afa073593c
SHA2562933796e3bee9cea7fcce9a06adc6260b02a1b6e2822e631d1a8cbe3c9948ede
SHA512691b7b4b9245f7ea107c86053270cfa14788b7e67748152289c4c4368ad77850dda57a29be6d2f673cd29d1ef55bace2614166e5217a4a22d8a45a455583774c
-
Filesize
32KB
MD500ebb35a9981daf9dbfc5c9e05ab93eb
SHA100cb1d8643b336f926a39528a73a1a27ee9f1be3
SHA256169770a72d10369cc74decc8f5b9730f533772675021d17b66f62b9180f40aea
SHA5121c3a54257e12bc56900b095738fc46d3b5c8fa2cab2d20e309115286e5d6959c8be7176ed07171f90994062fbfbb72a2a57cae654954eb4cf86adbc134df2345
-
Filesize
872KB
MD54fe6d24625898f968f3ab23d7d0ad336
SHA1bb9d475da747f9bb506607d8c2a0282c629691a1
SHA256f1de84e03842252e12584bb031466ddc3070291fdac398ca0f8d000421d34311
SHA512681f4b955605423cf91fc191b602d7d69eea123a96c9b78f43e62b34b343825316a70269da4f5c805462f26e538e456670b5e2f2f36c55a76b6d19b51bc37d7c
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
73KB
MD521c97d86182d75bcaa3d2fc8bba1ff72
SHA13b22e3f9eeb685d2ce6ecf97f317ce69d6ac3976
SHA2567f946ec102576eaadf519bed523deec5fe92a69ae849711f446c23b4ae36e886
SHA512964e8c09f41687d2ac09fea914a0e1ce5ec6615295d8eca5de7d8a94920783c5d7e314949c6f926bef831407421f3e29c6d417433539713f8c2e1ec26b53102f
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c