Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 15:10
Static task
static1
Behavioral task
behavioral1
Sample
$O00l1ArAi1nstaller.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
$O00l1ArAi1nstaller.zip
Resource
win10v2004-20241007-en
General
-
Target
$O00l1ArAi1nstaller.zip
-
Size
331KB
-
MD5
e5685d7badcd511b3847631402de6143
-
SHA1
088b2ee9859eec98eae62483a459248ec60f947d
-
SHA256
aaaff084052e3062d911bf5859a4a6bafdf09b5dc2fe8c201ed932ef9b8c92a2
-
SHA512
1e3a9792954f23c1e63cdaab42128e4714911f8a06f6669e10bce8e2fd6f38c561b7d3205486ec2c517f45b9d5dbc4372c311875706a80dfaa4e32d5b5059859
-
SSDEEP
6144:8yxRrFZp/PeqsuEJefOqsCSfz8dP3x/S1F294bnojHUOGtz+vp4WU:8yXrp/7sBcfwXo5Hizozuti5U
Malware Config
Extracted
redline
185.196.9.26:6302
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/4488-22-0x0000000000400000-0x0000000000452000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 4292 $O00l1ArAi1nstaller.exe 1068 $O00l1ArAi1nstaller.exe -
Loads dropped DLL 2 IoCs
pid Process 4292 $O00l1ArAi1nstaller.exe 1068 $O00l1ArAi1nstaller.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4292 set thread context of 4488 4292 $O00l1ArAi1nstaller.exe 106 PID 1068 set thread context of 3356 1068 $O00l1ArAi1nstaller.exe 109 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language $O00l1ArAi1nstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language $O00l1ArAi1nstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5056 7zFM.exe 5056 7zFM.exe 5056 7zFM.exe 5056 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5056 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeRestorePrivilege 5056 7zFM.exe Token: 35 5056 7zFM.exe Token: SeSecurityPrivilege 5056 7zFM.exe Token: SeSecurityPrivilege 5056 7zFM.exe Token: SeSecurityPrivilege 5056 7zFM.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 5056 7zFM.exe 5056 7zFM.exe 5056 7zFM.exe 5056 7zFM.exe 5056 7zFM.exe 5056 7zFM.exe 5056 7zFM.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 5056 wrote to memory of 4292 5056 7zFM.exe 102 PID 5056 wrote to memory of 4292 5056 7zFM.exe 102 PID 5056 wrote to memory of 4292 5056 7zFM.exe 102 PID 4292 wrote to memory of 4488 4292 $O00l1ArAi1nstaller.exe 106 PID 4292 wrote to memory of 4488 4292 $O00l1ArAi1nstaller.exe 106 PID 4292 wrote to memory of 4488 4292 $O00l1ArAi1nstaller.exe 106 PID 4292 wrote to memory of 4488 4292 $O00l1ArAi1nstaller.exe 106 PID 4292 wrote to memory of 4488 4292 $O00l1ArAi1nstaller.exe 106 PID 4292 wrote to memory of 4488 4292 $O00l1ArAi1nstaller.exe 106 PID 4292 wrote to memory of 4488 4292 $O00l1ArAi1nstaller.exe 106 PID 4292 wrote to memory of 4488 4292 $O00l1ArAi1nstaller.exe 106 PID 5056 wrote to memory of 1068 5056 7zFM.exe 107 PID 5056 wrote to memory of 1068 5056 7zFM.exe 107 PID 5056 wrote to memory of 1068 5056 7zFM.exe 107 PID 1068 wrote to memory of 3356 1068 $O00l1ArAi1nstaller.exe 109 PID 1068 wrote to memory of 3356 1068 $O00l1ArAi1nstaller.exe 109 PID 1068 wrote to memory of 3356 1068 $O00l1ArAi1nstaller.exe 109 PID 1068 wrote to memory of 3356 1068 $O00l1ArAi1nstaller.exe 109 PID 1068 wrote to memory of 3356 1068 $O00l1ArAi1nstaller.exe 109 PID 1068 wrote to memory of 3356 1068 $O00l1ArAi1nstaller.exe 109 PID 1068 wrote to memory of 3356 1068 $O00l1ArAi1nstaller.exe 109 PID 1068 wrote to memory of 3356 1068 $O00l1ArAi1nstaller.exe 109
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\$O00l1ArAi1nstaller.zip"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\7zO0C3EAD48\$O00l1ArAi1nstaller.exe"C:\Users\Admin\AppData\Local\Temp\7zO0C3EAD48\$O00l1ArAi1nstaller.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4488
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO0C3751F8\$O00l1ArAi1nstaller.exe"C:\Users\Admin\AppData\Local\Temp\7zO0C3751F8\$O00l1ArAi1nstaller.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3356
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42B
MD584cfdb4b995b1dbf543b26b86c863adc
SHA1d2f47764908bf30036cf8248b9ff5541e2711fa2
SHA256d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b
SHA512485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce
-
Filesize
384KB
MD551e03c02d99ef6ebbf99a129dafce711
SHA1bb8267b0677884a2681687f1a5e60fa35194ac06
SHA25603cbedf30b8339311d32d8df4895d36030b9f1f7917beba54b47d716674467c1
SHA5127623101de16700802f269ad15e18be069b9711b5f25ad0672083c707e487bad3fd288c364e2220c567d9104bfa32416b11aa88e46c4b565efde4ba1b4b0a3124
-
Filesize
570KB
MD55401467483efc8330d66e4fe98f03cc8
SHA16f0e567a34e8bef55d46edf1f5982d71bd92b481
SHA256f4341d1dc746b79c91ba341455bdaff7cc32cc75292d0fcd9f3f7eed01a3bda7
SHA51267ef910b8fc0a0a05f3c00ad8c3db4fb60e00423747d80115f91fd01cf17b9101ef84b790c06aea4dc25a44163d5d70c4030177b00c2b576d46f8bdcf0167472