Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2024 15:10

General

  • Target

    $O00l1ArAi1nstaller.zip

  • Size

    331KB

  • MD5

    e5685d7badcd511b3847631402de6143

  • SHA1

    088b2ee9859eec98eae62483a459248ec60f947d

  • SHA256

    aaaff084052e3062d911bf5859a4a6bafdf09b5dc2fe8c201ed932ef9b8c92a2

  • SHA512

    1e3a9792954f23c1e63cdaab42128e4714911f8a06f6669e10bce8e2fd6f38c561b7d3205486ec2c517f45b9d5dbc4372c311875706a80dfaa4e32d5b5059859

  • SSDEEP

    6144:8yxRrFZp/PeqsuEJefOqsCSfz8dP3x/S1F294bnojHUOGtz+vp4WU:8yXrp/7sBcfwXo5Hizozuti5U

Malware Config

Extracted

Family

redline

C2

185.196.9.26:6302

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\$O00l1ArAi1nstaller.zip"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:5056
    • C:\Users\Admin\AppData\Local\Temp\7zO0C3EAD48\$O00l1ArAi1nstaller.exe
      "C:\Users\Admin\AppData\Local\Temp\7zO0C3EAD48\$O00l1ArAi1nstaller.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4292
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4488
    • C:\Users\Admin\AppData\Local\Temp\7zO0C3751F8\$O00l1ArAi1nstaller.exe
      "C:\Users\Admin\AppData\Local\Temp\7zO0C3751F8\$O00l1ArAi1nstaller.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1068
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3356
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4708

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\$O00l1ArAi1nstaller.exe.log

      Filesize

      42B

      MD5

      84cfdb4b995b1dbf543b26b86c863adc

      SHA1

      d2f47764908bf30036cf8248b9ff5541e2711fa2

      SHA256

      d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b

      SHA512

      485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce

    • C:\Users\Admin\AppData\Local\Temp\7zO0C3EAD48\$O00l1ArAi1nstaller.exe

      Filesize

      384KB

      MD5

      51e03c02d99ef6ebbf99a129dafce711

      SHA1

      bb8267b0677884a2681687f1a5e60fa35194ac06

      SHA256

      03cbedf30b8339311d32d8df4895d36030b9f1f7917beba54b47d716674467c1

      SHA512

      7623101de16700802f269ad15e18be069b9711b5f25ad0672083c707e487bad3fd288c364e2220c567d9104bfa32416b11aa88e46c4b565efde4ba1b4b0a3124

    • C:\Users\Admin\AppData\Roaming\msvcp110.dll

      Filesize

      570KB

      MD5

      5401467483efc8330d66e4fe98f03cc8

      SHA1

      6f0e567a34e8bef55d46edf1f5982d71bd92b481

      SHA256

      f4341d1dc746b79c91ba341455bdaff7cc32cc75292d0fcd9f3f7eed01a3bda7

      SHA512

      67ef910b8fc0a0a05f3c00ad8c3db4fb60e00423747d80115f91fd01cf17b9101ef84b790c06aea4dc25a44163d5d70c4030177b00c2b576d46f8bdcf0167472

    • memory/4292-12-0x0000000074F2E000-0x0000000074F2F000-memory.dmp

      Filesize

      4KB

    • memory/4292-13-0x0000000000010000-0x0000000000078000-memory.dmp

      Filesize

      416KB

    • memory/4292-14-0x0000000002320000-0x0000000002326000-memory.dmp

      Filesize

      24KB

    • memory/4292-21-0x0000000074F20000-0x00000000756D0000-memory.dmp

      Filesize

      7.7MB

    • memory/4292-46-0x0000000074F20000-0x00000000756D0000-memory.dmp

      Filesize

      7.7MB

    • memory/4292-24-0x0000000074F20000-0x00000000756D0000-memory.dmp

      Filesize

      7.7MB

    • memory/4488-25-0x0000000005530000-0x0000000005AD4000-memory.dmp

      Filesize

      5.6MB

    • memory/4488-27-0x00000000051B0000-0x00000000051BA000-memory.dmp

      Filesize

      40KB

    • memory/4488-28-0x0000000006100000-0x0000000006718000-memory.dmp

      Filesize

      6.1MB

    • memory/4488-29-0x0000000005390000-0x000000000549A000-memory.dmp

      Filesize

      1.0MB

    • memory/4488-30-0x00000000052A0000-0x00000000052B2000-memory.dmp

      Filesize

      72KB

    • memory/4488-31-0x0000000005300000-0x000000000533C000-memory.dmp

      Filesize

      240KB

    • memory/4488-32-0x0000000005340000-0x000000000538C000-memory.dmp

      Filesize

      304KB

    • memory/4488-26-0x0000000005020000-0x00000000050B2000-memory.dmp

      Filesize

      584KB

    • memory/4488-22-0x0000000000400000-0x0000000000452000-memory.dmp

      Filesize

      328KB