Analysis
-
max time kernel
124s -
max time network
128s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
25-12-2024 11:51
Static task
static1
Behavioral task
behavioral1
Sample
$O00l1ArAi1nstaller.zip
Resource
win10ltsc2021-20241211-en
General
-
Target
$O00l1ArAi1nstaller.zip
-
Size
331KB
-
MD5
e5685d7badcd511b3847631402de6143
-
SHA1
088b2ee9859eec98eae62483a459248ec60f947d
-
SHA256
aaaff084052e3062d911bf5859a4a6bafdf09b5dc2fe8c201ed932ef9b8c92a2
-
SHA512
1e3a9792954f23c1e63cdaab42128e4714911f8a06f6669e10bce8e2fd6f38c561b7d3205486ec2c517f45b9d5dbc4372c311875706a80dfaa4e32d5b5059859
-
SSDEEP
6144:8yxRrFZp/PeqsuEJefOqsCSfz8dP3x/S1F294bnojHUOGtz+vp4WU:8yXrp/7sBcfwXo5Hizozuti5U
Malware Config
Extracted
redline
185.196.9.26:6302
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/1492-25-0x0000000000160000-0x00000000001B2000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
pid Process 1172 $O00l1ArAi1nstaller.exe 2940 $O00l1ArAi1nstaller.exe 4712 $O00l1ArAi1nstaller.exe 4556 $O00l1ArAi1nstaller.exe 1704 $O00l1ArAi1nstaller.exe 216 $O00l1ArAi1nstaller.exe -
Loads dropped DLL 6 IoCs
pid Process 1172 $O00l1ArAi1nstaller.exe 2940 $O00l1ArAi1nstaller.exe 4712 $O00l1ArAi1nstaller.exe 4556 $O00l1ArAi1nstaller.exe 1704 $O00l1ArAi1nstaller.exe 216 $O00l1ArAi1nstaller.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 1172 set thread context of 1492 1172 $O00l1ArAi1nstaller.exe 94 PID 2940 set thread context of 3948 2940 $O00l1ArAi1nstaller.exe 97 PID 4712 set thread context of 1128 4712 $O00l1ArAi1nstaller.exe 100 PID 4556 set thread context of 3936 4556 $O00l1ArAi1nstaller.exe 103 PID 1704 set thread context of 3480 1704 $O00l1ArAi1nstaller.exe 107 PID 216 set thread context of 1676 216 $O00l1ArAi1nstaller.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language $O00l1ArAi1nstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language $O00l1ArAi1nstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language $O00l1ArAi1nstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language $O00l1ArAi1nstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language $O00l1ArAi1nstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language $O00l1ArAi1nstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3424 7zFM.exe 3424 7zFM.exe 3424 7zFM.exe 3424 7zFM.exe 3424 7zFM.exe 3424 7zFM.exe 3424 7zFM.exe 3424 7zFM.exe 3424 7zFM.exe 3424 7zFM.exe 3424 7zFM.exe 3424 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3424 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeRestorePrivilege 3424 7zFM.exe Token: 35 3424 7zFM.exe Token: SeSecurityPrivilege 3424 7zFM.exe Token: SeSecurityPrivilege 3424 7zFM.exe Token: SeSecurityPrivilege 3424 7zFM.exe Token: SeSecurityPrivilege 3424 7zFM.exe Token: SeSecurityPrivilege 3424 7zFM.exe Token: SeSecurityPrivilege 3424 7zFM.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 3424 7zFM.exe 3424 7zFM.exe 3424 7zFM.exe 3424 7zFM.exe 3424 7zFM.exe 3424 7zFM.exe 3424 7zFM.exe 3424 7zFM.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3424 wrote to memory of 1172 3424 7zFM.exe 91 PID 3424 wrote to memory of 1172 3424 7zFM.exe 91 PID 3424 wrote to memory of 1172 3424 7zFM.exe 91 PID 1172 wrote to memory of 1492 1172 $O00l1ArAi1nstaller.exe 94 PID 1172 wrote to memory of 1492 1172 $O00l1ArAi1nstaller.exe 94 PID 1172 wrote to memory of 1492 1172 $O00l1ArAi1nstaller.exe 94 PID 1172 wrote to memory of 1492 1172 $O00l1ArAi1nstaller.exe 94 PID 1172 wrote to memory of 1492 1172 $O00l1ArAi1nstaller.exe 94 PID 1172 wrote to memory of 1492 1172 $O00l1ArAi1nstaller.exe 94 PID 1172 wrote to memory of 1492 1172 $O00l1ArAi1nstaller.exe 94 PID 1172 wrote to memory of 1492 1172 $O00l1ArAi1nstaller.exe 94 PID 3424 wrote to memory of 2940 3424 7zFM.exe 95 PID 3424 wrote to memory of 2940 3424 7zFM.exe 95 PID 3424 wrote to memory of 2940 3424 7zFM.exe 95 PID 2940 wrote to memory of 3948 2940 $O00l1ArAi1nstaller.exe 97 PID 2940 wrote to memory of 3948 2940 $O00l1ArAi1nstaller.exe 97 PID 2940 wrote to memory of 3948 2940 $O00l1ArAi1nstaller.exe 97 PID 2940 wrote to memory of 3948 2940 $O00l1ArAi1nstaller.exe 97 PID 2940 wrote to memory of 3948 2940 $O00l1ArAi1nstaller.exe 97 PID 2940 wrote to memory of 3948 2940 $O00l1ArAi1nstaller.exe 97 PID 2940 wrote to memory of 3948 2940 $O00l1ArAi1nstaller.exe 97 PID 2940 wrote to memory of 3948 2940 $O00l1ArAi1nstaller.exe 97 PID 3424 wrote to memory of 4712 3424 7zFM.exe 98 PID 3424 wrote to memory of 4712 3424 7zFM.exe 98 PID 3424 wrote to memory of 4712 3424 7zFM.exe 98 PID 4712 wrote to memory of 1128 4712 $O00l1ArAi1nstaller.exe 100 PID 4712 wrote to memory of 1128 4712 $O00l1ArAi1nstaller.exe 100 PID 4712 wrote to memory of 1128 4712 $O00l1ArAi1nstaller.exe 100 PID 4712 wrote to memory of 1128 4712 $O00l1ArAi1nstaller.exe 100 PID 4712 wrote to memory of 1128 4712 $O00l1ArAi1nstaller.exe 100 PID 4712 wrote to memory of 1128 4712 $O00l1ArAi1nstaller.exe 100 PID 4712 wrote to memory of 1128 4712 $O00l1ArAi1nstaller.exe 100 PID 4712 wrote to memory of 1128 4712 $O00l1ArAi1nstaller.exe 100 PID 3424 wrote to memory of 4556 3424 7zFM.exe 101 PID 3424 wrote to memory of 4556 3424 7zFM.exe 101 PID 3424 wrote to memory of 4556 3424 7zFM.exe 101 PID 4556 wrote to memory of 3936 4556 $O00l1ArAi1nstaller.exe 103 PID 4556 wrote to memory of 3936 4556 $O00l1ArAi1nstaller.exe 103 PID 4556 wrote to memory of 3936 4556 $O00l1ArAi1nstaller.exe 103 PID 4556 wrote to memory of 3936 4556 $O00l1ArAi1nstaller.exe 103 PID 4556 wrote to memory of 3936 4556 $O00l1ArAi1nstaller.exe 103 PID 4556 wrote to memory of 3936 4556 $O00l1ArAi1nstaller.exe 103 PID 4556 wrote to memory of 3936 4556 $O00l1ArAi1nstaller.exe 103 PID 4556 wrote to memory of 3936 4556 $O00l1ArAi1nstaller.exe 103 PID 3424 wrote to memory of 1704 3424 7zFM.exe 105 PID 3424 wrote to memory of 1704 3424 7zFM.exe 105 PID 3424 wrote to memory of 1704 3424 7zFM.exe 105 PID 1704 wrote to memory of 3480 1704 $O00l1ArAi1nstaller.exe 107 PID 1704 wrote to memory of 3480 1704 $O00l1ArAi1nstaller.exe 107 PID 1704 wrote to memory of 3480 1704 $O00l1ArAi1nstaller.exe 107 PID 1704 wrote to memory of 3480 1704 $O00l1ArAi1nstaller.exe 107 PID 1704 wrote to memory of 3480 1704 $O00l1ArAi1nstaller.exe 107 PID 1704 wrote to memory of 3480 1704 $O00l1ArAi1nstaller.exe 107 PID 1704 wrote to memory of 3480 1704 $O00l1ArAi1nstaller.exe 107 PID 1704 wrote to memory of 3480 1704 $O00l1ArAi1nstaller.exe 107 PID 3424 wrote to memory of 216 3424 7zFM.exe 108 PID 3424 wrote to memory of 216 3424 7zFM.exe 108 PID 3424 wrote to memory of 216 3424 7zFM.exe 108 PID 216 wrote to memory of 1676 216 $O00l1ArAi1nstaller.exe 110 PID 216 wrote to memory of 1676 216 $O00l1ArAi1nstaller.exe 110 PID 216 wrote to memory of 1676 216 $O00l1ArAi1nstaller.exe 110 PID 216 wrote to memory of 1676 216 $O00l1ArAi1nstaller.exe 110 PID 216 wrote to memory of 1676 216 $O00l1ArAi1nstaller.exe 110 PID 216 wrote to memory of 1676 216 $O00l1ArAi1nstaller.exe 110
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\$O00l1ArAi1nstaller.zip"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\7zO06D01287\$O00l1ArAi1nstaller.exe"C:\Users\Admin\AppData\Local\Temp\7zO06D01287\$O00l1ArAi1nstaller.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1492
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO06DEC8C7\$O00l1ArAi1nstaller.exe"C:\Users\Admin\AppData\Local\Temp\7zO06DEC8C7\$O00l1ArAi1nstaller.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3948
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO06D04038\$O00l1ArAi1nstaller.exe"C:\Users\Admin\AppData\Local\Temp\7zO06D04038\$O00l1ArAi1nstaller.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1128
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO06DECD38\$O00l1ArAi1nstaller.exe"C:\Users\Admin\AppData\Local\Temp\7zO06DECD38\$O00l1ArAi1nstaller.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3936
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO06DFE228\$O00l1ArAi1nstaller.exe"C:\Users\Admin\AppData\Local\Temp\7zO06DFE228\$O00l1ArAi1nstaller.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3480
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO06D24718\$O00l1ArAi1nstaller.exe"C:\Users\Admin\AppData\Local\Temp\7zO06D24718\$O00l1ArAi1nstaller.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1676
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42B
MD584cfdb4b995b1dbf543b26b86c863adc
SHA1d2f47764908bf30036cf8248b9ff5541e2711fa2
SHA256d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b
SHA512485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce
-
Filesize
384KB
MD551e03c02d99ef6ebbf99a129dafce711
SHA1bb8267b0677884a2681687f1a5e60fa35194ac06
SHA25603cbedf30b8339311d32d8df4895d36030b9f1f7917beba54b47d716674467c1
SHA5127623101de16700802f269ad15e18be069b9711b5f25ad0672083c707e487bad3fd288c364e2220c567d9104bfa32416b11aa88e46c4b565efde4ba1b4b0a3124
-
Filesize
570KB
MD55401467483efc8330d66e4fe98f03cc8
SHA16f0e567a34e8bef55d46edf1f5982d71bd92b481
SHA256f4341d1dc746b79c91ba341455bdaff7cc32cc75292d0fcd9f3f7eed01a3bda7
SHA51267ef910b8fc0a0a05f3c00ad8c3db4fb60e00423747d80115f91fd01cf17b9101ef84b790c06aea4dc25a44163d5d70c4030177b00c2b576d46f8bdcf0167472