Analysis
-
max time kernel
141s -
max time network
184s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
04-06-2022 12:07
Static task
static1
Behavioral task
behavioral1
Sample
1083ea2a76b0cf4cd2f8bd19120182f43d873685e68bef7bd5022a434346c0a5.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1083ea2a76b0cf4cd2f8bd19120182f43d873685e68bef7bd5022a434346c0a5.exe
Resource
win10v2004-20220414-en
General
-
Target
1083ea2a76b0cf4cd2f8bd19120182f43d873685e68bef7bd5022a434346c0a5.exe
-
Size
689KB
-
MD5
a9253a351d4fd393efb8bf0b1d351f77
-
SHA1
375cc00ead5d7f4c878e37533f4df5c904c18902
-
SHA256
1083ea2a76b0cf4cd2f8bd19120182f43d873685e68bef7bd5022a434346c0a5
-
SHA512
7931b95d0706069f188935ad2befab27a964ebd5617aa61956aff1617abc7de0b8fffd7fbe6f931f36a9a855883e3e4e922351e117036e821bff84a37c580fb2
Malware Config
Extracted
redline
333333
2.56.57.212:13040
-
auth_value
3efa022bc816f747304fd68e5810bb78
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/948-70-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/948-71-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/948-73-0x0000000000419062-mapping.dmp family_redline behavioral1/memory/948-72-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/948-75-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/948-77-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1083ea2a76b0cf4cd2f8bd19120182f43d873685e68bef7bd5022a434346c0a5.exedescription pid process target process PID 2032 set thread context of 948 2032 1083ea2a76b0cf4cd2f8bd19120182f43d873685e68bef7bd5022a434346c0a5.exe aspnet_regsql.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
1083ea2a76b0cf4cd2f8bd19120182f43d873685e68bef7bd5022a434346c0a5.exepid process 2032 1083ea2a76b0cf4cd2f8bd19120182f43d873685e68bef7bd5022a434346c0a5.exe 2032 1083ea2a76b0cf4cd2f8bd19120182f43d873685e68bef7bd5022a434346c0a5.exe 2032 1083ea2a76b0cf4cd2f8bd19120182f43d873685e68bef7bd5022a434346c0a5.exe 2032 1083ea2a76b0cf4cd2f8bd19120182f43d873685e68bef7bd5022a434346c0a5.exe 2032 1083ea2a76b0cf4cd2f8bd19120182f43d873685e68bef7bd5022a434346c0a5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1083ea2a76b0cf4cd2f8bd19120182f43d873685e68bef7bd5022a434346c0a5.exedescription pid process Token: SeDebugPrivilege 2032 1083ea2a76b0cf4cd2f8bd19120182f43d873685e68bef7bd5022a434346c0a5.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
1083ea2a76b0cf4cd2f8bd19120182f43d873685e68bef7bd5022a434346c0a5.exedescription pid process target process PID 2032 wrote to memory of 948 2032 1083ea2a76b0cf4cd2f8bd19120182f43d873685e68bef7bd5022a434346c0a5.exe aspnet_regsql.exe PID 2032 wrote to memory of 948 2032 1083ea2a76b0cf4cd2f8bd19120182f43d873685e68bef7bd5022a434346c0a5.exe aspnet_regsql.exe PID 2032 wrote to memory of 948 2032 1083ea2a76b0cf4cd2f8bd19120182f43d873685e68bef7bd5022a434346c0a5.exe aspnet_regsql.exe PID 2032 wrote to memory of 948 2032 1083ea2a76b0cf4cd2f8bd19120182f43d873685e68bef7bd5022a434346c0a5.exe aspnet_regsql.exe PID 2032 wrote to memory of 948 2032 1083ea2a76b0cf4cd2f8bd19120182f43d873685e68bef7bd5022a434346c0a5.exe aspnet_regsql.exe PID 2032 wrote to memory of 948 2032 1083ea2a76b0cf4cd2f8bd19120182f43d873685e68bef7bd5022a434346c0a5.exe aspnet_regsql.exe PID 2032 wrote to memory of 948 2032 1083ea2a76b0cf4cd2f8bd19120182f43d873685e68bef7bd5022a434346c0a5.exe aspnet_regsql.exe PID 2032 wrote to memory of 948 2032 1083ea2a76b0cf4cd2f8bd19120182f43d873685e68bef7bd5022a434346c0a5.exe aspnet_regsql.exe PID 2032 wrote to memory of 948 2032 1083ea2a76b0cf4cd2f8bd19120182f43d873685e68bef7bd5022a434346c0a5.exe aspnet_regsql.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1083ea2a76b0cf4cd2f8bd19120182f43d873685e68bef7bd5022a434346c0a5.exe"C:\Users\Admin\AppData\Local\Temp\1083ea2a76b0cf4cd2f8bd19120182f43d873685e68bef7bd5022a434346c0a5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regsql.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regsql.exe"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/948-90-0x000000006CD60000-0x000000006E06F000-memory.dmpFilesize
19.1MB
-
memory/948-101-0x0000000072EC0000-0x000000007424F000-memory.dmpFilesize
19.6MB
-
memory/948-67-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/948-68-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/948-99-0x0000000074520000-0x0000000074540000-memory.dmpFilesize
128KB
-
memory/948-98-0x000000006CD60000-0x000000006E06F000-memory.dmpFilesize
19.1MB
-
memory/948-97-0x0000000074A20000-0x0000000074B1C000-memory.dmpFilesize
1008KB
-
memory/948-96-0x000000006C6E0000-0x000000006C7A9000-memory.dmpFilesize
804KB
-
memory/948-95-0x0000000070870000-0x0000000070FAE000-memory.dmpFilesize
7.2MB
-
memory/948-94-0x0000000074520000-0x0000000074540000-memory.dmpFilesize
128KB
-
memory/948-93-0x000000006C7B0000-0x000000006CA6B000-memory.dmpFilesize
2.7MB
-
memory/948-92-0x000000006CA70000-0x000000006CD58000-memory.dmpFilesize
2.9MB
-
memory/948-83-0x000000006F6E0000-0x000000007028E000-memory.dmpFilesize
11.7MB
-
memory/948-102-0x00000000724B0000-0x0000000072EC0000-memory.dmpFilesize
10.1MB
-
memory/948-100-0x000000006C6E0000-0x000000006C7A9000-memory.dmpFilesize
804KB
-
memory/948-70-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/948-71-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/948-73-0x0000000000419062-mapping.dmp
-
memory/948-72-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/948-75-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/948-77-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/948-79-0x0000000072EC0000-0x000000007424F000-memory.dmpFilesize
19.6MB
-
memory/948-80-0x00000000724B0000-0x0000000072EC0000-memory.dmpFilesize
10.1MB
-
memory/948-81-0x0000000070FB0000-0x0000000071790000-memory.dmpFilesize
7.9MB
-
memory/948-82-0x0000000070290000-0x0000000070683000-memory.dmpFilesize
3.9MB
-
memory/948-84-0x000000006E3D0000-0x000000006F6D7000-memory.dmpFilesize
19.0MB
-
memory/2032-65-0x0000000004EC5000-0x0000000004ED6000-memory.dmpFilesize
68KB
-
memory/2032-85-0x0000000004EC5000-0x0000000004ED6000-memory.dmpFilesize
68KB
-
memory/2032-86-0x00000000724B0000-0x0000000072EC0000-memory.dmpFilesize
10.1MB
-
memory/2032-87-0x0000000074B20000-0x0000000074CB4000-memory.dmpFilesize
1.6MB
-
memory/2032-88-0x0000000071790000-0x00000000724AD000-memory.dmpFilesize
13.1MB
-
memory/2032-66-0x0000000070690000-0x0000000070861000-memory.dmpFilesize
1.8MB
-
memory/2032-89-0x0000000072EC0000-0x000000007424F000-memory.dmpFilesize
19.6MB
-
memory/2032-91-0x0000000070FB0000-0x0000000071790000-memory.dmpFilesize
7.9MB
-
memory/2032-54-0x00000000008D0000-0x0000000000982000-memory.dmpFilesize
712KB
-
memory/2032-64-0x0000000000470000-0x0000000000488000-memory.dmpFilesize
96KB
-
memory/2032-63-0x0000000004F80000-0x0000000005024000-memory.dmpFilesize
656KB
-
memory/2032-62-0x0000000070FB0000-0x0000000071790000-memory.dmpFilesize
7.9MB
-
memory/2032-61-0x0000000070870000-0x0000000070FAE000-memory.dmpFilesize
7.2MB
-
memory/2032-60-0x0000000074A20000-0x0000000074B1C000-memory.dmpFilesize
1008KB
-
memory/2032-59-0x0000000071790000-0x00000000724AD000-memory.dmpFilesize
13.1MB
-
memory/2032-58-0x0000000074B20000-0x0000000074CB4000-memory.dmpFilesize
1.6MB
-
memory/2032-57-0x00000000724B0000-0x0000000072EC0000-memory.dmpFilesize
10.1MB
-
memory/2032-56-0x0000000072EC0000-0x000000007424F000-memory.dmpFilesize
19.6MB
-
memory/2032-55-0x0000000076461000-0x0000000076463000-memory.dmpFilesize
8KB