Analysis
-
max time kernel
153s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12-06-2022 13:44
Static task
static1
Behavioral task
behavioral1
Sample
20144ac4b35cda8d0df43bacffb09aaa82e61c367001d87bd80e233127c41f75.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
20144ac4b35cda8d0df43bacffb09aaa82e61c367001d87bd80e233127c41f75.exe
Resource
win10v2004-20220414-en
General
-
Target
20144ac4b35cda8d0df43bacffb09aaa82e61c367001d87bd80e233127c41f75.exe
-
Size
3.6MB
-
MD5
4f1c1dee549fe45bfc4d69f251c3bbfe
-
SHA1
2771a162d86f1658a37ad50b55e73c38ebf4459a
-
SHA256
20144ac4b35cda8d0df43bacffb09aaa82e61c367001d87bd80e233127c41f75
-
SHA512
15b3d64c333e679a37661a21bff192cb6e76f63b3a1b409ae1ec1401893b77d9b76bafff01b3efbdcf7e15a60b55c4f424a161772423c264a3c64d8405255581
Malware Config
Extracted
redline
test1
disandillanne.xyz:80
-
auth_value
49b58bceac3797b6c21fd0772031e010
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4936-140-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Suspicious use of SetThreadContext 1 IoCs
Processes:
20144ac4b35cda8d0df43bacffb09aaa82e61c367001d87bd80e233127c41f75.exedescription pid process target process PID 3032 set thread context of 4936 3032 20144ac4b35cda8d0df43bacffb09aaa82e61c367001d87bd80e233127c41f75.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3252 3032 WerFault.exe 20144ac4b35cda8d0df43bacffb09aaa82e61c367001d87bd80e233127c41f75.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
20144ac4b35cda8d0df43bacffb09aaa82e61c367001d87bd80e233127c41f75.exedescription pid process target process PID 3032 wrote to memory of 4936 3032 20144ac4b35cda8d0df43bacffb09aaa82e61c367001d87bd80e233127c41f75.exe AppLaunch.exe PID 3032 wrote to memory of 4936 3032 20144ac4b35cda8d0df43bacffb09aaa82e61c367001d87bd80e233127c41f75.exe AppLaunch.exe PID 3032 wrote to memory of 4936 3032 20144ac4b35cda8d0df43bacffb09aaa82e61c367001d87bd80e233127c41f75.exe AppLaunch.exe PID 3032 wrote to memory of 4936 3032 20144ac4b35cda8d0df43bacffb09aaa82e61c367001d87bd80e233127c41f75.exe AppLaunch.exe PID 3032 wrote to memory of 4936 3032 20144ac4b35cda8d0df43bacffb09aaa82e61c367001d87bd80e233127c41f75.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\20144ac4b35cda8d0df43bacffb09aaa82e61c367001d87bd80e233127c41f75.exe"C:\Users\Admin\AppData\Local\Temp\20144ac4b35cda8d0df43bacffb09aaa82e61c367001d87bd80e233127c41f75.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3032 -s 4882⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3032 -ip 30321⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3032-136-0x0000000000400000-0x0000000000967000-memory.dmpFilesize
5.4MB
-
memory/3032-149-0x0000000000400000-0x0000000000967000-memory.dmpFilesize
5.4MB
-
memory/3032-132-0x0000000000400000-0x0000000000967000-memory.dmpFilesize
5.4MB
-
memory/3032-133-0x0000000000400000-0x0000000000967000-memory.dmpFilesize
5.4MB
-
memory/3032-134-0x0000000002570000-0x00000000025B1000-memory.dmpFilesize
260KB
-
memory/3032-135-0x0000000000400000-0x0000000000967000-memory.dmpFilesize
5.4MB
-
memory/3032-131-0x0000000000400000-0x0000000000967000-memory.dmpFilesize
5.4MB
-
memory/3032-150-0x0000000002570000-0x00000000025B1000-memory.dmpFilesize
260KB
-
memory/3032-130-0x0000000000400000-0x0000000000967000-memory.dmpFilesize
5.4MB
-
memory/4936-140-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/4936-146-0x0000000005320000-0x0000000005332000-memory.dmpFilesize
72KB
-
memory/4936-147-0x0000000005450000-0x000000000555A000-memory.dmpFilesize
1.0MB
-
memory/4936-148-0x00000000053C0000-0x00000000053FC000-memory.dmpFilesize
240KB
-
memory/4936-145-0x0000000005880000-0x0000000005E98000-memory.dmpFilesize
6.1MB
-
memory/4936-139-0x0000000000000000-mapping.dmp