Analysis
-
max time kernel
43s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-10-2022 17:07
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
1.3MB
-
MD5
012e45283f000c630c2cc46a9f87a996
-
SHA1
25d57354cd7ac18e8ee5aa6bb4b9502ff0dd05a5
-
SHA256
2f791a20689cb930c92a588e9223cf1a81f0b1d3ef5a47bf99cf9932b02beb68
-
SHA512
b3c7a40e085d84ab81da9302addc2614570e099791b10a76cb5bda3e462b12f3cb246a91808d606db9339b15b94036db4649671a020aadaed080c04fc5e7155d
-
SSDEEP
24576:P4WoZkB+6pZ4uSu39ptmagDLb2S7WRCcoHDygMIHFT+:oinrHUagDLb2S78AzMIl6
Malware Config
Extracted
redline
new10261
denestyenol.xyz:81
exirdonanos.xyz:81
-
auth_value
599f87da51c4253a0b6e880e0185e7e6
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/99856-56-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral1/memory/99856-61-0x0000000000422172-mapping.dmp family_redline behavioral1/memory/99856-62-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral1/memory/99856-63-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
file.exedescription pid process target process PID 1372 set thread context of 99856 1372 file.exe vbc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 99896 1372 WerFault.exe file.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
vbc.exepid process 99856 vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
vbc.exedescription pid process Token: SeDebugPrivilege 99856 vbc.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
file.exedescription pid process target process PID 1372 wrote to memory of 99856 1372 file.exe vbc.exe PID 1372 wrote to memory of 99856 1372 file.exe vbc.exe PID 1372 wrote to memory of 99856 1372 file.exe vbc.exe PID 1372 wrote to memory of 99856 1372 file.exe vbc.exe PID 1372 wrote to memory of 99856 1372 file.exe vbc.exe PID 1372 wrote to memory of 99856 1372 file.exe vbc.exe PID 1372 wrote to memory of 99896 1372 file.exe WerFault.exe PID 1372 wrote to memory of 99896 1372 file.exe WerFault.exe PID 1372 wrote to memory of 99896 1372 file.exe WerFault.exe PID 1372 wrote to memory of 99896 1372 file.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 985282⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/99856-54-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/99856-56-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/99856-61-0x0000000000422172-mapping.dmp
-
memory/99856-62-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/99856-63-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/99856-65-0x0000000075921000-0x0000000075923000-memory.dmpFilesize
8KB
-
memory/99896-64-0x0000000000000000-mapping.dmp