Analysis
-
max time kernel
113s -
max time network
132s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
06-12-2022 02:24
Static task
static1
Behavioral task
behavioral1
Sample
36915399b9afd2c1488e5c61c62ef24fdf26e1db8b2707949c0e1543c8588ec6.exe
Resource
win10-20220812-en
General
-
Target
36915399b9afd2c1488e5c61c62ef24fdf26e1db8b2707949c0e1543c8588ec6.exe
-
Size
277KB
-
MD5
61e556ed6671cad870b71e1bc848197b
-
SHA1
cea7e88c7a0883619b97754a2d4fc76b3865055f
-
SHA256
36915399b9afd2c1488e5c61c62ef24fdf26e1db8b2707949c0e1543c8588ec6
-
SHA512
c23f242c332d316a0edd6cdf7bae977282eb01d30cef498b6481c46b96e6b3da9feb9e3c93f80b4953a37fb8ab6eb8ae968395b0638ca2bf256249bf882420a3
-
SSDEEP
3072:6LjOlXj0I/hH3RvM+4UU5i7SVx/n8p+izFgTW2+SxO:6LSlXj0I/4nFzP8p+S
Malware Config
Extracted
redline
@2023
79.137.192.28:20723
-
auth_value
93b4b7d0dc8e9415e261a402587c6710
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
36915399b9afd2c1488e5c61c62ef24fdf26e1db8b2707949c0e1543c8588ec6.exedescription pid process target process PID 2452 set thread context of 4668 2452 36915399b9afd2c1488e5c61c62ef24fdf26e1db8b2707949c0e1543c8588ec6.exe vbc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4712 2452 WerFault.exe 36915399b9afd2c1488e5c61c62ef24fdf26e1db8b2707949c0e1543c8588ec6.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
vbc.exepid process 4668 vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
vbc.exedescription pid process Token: SeDebugPrivilege 4668 vbc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
36915399b9afd2c1488e5c61c62ef24fdf26e1db8b2707949c0e1543c8588ec6.exedescription pid process target process PID 2452 wrote to memory of 4668 2452 36915399b9afd2c1488e5c61c62ef24fdf26e1db8b2707949c0e1543c8588ec6.exe vbc.exe PID 2452 wrote to memory of 4668 2452 36915399b9afd2c1488e5c61c62ef24fdf26e1db8b2707949c0e1543c8588ec6.exe vbc.exe PID 2452 wrote to memory of 4668 2452 36915399b9afd2c1488e5c61c62ef24fdf26e1db8b2707949c0e1543c8588ec6.exe vbc.exe PID 2452 wrote to memory of 4668 2452 36915399b9afd2c1488e5c61c62ef24fdf26e1db8b2707949c0e1543c8588ec6.exe vbc.exe PID 2452 wrote to memory of 4668 2452 36915399b9afd2c1488e5c61c62ef24fdf26e1db8b2707949c0e1543c8588ec6.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\36915399b9afd2c1488e5c61c62ef24fdf26e1db8b2707949c0e1543c8588ec6.exe"C:\Users\Admin\AppData\Local\Temp\36915399b9afd2c1488e5c61c62ef24fdf26e1db8b2707949c0e1543c8588ec6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2452 -s 5002⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2452-118-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-119-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-120-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-121-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-122-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-123-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-124-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-125-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-126-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-127-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-128-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-129-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-130-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-131-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-132-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-133-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-134-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-135-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-136-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-137-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-138-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-139-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-140-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-141-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-142-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-143-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-144-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-145-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-146-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-147-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/2452-148-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/4668-149-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/4668-154-0x000000000041B5D2-mapping.dmp
-
memory/4668-155-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/4668-156-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/4668-157-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/4668-158-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/4668-159-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/4668-162-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/4668-161-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/4668-164-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/4668-165-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/4668-166-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/4668-167-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/4668-168-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/4668-169-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/4668-170-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/4668-171-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/4668-172-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/4668-173-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/4668-174-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/4668-175-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/4668-176-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/4668-177-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/4668-178-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/4668-179-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/4668-180-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/4668-181-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/4668-182-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/4668-183-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/4668-184-0x0000000077830000-0x00000000779BE000-memory.dmpFilesize
1.6MB
-
memory/4668-212-0x000000000A1F0000-0x000000000A7F6000-memory.dmpFilesize
6.0MB
-
memory/4668-215-0x000000000B940000-0x000000000BA4A000-memory.dmpFilesize
1.0MB
-
memory/4668-223-0x000000000BBA0000-0x000000000BBB2000-memory.dmpFilesize
72KB
-
memory/4668-225-0x000000000BC00000-0x000000000BC3E000-memory.dmpFilesize
248KB
-
memory/4668-227-0x000000000BC40000-0x000000000BC8B000-memory.dmpFilesize
300KB
-
memory/4668-314-0x0000000005560000-0x00000000055F2000-memory.dmpFilesize
584KB
-
memory/4668-315-0x000000000C560000-0x000000000CA5E000-memory.dmpFilesize
5.0MB
-
memory/4668-317-0x0000000005430000-0x0000000005496000-memory.dmpFilesize
408KB
-
memory/4668-330-0x000000000C330000-0x000000000C4F2000-memory.dmpFilesize
1.8MB
-
memory/4668-331-0x000000000CF90000-0x000000000D4BC000-memory.dmpFilesize
5.2MB