Analysis
-
max time kernel
151s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 02:26
Static task
static1
Behavioral task
behavioral1
Sample
modest-menu.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
modest-menu.exe
Resource
win10v2004-20221111-en
General
-
Target
modest-menu.exe
-
Size
3.8MB
-
MD5
5ff3e364b2c911a3a504db8ca8b357af
-
SHA1
634576bc4beb40802faabc2832bf8966746d33e5
-
SHA256
086cf9d70f774248002dd699663b21ffbff861b44068a1b468ae721b2813cf7a
-
SHA512
9b6d4a06468818c707164c3e5389410e83cf10baaa1a4d8c5ea573681c241b565eef4ddca96066b0cb5a1277ce6ce7eab3416470dd7055d803f8cbe93af43b72
-
SSDEEP
98304:73OMOXyx9YfGxGb1sPW7UHkvLw5mQTzd7W+HtdIOoQ7pCl:73OMay4fYasPfuL8ttdDoMpO
Malware Config
Extracted
redline
@dxrkl0rd
193.106.191.160:8673
-
auth_value
9c8dd7353be7ed4b6832da21d8d0d902
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4384-137-0x000000000042219E-mapping.dmp family_redline behavioral2/memory/4384-136-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
Suspicious use of SetThreadContext 1 IoCs
Processes:
modest-menu.exedescription pid process target process PID 3064 set thread context of 4384 3064 modest-menu.exe AddInProcess32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4548 3064 WerFault.exe modest-menu.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
modest-menu.exedescription pid process target process PID 3064 wrote to memory of 1952 3064 modest-menu.exe AddInProcess32.exe PID 3064 wrote to memory of 1952 3064 modest-menu.exe AddInProcess32.exe PID 3064 wrote to memory of 1952 3064 modest-menu.exe AddInProcess32.exe PID 3064 wrote to memory of 3424 3064 modest-menu.exe AddInProcess32.exe PID 3064 wrote to memory of 3424 3064 modest-menu.exe AddInProcess32.exe PID 3064 wrote to memory of 3424 3064 modest-menu.exe AddInProcess32.exe PID 3064 wrote to memory of 4384 3064 modest-menu.exe AddInProcess32.exe PID 3064 wrote to memory of 4384 3064 modest-menu.exe AddInProcess32.exe PID 3064 wrote to memory of 4384 3064 modest-menu.exe AddInProcess32.exe PID 3064 wrote to memory of 4384 3064 modest-menu.exe AddInProcess32.exe PID 3064 wrote to memory of 4384 3064 modest-menu.exe AddInProcess32.exe PID 3064 wrote to memory of 4384 3064 modest-menu.exe AddInProcess32.exe PID 3064 wrote to memory of 4384 3064 modest-menu.exe AddInProcess32.exe PID 3064 wrote to memory of 4384 3064 modest-menu.exe AddInProcess32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\modest-menu.exe"C:\Users\Admin\AppData\Local\Temp\modest-menu.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AddInProcess32.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AddInProcess32.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AddInProcess32.exe"2⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3064 -s 2402⤵
- Program crash
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 408 -p 3064 -ip 30641⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3064-132-0x00007FF722DB0000-0x00007FF723415000-memory.dmpFilesize
6.4MB
-
memory/3064-135-0x00007FF722DB0000-0x00007FF723415000-memory.dmpFilesize
6.4MB
-
memory/3064-138-0x00007FF722DB0000-0x00007FF723415000-memory.dmpFilesize
6.4MB
-
memory/4384-137-0x000000000042219E-mapping.dmp
-
memory/4384-136-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/4384-139-0x00000000058E0000-0x0000000005EF8000-memory.dmpFilesize
6.1MB
-
memory/4384-140-0x0000000005450000-0x000000000555A000-memory.dmpFilesize
1.0MB
-
memory/4384-141-0x0000000005380000-0x0000000005392000-memory.dmpFilesize
72KB
-
memory/4384-142-0x00000000053E0000-0x000000000541C000-memory.dmpFilesize
240KB