Analysis
-
max time kernel
60s -
max time network
91s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
06-12-2022 03:05
Static task
static1
Behavioral task
behavioral1
Sample
d54971c60182b1b57567348b2c9604e8cf21b18e4256d561c7fdadf25128b8aa.exe
Resource
win10-20220812-en
General
-
Target
d54971c60182b1b57567348b2c9604e8cf21b18e4256d561c7fdadf25128b8aa.exe
-
Size
277KB
-
MD5
fa9ff279393b97cb702111128534c6fa
-
SHA1
ff78456dfc73487a87d9adb283bd0c9ea18ca085
-
SHA256
d54971c60182b1b57567348b2c9604e8cf21b18e4256d561c7fdadf25128b8aa
-
SHA512
1cf25cca4653474ae4b5fd55c48999d2022c180db20f104db0539fa9832ea4e2528d8de0b66f56f8679a776037f9a795adde7743cf09418821b89dd53fe9959f
-
SSDEEP
3072:7LjOZXj0I/hH3RvM+4UU5i7SVx/n8p+izFgTWU+qxO:7LSZXj0I/4nFzP8p+4
Malware Config
Extracted
redline
@2023
79.137.192.28:20723
-
auth_value
93b4b7d0dc8e9415e261a402587c6710
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
d54971c60182b1b57567348b2c9604e8cf21b18e4256d561c7fdadf25128b8aa.exedescription pid process target process PID 2340 set thread context of 4820 2340 d54971c60182b1b57567348b2c9604e8cf21b18e4256d561c7fdadf25128b8aa.exe vbc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4480 2340 WerFault.exe d54971c60182b1b57567348b2c9604e8cf21b18e4256d561c7fdadf25128b8aa.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
vbc.exepid process 4820 vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
vbc.exedescription pid process Token: SeDebugPrivilege 4820 vbc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
d54971c60182b1b57567348b2c9604e8cf21b18e4256d561c7fdadf25128b8aa.exedescription pid process target process PID 2340 wrote to memory of 4820 2340 d54971c60182b1b57567348b2c9604e8cf21b18e4256d561c7fdadf25128b8aa.exe vbc.exe PID 2340 wrote to memory of 4820 2340 d54971c60182b1b57567348b2c9604e8cf21b18e4256d561c7fdadf25128b8aa.exe vbc.exe PID 2340 wrote to memory of 4820 2340 d54971c60182b1b57567348b2c9604e8cf21b18e4256d561c7fdadf25128b8aa.exe vbc.exe PID 2340 wrote to memory of 4820 2340 d54971c60182b1b57567348b2c9604e8cf21b18e4256d561c7fdadf25128b8aa.exe vbc.exe PID 2340 wrote to memory of 4820 2340 d54971c60182b1b57567348b2c9604e8cf21b18e4256d561c7fdadf25128b8aa.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d54971c60182b1b57567348b2c9604e8cf21b18e4256d561c7fdadf25128b8aa.exe"C:\Users\Admin\AppData\Local\Temp\d54971c60182b1b57567348b2c9604e8cf21b18e4256d561c7fdadf25128b8aa.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 5122⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2340-120-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/2340-121-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/2340-122-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/2340-123-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/2340-124-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/2340-125-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/2340-126-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/2340-127-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/2340-128-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/2340-129-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/2340-130-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/2340-131-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/2340-132-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/2340-134-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/2340-133-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/2340-135-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/2340-136-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/2340-137-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/2340-138-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/2340-139-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/2340-140-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/2340-141-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/2340-142-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/2340-143-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/2340-144-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/2340-146-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/2340-145-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/2340-147-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/2340-148-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/2340-149-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/2340-150-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4820-151-0x0000000000520000-0x0000000000552000-memory.dmpFilesize
200KB
-
memory/4820-156-0x000000000053B5D2-mapping.dmp
-
memory/4820-158-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4820-159-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4820-160-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4820-161-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4820-163-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4820-164-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4820-157-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4820-167-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4820-166-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4820-168-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4820-170-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4820-171-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4820-172-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4820-169-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4820-173-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4820-174-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4820-175-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4820-177-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4820-178-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4820-180-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4820-181-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4820-183-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4820-182-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4820-179-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4820-176-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4820-184-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4820-185-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4820-186-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4820-213-0x0000000009A30000-0x000000000A036000-memory.dmpFilesize
6.0MB
-
memory/4820-214-0x00000000095B0000-0x00000000096BA000-memory.dmpFilesize
1.0MB
-
memory/4820-225-0x00000000092C0000-0x00000000092D2000-memory.dmpFilesize
72KB
-
memory/4820-227-0x0000000009890000-0x00000000098CE000-memory.dmpFilesize
248KB
-
memory/4820-229-0x00000000098D0000-0x000000000991B000-memory.dmpFilesize
300KB
-
memory/4820-237-0x000000000C310000-0x000000000C80E000-memory.dmpFilesize
5.0MB
-
memory/4820-241-0x000000000BEC0000-0x000000000BF26000-memory.dmpFilesize
408KB
-
memory/4820-248-0x000000000BFD0000-0x000000000C062000-memory.dmpFilesize
584KB
-
memory/4820-253-0x000000000C810000-0x000000000C9D2000-memory.dmpFilesize
1.8MB
-
memory/4820-254-0x000000000CF10000-0x000000000D43C000-memory.dmpFilesize
5.2MB