Analysis
-
max time kernel
308s -
max time network
318s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
06-12-2022 04:21
Static task
static1
Behavioral task
behavioral1
Sample
80a57a2c22e7ea3318f2027af5d4fb57ecc76a0de5236c087b9554b739350aa6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
80a57a2c22e7ea3318f2027af5d4fb57ecc76a0de5236c087b9554b739350aa6.exe
Resource
win10-20220812-en
General
-
Target
80a57a2c22e7ea3318f2027af5d4fb57ecc76a0de5236c087b9554b739350aa6.exe
-
Size
277KB
-
MD5
4f7358c27ddf88af37f87127239aaa97
-
SHA1
e6c66e755ad804b66a12d92c88cfe4465bd64710
-
SHA256
80a57a2c22e7ea3318f2027af5d4fb57ecc76a0de5236c087b9554b739350aa6
-
SHA512
d9a9b73ee1ae0ff73915ab6c26f9a347f038b4df2fa3a240be287f83400f67fa9f66d39867132d08aa1f1daa3aee36f60194fdc448333f1e8ec7e6f2e2d41fbd
-
SSDEEP
3072:HLjOBXj0I/hH3RvM+4UU5i7SVx/n8p+izFgTWK+zxO:HLSBXj0I/4nFzP8p+/
Malware Config
Extracted
redline
@2023
79.137.192.28:20723
-
auth_value
93b4b7d0dc8e9415e261a402587c6710
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
80a57a2c22e7ea3318f2027af5d4fb57ecc76a0de5236c087b9554b739350aa6.exedescription pid process target process PID 2756 set thread context of 2124 2756 80a57a2c22e7ea3318f2027af5d4fb57ecc76a0de5236c087b9554b739350aa6.exe vbc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4140 2756 WerFault.exe 80a57a2c22e7ea3318f2027af5d4fb57ecc76a0de5236c087b9554b739350aa6.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
vbc.exepid process 2124 vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
vbc.exedescription pid process Token: SeDebugPrivilege 2124 vbc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
80a57a2c22e7ea3318f2027af5d4fb57ecc76a0de5236c087b9554b739350aa6.exedescription pid process target process PID 2756 wrote to memory of 2124 2756 80a57a2c22e7ea3318f2027af5d4fb57ecc76a0de5236c087b9554b739350aa6.exe vbc.exe PID 2756 wrote to memory of 2124 2756 80a57a2c22e7ea3318f2027af5d4fb57ecc76a0de5236c087b9554b739350aa6.exe vbc.exe PID 2756 wrote to memory of 2124 2756 80a57a2c22e7ea3318f2027af5d4fb57ecc76a0de5236c087b9554b739350aa6.exe vbc.exe PID 2756 wrote to memory of 2124 2756 80a57a2c22e7ea3318f2027af5d4fb57ecc76a0de5236c087b9554b739350aa6.exe vbc.exe PID 2756 wrote to memory of 2124 2756 80a57a2c22e7ea3318f2027af5d4fb57ecc76a0de5236c087b9554b739350aa6.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\80a57a2c22e7ea3318f2027af5d4fb57ecc76a0de5236c087b9554b739350aa6.exe"C:\Users\Admin\AppData\Local\Temp\80a57a2c22e7ea3318f2027af5d4fb57ecc76a0de5236c087b9554b739350aa6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2756 -s 5162⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2124-172-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2124-177-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2124-249-0x000000000D440000-0x000000000D96C000-memory.dmpFilesize
5.2MB
-
memory/2124-153-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2124-248-0x000000000CD40000-0x000000000CF02000-memory.dmpFilesize
1.8MB
-
memory/2124-154-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2124-237-0x000000000C4C0000-0x000000000C526000-memory.dmpFilesize
408KB
-
memory/2124-235-0x000000000C420000-0x000000000C4B2000-memory.dmpFilesize
584KB
-
memory/2124-232-0x000000000C840000-0x000000000CD3E000-memory.dmpFilesize
5.0MB
-
memory/2124-224-0x0000000009930000-0x000000000997B000-memory.dmpFilesize
300KB
-
memory/2124-222-0x0000000009FE0000-0x000000000A01E000-memory.dmpFilesize
248KB
-
memory/2124-214-0x0000000009B20000-0x0000000009B32000-memory.dmpFilesize
72KB
-
memory/2124-212-0x000000000B820000-0x000000000B92A000-memory.dmpFilesize
1.0MB
-
memory/2124-210-0x000000000A0D0000-0x000000000A6D6000-memory.dmpFilesize
6.0MB
-
memory/2124-181-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2124-180-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2124-179-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2124-178-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2124-155-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2124-161-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2124-176-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2124-175-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2124-174-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2124-173-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2124-171-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2124-170-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2124-169-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2124-168-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2124-167-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2124-166-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2124-165-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2124-146-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/2124-151-0x000000000041B5D2-mapping.dmp
-
memory/2124-152-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2124-164-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2124-163-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2124-162-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2124-156-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2124-158-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2124-159-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2756-133-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2756-116-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2756-120-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2756-118-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2756-145-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2756-144-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2756-143-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2756-142-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2756-141-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2756-140-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2756-139-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2756-115-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2756-138-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2756-137-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2756-136-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2756-135-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2756-134-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2756-132-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2756-131-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2756-129-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2756-130-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2756-128-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2756-127-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2756-126-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2756-125-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2756-124-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2756-123-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2756-122-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2756-121-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2756-119-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB
-
memory/2756-117-0x0000000077100000-0x000000007728E000-memory.dmpFilesize
1.6MB