Analysis
-
max time kernel
109s -
max time network
113s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
06-12-2022 10:21
Static task
static1
Behavioral task
behavioral1
Sample
abb2c05b20896b356f474fa897290564cd73ca5549af5e3121b547b41a4460a0.exe
Resource
win10-20220812-en
General
-
Target
abb2c05b20896b356f474fa897290564cd73ca5549af5e3121b547b41a4460a0.exe
-
Size
269KB
-
MD5
fafce6a43296b9555139887bf7748e63
-
SHA1
bb8ab8404dc3466e600fe98b938722e5793a3a0f
-
SHA256
abb2c05b20896b356f474fa897290564cd73ca5549af5e3121b547b41a4460a0
-
SHA512
11bfaa81d5a0bbd5a2be7a0431224c7f52bd8d504bfa36f7307420e1664e0b27a3f5006a00844797cb83bcff1f03306e4a01e8463e7fcf9e86f41d4be1bf937e
-
SSDEEP
3072:GMADZuNENYoKjAID8M/tdy98JMLOSEkb7WLa3QA/SfSnZKGCVy9Yn4SCrxO:jADZuNENSjAIDHE98JEbCe3QwSAZTK
Malware Config
Extracted
redline
@2023@
193.106.191.138:32796
-
auth_value
ca057e5baadfd0774a34a6a949cd5e69
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
abb2c05b20896b356f474fa897290564cd73ca5549af5e3121b547b41a4460a0.exedescription pid process target process PID 2300 set thread context of 2956 2300 abb2c05b20896b356f474fa897290564cd73ca5549af5e3121b547b41a4460a0.exe vbc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4812 2300 WerFault.exe abb2c05b20896b356f474fa897290564cd73ca5549af5e3121b547b41a4460a0.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
vbc.exepid process 2956 vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
vbc.exedescription pid process Token: SeDebugPrivilege 2956 vbc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
abb2c05b20896b356f474fa897290564cd73ca5549af5e3121b547b41a4460a0.exedescription pid process target process PID 2300 wrote to memory of 2956 2300 abb2c05b20896b356f474fa897290564cd73ca5549af5e3121b547b41a4460a0.exe vbc.exe PID 2300 wrote to memory of 2956 2300 abb2c05b20896b356f474fa897290564cd73ca5549af5e3121b547b41a4460a0.exe vbc.exe PID 2300 wrote to memory of 2956 2300 abb2c05b20896b356f474fa897290564cd73ca5549af5e3121b547b41a4460a0.exe vbc.exe PID 2300 wrote to memory of 2956 2300 abb2c05b20896b356f474fa897290564cd73ca5549af5e3121b547b41a4460a0.exe vbc.exe PID 2300 wrote to memory of 2956 2300 abb2c05b20896b356f474fa897290564cd73ca5549af5e3121b547b41a4460a0.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\abb2c05b20896b356f474fa897290564cd73ca5549af5e3121b547b41a4460a0.exe"C:\Users\Admin\AppData\Local\Temp\abb2c05b20896b356f474fa897290564cd73ca5549af5e3121b547b41a4460a0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2300 -s 2722⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2300-120-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2300-121-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2300-122-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2300-123-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2300-124-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2300-125-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2300-126-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2300-127-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-128-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/2956-133-0x000000000041B5B2-mapping.dmp
-
memory/2956-134-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-135-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-136-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-138-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-137-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-140-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-141-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-144-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-143-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-145-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-146-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-147-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-149-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-148-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-150-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-151-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-152-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-153-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-154-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-155-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-156-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-157-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-158-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-159-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-160-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-161-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-162-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-163-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-164-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-165-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-167-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-168-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-169-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-170-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-171-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-172-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-173-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-174-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-175-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-176-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-177-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-178-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-179-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-180-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-181-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-182-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-183-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-184-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-185-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-186-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-187-0x0000000077A00000-0x0000000077B8E000-memory.dmpFilesize
1.6MB
-
memory/2956-190-0x000000000A350000-0x000000000A956000-memory.dmpFilesize
6.0MB
-
memory/2956-194-0x0000000009ED0000-0x0000000009FDA000-memory.dmpFilesize
1.0MB
-
memory/2956-202-0x000000000A0D0000-0x000000000A0E2000-memory.dmpFilesize
72KB
-
memory/2956-204-0x000000000A290000-0x000000000A2CE000-memory.dmpFilesize
248KB
-
memory/2956-206-0x000000000C630000-0x000000000C67B000-memory.dmpFilesize
300KB
-
memory/2956-214-0x000000000CBF0000-0x000000000D0EE000-memory.dmpFilesize
5.0MB
-
memory/2956-217-0x000000000C7B0000-0x000000000C842000-memory.dmpFilesize
584KB
-
memory/2956-219-0x000000000C850000-0x000000000C8B6000-memory.dmpFilesize
408KB
-
memory/2956-230-0x000000000D0F0000-0x000000000D2B2000-memory.dmpFilesize
1.8MB
-
memory/2956-231-0x000000000D7F0000-0x000000000DD1C000-memory.dmpFilesize
5.2MB