Analysis
-
max time kernel
152s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 15:42
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
330KB
-
MD5
cceeb294bd5e7b01e40f94616ae20df4
-
SHA1
6850d9bfbcc00b9cae98f197350905e3c2eca4e8
-
SHA256
91fde83c85a83a2ce242a1ebb819fd0eddc7291562d3cc756d64b6fd0a386b94
-
SHA512
121d63205c67b1bb7df41dc27169930a3f8acff7e16b1cdb39082e9d92c669348fc962b0b3d09e661c7e39f39c4a18a45db11918879f3e278d57d5774b0e4d10
-
SSDEEP
6144:PZY9aCa+KPVlA86o/29e3ohFFhmbcv3I+Q6rG5L/V:e9FKh6ou9wobm4v3I+Qn
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
135.125.27.235:22883
-
auth_value
3a050df92d0cf082b2cdaf87863616be
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
s.exec.exewatchdog.exepid process 316 s.exe 4472 c.exe 4800 watchdog.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
file.exes.exedescription pid process target process PID 4868 set thread context of 3592 4868 file.exe RegSvcs.exe PID 316 set thread context of 3576 316 s.exe vbc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4068 316 WerFault.exe s.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
file.exeRegSvcs.exes.exedescription pid process target process PID 4868 wrote to memory of 3592 4868 file.exe RegSvcs.exe PID 4868 wrote to memory of 3592 4868 file.exe RegSvcs.exe PID 4868 wrote to memory of 3592 4868 file.exe RegSvcs.exe PID 4868 wrote to memory of 3592 4868 file.exe RegSvcs.exe PID 4868 wrote to memory of 3592 4868 file.exe RegSvcs.exe PID 4868 wrote to memory of 3592 4868 file.exe RegSvcs.exe PID 4868 wrote to memory of 3592 4868 file.exe RegSvcs.exe PID 4868 wrote to memory of 3592 4868 file.exe RegSvcs.exe PID 4868 wrote to memory of 3592 4868 file.exe RegSvcs.exe PID 4868 wrote to memory of 3592 4868 file.exe RegSvcs.exe PID 4868 wrote to memory of 3592 4868 file.exe RegSvcs.exe PID 3592 wrote to memory of 316 3592 RegSvcs.exe s.exe PID 3592 wrote to memory of 316 3592 RegSvcs.exe s.exe PID 3592 wrote to memory of 316 3592 RegSvcs.exe s.exe PID 316 wrote to memory of 3576 316 s.exe vbc.exe PID 316 wrote to memory of 3576 316 s.exe vbc.exe PID 316 wrote to memory of 3576 316 s.exe vbc.exe PID 316 wrote to memory of 3576 316 s.exe vbc.exe PID 316 wrote to memory of 3576 316 s.exe vbc.exe PID 3592 wrote to memory of 4472 3592 RegSvcs.exe c.exe PID 3592 wrote to memory of 4472 3592 RegSvcs.exe c.exe PID 3592 wrote to memory of 4472 3592 RegSvcs.exe c.exe PID 3592 wrote to memory of 4800 3592 RegSvcs.exe watchdog.exe PID 3592 wrote to memory of 4800 3592 RegSvcs.exe watchdog.exe PID 3592 wrote to memory of 4800 3592 RegSvcs.exe watchdog.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\s.exe"C:\Users\Admin\AppData\Local\Temp\s.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 316 -s 4324⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\c.exe"C:\Users\Admin\AppData\Local\Temp\c.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\watchdog.exe"C:\Users\Admin\AppData\Local\Temp\watchdog.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 316 -ip 3161⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\c.exeFilesize
2.9MB
MD5dfe93d0badc5903468c45eb9bec610ac
SHA103e0670c4c28256972e4413be8e2123fc85d12f3
SHA25636df4f3329d578af2447816e17eaace71c54f287b649e9e2b18bc81878eb9bb1
SHA5126be310a381d47116b31362a8acf0702a546e5fc9bcc3eb59f16866758a18ba258789cd3f3db7065fe291f068791493198cb14c58c55aa1b769efaaba1ec3a840
-
C:\Users\Admin\AppData\Local\Temp\c.exeFilesize
2.9MB
MD5dfe93d0badc5903468c45eb9bec610ac
SHA103e0670c4c28256972e4413be8e2123fc85d12f3
SHA25636df4f3329d578af2447816e17eaace71c54f287b649e9e2b18bc81878eb9bb1
SHA5126be310a381d47116b31362a8acf0702a546e5fc9bcc3eb59f16866758a18ba258789cd3f3db7065fe291f068791493198cb14c58c55aa1b769efaaba1ec3a840
-
C:\Users\Admin\AppData\Local\Temp\s.exeFilesize
512KB
MD5f8406736cb304f12b915197ac4557c46
SHA1eeb1cc9e74eac645a269a9fa8cb55d48d5571bd5
SHA25653cf8b6c232faba4c05e361a278db4387eac994c16b24393b5b7e9f56806d59b
SHA512c3ed779e41feb7f6cec3fe1cc845e0f01fb39b1cbc5fd09d0b04cf2ecaf0216b85af3a41ba674c6c7e39b37eb089e44d4f65b3b23bafb59de2b506c60c2ec748
-
C:\Users\Admin\AppData\Local\Temp\s.exeFilesize
512KB
MD5f8406736cb304f12b915197ac4557c46
SHA1eeb1cc9e74eac645a269a9fa8cb55d48d5571bd5
SHA25653cf8b6c232faba4c05e361a278db4387eac994c16b24393b5b7e9f56806d59b
SHA512c3ed779e41feb7f6cec3fe1cc845e0f01fb39b1cbc5fd09d0b04cf2ecaf0216b85af3a41ba674c6c7e39b37eb089e44d4f65b3b23bafb59de2b506c60c2ec748
-
C:\Users\Admin\AppData\Local\Temp\watchdog.exeFilesize
350KB
MD5b7a412ffde040190557f7373f0e86304
SHA1537d6c582ae306c53a1322cba301c9add2043030
SHA256a6785854cbd1234e79019fb49d07e0572c6897ebe1a341b8c3c83f690fbe812c
SHA512c98179dc9e1832b9d11eabde682f33afefc8dd9762b978186ad33df25d1a9bc3b86ddbdd097aaa4ede7d6d35c7abc25524dd8119e4fba44cf8c1dd4fff481c29
-
memory/316-137-0x0000000000000000-mapping.dmp
-
memory/3576-151-0x0000000004F40000-0x0000000004F52000-memory.dmpFilesize
72KB
-
memory/3576-152-0x0000000004FA0000-0x0000000004FDC000-memory.dmpFilesize
240KB
-
memory/3576-140-0x0000000000000000-mapping.dmp
-
memory/3576-141-0x0000000000390000-0x00000000003C2000-memory.dmpFilesize
200KB
-
memory/3576-150-0x0000000004FF0000-0x00000000050FA000-memory.dmpFilesize
1.0MB
-
memory/3576-149-0x0000000005470000-0x0000000005A88000-memory.dmpFilesize
6.1MB
-
memory/3592-135-0x0000000140000000-0x0000000140023000-memory.dmpFilesize
140KB
-
memory/3592-134-0x0000000140000000-0x0000000140023000-memory.dmpFilesize
140KB
-
memory/3592-132-0x0000000140000000-0x0000000140023000-memory.dmpFilesize
140KB
-
memory/3592-136-0x0000000140000000-0x0000000140023000-memory.dmpFilesize
140KB
-
memory/3592-133-0x000000014000356C-mapping.dmp
-
memory/3592-155-0x0000000140000000-0x0000000140023000-memory.dmpFilesize
140KB
-
memory/4472-146-0x0000000000000000-mapping.dmp
-
memory/4800-153-0x0000000000000000-mapping.dmp