Analysis
-
max time kernel
125s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-12-2022 17:43
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20221111-en
General
-
Target
file.exe
-
Size
417KB
-
MD5
78e835a570494846d421d78058be5d2a
-
SHA1
1531d8eed6cd96b14a79d99b13a0fa62308f3beb
-
SHA256
f80b159cd3d099a3e40ff671e2544df562639dd0cda61709f9e367288140e414
-
SHA512
fe726b39d1dfcdd3c9954d8af71130888b48137d73ffb06a2e7c7458062e36491ca9a8c39281b6cfe9a3a002e30fabdb92f6d1d837ab279960e4ff31f55dc7a5
-
SSDEEP
12288:9uKsohhtrUeKlL/IdaUI5Skb8oQjOi+eP1R:bBUZsdOFQjyeP1
Malware Config
Extracted
redline
11
79.137.202.18:45218
-
auth_value
107e09eee63158d2488feb03dac75204
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
file.exedescription pid process target process PID 1480 set thread context of 304 1480 file.exe vbc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 940 1480 WerFault.exe file.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
file.exedescription pid process target process PID 1480 wrote to memory of 304 1480 file.exe vbc.exe PID 1480 wrote to memory of 304 1480 file.exe vbc.exe PID 1480 wrote to memory of 304 1480 file.exe vbc.exe PID 1480 wrote to memory of 304 1480 file.exe vbc.exe PID 1480 wrote to memory of 304 1480 file.exe vbc.exe PID 1480 wrote to memory of 304 1480 file.exe vbc.exe PID 1480 wrote to memory of 940 1480 file.exe WerFault.exe PID 1480 wrote to memory of 940 1480 file.exe WerFault.exe PID 1480 wrote to memory of 940 1480 file.exe WerFault.exe PID 1480 wrote to memory of 940 1480 file.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 482⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/304-54-0x0000000000080000-0x00000000000B2000-memory.dmpFilesize
200KB
-
memory/304-56-0x0000000000080000-0x00000000000B2000-memory.dmpFilesize
200KB
-
memory/304-61-0x000000000009B58A-mapping.dmp
-
memory/304-62-0x0000000000080000-0x00000000000B2000-memory.dmpFilesize
200KB
-
memory/304-63-0x0000000000080000-0x00000000000B2000-memory.dmpFilesize
200KB
-
memory/304-65-0x0000000076201000-0x0000000076203000-memory.dmpFilesize
8KB
-
memory/940-64-0x0000000000000000-mapping.dmp