Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2022 17:43
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20221111-en
General
-
Target
file.exe
-
Size
417KB
-
MD5
78e835a570494846d421d78058be5d2a
-
SHA1
1531d8eed6cd96b14a79d99b13a0fa62308f3beb
-
SHA256
f80b159cd3d099a3e40ff671e2544df562639dd0cda61709f9e367288140e414
-
SHA512
fe726b39d1dfcdd3c9954d8af71130888b48137d73ffb06a2e7c7458062e36491ca9a8c39281b6cfe9a3a002e30fabdb92f6d1d837ab279960e4ff31f55dc7a5
-
SSDEEP
12288:9uKsohhtrUeKlL/IdaUI5Skb8oQjOi+eP1R:bBUZsdOFQjyeP1
Malware Config
Extracted
redline
11
79.137.202.18:45218
-
auth_value
107e09eee63158d2488feb03dac75204
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
file.exedescription pid process target process PID 3804 set thread context of 1752 3804 file.exe vbc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4432 3804 WerFault.exe file.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
file.exedescription pid process target process PID 3804 wrote to memory of 1752 3804 file.exe vbc.exe PID 3804 wrote to memory of 1752 3804 file.exe vbc.exe PID 3804 wrote to memory of 1752 3804 file.exe vbc.exe PID 3804 wrote to memory of 1752 3804 file.exe vbc.exe PID 3804 wrote to memory of 1752 3804 file.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3804 -s 1522⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3804 -ip 38041⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1752-132-0x0000000000000000-mapping.dmp
-
memory/1752-133-0x0000000000D90000-0x0000000000DC2000-memory.dmpFilesize
200KB
-
memory/1752-138-0x0000000005950000-0x0000000005F68000-memory.dmpFilesize
6.1MB
-
memory/1752-139-0x0000000005460000-0x000000000556A000-memory.dmpFilesize
1.0MB
-
memory/1752-140-0x0000000005390000-0x00000000053A2000-memory.dmpFilesize
72KB
-
memory/1752-141-0x00000000053F0000-0x000000000542C000-memory.dmpFilesize
240KB