Analysis
-
max time kernel
140s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
27-12-2022 00:02
Static task
static1
Behavioral task
behavioral1
Sample
18e9004b665ff009851895553fe1ec6c92e94b9b1f8898b5e3e38a762730db70.exe
Resource
win10-20220812-en
General
-
Target
18e9004b665ff009851895553fe1ec6c92e94b9b1f8898b5e3e38a762730db70.exe
-
Size
389KB
-
MD5
ab168ca7a8902f0a922590433d1acc7b
-
SHA1
30f50b2cc6c2fdcb2ee607b3e912556e36d1fb36
-
SHA256
18e9004b665ff009851895553fe1ec6c92e94b9b1f8898b5e3e38a762730db70
-
SHA512
4fc711bd1eb641d1e6a01b3780960dfd67ff46bc364f4d898ff05c78570d3c0922d11af52e502d9f867e425e20d57a02dc6c1679e9dfbe43b1a50363f75320c6
-
SSDEEP
6144:2m4H8wNHzXF/FdNcmG3vuAqMexSAOeDqsDE3dcMygTeefj1cV6ag9M:2tlNHzXF/RcKSc7efjqV6aaM
Malware Config
Extracted
redline
11
79.137.202.18:45218
-
auth_value
107e09eee63158d2488feb03dac75204
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
18e9004b665ff009851895553fe1ec6c92e94b9b1f8898b5e3e38a762730db70.exedescription pid process target process PID 2508 set thread context of 3864 2508 18e9004b665ff009851895553fe1ec6c92e94b9b1f8898b5e3e38a762730db70.exe vbc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3824 2508 WerFault.exe 18e9004b665ff009851895553fe1ec6c92e94b9b1f8898b5e3e38a762730db70.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
18e9004b665ff009851895553fe1ec6c92e94b9b1f8898b5e3e38a762730db70.exedescription pid process target process PID 2508 wrote to memory of 3864 2508 18e9004b665ff009851895553fe1ec6c92e94b9b1f8898b5e3e38a762730db70.exe vbc.exe PID 2508 wrote to memory of 3864 2508 18e9004b665ff009851895553fe1ec6c92e94b9b1f8898b5e3e38a762730db70.exe vbc.exe PID 2508 wrote to memory of 3864 2508 18e9004b665ff009851895553fe1ec6c92e94b9b1f8898b5e3e38a762730db70.exe vbc.exe PID 2508 wrote to memory of 3864 2508 18e9004b665ff009851895553fe1ec6c92e94b9b1f8898b5e3e38a762730db70.exe vbc.exe PID 2508 wrote to memory of 3864 2508 18e9004b665ff009851895553fe1ec6c92e94b9b1f8898b5e3e38a762730db70.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\18e9004b665ff009851895553fe1ec6c92e94b9b1f8898b5e3e38a762730db70.exe"C:\Users\Admin\AppData\Local\Temp\18e9004b665ff009851895553fe1ec6c92e94b9b1f8898b5e3e38a762730db70.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2508 -s 2362⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2508-115-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/2508-116-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/2508-117-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/2508-118-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/2508-120-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/2508-119-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-121-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/3864-126-0x000000000041B58A-mapping.dmp
-
memory/3864-127-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-128-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-129-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-130-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-131-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-133-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-134-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-136-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-137-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-138-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-140-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-139-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-141-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-142-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-143-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-144-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-146-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-147-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-148-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-145-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-149-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-150-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-151-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-152-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-153-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-154-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-155-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-156-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-157-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-158-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-160-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-161-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-162-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-163-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-164-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-165-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-166-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-167-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-168-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-169-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-170-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-171-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-172-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-173-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-174-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-175-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-176-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-177-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-178-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-179-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-180-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-181-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-182-0x00000000099F0000-0x0000000009FF6000-memory.dmpFilesize
6.0MB
-
memory/3864-183-0x00000000094F0000-0x00000000095FA000-memory.dmpFilesize
1.0MB
-
memory/3864-184-0x0000000077E00000-0x0000000077F8E000-memory.dmpFilesize
1.6MB
-
memory/3864-185-0x0000000009400000-0x0000000009412000-memory.dmpFilesize
72KB
-
memory/3864-187-0x0000000009460000-0x000000000949E000-memory.dmpFilesize
248KB
-
memory/3864-189-0x00000000094A0000-0x00000000094EB000-memory.dmpFilesize
300KB