Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
02-07-2023 12:36
Static task
static1
Behavioral task
behavioral1
Sample
186995-2exe.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
186995-2exe.exe
Resource
win10v2004-20230621-en
General
-
Target
186995-2exe.exe
-
Size
386KB
-
MD5
70d95ececad9aebf59ef9598eec18995
-
SHA1
f800e90809fe75cb933e7cfe4ac20d959c199e1c
-
SHA256
f863b2eaafe78bd61faf02eda91f00fafe397b7accd0817f03ce68a355d625f4
-
SHA512
91c87e83e2c10d9ef55b17c02641540e0a31a0152050c7b1f672c961f0ed0e30215215eb14f22193471107a23f117ab7012771f48b232ed8e3e90d2e53513ee7
-
SSDEEP
6144:vRQUMd4UvkL5kDhOM232DeAODGU0dSrTLMA6zJaAjgl:vRRMyUvkLk2Rvo6MAv/l
Malware Config
Extracted
redline
11
79.137.202.18:45218
-
auth_value
107e09eee63158d2488feb03dac75204
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
186995-2exe.exedescription pid process target process PID 1732 set thread context of 1240 1732 186995-2exe.exe vbc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1268 1732 WerFault.exe 186995-2exe.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
186995-2exe.exedescription pid process target process PID 1732 wrote to memory of 1240 1732 186995-2exe.exe vbc.exe PID 1732 wrote to memory of 1240 1732 186995-2exe.exe vbc.exe PID 1732 wrote to memory of 1240 1732 186995-2exe.exe vbc.exe PID 1732 wrote to memory of 1240 1732 186995-2exe.exe vbc.exe PID 1732 wrote to memory of 1240 1732 186995-2exe.exe vbc.exe PID 1732 wrote to memory of 1240 1732 186995-2exe.exe vbc.exe PID 1732 wrote to memory of 1268 1732 186995-2exe.exe WerFault.exe PID 1732 wrote to memory of 1268 1732 186995-2exe.exe WerFault.exe PID 1732 wrote to memory of 1268 1732 186995-2exe.exe WerFault.exe PID 1732 wrote to memory of 1268 1732 186995-2exe.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\186995-2exe.exe"C:\Users\Admin\AppData\Local\Temp\186995-2exe.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1732 -s 1602⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1240-54-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/1240-55-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/1240-59-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmpFilesize
4KB
-
memory/1240-61-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/1240-62-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/1240-63-0x0000000000AF0000-0x0000000000B30000-memory.dmpFilesize
256KB
-
memory/1240-64-0x0000000000AF0000-0x0000000000B30000-memory.dmpFilesize
256KB