Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
02-07-2023 12:36
Static task
static1
Behavioral task
behavioral1
Sample
186995-2exe.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
186995-2exe.exe
Resource
win10v2004-20230621-en
General
-
Target
186995-2exe.exe
-
Size
386KB
-
MD5
70d95ececad9aebf59ef9598eec18995
-
SHA1
f800e90809fe75cb933e7cfe4ac20d959c199e1c
-
SHA256
f863b2eaafe78bd61faf02eda91f00fafe397b7accd0817f03ce68a355d625f4
-
SHA512
91c87e83e2c10d9ef55b17c02641540e0a31a0152050c7b1f672c961f0ed0e30215215eb14f22193471107a23f117ab7012771f48b232ed8e3e90d2e53513ee7
-
SSDEEP
6144:vRQUMd4UvkL5kDhOM232DeAODGU0dSrTLMA6zJaAjgl:vRRMyUvkLk2Rvo6MAv/l
Malware Config
Extracted
redline
11
79.137.202.18:45218
-
auth_value
107e09eee63158d2488feb03dac75204
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
186995-2exe.exedescription pid process target process PID 4420 set thread context of 1528 4420 186995-2exe.exe vbc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1568 4420 WerFault.exe 186995-2exe.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
186995-2exe.exedescription pid process target process PID 4420 wrote to memory of 1528 4420 186995-2exe.exe vbc.exe PID 4420 wrote to memory of 1528 4420 186995-2exe.exe vbc.exe PID 4420 wrote to memory of 1528 4420 186995-2exe.exe vbc.exe PID 4420 wrote to memory of 1528 4420 186995-2exe.exe vbc.exe PID 4420 wrote to memory of 1528 4420 186995-2exe.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\186995-2exe.exe"C:\Users\Admin\AppData\Local\Temp\186995-2exe.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4420 -s 5042⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4420 -ip 44201⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1528-133-0x0000000000580000-0x00000000005B2000-memory.dmpFilesize
200KB
-
memory/1528-138-0x0000000005370000-0x0000000005988000-memory.dmpFilesize
6.1MB
-
memory/1528-139-0x0000000004EF0000-0x0000000004FFA000-memory.dmpFilesize
1.0MB
-
memory/1528-140-0x0000000004E20000-0x0000000004E32000-memory.dmpFilesize
72KB
-
memory/1528-141-0x0000000004EA0000-0x0000000004EDC000-memory.dmpFilesize
240KB
-
memory/1528-142-0x0000000004E90000-0x0000000004EA0000-memory.dmpFilesize
64KB
-
memory/1528-143-0x0000000004E90000-0x0000000004EA0000-memory.dmpFilesize
64KB