Analysis
-
max time kernel
290s -
max time network
302s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10-10-2023 00:59
Static task
static1
Behavioral task
behavioral1
Sample
4aw602SF.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
4aw602SF.exe
Resource
win10-20230915-en
General
-
Target
4aw602SF.exe
-
Size
459KB
-
MD5
f807505c12a33b65b08e46eef6408959
-
SHA1
49813fdcd432b333f296421a2dbf867506363626
-
SHA256
1327f6d2be1f9ec0e2bef78ffb5a702b1a5249e4e7cea43e0012aebf1cb8c669
-
SHA512
4df7bf7aaa4f1a409032c3e2e1cce183b707b70219b62d54af7fdccb6e5b7f78ae67727ee4bc6c30e044cb0f6535b155d1834ad3e3120eef7fdba82740919179
-
SSDEEP
6144:4vRHImfMPTjdJUINv8nqBJY5FAOtOjHXfSxrviJxekGQYto/vHYjB4rSPjIEtN3:4vCmETjbJ3mTOjHvSxrviukGftgvHhG3
Malware Config
Extracted
redline
frant
77.91.124.55:19071
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1360-2-0x0000000000400000-0x000000000043E000-memory.dmp family_redline behavioral1/memory/1360-3-0x0000000000400000-0x000000000043E000-memory.dmp family_redline behavioral1/memory/1360-5-0x0000000000400000-0x000000000043E000-memory.dmp family_redline behavioral1/memory/1360-9-0x0000000000400000-0x000000000043E000-memory.dmp family_redline behavioral1/memory/1360-7-0x0000000000400000-0x000000000043E000-memory.dmp family_redline behavioral1/memory/1360-11-0x0000000007330000-0x0000000007370000-memory.dmp family_redline -
Suspicious use of SetThreadContext 1 IoCs
Processes:
4aw602SF.exedescription pid process target process PID 1948 set thread context of 1360 1948 4aw602SF.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2324 1948 WerFault.exe 4aw602SF.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
4aw602SF.exedescription pid process target process PID 1948 wrote to memory of 2612 1948 4aw602SF.exe AppLaunch.exe PID 1948 wrote to memory of 2612 1948 4aw602SF.exe AppLaunch.exe PID 1948 wrote to memory of 2612 1948 4aw602SF.exe AppLaunch.exe PID 1948 wrote to memory of 2612 1948 4aw602SF.exe AppLaunch.exe PID 1948 wrote to memory of 2612 1948 4aw602SF.exe AppLaunch.exe PID 1948 wrote to memory of 2612 1948 4aw602SF.exe AppLaunch.exe PID 1948 wrote to memory of 2612 1948 4aw602SF.exe AppLaunch.exe PID 1948 wrote to memory of 1360 1948 4aw602SF.exe AppLaunch.exe PID 1948 wrote to memory of 1360 1948 4aw602SF.exe AppLaunch.exe PID 1948 wrote to memory of 1360 1948 4aw602SF.exe AppLaunch.exe PID 1948 wrote to memory of 1360 1948 4aw602SF.exe AppLaunch.exe PID 1948 wrote to memory of 1360 1948 4aw602SF.exe AppLaunch.exe PID 1948 wrote to memory of 1360 1948 4aw602SF.exe AppLaunch.exe PID 1948 wrote to memory of 1360 1948 4aw602SF.exe AppLaunch.exe PID 1948 wrote to memory of 1360 1948 4aw602SF.exe AppLaunch.exe PID 1948 wrote to memory of 1360 1948 4aw602SF.exe AppLaunch.exe PID 1948 wrote to memory of 1360 1948 4aw602SF.exe AppLaunch.exe PID 1948 wrote to memory of 1360 1948 4aw602SF.exe AppLaunch.exe PID 1948 wrote to memory of 1360 1948 4aw602SF.exe AppLaunch.exe PID 1948 wrote to memory of 2324 1948 4aw602SF.exe WerFault.exe PID 1948 wrote to memory of 2324 1948 4aw602SF.exe WerFault.exe PID 1948 wrote to memory of 2324 1948 4aw602SF.exe WerFault.exe PID 1948 wrote to memory of 2324 1948 4aw602SF.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4aw602SF.exe"C:\Users\Admin\AppData\Local\Temp\4aw602SF.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1948 -s 1442⤵
- Program crash
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1360-0-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/1360-1-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/1360-2-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/1360-3-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/1360-4-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmpFilesize
4KB
-
memory/1360-5-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/1360-9-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/1360-7-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/1360-10-0x00000000743C0000-0x0000000074AAE000-memory.dmpFilesize
6.9MB
-
memory/1360-11-0x0000000007330000-0x0000000007370000-memory.dmpFilesize
256KB
-
memory/1360-12-0x00000000743C0000-0x0000000074AAE000-memory.dmpFilesize
6.9MB
-
memory/1360-13-0x0000000007330000-0x0000000007370000-memory.dmpFilesize
256KB