Analysis
-
max time kernel
278s -
max time network
296s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10-10-2023 05:05
Static task
static1
Behavioral task
behavioral1
Sample
4Mr726Sl.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
4Mr726Sl.exe
Resource
win10-20230915-en
General
-
Target
4Mr726Sl.exe
-
Size
459KB
-
MD5
0dc5b68d3dabacbb1180ff5055d6c760
-
SHA1
15eefebd9a753cb096932f7696fa9fc774f2523f
-
SHA256
00517c79522072188015874aea7da2b0cc47a2527d8e22bdad86385deec60883
-
SHA512
b842ff9b30f394964a1e7888807b45312d6a923fedfe6a4a2d4f26fe84a00de7878fbf6acdfe795dba446d8e5c42c66c0ad4e31193a54171bfe933873e55f0ca
-
SSDEEP
6144:mfjhibDPM4jjdpvIN8fp7z5BAOCP2Taf+sDa+hUTn36FBJF8uVZlLoe6U0X:mfjaDPjjb/gPY36Lo5e6ZX
Malware Config
Extracted
redline
frant
77.91.124.55:19071
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2548-2-0x0000000000400000-0x000000000043E000-memory.dmp family_redline behavioral1/memory/2548-3-0x0000000000400000-0x000000000043E000-memory.dmp family_redline behavioral1/memory/2548-5-0x0000000000400000-0x000000000043E000-memory.dmp family_redline behavioral1/memory/2548-7-0x0000000000400000-0x000000000043E000-memory.dmp family_redline behavioral1/memory/2548-9-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
Suspicious use of SetThreadContext 1 IoCs
Processes:
4Mr726Sl.exedescription pid process target process PID 3004 set thread context of 2548 3004 4Mr726Sl.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2600 3004 WerFault.exe 4Mr726Sl.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
4Mr726Sl.exedescription pid process target process PID 3004 wrote to memory of 2640 3004 4Mr726Sl.exe AppLaunch.exe PID 3004 wrote to memory of 2640 3004 4Mr726Sl.exe AppLaunch.exe PID 3004 wrote to memory of 2640 3004 4Mr726Sl.exe AppLaunch.exe PID 3004 wrote to memory of 2640 3004 4Mr726Sl.exe AppLaunch.exe PID 3004 wrote to memory of 2640 3004 4Mr726Sl.exe AppLaunch.exe PID 3004 wrote to memory of 2640 3004 4Mr726Sl.exe AppLaunch.exe PID 3004 wrote to memory of 2640 3004 4Mr726Sl.exe AppLaunch.exe PID 3004 wrote to memory of 2948 3004 4Mr726Sl.exe AppLaunch.exe PID 3004 wrote to memory of 2948 3004 4Mr726Sl.exe AppLaunch.exe PID 3004 wrote to memory of 2948 3004 4Mr726Sl.exe AppLaunch.exe PID 3004 wrote to memory of 2948 3004 4Mr726Sl.exe AppLaunch.exe PID 3004 wrote to memory of 2948 3004 4Mr726Sl.exe AppLaunch.exe PID 3004 wrote to memory of 2948 3004 4Mr726Sl.exe AppLaunch.exe PID 3004 wrote to memory of 2948 3004 4Mr726Sl.exe AppLaunch.exe PID 3004 wrote to memory of 2548 3004 4Mr726Sl.exe AppLaunch.exe PID 3004 wrote to memory of 2548 3004 4Mr726Sl.exe AppLaunch.exe PID 3004 wrote to memory of 2548 3004 4Mr726Sl.exe AppLaunch.exe PID 3004 wrote to memory of 2548 3004 4Mr726Sl.exe AppLaunch.exe PID 3004 wrote to memory of 2548 3004 4Mr726Sl.exe AppLaunch.exe PID 3004 wrote to memory of 2548 3004 4Mr726Sl.exe AppLaunch.exe PID 3004 wrote to memory of 2548 3004 4Mr726Sl.exe AppLaunch.exe PID 3004 wrote to memory of 2548 3004 4Mr726Sl.exe AppLaunch.exe PID 3004 wrote to memory of 2548 3004 4Mr726Sl.exe AppLaunch.exe PID 3004 wrote to memory of 2548 3004 4Mr726Sl.exe AppLaunch.exe PID 3004 wrote to memory of 2548 3004 4Mr726Sl.exe AppLaunch.exe PID 3004 wrote to memory of 2548 3004 4Mr726Sl.exe AppLaunch.exe PID 3004 wrote to memory of 2600 3004 4Mr726Sl.exe WerFault.exe PID 3004 wrote to memory of 2600 3004 4Mr726Sl.exe WerFault.exe PID 3004 wrote to memory of 2600 3004 4Mr726Sl.exe WerFault.exe PID 3004 wrote to memory of 2600 3004 4Mr726Sl.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4Mr726Sl.exe"C:\Users\Admin\AppData\Local\Temp\4Mr726Sl.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 1562⤵
- Program crash
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2548-1-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/2548-0-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/2548-2-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/2548-4-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmpFilesize
4KB
-
memory/2548-3-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/2548-5-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/2548-7-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/2548-9-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/2548-10-0x00000000746E0000-0x0000000074DCE000-memory.dmpFilesize
6.9MB
-
memory/2548-11-0x0000000007420000-0x0000000007460000-memory.dmpFilesize
256KB
-
memory/2548-12-0x00000000746E0000-0x0000000074DCE000-memory.dmpFilesize
6.9MB
-
memory/2548-13-0x0000000007420000-0x0000000007460000-memory.dmpFilesize
256KB