Analysis

  • max time kernel
    127s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 07:10

General

  • Target

    d9a729c3b6a1d94495761b3c6fc329ef7ffabe8c8fdea534070c7d44e59ea349.exe

  • Size

    1.0MB

  • MD5

    7fb206715e38dd139d4247f2f5fd80d1

  • SHA1

    fbd6a09c4a0fc67c89d53b316abd4d153e025547

  • SHA256

    d9a729c3b6a1d94495761b3c6fc329ef7ffabe8c8fdea534070c7d44e59ea349

  • SHA512

    0a208ecd32b73f5b6a7db61159dff10108dc9307824c5f8e509011c472b823290ae43cefb8137f2a327a25dc24d0684786c9fe91a2c6caeaa9086a981d9ae4eb

  • SSDEEP

    12288:A+EAoTjelkz2ncnNmU+Q2N7Ls/WMDd/Z9FFsDuVy9sJoRmuJV/9:A1Ikz2ncnNmU+Qx/LJPsYiRB9

Malware Config

Extracted

Family

redline

Botnet

unique285

C2

194.169.175.232:45451

Attributes
  • auth_value

    1ed06994a9a19d3729019cb69c1f61a6

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9a729c3b6a1d94495761b3c6fc329ef7ffabe8c8fdea534070c7d44e59ea349.exe
    "C:\Users\Admin\AppData\Local\Temp\d9a729c3b6a1d94495761b3c6fc329ef7ffabe8c8fdea534070c7d44e59ea349.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2448
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
        PID:3304
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        2⤵
          PID:2524
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4288
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2448 -s 324
          2⤵
          • Program crash
          PID:1672
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2448 -ip 2448
        1⤵
          PID:624

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/4288-0-0x0000000000400000-0x0000000000430000-memory.dmp

                Filesize

                192KB

              • memory/4288-1-0x0000000074720000-0x0000000074ED0000-memory.dmp

                Filesize

                7.7MB

              • memory/4288-2-0x00000000054C0000-0x00000000054C6000-memory.dmp

                Filesize

                24KB

              • memory/4288-3-0x0000000074720000-0x0000000074ED0000-memory.dmp

                Filesize

                7.7MB

              • memory/4288-4-0x0000000005B60000-0x0000000006178000-memory.dmp

                Filesize

                6.1MB

              • memory/4288-5-0x0000000005650000-0x000000000575A000-memory.dmp

                Filesize

                1.0MB

              • memory/4288-7-0x0000000005530000-0x0000000005540000-memory.dmp

                Filesize

                64KB

              • memory/4288-6-0x0000000005540000-0x0000000005552000-memory.dmp

                Filesize

                72KB

              • memory/4288-8-0x00000000055A0000-0x00000000055DC000-memory.dmp

                Filesize

                240KB

              • memory/4288-9-0x00000000055E0000-0x000000000562C000-memory.dmp

                Filesize

                304KB

              • memory/4288-10-0x0000000005530000-0x0000000005540000-memory.dmp

                Filesize

                64KB

              • memory/4288-11-0x0000000005A10000-0x0000000005A86000-memory.dmp

                Filesize

                472KB

              • memory/4288-12-0x0000000005A90000-0x0000000005B22000-memory.dmp

                Filesize

                584KB

              • memory/4288-13-0x0000000006C20000-0x00000000071C4000-memory.dmp

                Filesize

                5.6MB

              • memory/4288-14-0x00000000062F0000-0x0000000006356000-memory.dmp

                Filesize

                408KB

              • memory/4288-15-0x0000000006360000-0x00000000063B0000-memory.dmp

                Filesize

                320KB

              • memory/4288-16-0x00000000073A0000-0x0000000007562000-memory.dmp

                Filesize

                1.8MB

              • memory/4288-17-0x0000000009510000-0x0000000009A3C000-memory.dmp

                Filesize

                5.2MB

              • memory/4288-19-0x0000000074720000-0x0000000074ED0000-memory.dmp

                Filesize

                7.7MB