Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-03-2024 18:53

General

  • Target

    9eb758edc7a192e4a4fcfe1eac1799c1e64408cc57809628f2ae8c2114ff8eb6.exe

  • Size

    1.7MB

  • MD5

    c726a4eba148b17c9ccf3692fbc90701

  • SHA1

    52d203ff30f7a23fdc4cb45caa2efa40324a43d9

  • SHA256

    9eb758edc7a192e4a4fcfe1eac1799c1e64408cc57809628f2ae8c2114ff8eb6

  • SHA512

    8499f446c1a7ae0f52f75e61073c916e2531f09b4cf7fc133c63b874d3c42a5cddc280f8b9b9d1be038c6bb789e763213c8d0a1e27add3796cb3a46523ea707e

  • SSDEEP

    49152:rbwfYXOdg8BnGyKkv6dfaAHYgDJY2Zuqz1:rs7sf

Score
10/10

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9eb758edc7a192e4a4fcfe1eac1799c1e64408cc57809628f2ae8c2114ff8eb6.exe
    "C:\Users\Admin\AppData\Local\Temp\9eb758edc7a192e4a4fcfe1eac1799c1e64408cc57809628f2ae8c2114ff8eb6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4612
    • C:\Windows\SysWOW64\notepad.exe
      "C:\Windows\SysWOW64\notepad.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1072
      • C:\Windows\Microsoft.NET\assembly\GAC_32\MSBuild\v4.0_4.0.0.0__b03f5f7f11d50a3a\MSBuild.exe
        "C:\Windows\Microsoft.NET\assembly\GAC_32\MSBuild\v4.0_4.0.0.0__b03f5f7f11d50a3a\MSBuild.exe"
        3⤵
          PID:4892

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1072-12-0x0000000073E00000-0x00000000745B0000-memory.dmp
      Filesize

      7.7MB

    • memory/1072-1-0x0000000004840000-0x0000000004850000-memory.dmp
      Filesize

      64KB

    • memory/1072-2-0x00000000020F0000-0x000000000211C000-memory.dmp
      Filesize

      176KB

    • memory/1072-3-0x0000000004840000-0x0000000004850000-memory.dmp
      Filesize

      64KB

    • memory/1072-0-0x0000000073E00000-0x00000000745B0000-memory.dmp
      Filesize

      7.7MB

    • memory/1072-14-0x0000000004840000-0x0000000004850000-memory.dmp
      Filesize

      64KB

    • memory/1072-13-0x0000000004840000-0x0000000004850000-memory.dmp
      Filesize

      64KB

    • memory/4892-4-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/4892-8-0x0000000007DD0000-0x0000000007EDA000-memory.dmp
      Filesize

      1.0MB

    • memory/4892-9-0x0000000007D00000-0x0000000007D10000-memory.dmp
      Filesize

      64KB

    • memory/4892-10-0x0000000007D10000-0x0000000007D4C000-memory.dmp
      Filesize

      240KB

    • memory/4892-11-0x0000000007D50000-0x0000000007D9C000-memory.dmp
      Filesize

      304KB

    • memory/4892-7-0x0000000007C60000-0x0000000007C72000-memory.dmp
      Filesize

      72KB

    • memory/4892-6-0x0000000008250000-0x0000000008868000-memory.dmp
      Filesize

      6.1MB

    • memory/4892-5-0x0000000073E00000-0x00000000745B0000-memory.dmp
      Filesize

      7.7MB

    • memory/4892-15-0x0000000073E00000-0x00000000745B0000-memory.dmp
      Filesize

      7.7MB

    • memory/4892-16-0x0000000007D00000-0x0000000007D10000-memory.dmp
      Filesize

      64KB