Analysis

  • max time kernel
    144s
  • max time network
    155s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    19-03-2024 18:53

General

  • Target

    9eb758edc7a192e4a4fcfe1eac1799c1e64408cc57809628f2ae8c2114ff8eb6.exe

  • Size

    1.7MB

  • MD5

    c726a4eba148b17c9ccf3692fbc90701

  • SHA1

    52d203ff30f7a23fdc4cb45caa2efa40324a43d9

  • SHA256

    9eb758edc7a192e4a4fcfe1eac1799c1e64408cc57809628f2ae8c2114ff8eb6

  • SHA512

    8499f446c1a7ae0f52f75e61073c916e2531f09b4cf7fc133c63b874d3c42a5cddc280f8b9b9d1be038c6bb789e763213c8d0a1e27add3796cb3a46523ea707e

  • SSDEEP

    49152:rbwfYXOdg8BnGyKkv6dfaAHYgDJY2Zuqz1:rs7sf

Score
10/10

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9eb758edc7a192e4a4fcfe1eac1799c1e64408cc57809628f2ae8c2114ff8eb6.exe
    "C:\Users\Admin\AppData\Local\Temp\9eb758edc7a192e4a4fcfe1eac1799c1e64408cc57809628f2ae8c2114ff8eb6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1484
    • C:\Windows\SysWOW64\notepad.exe
      "C:\Windows\SysWOW64\notepad.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2620
      • C:\Windows\Microsoft.NET\assembly\GAC_32\MSBuild\v4.0_4.0.0.0__b03f5f7f11d50a3a\MSBuild.exe
        "C:\Windows\Microsoft.NET\assembly\GAC_32\MSBuild\v4.0_4.0.0.0__b03f5f7f11d50a3a\MSBuild.exe"
        3⤵
          PID:4636

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2620-13-0x0000000074B50000-0x0000000075301000-memory.dmp

      Filesize

      7.7MB

    • memory/2620-1-0x0000000005470000-0x0000000005480000-memory.dmp

      Filesize

      64KB

    • memory/2620-2-0x0000000005490000-0x00000000054BC000-memory.dmp

      Filesize

      176KB

    • memory/2620-3-0x0000000005470000-0x0000000005480000-memory.dmp

      Filesize

      64KB

    • memory/2620-4-0x0000000005470000-0x0000000005480000-memory.dmp

      Filesize

      64KB

    • memory/2620-16-0x0000000005470000-0x0000000005480000-memory.dmp

      Filesize

      64KB

    • memory/2620-15-0x0000000005470000-0x0000000005480000-memory.dmp

      Filesize

      64KB

    • memory/2620-14-0x0000000005470000-0x0000000005480000-memory.dmp

      Filesize

      64KB

    • memory/2620-0-0x0000000074B50000-0x0000000075301000-memory.dmp

      Filesize

      7.7MB

    • memory/4636-8-0x0000000007710000-0x0000000007722000-memory.dmp

      Filesize

      72KB

    • memory/4636-10-0x0000000007AB0000-0x0000000007AC0000-memory.dmp

      Filesize

      64KB

    • memory/4636-11-0x0000000007770000-0x00000000077AC000-memory.dmp

      Filesize

      240KB

    • memory/4636-12-0x00000000077B0000-0x00000000077FC000-memory.dmp

      Filesize

      304KB

    • memory/4636-9-0x0000000007840000-0x000000000794A000-memory.dmp

      Filesize

      1.0MB

    • memory/4636-7-0x0000000007C90000-0x00000000082A8000-memory.dmp

      Filesize

      6.1MB

    • memory/4636-6-0x0000000074B50000-0x0000000075301000-memory.dmp

      Filesize

      7.7MB

    • memory/4636-5-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4636-17-0x0000000074B50000-0x0000000075301000-memory.dmp

      Filesize

      7.7MB

    • memory/4636-18-0x0000000007AB0000-0x0000000007AC0000-memory.dmp

      Filesize

      64KB