Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
19-03-2024 18:53
Static task
static1
Behavioral task
behavioral1
Sample
8752cc9bba740d06fa96d7d409f6f936ab7e1f02ccd24c598c7bceaf33ba9037.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
8752cc9bba740d06fa96d7d409f6f936ab7e1f02ccd24c598c7bceaf33ba9037.exe
Resource
win11-20240221-en
General
-
Target
8752cc9bba740d06fa96d7d409f6f936ab7e1f02ccd24c598c7bceaf33ba9037.exe
-
Size
297KB
-
MD5
bd5dfcf6a71e40a07b8b19bbe0a1a69b
-
SHA1
b2d0a905bdedbc2c4346396f622e3ffc822db4f6
-
SHA256
8752cc9bba740d06fa96d7d409f6f936ab7e1f02ccd24c598c7bceaf33ba9037
-
SHA512
679d305497bf76dacfc6ca5e5e7dbb4ce4ca6d08d948916a36662c53d414d4180948402a63f64036d8ca7189dc7a70b8f9204e740679c23b2ce97ee7c23b63e2
-
SSDEEP
6144:igzgtQltcKzMiu1WxPcLiniiTJ/+kSVE9BaLY1r1LINoANi3TH:ZzgtiA1Wx+wiuWLOr17AN+
Malware Config
Extracted
redline
easy11211
chardhesha.xyz:81
jalocliche.xyz:81
-
auth_value
980d12032eaaadd1ef7186440759c9a5
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral2/memory/3736-0-0x0000000000400000-0x000000000044F000-memory.dmp family_redline behavioral2/memory/3952-1-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral2/memory/3736-11-0x0000000000400000-0x000000000044F000-memory.dmp family_redline -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3736 set thread context of 3952 3736 8752cc9bba740d06fa96d7d409f6f936ab7e1f02ccd24c598c7bceaf33ba9037.exe 81 -
Program crash 1 IoCs
pid pid_target Process procid_target 488 3736 WerFault.exe 78 -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3736 wrote to memory of 3952 3736 8752cc9bba740d06fa96d7d409f6f936ab7e1f02ccd24c598c7bceaf33ba9037.exe 81 PID 3736 wrote to memory of 3952 3736 8752cc9bba740d06fa96d7d409f6f936ab7e1f02ccd24c598c7bceaf33ba9037.exe 81 PID 3736 wrote to memory of 3952 3736 8752cc9bba740d06fa96d7d409f6f936ab7e1f02ccd24c598c7bceaf33ba9037.exe 81 PID 3736 wrote to memory of 3952 3736 8752cc9bba740d06fa96d7d409f6f936ab7e1f02ccd24c598c7bceaf33ba9037.exe 81 PID 3736 wrote to memory of 3952 3736 8752cc9bba740d06fa96d7d409f6f936ab7e1f02ccd24c598c7bceaf33ba9037.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\8752cc9bba740d06fa96d7d409f6f936ab7e1f02ccd24c598c7bceaf33ba9037.exe"C:\Users\Admin\AppData\Local\Temp\8752cc9bba740d06fa96d7d409f6f936ab7e1f02ccd24c598c7bceaf33ba9037.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:3952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3736 -s 5322⤵
- Program crash
PID:488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3736 -ip 37361⤵PID:732