Analysis
-
max time kernel
122s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 22:46
Static task
static1
Behavioral task
behavioral1
Sample
722d05592673cad0177a00fd3bf940e9ec656a623f28d42e5867bda0fe58b51a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
722d05592673cad0177a00fd3bf940e9ec656a623f28d42e5867bda0fe58b51a.exe
Resource
win10-20240404-en
General
-
Target
722d05592673cad0177a00fd3bf940e9ec656a623f28d42e5867bda0fe58b51a.exe
-
Size
18.8MB
-
MD5
9211e67da80fe6d9f713f6b4aece1d27
-
SHA1
e271997ff6d723260ac8af44e37ed6a59adaaac2
-
SHA256
722d05592673cad0177a00fd3bf940e9ec656a623f28d42e5867bda0fe58b51a
-
SHA512
65950fbb4a3bc4bb0042502d5c4f363687e228e08fc606770323c2ac6590f241ab65ce53671dbaebaa958239154a33943c4132c9ad67554ae0bba9d4403e07ab
-
SSDEEP
393216:qynEX19Y0QBTstAfrrKgbKR2/KFZ9F9EIbHmWJqgLT1:qHLYPBTsmPKxvyIi0nX1
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2604-80-0x0000000001340000-0x00000000013BE000-memory.dmp family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
Ujc7eRsXhT.exeR8pX7QSikc.exepid process 2248 Ujc7eRsXhT.exe 2604 R8pX7QSikc.exe -
Loads dropped DLL 7 IoCs
Processes:
722d05592673cad0177a00fd3bf940e9ec656a623f28d42e5867bda0fe58b51a.exeWerFault.exepid process 3056 722d05592673cad0177a00fd3bf940e9ec656a623f28d42e5867bda0fe58b51a.exe 3056 722d05592673cad0177a00fd3bf940e9ec656a623f28d42e5867bda0fe58b51a.exe 3056 722d05592673cad0177a00fd3bf940e9ec656a623f28d42e5867bda0fe58b51a.exe 2708 WerFault.exe 2708 WerFault.exe 2708 WerFault.exe 2708 WerFault.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
722d05592673cad0177a00fd3bf940e9ec656a623f28d42e5867bda0fe58b51a.exeUjc7eRsXhT.exepid process 3056 722d05592673cad0177a00fd3bf940e9ec656a623f28d42e5867bda0fe58b51a.exe 3056 722d05592673cad0177a00fd3bf940e9ec656a623f28d42e5867bda0fe58b51a.exe 2248 Ujc7eRsXhT.exe 2248 Ujc7eRsXhT.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2708 2604 WerFault.exe R8pX7QSikc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
722d05592673cad0177a00fd3bf940e9ec656a623f28d42e5867bda0fe58b51a.exeUjc7eRsXhT.exepid process 3056 722d05592673cad0177a00fd3bf940e9ec656a623f28d42e5867bda0fe58b51a.exe 2248 Ujc7eRsXhT.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
722d05592673cad0177a00fd3bf940e9ec656a623f28d42e5867bda0fe58b51a.exeR8pX7QSikc.exedescription pid process target process PID 3056 wrote to memory of 2248 3056 722d05592673cad0177a00fd3bf940e9ec656a623f28d42e5867bda0fe58b51a.exe Ujc7eRsXhT.exe PID 3056 wrote to memory of 2248 3056 722d05592673cad0177a00fd3bf940e9ec656a623f28d42e5867bda0fe58b51a.exe Ujc7eRsXhT.exe PID 3056 wrote to memory of 2248 3056 722d05592673cad0177a00fd3bf940e9ec656a623f28d42e5867bda0fe58b51a.exe Ujc7eRsXhT.exe PID 3056 wrote to memory of 2248 3056 722d05592673cad0177a00fd3bf940e9ec656a623f28d42e5867bda0fe58b51a.exe Ujc7eRsXhT.exe PID 3056 wrote to memory of 2604 3056 722d05592673cad0177a00fd3bf940e9ec656a623f28d42e5867bda0fe58b51a.exe R8pX7QSikc.exe PID 3056 wrote to memory of 2604 3056 722d05592673cad0177a00fd3bf940e9ec656a623f28d42e5867bda0fe58b51a.exe R8pX7QSikc.exe PID 3056 wrote to memory of 2604 3056 722d05592673cad0177a00fd3bf940e9ec656a623f28d42e5867bda0fe58b51a.exe R8pX7QSikc.exe PID 3056 wrote to memory of 2604 3056 722d05592673cad0177a00fd3bf940e9ec656a623f28d42e5867bda0fe58b51a.exe R8pX7QSikc.exe PID 2604 wrote to memory of 2708 2604 R8pX7QSikc.exe WerFault.exe PID 2604 wrote to memory of 2708 2604 R8pX7QSikc.exe WerFault.exe PID 2604 wrote to memory of 2708 2604 R8pX7QSikc.exe WerFault.exe PID 2604 wrote to memory of 2708 2604 R8pX7QSikc.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\722d05592673cad0177a00fd3bf940e9ec656a623f28d42e5867bda0fe58b51a.exe"C:\Users\Admin\AppData\Local\Temp\722d05592673cad0177a00fd3bf940e9ec656a623f28d42e5867bda0fe58b51a.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\Ujc7eRsXhT.exeUjc7eRsXhT.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2248
-
-
C:\Users\Admin\AppData\Local\Temp\R8pX7QSikc.exeR8pX7QSikc.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2604 -s 923⤵
- Loads dropped DLL
- Program crash
PID:2708
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
488KB
MD5e1b561e9880d8d5204f20e281c5dc0a2
SHA1730a2c9e166cb52202df5eb34352f656a901e2ad
SHA256fe918ff5ea17f26dc67e9dce88ea0e9c36e7b7daf9b355a0f4d0a5046dd130ba
SHA512ab139bb16c1faff8296b6c0fc868ecd215a6c2c81a88b79fa3ae174143f013abe1419f2e65580371402fd6c1a0acdfadd2dc455c6e09bd7ec2dc59fe79b0efc7
-
Filesize
19.1MB
MD5912799971263c4b4415c40071c065eeb
SHA1ae8208e2f745b261788fe0898e9bdf83f8bd2fd8
SHA256e78bb074a1c8cf551e781ec3e21f454d1a6a6560d966cf844e8abc7ab980360d
SHA512e076766f7d770fef58bd4e54874e38e95df1c485c6388f240412c5770ea600b05f2ff9f131da8264afa6efbf3782f7a975c6795adac9af134bc12f82de5b14de