Analysis
-
max time kernel
287s -
max time network
298s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
02-05-2024 06:17
Static task
static1
Behavioral task
behavioral1
Sample
e668eed8b46eb6cb1b1ed9251661e2ad1a15af6c3073af38857c4ea2edfe8907.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e668eed8b46eb6cb1b1ed9251661e2ad1a15af6c3073af38857c4ea2edfe8907.exe
Resource
win10-20240404-en
General
-
Target
e668eed8b46eb6cb1b1ed9251661e2ad1a15af6c3073af38857c4ea2edfe8907.exe
-
Size
1.8MB
-
MD5
d234d90cef07b0500c3c8003b9599448
-
SHA1
5d31cc4529ffdbee5251ea9772e6ac98d5ee4f30
-
SHA256
e668eed8b46eb6cb1b1ed9251661e2ad1a15af6c3073af38857c4ea2edfe8907
-
SHA512
8bb7edbe8a416d211f75c856d2efecbc582ca8dbde54bb4397b250073c19aa6aa62f39bebfda9cbafbb16534142832dec381a4b24bdc53e8617b978a74bf2c7f
-
SSDEEP
24576:2j4XqbZVk1s19CWLELdWZ/RT6a9Dhvh9Kg1PW3Ry:h1s19COZpT6a3vag1
Malware Config
Extracted
redline
LogsDiller Cloud (Telegram: @logsdillabot)
51.255.152.132:36011
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1208-0-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
Suspicious use of SetThreadContext 1 IoCs
Processes:
e668eed8b46eb6cb1b1ed9251661e2ad1a15af6c3073af38857c4ea2edfe8907.exedescription pid process target process PID 4092 set thread context of 1208 4092 e668eed8b46eb6cb1b1ed9251661e2ad1a15af6c3073af38857c4ea2edfe8907.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4188 4092 WerFault.exe e668eed8b46eb6cb1b1ed9251661e2ad1a15af6c3073af38857c4ea2edfe8907.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
e668eed8b46eb6cb1b1ed9251661e2ad1a15af6c3073af38857c4ea2edfe8907.exedescription pid process target process PID 4092 wrote to memory of 1208 4092 e668eed8b46eb6cb1b1ed9251661e2ad1a15af6c3073af38857c4ea2edfe8907.exe AppLaunch.exe PID 4092 wrote to memory of 1208 4092 e668eed8b46eb6cb1b1ed9251661e2ad1a15af6c3073af38857c4ea2edfe8907.exe AppLaunch.exe PID 4092 wrote to memory of 1208 4092 e668eed8b46eb6cb1b1ed9251661e2ad1a15af6c3073af38857c4ea2edfe8907.exe AppLaunch.exe PID 4092 wrote to memory of 1208 4092 e668eed8b46eb6cb1b1ed9251661e2ad1a15af6c3073af38857c4ea2edfe8907.exe AppLaunch.exe PID 4092 wrote to memory of 1208 4092 e668eed8b46eb6cb1b1ed9251661e2ad1a15af6c3073af38857c4ea2edfe8907.exe AppLaunch.exe PID 4092 wrote to memory of 1208 4092 e668eed8b46eb6cb1b1ed9251661e2ad1a15af6c3073af38857c4ea2edfe8907.exe AppLaunch.exe PID 4092 wrote to memory of 1208 4092 e668eed8b46eb6cb1b1ed9251661e2ad1a15af6c3073af38857c4ea2edfe8907.exe AppLaunch.exe PID 4092 wrote to memory of 1208 4092 e668eed8b46eb6cb1b1ed9251661e2ad1a15af6c3073af38857c4ea2edfe8907.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e668eed8b46eb6cb1b1ed9251661e2ad1a15af6c3073af38857c4ea2edfe8907.exe"C:\Users\Admin\AppData\Local\Temp\e668eed8b46eb6cb1b1ed9251661e2ad1a15af6c3073af38857c4ea2edfe8907.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4092 -s 3242⤵
- Program crash
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1208-0-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/1208-3-0x000000007396E000-0x000000007396F000-memory.dmpFilesize
4KB
-
memory/1208-5-0x000000000C1C0000-0x000000000C6BE000-memory.dmpFilesize
5.0MB
-
memory/1208-6-0x000000000BD60000-0x000000000BDF2000-memory.dmpFilesize
584KB
-
memory/1208-7-0x0000000009320000-0x000000000932A000-memory.dmpFilesize
40KB
-
memory/1208-8-0x0000000073960000-0x000000007404E000-memory.dmpFilesize
6.9MB
-
memory/1208-9-0x000000000CCD0000-0x000000000D2D6000-memory.dmpFilesize
6.0MB
-
memory/1208-10-0x000000000C6C0000-0x000000000C7CA000-memory.dmpFilesize
1.0MB
-
memory/1208-11-0x000000000BF20000-0x000000000BF32000-memory.dmpFilesize
72KB
-
memory/1208-12-0x000000000C0C0000-0x000000000C0FE000-memory.dmpFilesize
248KB
-
memory/1208-13-0x000000000C100000-0x000000000C14B000-memory.dmpFilesize
300KB
-
memory/1208-18-0x000000007396E000-0x000000007396F000-memory.dmpFilesize
4KB
-
memory/1208-25-0x0000000073960000-0x000000007404E000-memory.dmpFilesize
6.9MB