Analysis

  • max time kernel
    137s
  • max time network
    140s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    09-11-2020 20:13

General

  • Target

    2884a1b8944cf25dad7dda0005b1995e.exe

  • Size

    714KB

  • MD5

    2884a1b8944cf25dad7dda0005b1995e

  • SHA1

    b0df655586ec0e4ef320c609053b1361c12a3084

  • SHA256

    c4a2c8397cfa4f7f16a317aad541b6c48e35c4420249f702b2c6f01faf66ef61

  • SHA512

    f86f5b06c467f99ca231b45bc6d444bea03107c6c3cc133dacc3033a435e92de4b9f1a170bcae55cf493e18ff80e3f1b27c58614ef1831709a087fab9d1ef789

Malware Config

Signatures

  • CoreEntity .NET Packer 1 IoCs

    A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • rezer0 1 IoCs

    Detects ReZer0, a packer with multiple versions used in various campaigns.

  • Suspicious use of SetThreadContext 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2884a1b8944cf25dad7dda0005b1995e.exe
    "C:\Users\Admin\AppData\Local\Temp\2884a1b8944cf25dad7dda0005b1995e.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1400
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "{path}"
      2⤵
        PID:1300
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "{path}"
        2⤵
          PID:1324
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "{path}"
          2⤵
            PID:1500
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "{path}"
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4036
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /C taskkill /F /PID 4036 && choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:3356
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /PID 4036
                4⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2868
              • C:\Windows\SysWOW64\choice.exe
                choice /C Y /N /D Y /T 3
                4⤵
                  PID:2932

          Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1400-1-0x0000000000B30000-0x0000000000B31000-memory.dmp

            Filesize

            4KB

          • memory/1400-3-0x0000000005960000-0x0000000005961000-memory.dmp

            Filesize

            4KB

          • memory/1400-4-0x0000000005460000-0x0000000005461000-memory.dmp

            Filesize

            4KB

          • memory/1400-5-0x0000000005410000-0x0000000005411000-memory.dmp

            Filesize

            4KB

          • memory/1400-6-0x0000000008A40000-0x0000000008A41000-memory.dmp

            Filesize

            4KB

          • memory/1400-7-0x0000000008AE0000-0x0000000008AE2000-memory.dmp

            Filesize

            8KB

          • memory/1400-8-0x0000000008D00000-0x0000000008D31000-memory.dmp

            Filesize

            196KB

          • memory/1400-0-0x0000000073550000-0x0000000073C3E000-memory.dmp

            Filesize

            6.9MB

          • memory/2868-21-0x0000000000000000-mapping.dmp

          • memory/2932-22-0x0000000000000000-mapping.dmp

          • memory/3356-20-0x0000000000000000-mapping.dmp

          • memory/4036-11-0x0000000073550000-0x0000000073C3E000-memory.dmp

            Filesize

            6.9MB

          • memory/4036-15-0x0000000006240000-0x0000000006241000-memory.dmp

            Filesize

            4KB

          • memory/4036-16-0x0000000005CA0000-0x0000000005CA1000-memory.dmp

            Filesize

            4KB

          • memory/4036-17-0x0000000005D00000-0x0000000005D01000-memory.dmp

            Filesize

            4KB

          • memory/4036-18-0x0000000005D40000-0x0000000005D41000-memory.dmp

            Filesize

            4KB

          • memory/4036-19-0x0000000005EF0000-0x0000000005EF1000-memory.dmp

            Filesize

            4KB

          • memory/4036-14-0x0000000005840000-0x0000000005841000-memory.dmp

            Filesize

            4KB

          • memory/4036-10-0x000000000042A3AE-mapping.dmp

          • memory/4036-9-0x0000000000400000-0x0000000000430000-memory.dmp

            Filesize

            192KB