Analysis
-
max time kernel
139s -
max time network
148s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
27-01-2022 09:49
Static task
static1
Behavioral task
behavioral1
Sample
God of War.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
God of War.exe
Resource
win10-en-20211208
General
-
Target
God of War.exe
-
Size
1.2MB
-
MD5
484c3ab4ae2795dce03be108c01ea316
-
SHA1
459b95db4341640c1c249bce55e74a39e256e2d4
-
SHA256
82b844c1e452640ba4bf4ef2ec6187d16673b3113af6a92ac684ca3ba6a82859
-
SHA512
956ebe3f1ddfb4aa565ccddf00184f787592b22aa548cdc82391bf1233b8ccd707aa90e6b9e73b42b28a9ddc637ca3ce79e070319445d35bcec907ae30477059
Malware Config
Extracted
redline
5.206.227.246:80
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/472-60-0x0000000000400000-0x000000000046C000-memory.dmp family_redline behavioral1/memory/472-61-0x0000000000400000-0x000000000046C000-memory.dmp family_redline behavioral1/memory/472-62-0x0000000000400000-0x000000000046C000-memory.dmp family_redline behavioral1/memory/472-64-0x0000000000400000-0x000000000046C000-memory.dmp family_redline behavioral1/memory/472-65-0x00000000023C0000-0x00000000026B0000-memory.dmp family_redline -
Suspicious use of SetThreadContext 1 IoCs
Processes:
God of War.exedescription pid process target process PID 748 set thread context of 472 748 God of War.exe RegAsm.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
RegAsm.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
RegAsm.exepid process 472 RegAsm.exe 472 RegAsm.exe 472 RegAsm.exe 472 RegAsm.exe 472 RegAsm.exe 472 RegAsm.exe 472 RegAsm.exe 472 RegAsm.exe 472 RegAsm.exe 472 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegAsm.exedescription pid process Token: SeDebugPrivilege 472 RegAsm.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
God of War.exedescription pid process target process PID 748 wrote to memory of 472 748 God of War.exe RegAsm.exe PID 748 wrote to memory of 472 748 God of War.exe RegAsm.exe PID 748 wrote to memory of 472 748 God of War.exe RegAsm.exe PID 748 wrote to memory of 472 748 God of War.exe RegAsm.exe PID 748 wrote to memory of 472 748 God of War.exe RegAsm.exe PID 748 wrote to memory of 472 748 God of War.exe RegAsm.exe PID 748 wrote to memory of 472 748 God of War.exe RegAsm.exe PID 748 wrote to memory of 472 748 God of War.exe RegAsm.exe PID 748 wrote to memory of 472 748 God of War.exe RegAsm.exe PID 748 wrote to memory of 472 748 God of War.exe RegAsm.exe PID 748 wrote to memory of 472 748 God of War.exe RegAsm.exe PID 748 wrote to memory of 472 748 God of War.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\God of War.exe"C:\Users\Admin\AppData\Local\Temp\God of War.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe#cmd2⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/472-58-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/472-59-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/472-60-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/472-61-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/472-62-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/472-64-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/472-65-0x00000000023C0000-0x00000000026B0000-memory.dmpFilesize
2.9MB
-
memory/748-54-0x0000000000C40000-0x0000000000D86000-memory.dmpFilesize
1.3MB
-
memory/748-55-0x0000000074F01000-0x0000000074F03000-memory.dmpFilesize
8KB
-
memory/748-56-0x0000000004D60000-0x0000000004D61000-memory.dmpFilesize
4KB