Analysis
-
max time kernel
123s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
07-06-2022 20:31
Static task
static1
Behavioral task
behavioral1
Sample
a43e06bcb221f023a05ecd2dffc305cab8ccd8ef9437746237047f67dbcdfb0f.exe
Resource
win10v2004-20220414-en
General
-
Target
a43e06bcb221f023a05ecd2dffc305cab8ccd8ef9437746237047f67dbcdfb0f.exe
-
Size
290KB
-
MD5
4a64f2d33923c007c5f2cd9a964eb35c
-
SHA1
9f95d5b12fa3e3eb742b1c7115c395884fd9c5bf
-
SHA256
a43e06bcb221f023a05ecd2dffc305cab8ccd8ef9437746237047f67dbcdfb0f
-
SHA512
3cae084ff3ea61d054812942a5d66f7471055ff788ec6f4d499ad86ebd430e93c9dd576ac5611c139d4269e9431278ec07ade20ebb1fa4aef1e6a95064e92213
Malware Config
Extracted
redline
9-5
139.99.32.83:43199
-
auth_value
637de2b47f42d9cc7912f71cb6b57b5b
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1912-131-0x0000000000430000-0x0000000000450000-memory.dmp family_redline -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
a43e06bcb221f023a05ecd2dffc305cab8ccd8ef9437746237047f67dbcdfb0f.exedescription pid process target process PID 1736 set thread context of 1912 1736 a43e06bcb221f023a05ecd2dffc305cab8ccd8ef9437746237047f67dbcdfb0f.exe AppLaunch.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2372 1736 WerFault.exe a43e06bcb221f023a05ecd2dffc305cab8ccd8ef9437746237047f67dbcdfb0f.exe 3296 1736 WerFault.exe a43e06bcb221f023a05ecd2dffc305cab8ccd8ef9437746237047f67dbcdfb0f.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
AppLaunch.exepid process 1912 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 1912 AppLaunch.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
a43e06bcb221f023a05ecd2dffc305cab8ccd8ef9437746237047f67dbcdfb0f.exedescription pid process target process PID 1736 wrote to memory of 1912 1736 a43e06bcb221f023a05ecd2dffc305cab8ccd8ef9437746237047f67dbcdfb0f.exe AppLaunch.exe PID 1736 wrote to memory of 1912 1736 a43e06bcb221f023a05ecd2dffc305cab8ccd8ef9437746237047f67dbcdfb0f.exe AppLaunch.exe PID 1736 wrote to memory of 1912 1736 a43e06bcb221f023a05ecd2dffc305cab8ccd8ef9437746237047f67dbcdfb0f.exe AppLaunch.exe PID 1736 wrote to memory of 1912 1736 a43e06bcb221f023a05ecd2dffc305cab8ccd8ef9437746237047f67dbcdfb0f.exe AppLaunch.exe PID 1736 wrote to memory of 1912 1736 a43e06bcb221f023a05ecd2dffc305cab8ccd8ef9437746237047f67dbcdfb0f.exe AppLaunch.exe PID 1736 wrote to memory of 2372 1736 a43e06bcb221f023a05ecd2dffc305cab8ccd8ef9437746237047f67dbcdfb0f.exe WerFault.exe PID 1736 wrote to memory of 2372 1736 a43e06bcb221f023a05ecd2dffc305cab8ccd8ef9437746237047f67dbcdfb0f.exe WerFault.exe PID 1736 wrote to memory of 2372 1736 a43e06bcb221f023a05ecd2dffc305cab8ccd8ef9437746237047f67dbcdfb0f.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a43e06bcb221f023a05ecd2dffc305cab8ccd8ef9437746237047f67dbcdfb0f.exe"C:\Users\Admin\AppData\Local\Temp\a43e06bcb221f023a05ecd2dffc305cab8ccd8ef9437746237047f67dbcdfb0f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1736 -s 2962⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1736 -s 2962⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1736 -ip 17361⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1912-140-0x0000000006FD0000-0x000000000700C000-memory.dmpFilesize
240KB
-
memory/1912-142-0x0000000007BE0000-0x0000000007C72000-memory.dmpFilesize
584KB
-
memory/1912-148-0x0000000008770000-0x00000000087C0000-memory.dmpFilesize
320KB
-
memory/1912-137-0x00000000056E0000-0x0000000005CF8000-memory.dmpFilesize
6.1MB
-
memory/1912-138-0x0000000006F60000-0x0000000006F72000-memory.dmpFilesize
72KB
-
memory/1912-139-0x0000000007090000-0x000000000719A000-memory.dmpFilesize
1.0MB
-
memory/1912-131-0x0000000000430000-0x0000000000450000-memory.dmpFilesize
128KB
-
memory/1912-141-0x00000000080B0000-0x0000000008654000-memory.dmpFilesize
5.6MB
-
memory/1912-130-0x0000000000000000-mapping.dmp
-
memory/1912-143-0x0000000007C80000-0x0000000007CE6000-memory.dmpFilesize
408KB
-
memory/1912-144-0x0000000007CF0000-0x0000000007D66000-memory.dmpFilesize
472KB
-
memory/1912-145-0x0000000007ED0000-0x0000000007EEE000-memory.dmpFilesize
120KB
-
memory/1912-146-0x0000000008830000-0x00000000089F2000-memory.dmpFilesize
1.8MB
-
memory/1912-147-0x0000000008F30000-0x000000000945C000-memory.dmpFilesize
5.2MB
-
memory/2372-136-0x0000000000000000-mapping.dmp