Analysis
-
max time kernel
91s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
19-06-2022 20:39
Static task
static1
Behavioral task
behavioral1
Sample
__1000.png.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
__1000.png.exe
Resource
win10v2004-20220414-en
General
-
Target
__1000.png.exe
-
Size
1.2MB
-
MD5
926ee43e282b9774b710501c4fff41c7
-
SHA1
4d8ebd4ac62c70e0e42d17b62a3051c686ece7df
-
SHA256
3b38378d0b57fc75646c350f286d53ad0d7a15ebd4d103374e2e2301758ab442
-
SHA512
9f338257255e53dc215fba6845af5a3cac39028be945481c514dd3393783a2be5f0d858ddbfba7b5716c8d62cf97870beaf467313db859ce93c601ae56c85257
Malware Config
Extracted
redline
2
45.142.122.179:36803
-
auth_value
8b4fd9f885203719dec0ceda822a4ec3
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
__1000.png.exedescription pid process target process PID 3768 set thread context of 4956 3768 __1000.png.exe InstallUtil.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
__1000.png.exeInstallUtil.exepid process 3768 __1000.png.exe 3768 __1000.png.exe 3768 __1000.png.exe 3768 __1000.png.exe 3768 __1000.png.exe 3768 __1000.png.exe 3768 __1000.png.exe 3768 __1000.png.exe 3768 __1000.png.exe 3768 __1000.png.exe 4956 InstallUtil.exe 4956 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
InstallUtil.exedescription pid process Token: SeDebugPrivilege 4956 InstallUtil.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
__1000.png.exedescription pid process target process PID 3768 wrote to memory of 960 3768 __1000.png.exe InstallUtil.exe PID 3768 wrote to memory of 960 3768 __1000.png.exe InstallUtil.exe PID 3768 wrote to memory of 960 3768 __1000.png.exe InstallUtil.exe PID 3768 wrote to memory of 4956 3768 __1000.png.exe InstallUtil.exe PID 3768 wrote to memory of 4956 3768 __1000.png.exe InstallUtil.exe PID 3768 wrote to memory of 4956 3768 __1000.png.exe InstallUtil.exe PID 3768 wrote to memory of 4956 3768 __1000.png.exe InstallUtil.exe PID 3768 wrote to memory of 4956 3768 __1000.png.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\__1000.png.exe"C:\Users\Admin\AppData\Local\Temp\__1000.png.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/960-134-0x0000000000000000-mapping.dmp
-
memory/3768-139-0x0000000002C49000-0x0000000002D8A000-memory.dmpFilesize
1.3MB
-
memory/3768-131-0x0000000002C49000-0x0000000002D8A000-memory.dmpFilesize
1.3MB
-
memory/3768-132-0x000000000CF40000-0x000000000D04C000-memory.dmpFilesize
1.0MB
-
memory/3768-133-0x000000000CF40000-0x000000000D04C000-memory.dmpFilesize
1.0MB
-
memory/3768-130-0x0000000002C49000-0x0000000002D8A000-memory.dmpFilesize
1.3MB
-
memory/4956-141-0x0000000007980000-0x0000000007992000-memory.dmpFilesize
72KB
-
memory/4956-144-0x0000000007DA0000-0x0000000007E16000-memory.dmpFilesize
472KB
-
memory/4956-136-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/4956-140-0x00000000060E0000-0x00000000066F8000-memory.dmpFilesize
6.1MB
-
memory/4956-135-0x0000000000000000-mapping.dmp
-
memory/4956-142-0x0000000007AB0000-0x0000000007BBA000-memory.dmpFilesize
1.0MB
-
memory/4956-143-0x00000000079E0000-0x0000000007A1C000-memory.dmpFilesize
240KB
-
memory/4956-138-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/4956-145-0x0000000007EC0000-0x0000000007F52000-memory.dmpFilesize
584KB
-
memory/4956-146-0x0000000008510000-0x0000000008AB4000-memory.dmpFilesize
5.6MB
-
memory/4956-147-0x0000000007EA0000-0x0000000007EBE000-memory.dmpFilesize
120KB
-
memory/4956-148-0x0000000008260000-0x00000000082C6000-memory.dmpFilesize
408KB
-
memory/4956-149-0x0000000008AC0000-0x0000000008C82000-memory.dmpFilesize
1.8MB
-
memory/4956-150-0x00000000091C0000-0x00000000096EC000-memory.dmpFilesize
5.2MB
-
memory/4956-151-0x0000000008D20000-0x0000000008D70000-memory.dmpFilesize
320KB