Analysis
-
max time kernel
165s -
max time network
184s -
platform
windows10_x64 -
resource
win10-20220414-en -
resource tags
arch:x64arch:x86image:win10-20220414-enlocale:en-usos:windows10-1703-x64system -
submitted
12-08-2022 01:26
Static task
static1
Behavioral task
behavioral1
Sample
AAFFD1B06AD080670E8CF627C0F0C4E961A8BE4FEFCC0910A30D726855669234.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
AAFFD1B06AD080670E8CF627C0F0C4E961A8BE4FEFCC0910A30D726855669234.exe
Resource
win10-20220414-en
General
-
Target
AAFFD1B06AD080670E8CF627C0F0C4E961A8BE4FEFCC0910A30D726855669234.exe
-
Size
2.5MB
-
MD5
124d1f6dad8e6dd823ab9c96cab8f113
-
SHA1
717bfa0241abfa8fa744e16f80d6fde99ad0b243
-
SHA256
aaffd1b06ad080670e8cf627c0f0c4e961a8be4fefcc0910a30d726855669234
-
SHA512
7050d5073df91855ee7c5ec60de48861cac5e2bd6cb9beb26a7bdccc967ea35cf70f91a37aae2a794fd4d83613b0d23dfabbe3cbd67b889881d9c423ab2d8772
Malware Config
Extracted
redline
185.215.113.83:60722
-
auth_value
ee9d4f10e44838ce0db5ea42cecb58a9
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/211092-134-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral2/memory/211092-139-0x000000000041B4EE-mapping.dmp family_redline -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
AAFFD1B06AD080670E8CF627C0F0C4E961A8BE4FEFCC0910A30D726855669234.exedescription pid process target process PID 936 set thread context of 211092 936 AAFFD1B06AD080670E8CF627C0F0C4E961A8BE4FEFCC0910A30D726855669234.exe AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
AppLaunch.exepid process 211092 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 211092 AppLaunch.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
AAFFD1B06AD080670E8CF627C0F0C4E961A8BE4FEFCC0910A30D726855669234.exedescription pid process target process PID 936 wrote to memory of 211092 936 AAFFD1B06AD080670E8CF627C0F0C4E961A8BE4FEFCC0910A30D726855669234.exe AppLaunch.exe PID 936 wrote to memory of 211092 936 AAFFD1B06AD080670E8CF627C0F0C4E961A8BE4FEFCC0910A30D726855669234.exe AppLaunch.exe PID 936 wrote to memory of 211092 936 AAFFD1B06AD080670E8CF627C0F0C4E961A8BE4FEFCC0910A30D726855669234.exe AppLaunch.exe PID 936 wrote to memory of 211092 936 AAFFD1B06AD080670E8CF627C0F0C4E961A8BE4FEFCC0910A30D726855669234.exe AppLaunch.exe PID 936 wrote to memory of 211092 936 AAFFD1B06AD080670E8CF627C0F0C4E961A8BE4FEFCC0910A30D726855669234.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\AAFFD1B06AD080670E8CF627C0F0C4E961A8BE4FEFCC0910A30D726855669234.exe"C:\Users\Admin\AppData\Local\Temp\AAFFD1B06AD080670E8CF627C0F0C4E961A8BE4FEFCC0910A30D726855669234.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:211092