Analysis
-
max time kernel
91s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
17-08-2022 10:35
Static task
static1
Behavioral task
behavioral1
Sample
Launcher.exe
Resource
win7-20220812-en
windows7-x64
13 signatures
150 seconds
Behavioral task
behavioral2
Sample
Launcher.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
Launcher.exe
-
Size
4.6MB
-
MD5
4612516fca7a6fc9c393a76859d89539
-
SHA1
4d854c616dca1833ee3bb64befb39676a4cd26c3
-
SHA256
097c24ae162bd92ddfacc1276aada59fa7d058837c359a3f3a37f2ddc763e841
-
SHA512
700125943a1e7fca1f161c869cf7553e4462bd770763ad49e3ef1591d77ee521ff635b721af241718413442a5ecf3972981579396fd52472e4a5ddcc89b3e290
Score
10/10
Malware Config
Extracted
Family
redline
C2
62.204.41.141:24758
Attributes
-
auth_value
2c7c599df95f4eb1a36237ba938268a0
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/163200-140-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral2/memory/3068-145-0x0000000000400000-0x00000000009F9000-memory.dmp family_redline -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Launcher.exedescription pid process target process PID 3068 set thread context of 163200 3068 Launcher.exe AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
AppLaunch.exepid process 163200 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Launcher.exeAppLaunch.exedescription pid process Token: 33 3068 Launcher.exe Token: SeIncBasePriorityPrivilege 3068 Launcher.exe Token: SeDebugPrivilege 163200 AppLaunch.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
Launcher.exedescription pid process target process PID 3068 wrote to memory of 163200 3068 Launcher.exe AppLaunch.exe PID 3068 wrote to memory of 163200 3068 Launcher.exe AppLaunch.exe PID 3068 wrote to memory of 163200 3068 Launcher.exe AppLaunch.exe PID 3068 wrote to memory of 163200 3068 Launcher.exe AppLaunch.exe PID 3068 wrote to memory of 163200 3068 Launcher.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Launcher.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:163200