Analysis
-
max time kernel
59s -
max time network
64s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30-09-2022 09:08
Static task
static1
Behavioral task
behavioral1
Sample
private valorant.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
private valorant.exe
Resource
win10v2004-20220812-en
General
-
Target
private valorant.exe
-
Size
2.6MB
-
MD5
4fe4971ca7dba89c1793b359cfbe8fd5
-
SHA1
2305e68738b5d6ce615d9386e7030c0120609428
-
SHA256
20178c4c0448a12445242ade89d2dd6973493c22ec545b45d69193fff0795dbd
-
SHA512
8da1b49237ccf820a11af103432f2c59f7c538735b54ce7f30cd8c4f3ed5f1f823e98691ff889b4a9088b77fdc65d9ea5afbc51d556f5eb53250a64750c442e5
-
SSDEEP
24576:Iz/1l1gz6B8BWccYvYhFMdeWQMyGdkYlHGTlNn7zVSYZJYvv9vOLyOkDPl3RuQ5C:6P1gu8BWvq8tEYZJYvv9vODkDPl30
Malware Config
Extracted
redline
62.204.41.141:24758
-
auth_value
6ecfe2239bb32c15669e8ad6e1fa793c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/100832-56-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral1/memory/100832-61-0x00000000004227EE-mapping.dmp family_redline behavioral1/memory/100832-62-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral1/memory/100832-63-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
MainModule.exestart.exepid process 101168 MainModule.exe 101232 start.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\start.exe upx C:\Users\Admin\AppData\Local\Temp\start.exe upx \Users\Admin\AppData\Local\Temp\start.exe upx behavioral1/memory/101232-78-0x0000000000150000-0x0000000001416000-memory.dmp upx behavioral1/memory/101232-81-0x0000000000150000-0x0000000001416000-memory.dmp upx -
Loads dropped DLL 3 IoCs
Processes:
AppLaunch.exepid process 100832 AppLaunch.exe 100832 AppLaunch.exe 100832 AppLaunch.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
private valorant.exedescription pid process target process PID 1464 set thread context of 100832 1464 private valorant.exe AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
AppLaunch.exeMainModule.exepid process 100832 AppLaunch.exe 100832 AppLaunch.exe 101168 MainModule.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
AppLaunch.exeMainModule.exeAUDIODG.EXEdescription pid process Token: SeDebugPrivilege 100832 AppLaunch.exe Token: SeDebugPrivilege 101168 MainModule.exe Token: 33 1380 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1380 AUDIODG.EXE Token: 33 1380 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1380 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
private valorant.exeAppLaunch.exedescription pid process target process PID 1464 wrote to memory of 100832 1464 private valorant.exe AppLaunch.exe PID 1464 wrote to memory of 100832 1464 private valorant.exe AppLaunch.exe PID 1464 wrote to memory of 100832 1464 private valorant.exe AppLaunch.exe PID 1464 wrote to memory of 100832 1464 private valorant.exe AppLaunch.exe PID 1464 wrote to memory of 100832 1464 private valorant.exe AppLaunch.exe PID 1464 wrote to memory of 100832 1464 private valorant.exe AppLaunch.exe PID 1464 wrote to memory of 100832 1464 private valorant.exe AppLaunch.exe PID 1464 wrote to memory of 100832 1464 private valorant.exe AppLaunch.exe PID 1464 wrote to memory of 100832 1464 private valorant.exe AppLaunch.exe PID 100832 wrote to memory of 101168 100832 AppLaunch.exe MainModule.exe PID 100832 wrote to memory of 101168 100832 AppLaunch.exe MainModule.exe PID 100832 wrote to memory of 101168 100832 AppLaunch.exe MainModule.exe PID 100832 wrote to memory of 101168 100832 AppLaunch.exe MainModule.exe PID 100832 wrote to memory of 101168 100832 AppLaunch.exe MainModule.exe PID 100832 wrote to memory of 101168 100832 AppLaunch.exe MainModule.exe PID 100832 wrote to memory of 101168 100832 AppLaunch.exe MainModule.exe PID 100832 wrote to memory of 101232 100832 AppLaunch.exe start.exe PID 100832 wrote to memory of 101232 100832 AppLaunch.exe start.exe PID 100832 wrote to memory of 101232 100832 AppLaunch.exe start.exe PID 100832 wrote to memory of 101232 100832 AppLaunch.exe start.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\private valorant.exe"C:\Users\Admin\AppData\Local\Temp\private valorant.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\MainModule.exe"C:\Users\Admin\AppData\Local\Temp\MainModule.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"3⤵
- Executes dropped EXE
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2ec1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\MainModule.exeFilesize
72KB
MD5077d5c3447d5e03cd4ad1bb68033ec03
SHA1290b6cce8788511265be31c2fbe4739fe9fc2132
SHA25678e3ff8a08208d3b5c7f7b8397fdfa4ede7ce0717546167b3d5635074922fd4c
SHA5124efad46544565ac336594a8c14add1657ad202afe225e50afb566e8922d0d356ff60e1b0e2061ffd6ec238c1657ded38428294e0886ec7feb9231e84228cf1a6
-
C:\Users\Admin\AppData\Local\Temp\MainModule.exeFilesize
72KB
MD5077d5c3447d5e03cd4ad1bb68033ec03
SHA1290b6cce8788511265be31c2fbe4739fe9fc2132
SHA25678e3ff8a08208d3b5c7f7b8397fdfa4ede7ce0717546167b3d5635074922fd4c
SHA5124efad46544565ac336594a8c14add1657ad202afe225e50afb566e8922d0d356ff60e1b0e2061ffd6ec238c1657ded38428294e0886ec7feb9231e84228cf1a6
-
C:\Users\Admin\AppData\Local\Temp\start.exeFilesize
5.1MB
MD53e2922711ccfb0d4c63bc2e1ac3962cb
SHA1c0080d77f23d9ba6aea56bf808e7047564ddff51
SHA2566e4581639b79846f73463632b751fbfb6568b3f3d12d14e1cf9a9f4f818d7a56
SHA51247de0b4c5a20aeb8a777f1dc8f7c3fa9264d472d229727c97a12d77ac06f99000f830c73f261d3ad529e91ef9b4dcf944263292f4e69084cd0cd66826091d8f4
-
\Users\Admin\AppData\Local\Temp\MainModule.exeFilesize
72KB
MD5077d5c3447d5e03cd4ad1bb68033ec03
SHA1290b6cce8788511265be31c2fbe4739fe9fc2132
SHA25678e3ff8a08208d3b5c7f7b8397fdfa4ede7ce0717546167b3d5635074922fd4c
SHA5124efad46544565ac336594a8c14add1657ad202afe225e50afb566e8922d0d356ff60e1b0e2061ffd6ec238c1657ded38428294e0886ec7feb9231e84228cf1a6
-
\Users\Admin\AppData\Local\Temp\start.exeFilesize
5.1MB
MD53e2922711ccfb0d4c63bc2e1ac3962cb
SHA1c0080d77f23d9ba6aea56bf808e7047564ddff51
SHA2566e4581639b79846f73463632b751fbfb6568b3f3d12d14e1cf9a9f4f818d7a56
SHA51247de0b4c5a20aeb8a777f1dc8f7c3fa9264d472d229727c97a12d77ac06f99000f830c73f261d3ad529e91ef9b4dcf944263292f4e69084cd0cd66826091d8f4
-
\Users\Admin\AppData\Local\Temp\start.exeFilesize
5.1MB
MD53e2922711ccfb0d4c63bc2e1ac3962cb
SHA1c0080d77f23d9ba6aea56bf808e7047564ddff51
SHA2566e4581639b79846f73463632b751fbfb6568b3f3d12d14e1cf9a9f4f818d7a56
SHA51247de0b4c5a20aeb8a777f1dc8f7c3fa9264d472d229727c97a12d77ac06f99000f830c73f261d3ad529e91ef9b4dcf944263292f4e69084cd0cd66826091d8f4
-
memory/100832-64-0x0000000075B51000-0x0000000075B53000-memory.dmpFilesize
8KB
-
memory/100832-76-0x00000000076B0000-0x0000000008976000-memory.dmpFilesize
18.8MB
-
memory/100832-54-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/100832-63-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/100832-80-0x00000000076B0000-0x0000000008976000-memory.dmpFilesize
18.8MB
-
memory/100832-77-0x00000000076B0000-0x0000000008976000-memory.dmpFilesize
18.8MB
-
memory/100832-62-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/100832-61-0x00000000004227EE-mapping.dmp
-
memory/100832-56-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/101168-66-0x0000000000000000-mapping.dmp
-
memory/101168-71-0x00000000002E0000-0x00000000002E6000-memory.dmpFilesize
24KB
-
memory/101168-70-0x0000000000300000-0x0000000000318000-memory.dmpFilesize
96KB
-
memory/101232-74-0x0000000000000000-mapping.dmp
-
memory/101232-78-0x0000000000150000-0x0000000001416000-memory.dmpFilesize
18.8MB
-
memory/101232-81-0x0000000000150000-0x0000000001416000-memory.dmpFilesize
18.8MB
-
memory/101356-79-0x000007FEFB5E1000-0x000007FEFB5E3000-memory.dmpFilesize
8KB