Analysis
-
max time kernel
147s -
max time network
199s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
12-10-2022 15:19
Static task
static1
Behavioral task
behavioral1
Sample
WhatsApp/WhatsApp.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
WhatsApp/WhatsApp.exe
Resource
win10v2004-20220812-en
General
-
Target
WhatsApp/WhatsApp.exe
-
Size
700.0MB
-
MD5
eed6f462fa1726e08e0484b390ca06b0
-
SHA1
8e70784980600025bbc4fa69498e001c65455a8e
-
SHA256
658b0fd44002ad353d0cf9cb604e9b8cfcad04a3d221c5133bcf6872bca73577
-
SHA512
af67542f607afbe0f00de61c4d672b2736a375bd484d445cdd4c1e76407467babdb633849f16bbe411cd87f4194ba4024cdca82a1f8d58339c10d4c972903b9e
-
SSDEEP
12288:Fwe20JjM2oJNVmnWZQzjFeM6DJOjB9sTTHyW8PCVmGZqfOTP/cBtApi2b3r:FnRqVmnYQb6VOKyKg6b3r
Malware Config
Extracted
redline
WS-30
38.91.100.57:32750
-
auth_value
28ec3879b1ff499f6d9b6d3735d23e33
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 6 IoCs
resource yara_rule behavioral1/memory/1320-67-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral1/memory/1320-66-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral1/memory/1320-69-0x000000000042211E-mapping.dmp family_redline behavioral1/memory/1320-68-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral1/memory/1320-71-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral1/memory/1320-73-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1644 set thread context of 1320 1644 WhatsApp.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1500 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1500 powershell.exe Token: SeDebugPrivilege 1644 WhatsApp.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1644 wrote to memory of 1500 1644 WhatsApp.exe 27 PID 1644 wrote to memory of 1500 1644 WhatsApp.exe 27 PID 1644 wrote to memory of 1500 1644 WhatsApp.exe 27 PID 1644 wrote to memory of 1500 1644 WhatsApp.exe 27 PID 1644 wrote to memory of 1320 1644 WhatsApp.exe 30 PID 1644 wrote to memory of 1320 1644 WhatsApp.exe 30 PID 1644 wrote to memory of 1320 1644 WhatsApp.exe 30 PID 1644 wrote to memory of 1320 1644 WhatsApp.exe 30 PID 1644 wrote to memory of 1320 1644 WhatsApp.exe 30 PID 1644 wrote to memory of 1320 1644 WhatsApp.exe 30 PID 1644 wrote to memory of 1320 1644 WhatsApp.exe 30 PID 1644 wrote to memory of 1320 1644 WhatsApp.exe 30 PID 1644 wrote to memory of 1320 1644 WhatsApp.exe 30 PID 1644 wrote to memory of 1320 1644 WhatsApp.exe 30 PID 1644 wrote to memory of 1320 1644 WhatsApp.exe 30 PID 1644 wrote to memory of 1320 1644 WhatsApp.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\WhatsApp\WhatsApp.exe"C:\Users\Admin\AppData\Local\Temp\WhatsApp\WhatsApp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQA1AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1500
-
-
C:\Users\Admin\AppData\Local\Temp\WhatsApp\WhatsApp.exeC:\Users\Admin\AppData\Local\Temp\WhatsApp\WhatsApp.exe2⤵PID:1320
-