Analysis
-
max time kernel
41s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 18:32
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.PWSX-gen.24835.20523.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.PWSX-gen.24835.20523.exe
Resource
win10v2004-20220812-en
General
-
Target
SecuriteInfo.com.Win32.PWSX-gen.24835.20523.exe
-
Size
216KB
-
MD5
f26954c64a0af9a97ff35355dfc233a0
-
SHA1
6da41827230a917ef747cdee06e2e104d5168127
-
SHA256
1cf660313e31e12e6fb8a8facd9930760d32df76d653702f02af1385a37e4f01
-
SHA512
de216842dab46a2ab49ee3e4739e7cc47ee7fd13e2641e8722f06a96b920725dd90209f3cdc668669a7d752624d36698508094938711640905c9f9d7d5b34a87
-
SSDEEP
3072:xhbc8yCxsFNcEyyrJ9WU4khLTvPZFzD0yfZNuzK/hRp1d53CDX5dINLqVqU:GCxGNp7FUyf2AhZjwINut
Malware Config
Extracted
redline
@P1
193.106.191.138:32796
-
auth_value
54c79ce081122137049ee07c0a2f38ab
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/788-56-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral1/memory/788-61-0x00000000004221CA-mapping.dmp family_redline behavioral1/memory/788-63-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral1/memory/788-62-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.Win32.PWSX-gen.24835.20523.exedescription pid process target process PID 872 set thread context of 788 872 SecuriteInfo.com.Win32.PWSX-gen.24835.20523.exe vbc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
vbc.exepid process 788 vbc.exe 788 vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
vbc.exedescription pid process Token: SeDebugPrivilege 788 vbc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
SecuriteInfo.com.Win32.PWSX-gen.24835.20523.exedescription pid process target process PID 872 wrote to memory of 788 872 SecuriteInfo.com.Win32.PWSX-gen.24835.20523.exe vbc.exe PID 872 wrote to memory of 788 872 SecuriteInfo.com.Win32.PWSX-gen.24835.20523.exe vbc.exe PID 872 wrote to memory of 788 872 SecuriteInfo.com.Win32.PWSX-gen.24835.20523.exe vbc.exe PID 872 wrote to memory of 788 872 SecuriteInfo.com.Win32.PWSX-gen.24835.20523.exe vbc.exe PID 872 wrote to memory of 788 872 SecuriteInfo.com.Win32.PWSX-gen.24835.20523.exe vbc.exe PID 872 wrote to memory of 788 872 SecuriteInfo.com.Win32.PWSX-gen.24835.20523.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.24835.20523.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.24835.20523.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\vbc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/788-54-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/788-56-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/788-61-0x00000000004221CA-mapping.dmp
-
memory/788-63-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/788-62-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/788-64-0x0000000076181000-0x0000000076183000-memory.dmpFilesize
8KB