Analysis
-
max time kernel
248s -
max time network
544s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 13:15
Static task
static1
Behavioral task
behavioral1
Sample
ALMV Launcher.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ALMV Launcher.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
amd_ags_x64.dll
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
amd_ags_x64.dll
Resource
win10v2004-20220812-en
General
-
Target
ALMV Launcher.exe
-
Size
742.6MB
-
MD5
8cddcf405a72b2d981532e1d3e17699f
-
SHA1
f7bfb31a2c1bf54f7ef880239056b1856630d664
-
SHA256
859185aee0c38ff110e5f3db1540ad2652e9169ebb96bdf4c9712687e6221371
-
SHA512
0574f3d8949a8b0699559ff94ce78d186506b01e1332075d55860e0db2ee9a051e0ae9e7af2481866061d5cdc0ea2d47633c34089e16da66dd430490bb8312ca
-
SSDEEP
12288:7TFXGNy0issp5HNisIMCpzXoeU7WS86Og5MGdaUjbIh9/sWr:fxbssp5H1IMCpTo+KX
Malware Config
Extracted
redline
almv
79.137.199.206:45354
-
auth_value
76c2a356a8839fd8b4eaf48948178a8a
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
ALMV Launcher.exedescription pid process target process PID 2036 set thread context of 3408 2036 ALMV Launcher.exe AddInProcess32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2432 2036 WerFault.exe ALMV Launcher.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AddInProcess32.exepid process 3408 AddInProcess32.exe 3408 AddInProcess32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AddInProcess32.exedescription pid process Token: SeDebugPrivilege 3408 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
ALMV Launcher.exedescription pid process target process PID 2036 wrote to memory of 3408 2036 ALMV Launcher.exe AddInProcess32.exe PID 2036 wrote to memory of 3408 2036 ALMV Launcher.exe AddInProcess32.exe PID 2036 wrote to memory of 3408 2036 ALMV Launcher.exe AddInProcess32.exe PID 2036 wrote to memory of 3408 2036 ALMV Launcher.exe AddInProcess32.exe PID 2036 wrote to memory of 3408 2036 ALMV Launcher.exe AddInProcess32.exe PID 2036 wrote to memory of 3408 2036 ALMV Launcher.exe AddInProcess32.exe PID 2036 wrote to memory of 3408 2036 ALMV Launcher.exe AddInProcess32.exe PID 2036 wrote to memory of 3408 2036 ALMV Launcher.exe AddInProcess32.exe PID 2036 wrote to memory of 3408 2036 ALMV Launcher.exe AddInProcess32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ALMV Launcher.exe"C:\Users\Admin\AppData\Local\Temp\ALMV Launcher.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AddInProcess32.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3408 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 5722⤵
- Program crash
PID:2432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2036 -ip 20361⤵PID:1792
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3408-132-0x0000000000000000-mapping.dmp
-
memory/3408-133-0x0000000000C00000-0x0000000000C36000-memory.dmpFilesize
216KB
-
memory/3408-134-0x00000000056A0000-0x0000000005CB8000-memory.dmpFilesize
6.1MB
-
memory/3408-135-0x0000000005080000-0x0000000005092000-memory.dmpFilesize
72KB
-
memory/3408-136-0x00000000051B0000-0x00000000052BA000-memory.dmpFilesize
1.0MB
-
memory/3408-137-0x00000000050E0000-0x000000000511C000-memory.dmpFilesize
240KB
-
memory/3408-138-0x0000000005E00000-0x0000000005E92000-memory.dmpFilesize
584KB
-
memory/3408-139-0x0000000006450000-0x00000000069F4000-memory.dmpFilesize
5.6MB
-
memory/3408-140-0x0000000005EA0000-0x0000000005F06000-memory.dmpFilesize
408KB
-
memory/3408-141-0x0000000007780000-0x0000000007942000-memory.dmpFilesize
1.8MB
-
memory/3408-142-0x0000000007E80000-0x00000000083AC000-memory.dmpFilesize
5.2MB
-
memory/3408-143-0x0000000006C40000-0x0000000006CB6000-memory.dmpFilesize
472KB
-
memory/3408-144-0x0000000006BA0000-0x0000000006BBE000-memory.dmpFilesize
120KB